{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,11]],"date-time":"2025-01-11T05:34:44Z","timestamp":1736573684813,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540393689"},{"type":"electronic","value":"9783540393726"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11847366_28","type":"book-chapter","created":{"date-parts":[[2006,9,8]],"date-time":"2006-09-08T20:50:18Z","timestamp":1157748618000},"page":"270-279","source":"Crossref","is-referenced-by-count":2,"title":["A Key-Predistribution-Based Weakly Connected Dominating Set for Secure Clustering in DSN"],"prefix":"10.1007","author":[{"given":"Al-Sakib Khan","family":"Pathan","sequence":"first","affiliation":[]},{"given":"Choong Seon","family":"Hong","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"28_CR1","unstructured":"Carman, D.W., Kruss, P.S., Matt, B.J.: Constraints and Approaches for Distributed Sensor Network Security. NAI Labs Technical Report # 00-010, September 1 (2000)"},{"issue":"8","key":"28_CR2","doi-asserted-by":"publisher","first-page":"2245","DOI":"10.1109\/TSP.2003.814623","volume":"51","author":"R.D. Nowak","year":"2003","unstructured":"Nowak, R.D.: Distributed EM ALgorithms for Density Estimation and Clustering in Sensor Networks. IEEE Transactions on Signal Processing\u00a051(8), 2245\u20132253 (2003)","journal-title":"IEEE Transactions on Signal Processing"},{"key":"28_CR3","doi-asserted-by":"crossref","unstructured":"Halgamuge, M.N., Guru, S.M., Jennings, A.: Energy efficient cluster formation in wireless sensor networks. In: 10th International Conference on Telecommunications, 2003 (ICT 2003), February 23- March 1, vol.\u00a02, pp. 1571\u20131576 (2003)","DOI":"10.1109\/ICTEL.2003.1191668"},{"key":"28_CR4","unstructured":"Lee, S., Yoo, J., Chung, T.: Distance-based energy efficient clustering for wireless sensor networks. In: 29th Annual IEEE International Conference on Local Computer Networks, November 16-18, vol.\u00a02004, pp. 567\u2013568 (2004)"},{"issue":"4","key":"28_CR5","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1109\/TMC.2004.41","volume":"3","author":"O. Younis","year":"2004","unstructured":"Younis, O., Fahmy, S.: Distributed Clustering in Ad-hoc Sensor Networks: A Hybrid, Energy-Efficient Approach. IEEE Transactions on Mobile Computing\u00a03(4), 366\u2013379 (2004)","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"28_CR6","unstructured":"Ye, M., Li, C., Chen, G., Wu, J.: EECS: an energy efficient clustering scheme in wireless sensor networks. In: 24th IEEE International Performance, Computing, and Communications Conference (PCCC 2005), April 7-9, pp. 535\u2013540 (2005)"},{"key":"28_CR7","unstructured":"Liu, J.-S., Lin, C.-H.R.: Power-efficiency clustering method with power-limit constraint for sensor networks. In: Proceedings of the 2003 IEEE International Performance, Computing, and Communications Conference, April 9-11, pp. 129\u2013136 (2003)"},{"key":"28_CR8","doi-asserted-by":"crossref","unstructured":"Tzevelekas, L., Ziviani, A., Amorim, M.D.D., Todorova, P., Stavrakakis, I.: Towards potential-based clustering for wireless sensor networks. In: Proc. of the 2005 ACM conference on Emerging network experiment and technology, Toulouse, France, pp. 292\u2013293 (2005)","DOI":"10.1145\/1095921.1095986"},{"key":"28_CR9","unstructured":"Wokoma, I., Scks, L., Marshall, I.: Clustering n Sensor Networks using Quorum Sensing. In: The London Communications Symposium, University College London, September 8-9 (2003)"},{"key":"28_CR10","doi-asserted-by":"crossref","unstructured":"Banerjee, S., Khuller, S.: A clustering scheme for hierarchical control in multi-hop wireless networks. In: Proc. of the IEEE INFOCOM 2001, April 22-26, vol.\u00a02, pp. 1028\u20131037 (2001)","DOI":"10.1109\/INFCOM.2001.916296"},{"key":"28_CR11","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1016\/0012-365X(90)90358-O","volume":"86","author":"B.N. Clark","year":"1990","unstructured":"Clark, B.N., Colbourn, C.J., Johnson, D.S.: Unit Disk Graphs. Discrete Mathematics\u00a086, 165\u2013177 (1990)","journal-title":"Discrete Mathematics"},{"key":"28_CR12","volume-title":"Computers and Intractability: A Guide to the Theory of NP-Completeness","author":"M.L. Garey","year":"1979","unstructured":"Garey, M.L., Johnson, D.S.: Computers and Intractability: A Guide to the Theory of NP-Completeness. W. H. Freeman, San Francisco (1979)"},{"key":"28_CR13","doi-asserted-by":"crossref","unstructured":"Das, B., Bharghavan, V.: Routing in ad-hoc networks using minumum connected dominating sets. In: Proc. IEEE International Conference on Communications (ICC 1997), pp. 376\u2013380 (June 1997)","DOI":"10.1109\/ICC.1997.605303"},{"key":"28_CR14","doi-asserted-by":"crossref","first-page":"290","DOI":"10.5486\/PMD.1959.6.3-4.12","volume":"6","author":"Erdos","year":"1959","unstructured":"Erdos, Renyi: On Random Graphs. Publ. Math. Debrecen\u00a06, 290\u2013297 (1959)","journal-title":"Publ. Math. Debrecen"},{"key":"28_CR15","doi-asserted-by":"crossref","unstructured":"Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: Attacks and countermeasures. Elsevier\u2019s Ad Hoc Network Journal, Special Issue on Sensor Network Applications and Protocols, 293\u2013315 (September 2003)","DOI":"10.1016\/S1570-8705(03)00008-8"},{"key":"28_CR16","doi-asserted-by":"crossref","unstructured":"Pathan, A.-S.K., Lee, H.-W., Hong, C.S.: Security in Wireless Sensor Networks: Issues and Challenges. In: Proc. of the 8th IEEE ICACT 2006, Phoenix Park, Korea, February 20-22, vol.\u00a0II, pp. 1043\u20131048 (2006)","DOI":"10.1109\/ICACT.2006.206151"},{"key":"28_CR17","doi-asserted-by":"crossref","unstructured":"Gupta, G., Younis, M.: Load-balanced clustering of wireless sensor networks. In: IEEE International Conference on Communications (ICC 2003), May 11-15, vol.\u00a03, pp. 1848\u20131852 (2003)","DOI":"10.1109\/ICC.2003.1203919"}],"container-title":["Lecture Notes in Computer Science","High Performance Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11847366_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,10]],"date-time":"2025-01-10T20:12:34Z","timestamp":1736539954000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11847366_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540393689","9783540393726"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/11847366_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}