{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T08:40:03Z","timestamp":1746348003225,"version":"3.40.4"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319097695"},{"type":"electronic","value":"9783319097701"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-09770-1_16","type":"book-chapter","created":{"date-parts":[[2014,8,19]],"date-time":"2014-08-19T07:25:20Z","timestamp":1408433120000},"page":"180-190","source":"Crossref","is-referenced-by-count":1,"title":["A Protocol for Intrusion Detection in Location Privacy-Aware Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Ji\u0159\u00ed","family":"K\u016fr","sequence":"first","affiliation":[]},{"given":"Vashek","family":"Maty\u00e1\u0161","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1145\/1089761.1089765","volume-title":"Proceedings of the 1st ACM International Workshop on Quality of Service & Security in Wireless and Mobile Networks, Q2SWinet 2005","author":"A.P.R. Silva da","year":"2005","unstructured":"da Silva, A.P.R., Martins, M.H.T., Rocha, B.P.S., Loureiro, A.A.F., Ruiz, L.B., Wong, H.C.: Decentralized intrusion detection in wireless sensor networks. In: Proceedings of the 1st ACM International Workshop on Quality of Service & Security in Wireless and Mobile Networks, Q2SWinet 2005, pp. 16\u201323. ACM, New York (2005)"},{"issue":"2","key":"16_CR2","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1016\/j.comcom.2005.05.018","volume":"29","author":"J. Deng","year":"2006","unstructured":"Deng, J., Han, R., Mishra, S.: INSENS: Intrusion-tolerant routing for wireless sensor networks. Computer Communications\u00a029(2), 216\u2013230 (2006)","journal-title":"Computer Communications"},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"Hai, T.H., Huh, E.-N.: Detecting selective forwarding attacks in wireless sensor networks using two-hops neighbor knowledge. In: Proceedings of the Seventh IEEE International Symposium on Network Computing and Applications, NCA 2008, pp. 325\u2013331 (2008)","DOI":"10.1109\/NCA.2008.13"},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Kaplantzis, S., Shilton, A., Mani, N., Sekercioglu, Y.A.: Detecting selective forwarding attacks in wireless sensor networks using support vector machines. In: Proceedings of the 3rd International Conference on Intelligent Sensors, Sensor Networks and Information, ISSNIP 2007, pp. 335\u2013340 (2007)","DOI":"10.1109\/ISSNIP.2007.4496866"},{"issue":"1","key":"16_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5815\/ijcnis.2011.01.01","volume":"3","author":"W.Z. Khan","year":"2011","unstructured":"Khan, W.Z., Xiang, Y., Aalsalem, M.Y., Arshad, Q.: Comprehensive study of selective forwarding attack in wireless sensor networks. IJCNIS\u00a03(1), 1\u201310 (2011)","journal-title":"IJCNIS"},{"key":"16_CR6","unstructured":"Krontiris, I., Dimitriou, T., Freiling, F.C.: Towards intrusion detection in wireless sensor networks. In: Proceedings of the 13th European Wireless Conference (2007)"},{"key":"16_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1007\/978-3-642-25867-1_18","volume-title":"Security Protocols XIX","author":"J. K\u016fr","year":"2011","unstructured":"K\u016fr, J., Maty\u00e1\u0161, V., Stetsko, A., \u0160venda, P.: Attack detection vs. privacy \u2013 how to find the link or how to hide it? In: Christianson, B., Crispo, B., Malcolm, J., Stajano, F. (eds.) Security Protocols 2011. LNCS, vol.\u00a07114, pp. 189\u2013199. Springer, Heidelberg (2011)"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Mehta, K., Liu, D., Wright, M.: Location privacy in sensor networks against a global eavesdropper. In: IEEE International Conference on Network Protocols, ICNP 2007, pp. 314\u2013323 (October 2007)","DOI":"10.1109\/ICNP.2007.4375862"},{"issue":"5","key":"16_CR9","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1023\/A:1016598314198","volume":"8","author":"A. Perrig","year":"2002","unstructured":"Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: SPINS: Security protocols for sensor networks. Wireless networks\u00a08(5), 521\u2013534 (2002)","journal-title":"Wireless networks"},{"key":"16_CR10","unstructured":"Polastre, J., Szewczyk, R., Culler, D.: Telos: Enabling ultra-low power wireless research. In: Fourth International Symposium on Information Processing in Sensor Networks, IPSN 2005, pp. 364\u2013369 (2005)"},{"key":"16_CR11","doi-asserted-by":"crossref","unstructured":"Roman, R., Zhou, J., Lopez, J.: Applying intrusion detection systems to wireless sensor networks. In: Proceedings of the 3rd IEEE Consumer Communications and Networking Conference, CCNC 2006, vol.\u00a01, pp. 640\u2013644 (2006)","DOI":"10.1109\/CCNC.2006.1593102"},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"Stetsko, A., Folkman, L., Maty\u00e1\u0161, V.: Neighbor-based intrusion detection for wireless sensor networks. In: Proceedings of the 6th International Conference on Wireless and Mobile Communications, ICWMC 2010, pp. 420\u2013425 (2010)","DOI":"10.1109\/ICWMC.2010.61"},{"issue":"5","key":"16_CR13","doi-asserted-by":"publisher","first-page":"835","DOI":"10.1109\/TPDS.2011.117","volume":"23","author":"G. Wang","year":"2012","unstructured":"Wang, G., Zhang, W., Kim, J., Feng, T., Wang, C.: Catching packet droppers and modifiers in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems\u00a023(5), 835\u2013843 (2012)","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"16_CR14","unstructured":"Yu, B., Xiao, B.: Detecting selective forwarding attacks in wireless sensor networks. In: Proceedings of the 20th International Parallel and Distributed Processing Symposium, IPDPS 2006, pp. 1\u20138 (2006)"}],"container-title":["Lecture Notes in Computer Science","Trust, Privacy, and Security in Digital Business"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-09770-1_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T08:06:15Z","timestamp":1746345975000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-09770-1_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319097695","9783319097701"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-09770-1_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}