{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T16:09:37Z","timestamp":1758816577799,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030996185"},{"type":"electronic","value":"9783030996192"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-99619-2_35","type":"book-chapter","created":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T05:19:48Z","timestamp":1648617588000},"page":"370-379","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Security, Power Consumption and\u00a0Simulations in\u00a0IoT Device Networks: A Systematic Review"],"prefix":"10.1007","author":[{"given":"Roland Montalvan Pires Torres","family":"Filho","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Luciana Pereira","family":"Oliveira","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Leonardo Nunes","family":"Carneiro","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2022,3,31]]},"reference":[{"key":"35_CR1","doi-asserted-by":"publisher","unstructured":"Menezes, A.H.S., et al.: IoT environment to train service dogs. In: IEEE First Summer School on Smart Cities (S3C) (2017). https:\/\/doi.org\/10.1109\/S3C.2017.8501386","DOI":"10.1109\/S3C.2017.8501386"},{"key":"35_CR2","doi-asserted-by":"publisher","DOI":"10.1109\/DeSE.2010.20","author":"M Asim","year":"2010","unstructured":"Asim, M., et al.: A self-configurable architecture for wireless sensor networks. Dev. E-Syst. Eng. DeSE (2010). https:\/\/doi.org\/10.1109\/DeSE.2010.20","journal-title":"Dev. E-Syst. Eng. DeSE"},{"key":"35_CR3","doi-asserted-by":"crossref","unstructured":"Lata, B.T., et al.: SGR: secure geographical routing in wireless sensor networks. In: 9th International Conference on Industrial and Information Systems ICIIS (2015)","DOI":"10.1109\/ICIINFS.2014.7036521"},{"key":"35_CR4","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.future.2018.12.024","volume":"95","author":"J Lu","year":"2019","unstructured":"Lu, J., et al.: Artificial agent: the fusion of artificial intelligence and a mobile agent for energy-efficient traffic control in wireless sensor networks. Future Gener. Comput. Syst. 95, 45\u201351 (2019). https:\/\/doi.org\/10.1016\/j.future.2018.12.024","journal-title":"Future Gener. Comput. Syst."},{"key":"35_CR5","doi-asserted-by":"publisher","unstructured":"Mbarek, B., Meddeb, A.: Energy efficient security protocols for wireless sensor networks: SPINS vs TinySec. In: ISNCC (2016). https:\/\/doi.org\/10.1109\/ISNCC.2016.7746117","DOI":"10.1109\/ISNCC.2016.7746117"},{"key":"35_CR6","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/978-3-030-44041-1_20","volume-title":"Advanced Information Networking and Applications","author":"LP Oliveira","year":"2020","unstructured":"Oliveira, L.P., Vieira, M.N., Leite, G.B., de Almeida, E.L.V.: Evaluating energy efficiency and security for Internet of Things: a systematic review. In: Barolli, L., Amato, F., Moscato, F., Enokido, T., Takizawa, M. (eds.) AINA 2020. AISC, vol. 1151, pp. 217\u2013228. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-44041-1_20"},{"key":"35_CR7","series-title":"Lecture Notes in Networks and Systems","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1007\/978-3-030-75078-7_28","volume-title":"Advanced Information Networking and Applications","author":"LP Oliveira","year":"2021","unstructured":"Oliveira, L.P., da Silva, A.W.N., de Azevedo, L.P., da Silva, M.V.L.: Formal methods to analyze energy efficiency and security for IoT: a systematic review. In: Barolli, L., Woungang, I., Enokido, T. (eds.) AINA 2021. LNNS, vol. 227, pp. 270\u2013279. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-75078-7_28"},{"key":"35_CR8","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1109\/WCL.2013.13.130292","volume":"2","author":"G Zeng","year":"2013","unstructured":"Zeng, G., Dong, X., Bornemann, J.: Reconfigurable feedback shift register based stream cipher for wireless sensor networks. IEEE Wirel. Commun. Lett. 2, 559\u2013562 (2013)","journal-title":"IEEE Wirel. Commun. Lett."},{"key":"35_CR9","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1016\/j.comnet.2019.02.019","volume":"154","author":"S Halder","year":"2019","unstructured":"Halder, S., Ghosal, A., Conti, M.: Efficient physical intrusion detection in Internet of Things: a node deployment approach. Comput. Netw. 154, 28\u201346 (2019)","journal-title":"Comput. Netw."},{"key":"35_CR10","unstructured":"Hong, L.: Mobile agent based topology control algorithms for wireless sensor networks. In: IEEE Wireless Communications and Networking Conference Workshops WCNCW (2013)"},{"key":"35_CR11","unstructured":"Sichitiu, M.L.: Cross-layer scheduling for power efficiency in wireless sensor networks. In: IEEE INFOCOM (2004)"},{"key":"35_CR12","doi-asserted-by":"publisher","first-page":"470","DOI":"10.1109\/JSEN.2017.2761396","volume":"18","author":"F Al-Turjman","year":"2018","unstructured":"Al-Turjman, F.: Energy-aware data delivery framework for safety-oriented mobile IoT. IEEE Sens. J. 18, 470\u2013478 (2018). https:\/\/doi.org\/10.1109\/JSEN.2017.2761396","journal-title":"IEEE Sens. J."},{"key":"35_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.09.015","author":"T Gaber","year":"2018","unstructured":"Gaber, T., et al.: Trust-based secure clustering in WSN-based intelligent transportation systems. Comput. Netw. (2018). https:\/\/doi.org\/10.1016\/j.comnet.2018.09.015","journal-title":"Comput. Netw."},{"key":"35_CR14","doi-asserted-by":"publisher","unstructured":"Yin, J., Madria, S.K.: Sybil attack detection in a hierarchical sensor network. In: SecureComm (2007). https:\/\/doi.org\/10.1109\/SECCOM.2007.4550372","DOI":"10.1109\/SECCOM.2007.4550372"},{"key":"35_CR15","doi-asserted-by":"publisher","unstructured":"Silva, A.A.A., et al.: Predicting model for identifying the malicious activity of nodes in MANETs. In: Proceedings - IEEE IEEE Symposium on Computers and Communication (2015). https:\/\/doi.org\/10.1109\/ISCC.2015.7405596","DOI":"10.1109\/ISCC.2015.7405596"},{"key":"35_CR16","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1016\/j.compeleceng.2016.10.015","volume":"64","author":"H Lin","year":"2017","unstructured":"Lin, H., et al.: A trustworthy and energy-aware routing protocol in software-defined wireless mesh networks. Comput. Electr. Eng. 64, 407\u2013419 (2017)","journal-title":"Comput. Electr. Eng."}],"container-title":["Lecture Notes in Networks and Systems","Advanced Information Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-99619-2_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T06:13:31Z","timestamp":1648620811000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-99619-2_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030996185","9783030996192"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-99619-2_35","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"31 March 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AINA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Networking and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sydney, NSW","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 April 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 April 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aina2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/aina\/2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}