{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T20:05:49Z","timestamp":1649016349812},"reference-count":43,"publisher":"SAGE Publications","issue":"8","license":[{"start":{"date-parts":[[2018,8,1]],"date-time":"2018-08-01T00:00:00Z","timestamp":1533081600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No.61170273"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No.U1536111"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2018,8]]},"abstract":" With the rapid popularization and development of Internet, global researchers are increasingly paying more and more attention to anonymity and privacy security. Anonymous communication technology has gradually become people\u2019s focus. Attacks against sensors may appear in different layers, so anonymity at network layer should therefore be envisioned. Tor, as one of the anonymous communication systems which implements multi-hop to protect user\u2019s identity privacy on the Internet, is currently the most popular anonymous privacy solution, but the concept of Tor has not applied to wireless sensor networks. Therefore, in this article, we think the mix structure of Tor which is crucial to its anonymity can be applied to wireless sensor networks; what\u2019s more, an improved path selecting algorithm according to round trip time we propose can boost some degree of performance. First, we make a summary of current typical path selection algorithms and analyze the performance and anonymity problems of these algorithms in network congestion. Then, in order to improve the performance of the algorithm in congestion, a routing improvement scheme based on round trip time is proposed. <\/jats:p>","DOI":"10.1177\/1550147718793856","type":"journal-article","created":{"date-parts":[[2018,8,21]],"date-time":"2018-08-21T13:32:37Z","timestamp":1534858357000},"page":"155014771879385","update-policy":"http:\/\/dx.doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":0,"title":["Path selection algorithm with minimal delay in wireless sensor networks"],"prefix":"10.1177","volume":"14","author":[{"given":"Tianbo","family":"Lu","sequence":"first","affiliation":[{"name":"School of Software Engineering, Beijing University of Posts and Telecommunications, Beijing, China"},{"name":"Key Laboratory of Trustworthy Distributed Computing and Service of Ministry of Education, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Yifei","family":"Su","sequence":"additional","affiliation":[{"name":"School of Software Engineering, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Youwen","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Software Engineering, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Xiaoyan","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Software Engineering, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Hao","family":"Meng","sequence":"additional","affiliation":[{"name":"School of Software Engineering, Beijing University of Posts and Telecommunications, Beijing, China"}]}],"member":"179","published-online":{"date-parts":[[2018,8,21]]},"reference":[{"key":"bibr1-1550147718793856","doi-asserted-by":"publisher","DOI":"10.1201\/b12988-15"},{"key":"bibr2-1550147718793856","first-page":"1","volume-title":"Proceedings of 18th international conference on computer communications and networks (ICCCN 2009)","author":"De Cristofaro E"},{"key":"bibr3-1550147718793856","volume-title":"Mixmaster protocol, version 3","author":"M\u00f6ller U","year":"2003"},{"key":"bibr4-1550147718793856","volume-title":"Industrial wireless sensor networks: applications, protocols, and standards","author":"G\u00fcng\u00f6r VC","year":"2013"},{"key":"bibr5-1550147718793856","doi-asserted-by":"publisher","DOI":"10.1177\/155014772171642"},{"key":"bibr6-1550147718793856","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2016.7860478"},{"key":"bibr7-1550147718793856","first-page":"21","volume-title":"Proceedings of the 13th conference on USENIX Security Symposium - Volume 13 (SSYM\u201904)","volume":"13","author":"Syverson P"},{"key":"bibr8-1550147718793856","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44702-4_6"},{"key":"bibr9-1550147718793856","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03168-7_5"},{"key":"bibr10-1550147718793856","volume-title":"Proceedings of network and distributed system security symposium","author":"Snader R"},{"key":"bibr11-1550147718793856","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2013.2291242"},{"key":"bibr12-1550147718793856","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32946-3_9"},{"key":"bibr13-1550147718793856","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75551-7_9"},{"key":"bibr14-1550147718793856","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75551-7_7"},{"key":"bibr15-1550147718793856","volume-title":"Proceedings of 2000 symposium on cryptography and information security (SCIS2000)","author":"Sakai R"},{"key":"bibr16-1550147718793856","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653682"},{"key":"bibr18-1550147718793856","first-page":"114","volume-title":"Proceedings of ninth annual international symposium on applications and the Internet","author":"Panchenko A"},{"key":"bibr19-1550147718793856","doi-asserted-by":"publisher","DOI":"10.14257\/ijfgcn.2016.9.8.33"},{"key":"bibr20-1550147718793856","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.03.003"},{"key":"bibr21-1550147718793856","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866345"},{"key":"bibr22-1550147718793856","first-page":"1","volume-title":"Proceedings of the 5th USENIX conference on Hot topics in security (HotSec\u201910)","author":"Mittal P"},{"key":"bibr23-1550147718793856","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15317-4_27"},{"key":"bibr24-1550147718793856","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2011.78"},{"key":"bibr25-1550147718793856","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24861-0_6"},{"key":"bibr26-1550147718793856","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-016-0337-x"},{"key":"bibr27-1550147718793856","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1001.2011.04007"},{"key":"bibr28-1550147718793856","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21554-4_15"},{"key":"bibr29-1550147718793856","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2014.7004528"},{"key":"bibr30-1550147718793856","first-page":"24","volume-title":"Proceedings of Network and distributed system security symposium (NDSS 2013)","author":"Wacek C"},{"key":"bibr31-1550147718793856","doi-asserted-by":"publisher","DOI":"10.1145\/2946802"},{"key":"bibr32-1550147718793856","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813667"},{"key":"bibr33-1550147718793856","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70630-4_8"},{"key":"bibr34-1550147718793856","volume-title":"Proceedings of network and distributed system security symposium (NDSS 2013)","author":"Jansen R"},{"key":"bibr35-1550147718793856","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076762"},{"key":"bibr36-1550147718793856","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653733"},{"key":"bibr37-1550147718793856","first-page":"349","volume-title":"Proceedings of the 21st USENIX conference on Security symposium (Security\u201912)","author":"Jansen R"},{"key":"bibr38-1550147718793856","first-page":"143","volume-title":"Proceedings of international symposium on privacy enhancing technologies symposium","author":"AlSabah M"},{"key":"bibr39-1550147718793856","first-page":"1","volume-title":"Proceedings of 5th international conference on new technologies, mobility and security","author":"Karaoglu HT"},{"key":"bibr40-1550147718793856","first-page":"1","volume-title":"Proceedings of network and distributed system security symposium (NDSS 2010)","author":"Wolchok S"},{"key":"bibr41-1550147718793856","first-page":"369","volume-title":"Proceedings of IEEE 25th computer security foundations symposium","author":"Backes M"},{"key":"bibr42-1550147718793856","first-page":"359","volume-title":"Proceedings of international conference on financial cryptography and data security","author":"Kate A"},{"key":"bibr43-1550147718793856","doi-asserted-by":"publisher","DOI":"10.1145\/2381966.2381974"},{"key":"bibr44-1550147718793856","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-28166-7_13"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147718793856","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/1550147718793856","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147718793856","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,8]],"date-time":"2020-12-08T23:24:18Z","timestamp":1607469858000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1177\/1550147718793856"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8]]},"references-count":43,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2018,8]]}},"alternative-id":["10.1177\/1550147718793856"],"URL":"https:\/\/doi.org\/10.1177\/1550147718793856","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"value":"1550-1477","type":"print"},{"value":"1550-1477","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,8]]}}}
  NODES