{"created":"2023-06-19T10:29:16.358189+00:00","id":9041,"links":{},"metadata":{"_buckets":{"deposit":"a25b84e3-937e-4280-90f8-4f1f654cc874"},"_deposit":{"created_by":18,"id":"9041","owners":[18],"pid":{"revision_id":0,"type":"depid","value":"9041"},"status":"published"},"_oai":{"id":"oai:muroran-it.repo.nii.ac.jp:00009041","sets":["216:316","216:352","48"]},"author_link":["21131","39157","39433"],"item_1694052902339":{"attribute_name":"会議記述","attribute_value_mlt":[{"subitem_conference_country":"GBR","subitem_conference_date":{"subitem_conference_date_language":"en","subitem_conference_end_day":"28","subitem_conference_end_month":"10","subitem_conference_end_year":"2015","subitem_conference_period":"OCT 26-28, 2015","subitem_conference_start_day":"26","subitem_conference_start_month":"10","subitem_conference_start_year":"2015"},"subitem_conference_names":[{"subitem_conference_name":"2015 IEEE International Conference on Computer and Information Technology - Ubiquitous Computing and Communications - Dependable, Autonomic and Secure Computing - Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM)","subitem_conference_name_language":"en"}],"subitem_conference_places":[{"subitem_conference_place":"Liverpool","subitem_conference_place_language":"en"}]}]},"item_82_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2015","bibliographicIssueDateType":"Issued"},"bibliographicPageEnd":"1843","bibliographicPageStart":"1836","bibliographic_titles":[{"bibliographic_title":"2015 IEEE International Conference on Computer and Information Technology - Ubiquitous Computing and Communications - Dependable, Autonomic and Secure Computing - Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM)","bibliographic_titleLang":"en"}]}]},"item_82_description_23":{"attribute_name":"フォーマット","attribute_value_mlt":[{"subitem_description":"application/pdf","subitem_description_type":"Other"}]},"item_82_description_7":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"A redundant fog loop-based scheme is proposed to preserve the source node-location privacy and achieve energy efficiency through two important mechanisms in wireless sensor networks (WSNs). The first mechanism is to create fogs with loop paths. The second mechanism creates fogs in the real source node region as well as many interference fogs in other regions of the network. In addition, the fogs are dynamically changing, and the communication among fogs also forms the loop path. The simulation results show that for medium-scale networks, our scheme can improve the privacy security by 8 fold compared to the phantom routing scheme, whereas the energy efficiency can be improved by 4 fold.","subitem_description_language":"en","subitem_description_type":"Abstract"}]},"item_82_description_8":{"attribute_name":"注記","attribute_value_mlt":[{"subitem_description":"Location: Liverpool, UNITED KINGDOM","subitem_description_language":"en","subitem_description_type":"Other"},{"subitem_description":"Date: OCT 26-28, 2015","subitem_description_language":"en","subitem_description_type":"Other"}]},"item_82_link_17":{"attribute_name":"出版者版へのリンク","attribute_value_mlt":[{"subitem_link_text":"10.1109/CIT/IUCC/DASC/PICOM.2015.274","subitem_link_url":"http://dx.doi.org/10.1109/CIT/IUCC/DASC/PICOM.2015.274"}]},"item_82_link_5":{"attribute_name":"室蘭工業大学研究者データベースへのリンク","attribute_value_mlt":[{"subitem_link_text":"董 冕雄(DONG Mianxiong)","subitem_link_url":"http://rdsoran.muroran-it.ac.jp/html/100000145_ja.html"},{"subitem_link_text":"太田 香(OTA Kaoru)","subitem_link_url":"http://rdsoran.muroran-it.ac.jp/html/100000140_ja.html"}]},"item_82_publisher_11":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"IEEE","subitem_publisher_language":"en"}]},"item_82_relation_13":{"attribute_name":"ISBN","attribute_value_mlt":[{"subitem_relation_type_id":{"subitem_relation_type_id_text":"978-1-5090-0154-5","subitem_relation_type_select":"ISBN"}},{"subitem_relation_type_id":{"subitem_relation_type_id_text":"978-1-5090-0153-8","subitem_relation_type_select":"ISBN"}}]},"item_82_relation_18":{"attribute_name":"DOI","attribute_value_mlt":[{"subitem_relation_type":"isVersionOf","subitem_relation_type_id":{"subitem_relation_type_id_text":"info:doi/10.1109/CIT/IUCC/DASC/PICOM.2015.274","subitem_relation_type_select":"DOI"}}]},"item_82_rights_19":{"attribute_name":"権利","attribute_value_mlt":[{"subitem_rights":"© 2015 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.","subitem_rights_language":"en"}]},"item_82_subject_9":{"attribute_name":"日本十進分類法","attribute_value_mlt":[{"subitem_subject":"007.7","subitem_subject_scheme":"NDC"}]},"item_82_version_type_21":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_ab4af688f83e57aa","subitem_version_type":"AM"}]},"item_access_right":{"attribute_name":"アクセス権","attribute_value_mlt":[{"subitem_access_right":"open access","subitem_access_right_uri":"http://purl.org/coar/access_right/c_abf2"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorAffiliations":[{"affiliationNameIdentifiers":[{}],"affiliationNames":[{},{}]}],"creatorNames":[{"creatorName":"DONG, Mianxiong","creatorNameLang":"en"},{"creatorName":"トウ, メンユウ","creatorNameLang":"ja-Kana"},{"creatorName":"董, 冕雄","creatorNameLang":"ja"}],"familyNames":[{},{},{}],"givenNames":[{},{},{}],"nameIdentifiers":[{},{}]},{"creatorAffiliations":[{"affiliationNameIdentifiers":[{}],"affiliationNames":[{},{}]}],"creatorNames":[{"creatorName":"OTA, Kaoru","creatorNameLang":"en"},{"creatorName":"太田, 香","creatorNameLang":"ja"},{"creatorName":"オオタ, カオル","creatorNameLang":"ja-Kana"}],"familyNames":[{},{},{}],"givenNames":[{},{},{}],"nameIdentifiers":[{},{}]},{"creatorAffiliations":[{"affiliationNameIdentifiers":[],"affiliationNames":[{"affiliationName":""}]}],"creatorNames":[{"creatorName":"LIU, Anfeng","creatorNameLang":"en"}],"familyNames":[{}],"givenNames":[{}],"nameIdentifiers":[{}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2016-10-14"}],"displaytype":"detail","filename":"CIT_2015_1836-1843.pdf","filesize":[{"value":"562.4 kB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"CIT_2015_1836-1843","objectType":"fulltext","url":"https://muroran-it.repo.nii.ac.jp/record/9041/files/CIT_2015_1836-1843.pdf"},"version_id":"0dd89da2-d866-4a78-8b73-f9ed56ab952d"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"performance optimization","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"wireless sensor networks","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"source-location privacy","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"redundant fog loop","subitem_subject_language":"en","subitem_subject_scheme":"Other"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"conference paper","resourceuri":"http://purl.org/coar/resource_type/c_5794"}]},"item_title":"Preserving Source-Location Privacy through Redundant Fog Loop for Wireless Sensor Networks","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Preserving Source-Location Privacy through Redundant Fog Loop for Wireless Sensor Networks","subitem_title_language":"en"}]},"item_type_id":"82","owner":"18","path":["48","316","352"],"pubdate":{"attribute_name":"PubDate","attribute_value":"2016-10-18"},"publish_date":"2016-10-18","publish_status":"0","recid":"9041","relation_version_is_last":true,"title":["Preserving Source-Location Privacy through Redundant Fog Loop for Wireless Sensor Networks"],"weko_creator_id":"18","weko_shared_id":-1},"updated":"2023-11-13T01:09:26.488913+00:00"}