{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T13:52:05Z","timestamp":1773150725428,"version":"3.50.1"},"publisher-location":"Cham","reference-count":61,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030222765","type":"print"},{"value":"9783030222772","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-22277-2_7","type":"book-chapter","created":{"date-parts":[[2019,12,31]],"date-time":"2019-12-31T12:02:28Z","timestamp":1577793748000},"page":"173-200","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["Security and Privacy Issues in Wireless Sensor and Body Area Networks"],"prefix":"10.1007","author":[{"given":"Moumita","family":"Roy","sequence":"first","affiliation":[]},{"given":"Chandreyee","family":"Chowdhury","sequence":"additional","affiliation":[]},{"given":"Nauman","family":"Aslam","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,1]]},"reference":[{"issue":"3","key":"7_CR1","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1007\/s11235-017-0345-9","volume":"67","author":"V Adat","year":"2018","unstructured":"Adat, V., & Gupta, B. (2018). Security in internet of things: Issues, challenges, taxonomy, and architecture. Telecommunication Systems, 67(3), 423\u2013441.","journal-title":"Telecommunication Systems"},{"issue":"4","key":"7_CR2","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1016\/S1389-1286(01)00302-4","volume":"38","author":"I F Akyildiz","year":"2002","unstructured":"Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). Wireless sensor networks: A survey. Computer Networks, 38(4), 393\u2013422.","journal-title":"Computer Networks"},{"issue":"1","key":"7_CR3","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/s10916-010-9449-4","volume":"36","author":"M Al Ameen","year":"2012","unstructured":"Al Ameen, M., Liu, J., & Kwak, K. (2012). Security and privacy issues in wireless sensor networks for healthcare applications. Journal of Medical Systems, 36(1), 93\u2013101.","journal-title":"Journal of Medical Systems"},{"issue":"1","key":"7_CR4","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1186\/1687-1499-2013-216","volume":"2013","author":"A Ali","year":"2013","unstructured":"Ali, A., & Khan, F. A. (2013). Energy-efficient cluster-based security mechanism for intra-WBAN and inter-WBAN communications for healthcare applications. EURASIP Journal on Wireless Communications and Networking, 2013(1), 216.","journal-title":"EURASIP Journal on Wireless Communications and Networking"},{"issue":"1","key":"7_CR5","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/s11277-014-1998-2","volume":"80","author":"X Anita","year":"2015","unstructured":"Anita, X., Bhagyaveni, M. A., & Manickam, J. M. L. (2015). Collaborative lightweight trust management scheme for wireless sensor networks. Wireless Personal Communications, 80(1), 117\u2013140.","journal-title":"Wireless Personal Communications"},{"key":"7_CR6","first-page":"719","volume-title":"Proceedings of the 2005 IEEE International Symposium on Mediterranean Conference on Control and Automation, Intelligent Control","author":"T Arampatzis","year":"2005","unstructured":"Arampatzis, T., Lygeros, J., & Manesis, S. (2005). A survey of applications of wireless sensors and wireless sensor networks. In Proceedings of the 2005 IEEE International Symposium on Mediterranean Conference on Control and Automation, Intelligent Control (pp. 719\u2013724). Piscataway: IEEE."},{"key":"7_CR7","unstructured":"Bicket, J., Rowson, J. M., & Phillips, C. (2018). Authentication of a gateway device in a sensor network. US Patent App. 10\/085,149."},{"key":"7_CR8","unstructured":"Borgohain, T., Kumar, U., & Sanyal, S. (2015). Survey of security and privacy issues of internet of things. arXiv preprint arXiv:1501.02211."},{"issue":"3","key":"7_CR9","doi-asserted-by":"publisher","first-page":"1635","DOI":"10.1109\/SURV.2014.012214.00007","volume":"16","author":"R Cavallari","year":"2014","unstructured":"Cavallari, R., Martelli, F., Rosini, R., Buratti, C., & Verdone, R. (2014). A survey on wireless body area networks: Technologies and design challenges. IEEE Communications Surveys & Tutorials, 16(3), 1635\u20131657.","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"1","key":"7_CR10","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1109\/MWC.2005.1404570","volume":"12","author":"J C Chen","year":"2005","unstructured":"Chen, J. C., Jiang, M. C., & Liu, Y. W. (2005). Wireless lan security and IEEE 802.11 i. IEEE Wireless Communications, 12(1), 27\u201336.","journal-title":"IEEE Wireless Communications"},{"issue":"1","key":"7_CR11","doi-asserted-by":"publisher","first-page":"1331","DOI":"10.1007\/s11277-017-4921-9","volume":"98","author":"C Chowdhury","year":"2018","unstructured":"Chowdhury, C., Aslam, N., Ahmed, G., Chattapadhyay, S., Neogy, S., & Zhang, L. (2018). Novel algorithms for reliability evaluation of remotely deployed wireless sensor networks. Wireless Personal Communications, 98(1), 1331\u20131360.","journal-title":"Wireless Personal Communications"},{"key":"7_CR12","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1002\/9781119226444.ch5","volume-title":"Smart cities: Foundations, principles, and applications","author":"C Chowdhury","year":"2017","unstructured":"Chowdhury, C., & Roy, S. (2017). Mobile crowdsensing for smart cities. In Smart cities: Foundations, principles, and applications (pp. 125\u2013154). Hoboken: Wiley."},{"issue":"11","key":"7_CR13","doi-asserted-by":"publisher","first-page":"1903","DOI":"10.1109\/JPROC.2010.2068530","volume":"98","author":"P Corke","year":"2010","unstructured":"Corke, P., Wark, T., Jurdak, R., Hu, W., Valencia, P., & Moore, D. (2010). Environmental wireless sensor networks. Proceedings of the IEEE, 98(11), 1903\u20131917.","journal-title":"Proceedings of the IEEE"},{"issue":"5","key":"7_CR14","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1016\/j.adhoc.2010.08.020","volume":"9","author":"O Delgado-Mohatar","year":"2011","unstructured":"Delgado-Mohatar, O., F\u00faster-Sabater, A., & Sierra, J. M. (2011). A light-weight authentication scheme for wireless sensor networks. Ad Hoc Networks, 9(5), 727\u2013735.","journal-title":"Ad Hoc Networks"},{"issue":"13","key":"7_CR15","doi-asserted-by":"crossref","first-page":"2024","DOI":"10.1002\/sec.1459","volume":"9","author":"M Elhoseny","year":"2016","unstructured":"Elhoseny, M., Yuan, X., El-Minir, H., & Riad, A. (2016). An energy efficient encryption method for secure dynamic WSN. Security and Communication Networks, 9(13), 2024\u20132031.","journal-title":"Security and Communication Networks"},{"key":"7_CR16","first-page":"180","volume-title":"International Conference on Ad Hoc Networks","author":"X Fan","year":"2012","unstructured":"Fan, X., & Gong, G. (2012). LPKM: A lightweight polynomial-based key management protocol for distributed wireless sensor networks. In International Conference on Ad Hoc Networks (pp. 180\u2013195). Berlin: Springer."},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"Fu, Y., & Liu, J. (2013). Monitoring system for sports activities using body area networks. In Proceedings of the 8th International Conference on Body Area Networks (pp. 408\u2013413).","DOI":"10.4108\/icst.bodynets.2013.253675"},{"issue":"10","key":"7_CR18","doi-asserted-by":"publisher","first-page":"4258","DOI":"10.1109\/TIE.2009.2015754","volume":"56","author":"V C Gungor","year":"2009","unstructured":"Gungor, V. C., & Hancke, G. P. (2009). Industrial wireless sensor networks: Challenges, design principles, and technical approaches. IEEE Transactions on Industrial Electronics, 56(10), 4258\u20134265.","journal-title":"IEEE Transactions on Industrial Electronics"},{"key":"7_CR19","volume-title":"Computer and cyber security: Principles, algorithm, applications, and perspectives","author":"B B Gupta","year":"2018","unstructured":"Gupta, B. B. (2018). Computer and cyber security: Principles, algorithm, applications, and perspectives. Boca Raton: CRC Press."},{"issue":"11","key":"7_CR20","doi-asserted-by":"publisher","first-page":"1294","DOI":"10.1016\/j.comcom.2011.01.004","volume":"34","author":"S Halder","year":"2011","unstructured":"Halder, S., Ghosal, A., & Bit, S. D. (2011). A pre-determined node deployment strategy to prolong network lifetime in wireless sensor network. Computer Communications, 34(11), 1294\u20131306.","journal-title":"Computer Communications"},{"issue":"4","key":"7_CR21","doi-asserted-by":"publisher","first-page":"2590","DOI":"10.1109\/JSYST.2016.2544805","volume":"11","author":"D He","year":"2017","unstructured":"He, D., Zeadally, S., Kumar, N., & Lee, J. H. (2017). Anonymous authentication for wireless body area networks with provable security. IEEE Systems Journal, 11(4), 2590\u20132601.","journal-title":"IEEE Systems Journal"},{"key":"7_CR22","doi-asserted-by":"publisher","first-page":"596","DOI":"10.1016\/j.future.2017.03.029","volume":"83","author":"M S Hossain","year":"2018","unstructured":"Hossain, M. S., Muhammad, G., Abdul, W., Song, B., & Gupta, B. (2018). Cloud-assisted secure video transmission and sharing framework for smart cities. Future Generation Computer Systems, 83, 596\u2013606.","journal-title":"Future Generation Computer Systems"},{"key":"7_CR23","first-page":"14","volume-title":"Proceedings of the 13th ACM International Conference on Modeling, Analysis, and Simulation of Wireless and Mobile Systems (MSWIM\u201910)","author":"K L Huang","year":"2010","unstructured":"Huang, K. L., Kanhere, S., & Hu, W. (2010). Are you contributing trustworthy data? The case for a reputation system in participatory sensing. In Proceedings of the 13th ACM International Conference on Modeling, Analysis, and Simulation of Wireless and Mobile Systems (MSWIM\u201910) (pp. 14\u201322). New York: ACM."},{"issue":"17","key":"7_CR24","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.3986","volume":"29","author":"M Jan","year":"2017","unstructured":"Jan, M., Nanda, P., Usman, M., & He, X. (2017). PAWN: A payload-based mutual authentication scheme for wireless sensor networks. Concurrency and Computation: Practice and Experience, 29(17), e3986.","journal-title":"Concurrency and Computation: Practice and Experience"},{"key":"7_CR25","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/978-3-642-36169-2_6","volume-title":"Wireless networks and security","author":"S S Javadi","year":"2013","unstructured":"Javadi, S. S., & Razzaque, M. (2013). Security and privacy in wireless body area networks for health care applications. In Wireless networks and security (pp. 165\u2013187). Berlin: Springer."},{"key":"7_CR26","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1007\/978-3-319-48799-1_25","volume-title":"Ubiquitous computing and ambient intelligence","author":"J Kallio","year":"2016","unstructured":"Kallio, J., & Koivusaari, J. (2016). WSN related requirement analysis towards sustainable building automation operations and maintenance. In Ubiquitous computing and ambient intelligence (pp. 212\u2013217). Berlin: Springer."},{"issue":"6","key":"7_CR27","doi-asserted-by":"publisher","first-page":"72","DOI":"10.5815\/ijisa.2014.06.08","volume":"6","author":"K Khan","year":"2014","unstructured":"Khan, K., & Goodridge, W. (2014). Impact of multipath routing on WSN security attacks. International Journal of Intelligent Systems and Applications, 6(6), 72.","journal-title":"International Journal of Intelligent Systems and Applications"},{"key":"7_CR28","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/j.adhoc.2017.11.006","volume":"70","author":"M Kompara","year":"2018","unstructured":"Kompara, M., & H\u00f6lbl, M. (2018). Survey on security in intra-body area network communication. Ad Hoc Networks, 70, 23\u201343.","journal-title":"Ad Hoc Networks"},{"key":"7_CR29","unstructured":"Lee, T. H. (2008). Simple dynamic user authentication protocols for wireless sensor networks. In Second International Conference on Sensor Technologies and Applications, 2008. SENSORCOMM\u201908 (pp. 657\u2013660). Piscataway: IEEE."},{"key":"7_CR30","first-page":"041","volume":"4","author":"Q Liu","year":"2009","unstructured":"Liu, Q., & Wang, P. K. (2009). Secure and energy-efficient clustered routing protocol for wireless sensor networks [j]. Computer Simulation, 4, 041.","journal-title":"Computer Simulation"},{"key":"7_CR31","doi-asserted-by":"publisher","first-page":"2768","DOI":"10.1109\/INFCOM.2011.5935109","volume-title":"Proceedings IEEE INFOCOM, 2011","author":"X Liu","year":"2011","unstructured":"Liu, X., Cao, J., Lai, S., Yang, C., Wu, H., & Xu, Y. L. (2011). Energy efficient clustering for WSN-based structural health monitoring. In Proceedings IEEE INFOCOM, 2011 (pp. 2768\u20132776). Piscataway: IEEE."},{"key":"7_CR32","first-page":"1","volume-title":"2015 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS)","author":"V Mainanwal","year":"2015","unstructured":"Mainanwal, V., Gupta, M., & Upadhayay, S. K. (2015) A survey on wireless body area network: Security technology and its design methodology issue. In 2015 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS) (pp. 1\u20135). Piscataway: IEEE."},{"issue":"17","key":"7_CR33","doi-asserted-by":"publisher","first-page":"5759","DOI":"10.1109\/JSEN.2017.2725324","volume":"17","author":"T Maitra","year":"2018","unstructured":"Maitra, T., & Roy, S. (2018). Research challenges in ban due to the mixed WSN features: Some perspectives and future directions. IEEE Sensors Journal, 17(17), 5759\u20135766.","journal-title":"IEEE Sensors Journal"},{"issue":"3","key":"7_CR34","doi-asserted-by":"publisher","first-page":"559","DOI":"10.4304\/jnw.8.3.559-575","volume":"8","author":"S Movassaghi","year":"2013","unstructured":"Movassaghi, S., Abolhasan, M., & Lipman, J. (2013). A review of routing protocols in wireless body area networks. Journal of Networks, 8(3), 559\u2013575.","journal-title":"Journal of Networks"},{"issue":"3","key":"7_CR35","doi-asserted-by":"publisher","first-page":"1658","DOI":"10.1109\/SURV.2013.121313.00064","volume":"16","author":"S Movassaghi","year":"2014","unstructured":"Movassaghi, S., Abolhasan, M., Lipman, J., Smith, D., & Jamalipour, A. (2014). Wireless body area networks: A survey. IEEE Communications Surveys & Tutorials, 16(3), 1658\u20131686.","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"2","key":"7_CR36","doi-asserted-by":"publisher","first-page":"551","DOI":"10.1109\/SURV.2012.062612.00084","volume":"15","author":"N A Pantazis","year":"2013","unstructured":"Pantazis, N. A., Nikolidakis, S. A., & Vergados, D. D. (2013). Energy-efficient routing protocols in wireless sensor networks: A survey. IEEE Communications Surveys & Tutorials, 15(2), 551\u2013591.","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"7_CR37","unstructured":"Pathan, A. S. K., Lee, H. W., & Hong, C. S. (2006). Security in wireless sensor networks: Issues and challenges. In The 8th International Conference on Advanced Communication Technology, ICACT 2006 (Vol. 2, 6 pp.). Piscataway: IEEE."},{"key":"7_CR38","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1016\/j.future.2017.09.082","volume":"82","author":"A P Plageras","year":"2018","unstructured":"Plageras, A. P., Psannis, K. E., Stergiou, C., Wang, H., & Gupta, B. B. (2018). Efficient IoT-based sensor big data collection\u2013processing and analysis in smart buildings. Future Generation Computer Systems, 82, 349\u2013357.","journal-title":"Future Generation Computer Systems"},{"key":"7_CR39","first-page":"998","volume-title":"15th International Conference on Advanced Communication Technology (ICACT)","author":"S N Ramli","year":"2013","unstructured":"Ramli, S. N., Ahmad, R., Abdollah, M. F., & Dutkiewicz, E. (2013). A biometric-based security for data authentication in wireless body area network (WBAN). In 15th International Conference on Advanced Communication Technology (ICACT) (pp. 998\u20131001). Piscataway: IEEE."},{"issue":"1","key":"7_CR40","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11227-013-1021-9","volume":"68","author":"P Rawat","year":"2014","unstructured":"Rawat, P., Singh, K. D., Chaouchi, H., & Bonnin, J. M. (2014). Wireless sensor networks: Recent developments and potential synergies. The Journal of Supercomputing, 68(1), 1\u201348.","journal-title":"The Journal of Supercomputing"},{"issue":"6","key":"7_CR41","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MWC.2004.1368897","volume":"11","author":"K Romer","year":"2004","unstructured":"Romer, K., & Mattern, F. (2004). The design space of wireless sensor networks. IEEE Wireless Communications, 11(6), 54\u201361.","journal-title":"IEEE Wireless Communications"},{"key":"7_CR42","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1007\/978-3-319-67235-9_16","volume-title":"International Conference on Communication Systems and Networks","author":"M Roy","year":"2017","unstructured":"Roy, M., Chowdhury, C., & Aslam, N. (2017). Designing 2-hop interference aware energy efficient routing (hier) protocol for wireless body area networks. In International Conference on Communication Systems and Networks (pp. 262\u2013283). Berlin: Springer."},{"key":"7_CR43","first-page":"298","volume-title":"9th International Conference on Communication Systems and Networks (COMSNETS)","author":"M Roy","year":"2017","unstructured":"Roy, M., Chowdhury, C., & Aslam, N. (2017). Designing an energy efficient WBAN routing protocol. In 9th International Conference on Communication Systems and Networks (COMSNETS) (pp. 298\u2013305). Piscataway: IEEE."},{"key":"7_CR44","first-page":"1","volume-title":"IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","author":"M Roy","year":"2017","unstructured":"Roy, M., Chowdhury, C., Kundu, A., & Aslam, N. (2017). Secure lightweight routing (SLR) strategy for wireless body area networks. In IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS) (pp. 1\u20134). Piscataway: IEEE."},{"key":"7_CR45","first-page":"183","volume-title":"Fourth International Conference on Advances in Computing and Communications (ICACC)","author":"M Roy","year":"2014","unstructured":"Roy, M., Chowdhury, C., & Neogy, S. (2014). Developing secured manet using trust. In Fourth International Conference on Advances in Computing and Communications (ICACC) (pp. 183\u2013186). Piscataway: IEEE."},{"issue":"2","key":"7_CR46","doi-asserted-by":"publisher","first-page":"1383","DOI":"10.3390\/s110201383","volume":"11","author":"S Saleem","year":"2011","unstructured":"Saleem, S., Ullah, S., & Kwak, K. S. (2011). A study of IEEE 802.15. 4 security framework for wireless body area networks. Sensors, 11(2), 1383\u20131395.","journal-title":"Sensors"},{"issue":"3","key":"7_CR47","doi-asserted-by":"publisher","first-page":"178","DOI":"10.4156\/jdcta.vol3.issue3.22","volume":"3","author":"S Saleem","year":"2009","unstructured":"Saleem, S., Ullah, S., & Yoo, H. S. (2009). On the security issues in wireless body area networks. International Journal of Digital Content Technology and Its Applications, 3(3), 178\u2013184.","journal-title":"International Journal of Digital Content Technology and Its Applications"},{"key":"7_CR48","unstructured":"Seah, W. K., Eu, Z. A., & Tan, H. P. (2009). Wireless sensor networks powered by ambient energy harvesting (WSN-heap)-survey and challenges. In 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology. Wireless VITAE 2009 (pp. 1\u20135). Piscataway: IEEE."},{"issue":"3\u20134","key":"7_CR49","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/s12243-014-0428-5","volume":"69","author":"M R Senouci","year":"2014","unstructured":"Senouci, M. R., Mellouk, A., Senouci, M. A., & Oukhellou, L. (2014). Belief functions in telecommunications and network technologies: An overview. Annals of Telecommunications, 69(3\u20134), 135\u2013145.","journal-title":"Annals of Telecommunications"},{"key":"7_CR50","doi-asserted-by":"publisher","first-page":"956","DOI":"10.1016\/j.future.2016.11.033","volume":"78","author":"J Shen","year":"2018","unstructured":"Shen, J., Chang, S., Shen, J., Liu, Q., & Sun, X. (2018). A lightweight multi-layer authentication protocol for wireless body area networks. Future Generation Computer Systems, 78, 956\u2013963.","journal-title":"Future Generation Computer Systems"},{"issue":"6","key":"7_CR51","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1109\/MWC.2013.6704479","volume":"20","author":"Z Sheng","year":"2013","unstructured":"Sheng, Z., Yang, S., Yu, Y., Vasilakos, A., Mccann, J., & Leung, K. (2013). A survey on the IETF protocol suite for the internet of things: Standards, challenges, and opportunities. IEEE Wireless Communications, 20(6), 91\u201398.","journal-title":"IEEE Wireless Communications"},{"issue":"2","key":"7_CR52","doi-asserted-by":"publisher","first-page":"63","DOI":"10.5121\/ijcses.2010.1206","volume":"1","author":"S K Singh","year":"2010","unstructured":"Singh, S. K., Singh, M., & Singh, D. K. (2010). Routing protocols in wireless sensor networks\u2013a survey. International Journal of Computer Science & Engineering Survey, 1(2), 63\u201383.","journal-title":"International Journal of Computer Science & Engineering Survey"},{"issue":"4","key":"7_CR53","first-page":"529","volume":"3","author":"A Singla","year":"2013","unstructured":"Singla, A., & Sachdeva, R. (2013). Review on security issues and attacks in wireless sensor networks. International Journal of Advanced Research in Computer Science and Software Engineering, 3(4), 529\u2013534.","journal-title":"International Journal of Advanced Research in Computer Science and Software Engineering"},{"key":"7_CR54","doi-asserted-by":"publisher","first-page":"964","DOI":"10.1016\/j.future.2016.11.031","volume":"78","author":"C Stergiou","year":"2018","unstructured":"Stergiou, C., Psannis, K. E., Kim, B. G., & Gupta, B. (2018). Secure integration of IoT and cloud computing. Future Generation Computer Systems, 78, 964\u2013975.","journal-title":"Future Generation Computer Systems"},{"key":"7_CR55","doi-asserted-by":"crossref","unstructured":"Tewari, A., & Gupta, B. (2018, in press). Security, privacy and trust of different layers in internet-of-things (IoTs) framework. Future Generation Computer Systems. https:\/\/doi.org\/10.1016\/j.future.2018.04.027","DOI":"10.1016\/j.future.2018.04.027"},{"key":"7_CR56","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.comcom.2013.10.002","volume":"38","author":"F Tiegang","year":"2014","unstructured":"Tiegang, F., Guifa, T., & Limin, H. (2014). Deployment strategy of wsn based on minimizing cost per unit area. Computer Communications, 38, 26\u201335.","journal-title":"Computer Communications"},{"issue":"17","key":"7_CR57","doi-asserted-by":"publisher","first-page":"2471","DOI":"10.1002\/dac.3120","volume":"29","author":"M Toorani","year":"2016","unstructured":"Toorani, M. (2016). Security analysis of the IEEE 802.15. 6 standard. International Journal of Communication Systems, 29(17), 2471\u20132489.","journal-title":"International Journal of Communication Systems"},{"issue":"2","key":"7_CR58","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1109\/MSSC.2010.936667","volume":"2","author":"R J Vullers","year":"2010","unstructured":"Vullers, R. J., Van Schaijk, R., Visser, H. J., Penders, J., & Van Hoof, C. (2010). Energy harvesting for autonomous wireless sensor networks. IEEE Solid-State Circuits Magazine, 2(2), 29\u201338.","journal-title":"IEEE Solid-State Circuits Magazine"},{"key":"7_CR59","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/COMST.2006.315852","volume":"8","author":"Y Wang","year":"2006","unstructured":"Wang, Y., Attebury, G., & Ramamurthy, B. (2006). A survey of security issues in wireless sensor networks. IEEE Communications Surveys & Tutorials, 8, 2\u201323.","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"7_CR60","unstructured":"Zhang, T., & Qu, H. (2010). A lightweight key management scheme for wireless sensor networks. In Second International Workshop on Education Technology and Computer Science (ETCS) (Vol. 1, pp. 272\u2013275). Piscataway: IEEE."},{"key":"7_CR61","unstructured":"Zia, T., & Zomaya, A. (2006). Security issues in wireless sensor networks. In Proceedings of the International Conference on Systems and Networks Communications (ICSNC 2006) (p. 40). Piscataway: IEEE."}],"container-title":["Handbook of Computer Networks and Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-22277-2_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,24]],"date-time":"2023-09-24T14:18:00Z","timestamp":1695565080000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-22277-2_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030222765","9783030222772"],"references-count":61,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-22277-2_7","relation":{},"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"1 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}