{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T12:00:12Z","timestamp":1726056012776},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030335847"},{"type":"electronic","value":"9783030335854"}],"license":[{"start":{"date-parts":[[2019,10,27]],"date-time":"2019-10-27T00:00:00Z","timestamp":1572134400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-33585-4_54","type":"book-chapter","created":{"date-parts":[[2019,10,26]],"date-time":"2019-10-26T16:03:38Z","timestamp":1572105818000},"page":"549-558","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Dynamic Secure Power Management System in Mobile Wireless Sensor Network"],"prefix":"10.1007","author":[{"given":"B.","family":"Bazeer Ahamed","sequence":"first","affiliation":[]},{"given":"D.","family":"Yuvaraj","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,10,27]]},"reference":[{"key":"54_CR1","unstructured":"Yin, J., Madria, S.K.: A hierarchical secure routing protocol against black hole attacks in sensor networks. In: IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, vol. 1, pp. 8 (2006)"},{"issue":"9","key":"54_CR2","doi-asserted-by":"publisher","first-page":"3395","DOI":"10.1109\/TWC.2007.06095","volume":"6","author":"X Du","year":"2007","unstructured":"Du, X., Guizani, M., Xiao, Y., Chen, H.H.: Two tier secure routing protocol for heterogeneous sensor networks. IEEE Trans. Wirel. Commun. 6(9), 3395\u20133401 (2007)","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"6","key":"54_CR3","doi-asserted-by":"publisher","first-page":"1051","DOI":"10.1016\/j.adhoc.2008.09.005","volume":"7","author":"S Madria","year":"2009","unstructured":"Madria, S., Yin, J.: SeRWA: a secure routing protocol against wormhole attacks in sensor networks. Ad Hoc Netw. 7(6), 1051\u20131063 (2009)","journal-title":"Ad Hoc Netw."},{"issue":"1","key":"54_CR4","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1145\/974121.974123","volume":"33","author":"M Tubaishat","year":"2004","unstructured":"Tubaishat, M., Yin, J., Panja, B., Madria, S.: A secure hierarchical model for sensor network. ACM Sigmod Rec. 33(1), 7\u201313 (2004)","journal-title":"ACM Sigmod Rec."},{"issue":"5","key":"54_CR5","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1023\/A:1016598314198","volume":"8","author":"A Perrig","year":"2002","unstructured":"Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: SPINS: Security protocols for sensor networks. Wirel. Netw. 8(5), 521\u2013534 (2002)","journal-title":"Wirel. Netw."},{"key":"54_CR6","doi-asserted-by":"crossref","unstructured":"Tang, L., Li, Q.: S-SPIN: a provably secure routing protocol for wireless sensor networks. In: IEEE International Conference on Communication Software and Networks, pp. 620\u2013624 (2009)","DOI":"10.1109\/ICCSN.2009.8"},{"key":"54_CR7","doi-asserted-by":"crossref","unstructured":"Cheng, F.H., Zhang, J., Ma, Z.: Curve-based secure routing algorithm for sensor network. In: IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 278\u2013281 (2006)","DOI":"10.1109\/IIH-MSP.2006.264998"},{"key":"54_CR8","unstructured":"Yin, C., Huang, S., Su, P., Gao, C.: Secure routing for large-scale wireless sensor networks. In: IEEE International Conference on Communication Technology Proceedings, vol. 2, pp. 1282\u20131286 (2003)"},{"key":"54_CR9","doi-asserted-by":"crossref","unstructured":"Sendra, S., Lloret, J., Garc\u00eda, M., Toledo, J.F.: Power saving and energy optimization techniques for wireless sensor networks. 6(6), 439\u2013459 (2011)","DOI":"10.4304\/jcm.6.6.439-459"},{"key":"54_CR10","doi-asserted-by":"crossref","unstructured":"Vijay, G., Bdiraand, E., Ibnkahla, M.: Cognitive approaches in wireless sensor networks: a survey. In: 25th IEEE Biennial Symposium on Communications, pp. 177\u2013180 (2010)","DOI":"10.1109\/BSC.2010.5472978"},{"key":"54_CR11","doi-asserted-by":"publisher","first-page":"488","DOI":"10.1016\/j.procs.2015.08.373","volume":"63","author":"ME Migabo","year":"2015","unstructured":"Migabo, M.E., Djouani, K., Kurien, A.M., Olwal, T.O.: Gradient-based routing for energy consumption balance in multiple sinks-based wireless sensor networks. Procedia Comput. Sci. 63, 488\u2013493 (2015)","journal-title":"Procedia Comput. Sci."},{"issue":"4","key":"54_CR12","first-page":"123","volume":"5","author":"BB Ahamed","year":"2012","unstructured":"Ahamed, B.B., Hariharan, S.: Implementation of network level security process through stepping stones by watermarking methodology. Int. J. Futur. Gener. Commun. Netw. 5(4), 123\u2013130 (2012)","journal-title":"Int. J. Futur. Gener. Commun. Netw."},{"key":"54_CR13","unstructured":"Ahamed, B.B., Yuvaraj, D.: Framework for faction of data in social network using link based mining process. In: Intelligent Computing & Optimization, Conference Proceedings, ICO 2018. Springer, Cham (2018). ISBN 978-3-030-00978-6"}],"container-title":["Advances in Intelligent Systems and Computing","Intelligent Computing and Optimization"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-33585-4_54","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,26]],"date-time":"2019-10-26T16:10:31Z","timestamp":1572106231000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-33585-4_54"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,27]]},"ISBN":["9783030335847","9783030335854"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-33585-4_54","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,10,27]]},"assertion":[{"value":"27 October 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICO","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Computing & Optimization","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Koh Samui","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Thailand","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 October 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 October 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ico0","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}