{"id":"https://openalex.org/W2171383939","doi":"https://doi.org/10.1109/trustcom.2013.276","title":"A Novel Evidential Evaluation for Internal Attacks with Dempster-Shafer Theory in WSN","display_name":"A Novel Evidential Evaluation for Internal Attacks with Dempster-Shafer Theory in WSN","publication_year":2013,"publication_date":"2013-07-01","ids":{"openalex":"https://openalex.org/W2171383939","doi":"https://doi.org/10.1109/trustcom.2013.276","mag":"2171383939"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/trustcom.2013.276","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102377615","display_name":"Muhammad R. Ahmed","orcid":null},"institutions":[{"id":"https://openalex.org/I188329596","display_name":"University of Canberra","ror":"https://ror.org/04s1nv328","country_code":"AU","type":"education","lineage":["https://openalex.org/I188329596"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Muhammad R. Ahmed","raw_affiliation_strings":["Faculty of information Sciences and engineering, University of Canberra, Canberra, Australia"],"affiliations":[{"raw_affiliation_string":"Faculty of information Sciences and engineering, University of Canberra, Canberra, Australia","institution_ids":["https://openalex.org/I188329596"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108457255","display_name":"Xu Huang","orcid":null},"institutions":[{"id":"https://openalex.org/I188329596","display_name":"University of Canberra","ror":"https://ror.org/04s1nv328","country_code":"AU","type":"education","lineage":["https://openalex.org/I188329596"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Xu Huang","raw_affiliation_strings":["Faculty of information Sciences and engineering, University of Canberra, Canberra, Australia"],"affiliations":[{"raw_affiliation_string":"Faculty of information Sciences and engineering, University of Canberra, Canberra, Australia","institution_ids":["https://openalex.org/I188329596"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5047836896","display_name":"Hongyan Cui","orcid":"https://orcid.org/0000-0003-1061-0112"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongyan Cui","raw_affiliation_strings":["School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, China","institution_ids":["https://openalex.org/I139759216"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.687,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":4,"citation_normalized_percentile":{"value":0.513011,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":78,"max":80},"biblio":{"volume":"2","issue":null,"first_page":"688","last_page":"693"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Intrusion Detection and Defense Mechanisms","score":0.9983,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Wireless Sensor Networks: Survey and Applications","score":0.9972,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/dempster\u2013shafer-theory","display_name":"Dempster\u2013Shafer theory","score":0.6473427},{"id":"https://openalex.org/keywords/wireless-sensor-networks","display_name":"Wireless Sensor Networks","score":0.613212},{"id":"https://openalex.org/keywords/attack-detection","display_name":"Attack Detection","score":0.566233},{"id":"https://openalex.org/keywords/mobile-sensor-deployment","display_name":"Mobile Sensor Deployment","score":0.542995},{"id":"https://openalex.org/keywords/intrusion-detection","display_name":"Intrusion Detection","score":0.542279},{"id":"https://openalex.org/keywords/battlefield","display_name":"Battlefield","score":0.54169744},{"id":"https://openalex.org/keywords/wireless-networks","display_name":"Wireless Networks","score":0.518702}],"concepts":[{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.72163135},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7026281},{"id":"https://openalex.org/C178011137","wikidata":"https://www.wikidata.org/wiki/Q285997","display_name":"Dempster\u2013Shafer theory","level":2,"score":0.6473427},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.60899013},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.58787584},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.555577},{"id":"https://openalex.org/C2779669469","wikidata":"https://www.wikidata.org/wiki/Q4895508","display_name":"Battlefield","level":2,"score":0.54169744},{"id":"https://openalex.org/C2778156585","wikidata":"https://www.wikidata.org/wiki/Q174053","display_name":"Relay","level":3,"score":0.53416544},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.46419847},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.42500383},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2430763},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.14826158},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.13528606},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0},{"id":"https://openalex.org/C195244886","wikidata":"https://www.wikidata.org/wiki/Q41493","display_name":"Ancient history","level":1,"score":0.0},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/trustcom.2013.276","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.66}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":30,"referenced_works":["https://openalex.org/W1559097925","https://openalex.org/W1562321138","https://openalex.org/W1600757692","https://openalex.org/W1600834507","https://openalex.org/W1716149433","https://openalex.org/W1884115838","https://openalex.org/W1886022907","https://openalex.org/W2036358294","https://openalex.org/W2058983206","https://openalex.org/W2097380742","https://openalex.org/W2110689325","https://openalex.org/W2116018197","https://openalex.org/W2119331832","https://openalex.org/W2127699957","https://openalex.org/W2136992183","https://openalex.org/W2139149021","https://openalex.org/W2140104285","https://openalex.org/W2146716049","https://openalex.org/W2150298171","https://openalex.org/W2155947520","https://openalex.org/W2157568282","https://openalex.org/W2168125208","https://openalex.org/W2171215799","https://openalex.org/W2226271380","https://openalex.org/W2326778481","https://openalex.org/W2505390583","https://openalex.org/W2885811487","https://openalex.org/W3100117785","https://openalex.org/W3145900515","https://openalex.org/W4252430522"],"related_works":["https://openalex.org/W4294619279","https://openalex.org/W4230275798","https://openalex.org/W2953038261","https://openalex.org/W2539674285","https://openalex.org/W2363573290","https://openalex.org/W2185155656","https://openalex.org/W2039188918","https://openalex.org/W1984179778","https://openalex.org/W1968383387","https://openalex.org/W1494981048"],"abstract_inverted_index":{"Wireless":[0],"Sensor":[1],"Network":[2],"(WSN)":[3],"consists":[4],"of":[5,60,69,84,89,137,196,221,229],"low-cost":[6],"and":[7,24,34,65,91,116],"multifunctional":[8],"resources":[9],"constrain":[10],"nodes":[11,90,184],"that":[12],"communicate":[13],"at":[14],"short":[15],"distances":[16],"through":[17],"wireless":[18],"links.":[19],"It":[20,36,76],"is":[21,77,161,170],"open":[22],"media":[23],"underpinned":[25],"by":[26],"an":[27],"application":[28,66],"driven":[29],"technology":[30],"for":[31,40,86,216],"information":[32],"gathering":[33],"processing.":[35],"can":[37,185],"be":[38,80,186],"used":[39],"many":[41],"different":[42,171],"applications":[43],"range":[44],"from":[45,132,172,223],"military":[46],"implementation":[47],"in":[48,102,179,207],"the":[49,87,118,158,173,202],"battlefield,":[50],"environmental":[51],"monitoring,":[52],"health":[53],"sector":[54],"as":[55,57],"well":[56],"emergency":[58],"response":[59],"surveillance.":[61],"With":[62],"its":[63,99],"nature":[64],"scenario,":[67],"security":[68,105,151],"WSN":[70,131,154],"had":[71],"drawn":[72],"a":[73,149,153,162,180,208,213],"great":[74],"attention.":[75],"known":[78],"to":[79,82,97,122,129,156,200],"valuable":[81],"variety":[83],"attacks":[85,121,134,160,206],"construction":[88],"distributed":[92],"network":[93],"infrastructure.":[94],"In":[95,188],"order":[96],"ensure":[98],"functionality":[100],"especially":[101],"malicious":[103,203],"environments,":[104],"mechanisms":[106],"are":[107],"essential.":[108],"Malicious":[109],"or":[110,145,204],"internal":[111,133,159,165,205],"attacker":[112],"has":[113],"gained":[114],"prominence":[115],"poses":[117],"most":[119,136],"challenging":[120],"WSN.":[123,209],"Many":[124],"works":[125],"have":[126],"been":[127],"done":[128],"secure":[130],"but":[135],"it":[138,211],"relay":[139],"on":[140],"either":[141],"training":[142],"data":[143],"set":[144],"predefined":[146],"threshold.":[147],"Without":[148],"fixed":[150],"infrastructure":[152],"needs":[155],"find":[157],"challenge.":[163],"Normally,":[164],"attack's":[166],"node":[167],"behavioral":[168],"pattern":[169],"other":[174],"neighbors,":[175],"called":[176],"\"good":[177],"nodes,\"":[178],"system":[181],"even":[182],"neighbor":[183,225],"attacked.":[187],"this":[189],"paper,":[190],"we":[191],"use":[192],"Dempster-Shafer":[193],"theory":[194],"(DST)":[195],"combined":[197],"multiple":[198,219],"evidences":[199,222],"identify":[201],"Moreover,":[210],"gives":[212],"numerical":[214],"procedure":[215],"fusing":[217],"together":[218],"pieces":[220],"unreliable":[224],"with":[226],"higher":[227],"degree":[228],"conflict":[230],"reliability.":[231]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2171383939","counts_by_year":[{"year":2018,"cited_by_count":1},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":1}],"updated_date":"2024-11-19T17:24:21.849753","created_date":"2016-06-24"}