{"id":"https://openalex.org/W2616364971","doi":"https://doi.org/10.1109/ict.2017.7998272","title":"Intrusion recovery in NLOS WSNs with a varying network density","display_name":"Intrusion recovery in NLOS WSNs with a varying network density","publication_year":2017,"publication_date":"2017-05-01","ids":{"openalex":"https://openalex.org/W2616364971","doi":"https://doi.org/10.1109/ict.2017.7998272","mag":"2616364971"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/ict.2017.7998272","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5032212838","display_name":"Eliana Stavrou","orcid":"https://orcid.org/0000-0003-4040-4942"},"institutions":[{"id":"https://openalex.org/I4210108889","display_name":"University of Central Lancashire Cyprus","ror":"https://ror.org/020ps3a34","country_code":"CY","type":"education","lineage":["https://openalex.org/I4210108889"]}],"countries":["CY"],"is_corresponding":false,"raw_author_name":"Eliana Stavrou","raw_affiliation_strings":["Computing Department, University of Central Lancashire, Larnaca, Cyprus"],"affiliations":[{"raw_affiliation_string":"Computing Department, University of Central Lancashire, Larnaca, Cyprus","institution_ids":["https://openalex.org/I4210108889"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5003106918","display_name":"Stavros Stavrou","orcid":null},"institutions":[{"id":"https://openalex.org/I59746437","display_name":"Open University of Cyprus","ror":"https://ror.org/033sm2k57","country_code":"CY","type":"education","lineage":["https://openalex.org/I59746437"]}],"countries":["CY"],"is_corresponding":false,"raw_author_name":"Stavros Stavrou","raw_affiliation_strings":["Faculty of Pure and Applied Sciences, Open University of Cyprus, Nicosia, Cyprus"],"affiliations":[{"raw_affiliation_string":"Faculty of Pure and Applied Sciences, Open University of Cyprus, Nicosia, Cyprus","institution_ids":["https://openalex.org/I59746437"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":0,"citation_normalized_percentile":{"value":0.0,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":0,"max":63},"biblio":{"volume":"3","issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9977,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-tolerance","display_name":"Intrusion tolerance","score":0.46967086},{"id":"https://openalex.org/keywords/non-line-of-sight-propagation","display_name":"Non-line-of-sight propagation","score":0.45898473}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.70924044},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.6518552},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.6339858},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.60379857},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.56347036},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.54037297},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.51966345},{"id":"https://openalex.org/C196903269","wikidata":"https://www.wikidata.org/wiki/Q6059063","display_name":"Intrusion tolerance","level":3,"score":0.46967086},{"id":"https://openalex.org/C154910267","wikidata":"https://www.wikidata.org/wiki/Q1740982","display_name":"Non-line-of-sight propagation","level":3,"score":0.45898473},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.41834462},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.34071824},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.30675113},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.17009768},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C17409809","wikidata":"https://www.wikidata.org/wiki/Q161764","display_name":"Geochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/ict.2017.7998272","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7,"display_name":"Peace, justice, and strong institutions","id":"https://metadata.un.org/sdg/16"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":18,"referenced_works":["https://openalex.org/W1652714411","https://openalex.org/W1997372906","https://openalex.org/W2061292137","https://openalex.org/W2063699838","https://openalex.org/W2101363008","https://openalex.org/W2107984909","https://openalex.org/W2134576828","https://openalex.org/W2136032111","https://openalex.org/W2142100695","https://openalex.org/W2151090982","https://openalex.org/W2168452204","https://openalex.org/W2323865746","https://openalex.org/W2465495723","https://openalex.org/W2473247000","https://openalex.org/W2512852454","https://openalex.org/W2547891244","https://openalex.org/W2737645800","https://openalex.org/W4290442704"],"related_works":["https://openalex.org/W34565110","https://openalex.org/W2487262093","https://openalex.org/W2389356976","https://openalex.org/W2356891656","https://openalex.org/W2353050426","https://openalex.org/W2352562479","https://openalex.org/W2347413713","https://openalex.org/W2133389611","https://openalex.org/W1539957869","https://openalex.org/W136910588"],"abstract_inverted_index":{"The":[0,32,94,114],"Internet":[1],"of":[2,10,35,62,96,122,156,219,227],"Things":[3],"(IoT)":[4],"paradigm,":[5],"supported":[6],"by":[7,176],"the":[8,39,56,68,120,145,149,154,180,191,207,217,220],"operation":[9],"wireless":[11],"sensor":[12,177],"networks":[13],"(WSNs),":[14],"has":[15],"gained":[16],"a":[17,47,60,88,123,157,169],"great":[18],"attention":[19],"lately":[20],"and":[21,25,91,109,126,137,148,160,204,230],"new":[22],"security":[23],"concerns":[24],"challenges":[26],"are":[27,223],"emerging":[28],"from":[29],"its":[30,127,161],"usage.":[31],"rising":[33],"number":[34],"cyber":[36],"threats":[37],"makes":[38],"quest":[40],"for":[41,195],"solutions":[42],"to":[43,54,76,84,87,104,107,215],"promote":[44],"resilient":[45],"operations":[46],"necessity.":[48],"A":[49],"major":[50],"threat":[51],"that":[52,80,142],"continues":[53],"concern":[55],"research":[57,133],"community":[58],"is":[59,72,100,174,183,202,211],"denial":[61],"service":[63],"(DoS)":[64],"attack.":[65],"In":[66,166,213],"case":[67],"network's":[69],"communication":[70,112,146],"path":[71],"compromised,":[73],"it":[74],"needs":[75],"be":[77,105],"restored":[78],"so":[79],"sensors":[81],"can":[82,118,152],"continue":[83],"propagate":[85],"observations":[86],"control":[89],"center":[90],"support":[92,216],"decision-making.":[93],"performance":[95,210],"intrusion":[97,129,163,208],"recovery":[98,130,164,209],"measures":[99],"critical":[101],"in":[102,138,144],"order":[103,214],"able":[106],"recover":[108],"restore":[110],"network":[111,115,150],"effectively.":[113],"deployment":[116],"layout":[117],"affect":[119],"effectiveness":[121],"DoS":[124,158,181],"attack":[125,159,182],"respective":[128,162],"measures.":[131],"This":[132],"work":[134],"investigates":[135],"how":[136,206],"what":[139],"way":[140],"shadowing":[141,201],"occurs":[143],"paths":[147],"density,":[151],"impact":[153],"efficiency":[155],"measure.":[165],"this":[167],"work,":[168],"low":[170],"duty":[171],"cycle":[172],"measure":[173],"applied":[175],"nodes":[178,193],"once":[179],"detected.":[184],"Investigations":[185],"focus":[186],"on:":[187],"a)":[188],"identifying":[189],"if":[190],"malicious":[192],"chances":[194],"compromisation":[196],"increase":[197],"or":[198],"decrease":[199],"when":[200],"considered,":[203],"b)":[205],"affected.":[212],"objectives":[218],"investigations,":[221],"comparisons":[222],"performed":[224],"between":[225],"Line":[226],"Sight":[228],"(LOS)":[229],"Non":[231],"LOS":[232],"(NLOS)":[233],"scenarios.":[234]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2616364971","counts_by_year":[],"updated_date":"2024-12-10T09:28:46.719186","created_date":"2017-05-26"}