{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T16:12:37Z","timestamp":1725466357620},"publisher-location":"New York","reference-count":19,"publisher":"Springer-Verlag","isbn-type":[{"type":"print","value":"0387239936"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/0-387-24043-8_13","type":"book-chapter","created":{"date-parts":[[2005,9,21]],"date-time":"2005-09-21T18:15:59Z","timestamp":1127326559000},"page":"123-134","source":"Crossref","is-referenced-by-count":1,"title":["Providing Holistic Security in Sensor Networks"],"prefix":"10.1007","author":[{"given":"S.","family":"Olariu","sequence":"first","affiliation":[]},{"given":"A.","family":"Wadaa","sequence":"additional","affiliation":[]},{"given":"L.","family":"Wilson","sequence":"additional","affiliation":[]},{"given":"Q.","family":"Xu","sequence":"additional","affiliation":[]},{"given":"M.","family":"Eltoweissy","sequence":"additional","affiliation":[]},{"given":"K.","family":"Jones","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"13_CR1","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1016\/S1389-1286(01)00302-4","volume":"38","author":"I. F. Akyildiz","year":"2002","unstructured":"I. F. Akyildiz, W. Su, Y. Sankarasubramanian, and E. Cayirci, Wireless sensor networks: A survey, Computer Networks, 38(4), 2002, 393\u2013422.","journal-title":"Computer Networks"},{"key":"13_CR2","unstructured":"R. Anderson and M. Kuhn, Tamper resistance \u2014 a cautionary note, Proc. 2 nd Usenix Workshop on Electronic Commerce, Berkely, CA, 1996, 1\u201311."},{"issue":"1","key":"13_CR3","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MWC.2002.986457","volume":"9","author":"P. Bahl","year":"2002","unstructured":"P. Bahl, W. Russell, Y.-M. Wang, A. Balachandran, G. M. Voelker, and A. Miu, PAWNs: satisfying the need for ubiquitous secure connectivity and location services, IEEE Wireless Communications, 9(1), 2002, 40\u201348.","journal-title":"IEEE Wireless Communications"},{"key":"13_CR4","unstructured":"D. W. Carman, P. S. Kruus, and B. J. Matt, Constraints and approaches for distributed sensor network security, Tech. Rep. #00-010, NAI Labs, 2000."},{"key":"13_CR5","unstructured":"Cross Bow Technologies, http:\/\/www.xbow.com\/"},{"issue":"1","key":"13_CR6","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/PROC.1987.13705","volume":"75","author":"A. Ephremides","year":"1987","unstructured":"A. Ephremides, J. Wieselthier and D. Baker, A design concept for reliable mobile radio networks with frequency hopping signaling, Proceedings of the IEEE, 75(1), 1987, 56\u201373.","journal-title":"Proceedings of the IEEE"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"J.-P. Hubaux, L. Buttyan, and S. Capkun, The quest for security in mobile ad-hoc networks, Proc. MobiHoc, Long Beach, October 2001, 146\u2013155.","DOI":"10.1145\/501416.501437"},{"key":"13_CR8","unstructured":"J. M. Kahn, R. H. Katz and K. S. J. Pister, Mobile networking for Smart Dust, Proc. MOBICOM'99, Seattle, WA, August 1999."},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"S. Marti, T. J. Giuli, K. Lai, and M. Baker, Mitigating routing misbehavior in mobile ad-hoc networks, Proc. MOBICOM, Boston, MA, August 2000.","DOI":"10.1145\/345910.345955"},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"A. Perrig, R. Szewczyk, V. Wen, D. Culler and J. D. Tygar, SPINS: Security protocols for sensor networks, Proc. MOBICOM, Rome, Italy, August 2001, 189\u2013199.","DOI":"10.1145\/381677.381696"},{"issue":"2","key":"13_CR11","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1109\/2.566159","volume":"30","author":"A. Pfitzmann","year":"1997","unstructured":"A. Pfitzmann, B. Pfitzmann and M. Waidner, Trusting mobile user devices and security modules, IEEE Computer, 30(2), 1997, 61\u201368.","journal-title":"IEEE Computer"},{"issue":"2","key":"13_CR12","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1145\/253671.253734","volume":"40","author":"P. Saffo","year":"1997","unstructured":"P. Saffo, Sensors, the next wave of innovation, Communications of the ACM, 40(2), 1997, 93\u201397.","journal-title":"Communications of the ACM"},{"key":"13_CR13","unstructured":"TinySec http:\/\/www.cs.berkeley.edu\/~nks\/tinysec\/"},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"A. Wadaa, S. Olariu, L. Wilson, K. Jones, and Q. Xu, On training wireless sensor networks, MONET, February 2005, to appear.","DOI":"10.1023\/B:MONE.0000048552.15853.c2"},{"issue":"1","key":"13_CR15","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1109\/2.895117","volume":"34","author":"B. Warneke","year":"2001","unstructured":"B. Warneke, M. Last, B. Leibowitz, and K. Pister, SmartDust: communicating with a cubic-millimeter computer, IEEE Computer, 34(1), 2001, 44\u201351.","journal-title":"IEEE Computer"},{"issue":"4","key":"13_CR16","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1109\/MC.2002.1039518","volume":"35","author":"A. D. Wood","year":"2002","unstructured":"A. D. Wood and J. A. Stankovic, Denial of service in sensor networks, IEEE Computer, 35(4), 2002, 54\u201362.","journal-title":"IEEE Computer"},{"key":"13_CR17","doi-asserted-by":"crossref","unstructured":"Y. Zhang and W. Lee, Intrusion detection in ad-hoc networks, Proc. MOBICOM, Boston, MA, August 2000.","DOI":"10.1145\/345910.345958"},{"issue":"1","key":"13_CR18","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1109\/2.895116","volume":"34","author":"V. V. Zhirnov","year":"2001","unstructured":"V. V. Zhirnov and D. J. C. Herr, New frontiers: self-assembly and nano-electronics, IEEE Computer, 34(1), 2001, 34\u201343.","journal-title":"IEEE Computer"},{"issue":"6","key":"13_CR19","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/65.806983","volume":"13","author":"L. Zhou","year":"1999","unstructured":"L. Zhou and Z.J. Haas, Securing ad-hoc networks, IEEE Network, 13(6), 1999, 24\u201330.","journal-title":"IEEE Network"}],"container-title":["IFIP International Federation for Information Processing","Broadband Satellite Comunication Systems and the Challenges of Mobility"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/0-387-24043-8_13.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T19:58:00Z","timestamp":1605643080000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/0-387-24043-8_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["0387239936"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/0-387-24043-8_13","relation":{},"subject":[]}}