WEKO3
アイテム
{"_buckets": {"deposit": "9c2367a7-c56d-40f4-a079-b2463a4453b0"}, "_deposit": {"created_by": 18, "id": "9039", "owners": [18], "pid": {"revision_id": 0, "type": "depid", "value": "9039"}, "status": "published"}, "_oai": {"id": "oai:muroran-it.repo.nii.ac.jp:00009039", "sets": ["46", "316", "352"]}, "author_link": ["21131", "39157", "53561", "39433"], "item_79_biblio_info_10": {"attribute_name": "書誌情報", "attribute_value_mlt": [{"bibliographicIssueDates": {"bibliographicIssueDate": "2016-09", "bibliographicIssueDateType": "Issued"}, "bibliographicIssueNumber": "9", "bibliographicPageEnd": "2027", "bibliographicPageStart": "2013", "bibliographicVolumeNumber": "11", "bibliographic_titles": [{"bibliographic_title": "IEEE Transactions on Information Forensics and Security", "bibliographic_titleLang": "en"}]}]}, "item_79_description_23": {"attribute_name": "フォーマット", "attribute_value_mlt": [{"subitem_description": "application/pdf", "subitem_description_type": "Other"}]}, "item_79_description_7": {"attribute_name": "抄録", "attribute_value_mlt": [{"subitem_description": "Wireless sensor networks (WSNs) are increasingly being deployed in security-critical applications. Because of their inherent resource-constrained characteristics, they are prone to various security attacks, and a black hole attack is a type of attack that seriously affects data collection. To conquer that challenge, an active detection-based security and trust routing scheme named ActiveTrust is proposed for WSNs. The most important innovation of ActiveTrust is that it avoids black holes through the active creation of a number of detection routes to quickly detect and obtain nodal trust and thus improve the data route security. More importantly, the generation and the distribution of detection routes are given in the ActiveTrust scheme, which can fully use the energy in non-hotspots to create as many detection routes as needed to achieve the desired security and energy efficiency. Both comprehensive theoretical analysis and experimental results indicate that the performance of the ActiveTrust scheme is better than that of the previous studies. ActiveTrust can significantly improve the data route success probability and ability against black hole attacks and can optimize network lifetime.", "subitem_description_language": "en", "subitem_description_type": "Abstract"}]}, "item_79_link_17": {"attribute_name": "出版者版へのリンク", "attribute_value_mlt": [{"subitem_link_text": "10.1109/TIFS.2016.2570740", "subitem_link_url": "https://doi.org/10.1109/TIFS.2016.2570740"}]}, "item_79_link_5": {"attribute_name": "室蘭工業大学研究者データベースへのリンク", "attribute_value_mlt": [{"subitem_link_text": "董 冕雄(DONG Mianxiong)", "subitem_link_url": "http://rdsoran.muroran-it.ac.jp/html/100000145_ja.html"}, {"subitem_link_text": "太田 香(OTA Kaoru)", "subitem_link_url": "http://rdsoran.muroran-it.ac.jp/html/100000140_ja.html"}]}, "item_79_publisher_11": {"attribute_name": "出版者", "attribute_value_mlt": [{"subitem_publisher": "IEEE", "subitem_publisher_language": "en"}]}, "item_79_relation_18": {"attribute_name": "DOI", "attribute_value_mlt": [{"subitem_relation_type": "isVersionOf", "subitem_relation_type_id": {"subitem_relation_type_id_text": "10.1109/TIFS.2016.2570740", "subitem_relation_type_select": "DOI"}}]}, "item_79_rights_19": {"attribute_name": "権利", "attribute_value_mlt": [{"subitem_rights": "© 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.", "subitem_rights_language": "en"}]}, "item_79_source_id_12": {"attribute_name": "ISSN", "attribute_value_mlt": [{"subitem_source_identifier": "1556-6013", "subitem_source_identifier_type": "PISSN"}, {"subitem_source_identifier": "1556-6021", "subitem_source_identifier_type": "EISSN"}]}, "item_79_source_id_14": {"attribute_name": "書誌レコードID", "attribute_value_mlt": [{"subitem_source_identifier": "AA12443718", "subitem_source_identifier_type": "NCID"}, {"subitem_source_identifier": "AA12122678", "subitem_source_identifier_type": "NCID"}]}, "item_79_subject_9": {"attribute_name": "日本十進分類法", "attribute_value_mlt": [{"subitem_subject": "007.7", "subitem_subject_scheme": "NDC"}]}, "item_79_text_4": {"attribute_name": "著者ID(非表示)", "attribute_value_mlt": [{"subitem_text_value": "1000020728274@@@1000050713971"}]}, "item_79_version_type_21": {"attribute_name": "著者版フラグ", "attribute_value_mlt": [{"subitem_version_resource": "http://purl.org/coar/version/c_ab4af688f83e57aa", "subitem_version_type": "AM"}]}, "item_access_right": {"attribute_name": "アクセス権", "attribute_value_mlt": [{"subitem_access_right": "open access", "subitem_access_right_uri": "http://purl.org/coar/access_right/c_abf2"}]}, "item_creator": {"attribute_name": "著者", "attribute_type": "creator", "attribute_value_mlt": [{"creatorAffiliations": [{"affiliationNameIdentifiers": [], "affiliationNames": [{"affiliationName": "", "affiliationNameLang": "ja"}]}], "creatorNames": [{"creatorName": "LIU, Yuxin", "creatorNameLang": "en"}], "familyNames": [{"familyName": "LIU", "familyNameLang": "en"}], "givenNames": [{"givenName": "Yuxin", "givenNameLang": "en"}], "nameIdentifiers": [{"nameIdentifier": "53561", "nameIdentifierScheme": "WEKO"}]}, {"creatorAffiliations": [{"affiliationNameIdentifiers": [{"affiliationNameIdentifier": "10103", "affiliationNameIdentifierScheme": "kakenhi"}], "affiliationNames": [{"affiliationName": "室蘭工業大学", "affiliationNameLang": "ja"}, {"affiliationName": "Muroran Institute of Technology", "affiliationNameLang": "en"}]}], "creatorNames": [{"creatorName": "DONG, Mianxiong", "creatorNameLang": "en"}, {"creatorName": "トウ, メンユウ", "creatorNameLang": "ja-Kana"}, {"creatorName": "董, 冕雄", "creatorNameLang": "ja"}], "familyNames": [{"familyName": "DONG", "familyNameLang": "en"}, {"familyName": "トウ", "familyNameLang": "ja-Kana"}, {"familyName": "董", "familyNameLang": "ja"}], "givenNames": [{"givenName": " Mianxiong", "givenNameLang": "en"}, {"givenName": "メンユウ", "givenNameLang": "ja-Kana"}, {"givenName": "冕雄", "givenNameLang": "ja"}], "nameIdentifiers": [{"nameIdentifier": "39157", "nameIdentifierScheme": "WEKO"}, {"nameIdentifier": "1000020728274", "nameIdentifierScheme": "NRID", "nameIdentifierURI": "https://nrid.nii.ac.jp/ja/nrid/1000020728274"}]}, {"creatorAffiliations": [{"affiliationNameIdentifiers": [{"affiliationNameIdentifier": "10103", "affiliationNameIdentifierScheme": "kakenhi"}], "affiliationNames": [{"affiliationName": "室蘭工業大学", "affiliationNameLang": "ja"}, {"affiliationName": "Muroran Institute of Technology", "affiliationNameLang": "en"}]}], "creatorNames": [{"creatorName": "OTA, Kaoru", "creatorNameLang": "en"}, {"creatorName": "太田, 香", "creatorNameLang": "ja"}, {"creatorName": "オオタ, カオル", "creatorNameLang": "ja-Kana"}], "familyNames": [{"familyName": "OTA", "familyNameLang": "en"}, {"familyName": "太田", "familyNameLang": "ja"}, {"familyName": "オオタ", "familyNameLang": "ja-Kana"}], "givenNames": [{"givenName": " Kaoru", "givenNameLang": "en"}, {"givenName": "香", "givenNameLang": "ja"}, {"givenName": "カオル", "givenNameLang": "ja-Kana"}], "nameIdentifiers": [{"nameIdentifier": "21131", "nameIdentifierScheme": "WEKO"}, {"nameIdentifier": "1000050713971", "nameIdentifierScheme": "NRID", "nameIdentifierURI": "https://nrid.nii.ac.jp/ja/nrid/1000050713971"}]}, {"creatorAffiliations": [{"affiliationNameIdentifiers": [], "affiliationNames": [{"affiliationName": "", "affiliationNameLang": "ja"}]}], "creatorNames": [{"creatorName": "LIU, Anfeng", "creatorNameLang": "en"}], "familyNames": [{"familyName": "LIU", "familyNameLang": "en"}], "givenNames": [{"givenName": "Anfeng", "givenNameLang": "en"}], "nameIdentifiers": [{"nameIdentifier": "39433", "nameIdentifierScheme": "WEKO"}]}]}, "item_files": {"attribute_name": "ファイル情報", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_date", "date": [{"dateType": "Available", "dateValue": "2016-10-11"}], "displaytype": "detail", "download_preview_message": "", "file_order": 0, "filename": "T_IFS_2013-2027.pdf", "filesize": [{"value": "1.3 MB"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_note", "mimetype": "application/pdf", "size": 1300000.0, "url": {"label": "T_IFS_2013-2027", "objectType": "fulltext", "url": "https://muroran-it.repo.nii.ac.jp/record/9039/files/T_IFS_2013-2027.pdf"}, "version_id": "8a35c5f1-26e7-4209-ae2a-77c40cf6416d"}]}, "item_keyword": {"attribute_name": "キーワード", "attribute_value_mlt": [{"subitem_subject": "wireless sensor networks", "subitem_subject_language": "en", "subitem_subject_scheme": "Other"}, {"subitem_subject": "black hole attack", "subitem_subject_language": "en", "subitem_subject_scheme": "Other"}, {"subitem_subject": "network lifetime", "subitem_subject_language": "en", "subitem_subject_scheme": "Other"}, {"subitem_subject": "security", "subitem_subject_language": "en", "subitem_subject_scheme": "Other"}, {"subitem_subject": "trust", "subitem_subject_language": "en", "subitem_subject_scheme": "Other"}]}, "item_language": {"attribute_name": "言語", "attribute_value_mlt": [{"subitem_language": "eng"}]}, "item_resource_type": {"attribute_name": "資源タイプ", "attribute_value_mlt": [{"resourcetype": "journal article", "resourceuri": "http://purl.org/coar/resource_type/c_6501"}]}, "item_title": "ActiveTrust : Secure and Trustable Routing in Wireless Sensor Networks", "item_titles": {"attribute_name": "タイトル", "attribute_value_mlt": [{"subitem_title": "ActiveTrust : Secure and Trustable Routing in Wireless Sensor Networks", "subitem_title_language": "en"}]}, "item_type_id": "79", "owner": "18", "path": ["46", "316", "352"], "permalink_uri": "http://hdl.handle.net/10258/00009018", "pubdate": {"attribute_name": "PubDate", "attribute_value": "2016-10-18"}, "publish_date": "2016-10-18", "publish_status": "0", "recid": "9039", "relation": {}, "relation_version_is_last": true, "title": ["ActiveTrust : Secure and Trustable Routing in Wireless Sensor Networks"], "weko_shared_id": -1}
ActiveTrust : Secure and Trustable Routing in Wireless Sensor Networks
http://hdl.handle.net/10258/00009018
http://hdl.handle.net/10258/000090189c4701a4-4569-4c5b-a442-514aa34725ed
名前 / ファイル | ライセンス | アクション |
---|---|---|
T_IFS_2013-2027 (1.3 MB)
|
|
Item type | 学術雑誌論文 / Journal Article.(1) | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
公開日 | 2016-10-18 | |||||||||||||||||
タイトル | ||||||||||||||||||
言語 | en | |||||||||||||||||
タイトル | ActiveTrust : Secure and Trustable Routing in Wireless Sensor Networks | |||||||||||||||||
言語 | ||||||||||||||||||
言語 | eng | |||||||||||||||||
キーワード | ||||||||||||||||||
言語 | en | |||||||||||||||||
主題Scheme | Other | |||||||||||||||||
主題 | wireless sensor networks | |||||||||||||||||
キーワード | ||||||||||||||||||
言語 | en | |||||||||||||||||
主題Scheme | Other | |||||||||||||||||
主題 | black hole attack | |||||||||||||||||
キーワード | ||||||||||||||||||
言語 | en | |||||||||||||||||
主題Scheme | Other | |||||||||||||||||
主題 | network lifetime | |||||||||||||||||
キーワード | ||||||||||||||||||
言語 | en | |||||||||||||||||
主題Scheme | Other | |||||||||||||||||
主題 | security | |||||||||||||||||
キーワード | ||||||||||||||||||
言語 | en | |||||||||||||||||
主題Scheme | Other | |||||||||||||||||
主題 | trust | |||||||||||||||||
資源タイプ | ||||||||||||||||||
資源タイプ識別子 | http://purl.org/coar/resource_type/c_6501 | |||||||||||||||||
資源タイプ | journal article | |||||||||||||||||
アクセス権 | ||||||||||||||||||
アクセス権 | open access | |||||||||||||||||
アクセス権URI | http://purl.org/coar/access_right/c_abf2 | |||||||||||||||||
著者 |
LIU, Yuxin
× LIU, Yuxin× 董, 冕雄
WEKO
39157
× 太田, 香
WEKO
21131
× LIU, Anfeng |
|||||||||||||||||
室蘭工業大学研究者データベースへのリンク | ||||||||||||||||||
董 冕雄(DONG Mianxiong) | ||||||||||||||||||
http://rdsoran.muroran-it.ac.jp/html/100000145_ja.html | ||||||||||||||||||
室蘭工業大学研究者データベースへのリンク | ||||||||||||||||||
太田 香(OTA Kaoru) | ||||||||||||||||||
http://rdsoran.muroran-it.ac.jp/html/100000140_ja.html | ||||||||||||||||||
抄録 | ||||||||||||||||||
内容記述タイプ | Abstract | |||||||||||||||||
内容記述 | Wireless sensor networks (WSNs) are increasingly being deployed in security-critical applications. Because of their inherent resource-constrained characteristics, they are prone to various security attacks, and a black hole attack is a type of attack that seriously affects data collection. To conquer that challenge, an active detection-based security and trust routing scheme named ActiveTrust is proposed for WSNs. The most important innovation of ActiveTrust is that it avoids black holes through the active creation of a number of detection routes to quickly detect and obtain nodal trust and thus improve the data route security. More importantly, the generation and the distribution of detection routes are given in the ActiveTrust scheme, which can fully use the energy in non-hotspots to create as many detection routes as needed to achieve the desired security and energy efficiency. Both comprehensive theoretical analysis and experimental results indicate that the performance of the ActiveTrust scheme is better than that of the previous studies. ActiveTrust can significantly improve the data route success probability and ability against black hole attacks and can optimize network lifetime. | |||||||||||||||||
言語 | en | |||||||||||||||||
書誌情報 |
en : IEEE Transactions on Information Forensics and Security 巻 11, 号 9, p. 2013-2027, 発行日 2016-09 |
|||||||||||||||||
出版者 | ||||||||||||||||||
言語 | en | |||||||||||||||||
出版者 | IEEE | |||||||||||||||||
出版者版へのリンク | ||||||||||||||||||
10.1109/TIFS.2016.2570740 | ||||||||||||||||||
https://doi.org/10.1109/TIFS.2016.2570740 | ||||||||||||||||||
DOI | ||||||||||||||||||
関連タイプ | isVersionOf | |||||||||||||||||
識別子タイプ | DOI | |||||||||||||||||
関連識別子 | 10.1109/TIFS.2016.2570740 | |||||||||||||||||
日本十進分類法 | ||||||||||||||||||
主題Scheme | NDC | |||||||||||||||||
主題 | 007.7 | |||||||||||||||||
ISSN | ||||||||||||||||||
収録物識別子タイプ | PISSN | |||||||||||||||||
収録物識別子 | 1556-6013 | |||||||||||||||||
ISSN | ||||||||||||||||||
収録物識別子タイプ | EISSN | |||||||||||||||||
収録物識別子 | 1556-6021 | |||||||||||||||||
書誌レコードID | ||||||||||||||||||
収録物識別子タイプ | NCID | |||||||||||||||||
収録物識別子 | AA12443718 | |||||||||||||||||
書誌レコードID | ||||||||||||||||||
収録物識別子タイプ | NCID | |||||||||||||||||
収録物識別子 | AA12122678 | |||||||||||||||||
権利 | ||||||||||||||||||
言語 | en | |||||||||||||||||
権利情報 | © 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. | |||||||||||||||||
著者版フラグ | ||||||||||||||||||
出版タイプ | AM | |||||||||||||||||
出版タイプResource | http://purl.org/coar/version/c_ab4af688f83e57aa | |||||||||||||||||
フォーマット | ||||||||||||||||||
内容記述タイプ | Other | |||||||||||||||||
内容記述 | application/pdf |