{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T18:40:02Z","timestamp":1746470402143,"version":"3.40.4"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319123998"},{"type":"electronic","value":"9783319124001"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-12400-1_29","type":"book-chapter","created":{"date-parts":[[2014,10,28]],"date-time":"2014-10-28T15:15:00Z","timestamp":1414509300000},"page":"300-315","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["On Node Capturing Attacker Strategies"],"prefix":"10.1007","author":[{"given":"Filip","family":"Jurne\u010dka","sequence":"first","affiliation":[]},{"given":"Martin","family":"Stehl\u00edk","sequence":"additional","affiliation":[]},{"given":"Vashek","family":"Maty\u00e1\u0161","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,10,29]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Anderson, R., Chan, H., Perrig, A.: Key infection: smart trust for smart dust. In: Proceedings of the 12th IEEE International Conference on Network Protocols, pp. 206\u2013215. IEEE Computer Society, Washington, DC (2004)","key":"29_CR1","DOI":"10.1109\/ICNP.2004.1348111"},{"doi-asserted-by":"crossref","unstructured":"Bonaci, T., Bushnell, L., Poovendran, R.: Node capture attacks in wireless sensor networks: a system theoretic approach. In: 2010 49th IEEE Conference on Decision and Control (CDC), pp. 6765\u20136772 (2010)","key":"29_CR2","DOI":"10.1109\/CDC.2010.5717499"},{"doi-asserted-by":"crossref","unstructured":"Chan, H., Perrig, A.: Pike: peer intermediaries for key establishment in sensor networks. In: INFOCOM 2005: Proceedings of 24th Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 1, pp. 524\u2013535, March 2005","key":"29_CR3","DOI":"10.1109\/INFCOM.2005.1497920"},{"unstructured":"Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: 2003 Symposium on Security and Privacy, pp. 197\u2013213, May 2003","key":"29_CR4"},{"issue":"2","key":"29_CR5","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.C.: On the security of public key protocols. IEEE Trans. Inf. Theory 29(2), 198\u2013208 (1983)","journal-title":"IEEE Trans. Inf. Theory"},{"doi-asserted-by":"crossref","unstructured":"Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS \u201902, pp. 41\u201347. ACM, New York (2002)","key":"29_CR6","DOI":"10.1145\/586110.586117"},{"issue":"3","key":"29_CR7","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/s11036-006-5188-7","volume":"11","author":"R Hekmat","year":"2006","unstructured":"Hekmat, R., Van Mieghem, P.: Connectivity in wireless ad-hoc networks with a log-normal radio model. Mob. Netw. Appl. 11(3), 351\u2013360 (2006)","journal-title":"Mob. Netw. Appl."},{"doi-asserted-by":"crossref","unstructured":"Hwang, J., Kim, Y.: Revisiting random key pre-distribution schemes for wireless sensor networks. In: Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN \u201904, pp. 43\u201352. ACM, New York (2004)","key":"29_CR8","DOI":"10.1145\/1029102.1029111"},{"doi-asserted-by":"crossref","unstructured":"Jurne\u010dka, F., Stehl\u00edk, M., Maty\u00e1\u0161, V.: Key management schemes for wireless sensor networks (2013). https:\/\/sourceforge.net\/projects\/kmsfwsn\/. Accessed 22 May 2014","key":"29_CR9","DOI":"10.1007\/978-3-319-11851-2_16"},{"doi-asserted-by":"crossref","unstructured":"K\u00f6pke, A., Swigulski, M., Wessel, K., Willkomm, D., Haneveld, P.T.K., Parker, T.E.V., Visser, O.W., Lichte, H.S., Valentin, S.: Simulating wireless and mobile networks in OMNeT++ the MiXiM vision. In: Conference on Simulation Tools and Techniques for Communications, Networks and Systems & Workshops, Simutools \u201908, ICST, pp. 71:1\u201371:8. ICST, Brussels (2008)","key":"29_CR10","DOI":"10.4108\/ICST.SIMUTOOLS2008.3031"},{"key":"29_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-642-36213-2_2","volume-title":"Security Protocols XVII","author":"J K\u016fr","year":"2013","unstructured":"K\u016fr, J., Maty\u00e1\u0161, V., \u0160venda, P.: Evolutionary design of attack strategies. In: Christianson, B., Malcolm, J.A., Maty\u00e1\u0161, V., Roe, M. (eds.) Security Protocols 2009. LNCS, vol. 7028, pp. 3\u201317. Springer, Heidelberg (2013)"},{"unstructured":"Lai, B., Kim, S., Verbauwhede, I.: Scalable session key construction protocol for wireless sensor networks. In: IEEE Workshop on Large Scale RealTime and Embedded Systems (LARTES), p. 7 (2002)","key":"29_CR12"},{"key":"29_CR13","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1145\/359657.359659","volume":"21","author":"RM Needham","year":"1978","unstructured":"Needham, R.M., Schroeder, M.D.: Using encryption for authentication in large networks of computers. Commun. ACM 21, 993\u2013999 (1978)","journal-title":"Commun. ACM"},{"issue":"2","key":"29_CR14","first-page":"465","volume":"25","author":"S \u00d6zdemir","year":"2012","unstructured":"\u00d6zdemir, S., Khalil, O.: Performance evaluation of key management schemes in wireless sensor networks. Gazi Univ. J. Sci. 25(2), 465\u2013476 (2012)","journal-title":"Gazi Univ. J. Sci."},{"doi-asserted-by":"crossref","unstructured":"Roman, R., Lopez, J., Alcaraz, C., Chen, H.H.: Sensekey - simplifying the selection of key management schemes for sensor networks. In: Proceedings of the 2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications, WAINA \u201911, pp. 789\u2013794. IEEE Computer Society, Washington, DC (2011)","key":"29_CR15","DOI":"10.1109\/WAINA.2011.78"},{"doi-asserted-by":"crossref","unstructured":"Stetsko, A., Stehlik, M., Matyas, V.: Calibrating and comparing simulators for wireless sensor networks. In: 2011 IEEE 8th International Conference on Mobile Adhoc and Sensor Systems (MASS), pp. 733\u2013738 (2011)","key":"29_CR16","DOI":"10.1109\/MASS.2011.80"},{"doi-asserted-by":"crossref","unstructured":"Stetsko, A., Smolka, T., Jurne\u010dka, F., Matyas, V.: On the credibility of wireless sensor network simulations: evaluation of intrusion detection system. In: Proceedings of the 5th International ICST Conference on Simulation Tools and Techniques, SIMUTOOLS \u201912, ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), pp. 75\u201384. ICST, Brussels (2012)","key":"29_CR17","DOI":"10.4108\/icst.simutools.2012.247708"},{"issue":"6","key":"29_CR18","doi-asserted-by":"publisher","first-page":"801","DOI":"10.1016\/j.adhoc.2007.01.002","volume":"5","author":"P Tague","year":"2007","unstructured":"Tague, P., Poovendran, R.: Modeling adaptive node capture attacks in multi-hop wireless networks. Ad Hoc Netw. 5(6), 801\u2013814 (2007)","journal-title":"Ad Hoc Netw."},{"key":"29_CR19","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1109\/13.804564","volume":"42","author":"A Varga","year":"1999","unstructured":"Varga, A.: Using the OMNeT++ discrete event simulation system in education. IEEE Trans. Educ. 42, 372 (1999)","journal-title":"IEEE Trans. Educ."},{"doi-asserted-by":"crossref","unstructured":"Vu, T.M., Williamson, C., Safavi-Naini, R.: Simulation modeling of secure wireless sensor networks. In: Proceedings of the Fourth International ICST Conference on Performance Evaluation Methodologies and Tools, VALUETOOLS \u201909, ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), pp. 30:1\u201330:10. ICST, Brussels (2009)","key":"29_CR20","DOI":"10.4108\/ICST.VALUETOOLS2009.7629"}],"container-title":["Lecture Notes in Computer Science","Security Protocols XXII"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-12400-1_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T18:01:02Z","timestamp":1746468062000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-12400-1_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319123998","9783319124001"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-12400-1_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"29 October 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}