{"created":"2023-06-19T10:29:16.273655+00:00","id":9039,"links":{},"metadata":{"_buckets":{"deposit":"9c2367a7-c56d-40f4-a079-b2463a4453b0"},"_deposit":{"created_by":18,"id":"9039","owners":[18],"pid":{"revision_id":0,"type":"depid","value":"9039"},"status":"published"},"_oai":{"id":"oai:muroran-it.repo.nii.ac.jp:00009039","sets":["216:316","216:352","46"]},"author_link":["21131","39157","53561","39433"],"item_79_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2016-09","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"9","bibliographicPageEnd":"2027","bibliographicPageStart":"2013","bibliographicVolumeNumber":"11","bibliographic_titles":[{"bibliographic_title":"IEEE Transactions on Information Forensics and Security","bibliographic_titleLang":"en"}]}]},"item_79_description_23":{"attribute_name":"フォーマット","attribute_value_mlt":[{"subitem_description":"application/pdf","subitem_description_type":"Other"}]},"item_79_description_7":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"Wireless sensor networks (WSNs) are increasingly being deployed in security-critical applications. Because of their inherent resource-constrained characteristics, they are prone to various security attacks, and a black hole attack is a type of attack that seriously affects data collection. To conquer that challenge, an active detection-based security and trust routing scheme named ActiveTrust is proposed for WSNs. The most important innovation of ActiveTrust is that it avoids black holes through the active creation of a number of detection routes to quickly detect and obtain nodal trust and thus improve the data route security. More importantly, the generation and the distribution of detection routes are given in the ActiveTrust scheme, which can fully use the energy in non-hotspots to create as many detection routes as needed to achieve the desired security and energy efficiency. Both comprehensive theoretical analysis and experimental results indicate that the performance of the ActiveTrust scheme is better than that of the previous studies. ActiveTrust can significantly improve the data route success probability and ability against black hole attacks and can optimize network lifetime.","subitem_description_language":"en","subitem_description_type":"Abstract"}]},"item_79_link_17":{"attribute_name":"出版者版へのリンク","attribute_value_mlt":[{"subitem_link_text":"10.1109/TIFS.2016.2570740","subitem_link_url":"https://doi.org/10.1109/TIFS.2016.2570740"}]},"item_79_link_5":{"attribute_name":"室蘭工業大学研究者データベースへのリンク","attribute_value_mlt":[{"subitem_link_text":"董 冕雄(DONG Mianxiong)","subitem_link_url":"http://rdsoran.muroran-it.ac.jp/html/100000145_ja.html"},{"subitem_link_text":"太田 香(OTA Kaoru)","subitem_link_url":"http://rdsoran.muroran-it.ac.jp/html/100000140_ja.html"}]},"item_79_publisher_11":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"IEEE","subitem_publisher_language":"en"}]},"item_79_relation_18":{"attribute_name":"DOI","attribute_value_mlt":[{"subitem_relation_type":"isVersionOf","subitem_relation_type_id":{"subitem_relation_type_id_text":"10.1109/TIFS.2016.2570740","subitem_relation_type_select":"DOI"}}]},"item_79_rights_19":{"attribute_name":"権利","attribute_value_mlt":[{"subitem_rights":"© 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.","subitem_rights_language":"en"}]},"item_79_source_id_12":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"1556-6013","subitem_source_identifier_type":"PISSN"},{"subitem_source_identifier":"1556-6021","subitem_source_identifier_type":"EISSN"}]},"item_79_source_id_14":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA12443718","subitem_source_identifier_type":"NCID"},{"subitem_source_identifier":"AA12122678","subitem_source_identifier_type":"NCID"}]},"item_79_subject_9":{"attribute_name":"日本十進分類法","attribute_value_mlt":[{"subitem_subject":"007.7","subitem_subject_scheme":"NDC"}]},"item_79_version_type_21":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_ab4af688f83e57aa","subitem_version_type":"AM"}]},"item_access_right":{"attribute_name":"アクセス権","attribute_value_mlt":[{"subitem_access_right":"open access","subitem_access_right_uri":"http://purl.org/coar/access_right/c_abf2"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorAffiliations":[{"affiliationNameIdentifiers":[],"affiliationNames":[{"affiliationName":""}]}],"creatorNames":[{"creatorName":"LIU, Yuxin","creatorNameLang":"en"}],"familyNames":[{}],"givenNames":[{}],"nameIdentifiers":[{}]},{"creatorAffiliations":[{"affiliationNameIdentifiers":[{}],"affiliationNames":[{},{}]}],"creatorNames":[{"creatorName":"DONG, Mianxiong","creatorNameLang":"en"},{"creatorName":"トウ, メンユウ","creatorNameLang":"ja-Kana"},{"creatorName":"董, 冕雄","creatorNameLang":"ja"}],"familyNames":[{},{},{}],"givenNames":[{},{},{}],"nameIdentifiers":[{},{}]},{"creatorAffiliations":[{"affiliationNameIdentifiers":[{}],"affiliationNames":[{},{}]}],"creatorNames":[{"creatorName":"OTA, Kaoru","creatorNameLang":"en"},{"creatorName":"太田, 香","creatorNameLang":"ja"},{"creatorName":"オオタ, カオル","creatorNameLang":"ja-Kana"}],"familyNames":[{},{},{}],"givenNames":[{},{},{}],"nameIdentifiers":[{},{}]},{"creatorAffiliations":[{"affiliationNameIdentifiers":[],"affiliationNames":[{"affiliationName":""}]}],"creatorNames":[{"creatorName":"LIU, Anfeng","creatorNameLang":"en"}],"familyNames":[{}],"givenNames":[{}],"nameIdentifiers":[{}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2016-10-11"}],"displaytype":"detail","filename":"T_IFS_2013-2027.pdf","filesize":[{"value":"1.3 MB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"T_IFS_2013-2027","objectType":"fulltext","url":"https://muroran-it.repo.nii.ac.jp/record/9039/files/T_IFS_2013-2027.pdf"},"version_id":"8a35c5f1-26e7-4209-ae2a-77c40cf6416d"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"wireless sensor networks","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"black hole attack","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"network lifetime","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"security","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"trust","subitem_subject_language":"en","subitem_subject_scheme":"Other"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"journal article","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_title":"ActiveTrust : Secure and Trustable Routing in Wireless Sensor Networks","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"ActiveTrust : Secure and Trustable Routing in Wireless Sensor Networks","subitem_title_language":"en"}]},"item_type_id":"79","owner":"18","path":["46","316","352"],"pubdate":{"attribute_name":"PubDate","attribute_value":"2016-10-18"},"publish_date":"2016-10-18","publish_status":"0","recid":"9039","relation_version_is_last":true,"title":["ActiveTrust : Secure and Trustable Routing in Wireless Sensor Networks"],"weko_creator_id":"18","weko_shared_id":-1},"updated":"2023-12-08T04:11:45.868789+00:00"}