{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:33:52Z","timestamp":1725543232260},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540366461"},{"type":"electronic","value":"9783540378631"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11801412_15","type":"book-chapter","created":{"date-parts":[[2006,8,2]],"date-time":"2006-08-02T19:29:50Z","timestamp":1154546990000},"page":"158-173","source":"Crossref","is-referenced-by-count":3,"title":["ARMS: An Authenticated Routing Message in Sensor Networks"],"prefix":"10.1007","author":[{"given":"Suk-Bok","family":"Lee","sequence":"first","affiliation":[]},{"given":"Yoon-Hwa","family":"Choi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","unstructured":"Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: IEEE Symposium on Security and Privacy (May 2003)"},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: 9th ACM Conference on Computer and Communication Security (CCS) (November 2002)","DOI":"10.1145\/586110.586117"},{"key":"15_CR3","unstructured":"Hartung, C., Balasalle, J., Han, R.: Node Compromise in Sensor Networks: The Need for Secure Systems, Technical Report CU-CS-990-05, Department of Computer Science University of Colorado at Boulder (January 2005)"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Heinzelman, W.R., Kulik, J., Balakrishnan, H.: Adaptive protocols for information dissemination in wireless sensor networks. In: Proceedings of the ACM MobiCom 1999, Seattle, Washington, pp. 174\u2013185 (1999)","DOI":"10.1145\/313451.313529"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Karlof, C., Wagner, D.: Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures. In: First IEEE InternationalWorkshop on Sensor Network Protocols and Applications (May 2003)","DOI":"10.1016\/S1570-8705(03)00008-8"},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Karlof, C., Sastry, N., Wagner, D.: TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. In: Proceedings of the Second ACM Conference on Embedded Networked Sensor Systems (SensSys 2004) (November 2004)","DOI":"10.1145\/1031495.1031515"},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: 10th ACM Conference on Computer and Communications Security (CCS) (October 2003)","DOI":"10.1145\/948109.948119"},{"key":"15_CR8","unstructured":"Liu, D., Ning, P.: Multi-Level \u03bc-TESLA: A Broadcast Authentication System for Distributed Sensor Networks (submitted for journal publication); Also available as Technical Report, TR-2003-08, North Carolina State University, Department of Computer Science (March 2003)"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Perrig, A., Canetti, R., Tygar, J.D., Song, D.: Efficient authentication and signing of multicast streams over lossy channels. In: IEEE Symposium on Security and Privacy (May 2000)","DOI":"10.1109\/SECPRI.2000.848446"},{"key":"15_CR10","unstructured":"Perrig, A., Canetti, R., Song, D., Tygar, J.D.: Efficient and secure source authentication for multicast. In: Network and Distributed System Security Symposium, NDSS 2001 (February 2001)"},{"issue":"6","key":"15_CR11","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1145\/990680.990707","volume":"47","author":"A. Perrig","year":"2004","unstructured":"Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Communications of the ACM\u00a047(6), 53\u201357 (2004) (Special Issue on Wireless sensor networks)","journal-title":"Communications of the ACM"},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: SPINS: Security protocols for sensor networks. In: The Seventh Annual International Conference on Mobile Computing and Networking (MobiCom 2001) (2001)","DOI":"10.1145\/381677.381696"},{"issue":"10","key":"15_CR13","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1109\/MC.2002.1039518","volume":"35","author":"A.D. Wood","year":"2002","unstructured":"Wood, A.D., Stankovic, J.A.: Denial of Service in Sensor Networks. IEEE Computer\u00a035(10), 54\u201362 (2002)","journal-title":"IEEE Computer"}],"container-title":["Lecture Notes in Computer Science","Secure Mobile Ad-hoc Networks and Sensors"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11801412_15.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:11:26Z","timestamp":1605643886000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11801412_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540366461","9783540378631"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/11801412_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}