{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,31]],"date-time":"2025-01-31T05:14:40Z","timestamp":1738300480452,"version":"3.35.0"},"publisher-location":"Boston, MA","reference-count":12,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387094403"},{"type":"electronic","value":"9780387094410"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-09441-0_13","type":"book-chapter","created":{"date-parts":[[2008,5,24]],"date-time":"2008-05-24T08:47:07Z","timestamp":1211618827000},"page":"149-160","source":"Crossref","is-referenced-by-count":1,"title":["Energy Efficient Key Management Protocols to Securely Confirm Intrusion Detection in Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Jibi","family":"Abraham","sequence":"first","affiliation":[]},{"given":"K S","family":"Ramanatha","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Vijay Subhash Bhuse, Lightweight Intrusion Detection: A Second Line of Defense for Unguarded Wireless Sensor Networks, PhD Thesis, Western Michigan University, 2007.","key":"13_CR1"},{"unstructured":"Krontiris Ioannis, Tassos Dimitriou and Felix C. Freiling, Towards Intrusion Detection in Wireless Sensor Networks, Proceedings of 13th European Wireless Conference, 2007.","key":"13_CR2"},{"doi-asserted-by":"crossref","unstructured":"D. Liu and Peng Ning, Establishing Pair-wise Keys in Distributed Sensor Networks, Proceedings of ACM Conference on Computer and Communication Security, 2003.","key":"13_CR3","DOI":"10.1145\/948117.948119"},{"unstructured":"Eschenauer and Gligor, A Key-management Scheme for Distributed Sensor Networks, Proceedings of ACM Conference on Computer and communication Security, 2004.","key":"13_CR4"},{"unstructured":"Chan, H., Perrig, A. and Song D., Random Key Pre-distribution Schemes for Sensor Networks, Proceedings of IEEE Symposium on Research in Security and Privacy, 2003.","key":"13_CR5"},{"doi-asserted-by":"crossref","unstructured":"Lingxuan Hu and David Evans, Secure Aggregation for Wireless Networks, Proceedings of Symposium on Applications and the Internet Workshops, pp. 384, January 2003.","key":"13_CR6","DOI":"10.1109\/SAINTW.2003.1210191"},{"doi-asserted-by":"crossref","unstructured":"Jibi Abraham and K S Ramanatha, An Efficient Protocol for Authentication and Initial Shared Key Establishment in Clustered Wireless Sensor Networks, Proceedings of 3rd IEEE\/IFIP International Conference on Wireless and Optical Communications Networks, April 11-13, 2006, Bangalore, India.","key":"13_CR7","DOI":"10.1109\/WOCN.2006.1666568"},{"doi-asserted-by":"crossref","unstructured":"Philip Levis, Nelson Lee, Matt Welsh and David Culler, TOSSIM: Accurate and Scalable Simulation of Entire TinyOS Applications, Proceedings of ACM Conference on Embedded Networked Sensor Systems, 2003, pp. 126-137.","key":"13_CR8","DOI":"10.1145\/958491.958506"},{"doi-asserted-by":"crossref","unstructured":"Chris Karlof and David Wagner, Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures, Proceedings of IEEE International Workshop on Sensor Network Protocols and Applications, May 2003, pp. 113-117.","key":"13_CR9","DOI":"10.1109\/SNPA.2003.1203362"},{"doi-asserted-by":"crossref","unstructured":"Sasha Slijepcevic, Miodrag Potkonjak, Vlasios Tsiatsis, Scott Zimbeck and Mani B Srivatsa, On Communication Security in Wireless Ad-Hoc Sensor Networks, Proceedings of 11th IEEE International Workshops on Enabling Technologies, pp. 139 \u2013 144, 2002.","key":"13_CR10","DOI":"10.1109\/ENABL.2002.1030000"},{"doi-asserted-by":"crossref","unstructured":"Jason Hill, Robert Szewczyk, Alec et. All., System Architecture Directions for Network Sensors, Proceedings of International Conference on Architectural Support for Programming Languages and Operating Systems, 2000, pp. 93-104.","key":"13_CR11","DOI":"10.1145\/378993.379006"},{"key":"13_CR12","first-page":"920","volume-title":"A Complete Set of Protocols for Distributed Key Management in Clustered Wireless Sensor Networks","author":"Abraham Jibi","year":"2007","unstructured":"Jibi Abraham and K S Ramanatha, A Complete Set of Protocols for Distributed Key Management in Clustered Wireless Sensor Networks, Proceedings of IEEE International Conference on Multimedia and Ubiquitous Engineering, pp. 920-925, April 2007, Korea."}],"container-title":["IFIP \u2013 The International Federation for Information Processing","Wireless Sensor and Actor Networks II"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-09441-0_13.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,30]],"date-time":"2025-01-30T11:49:01Z","timestamp":1738237741000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-09441-0_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387094403","9780387094410"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-09441-0_13","relation":{},"subject":[]}}