{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T04:11:11Z","timestamp":1748578271677,"version":"3.41.0"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319210087"},{"type":"electronic","value":"9783319210094"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-21009-4_43","type":"book-chapter","created":{"date-parts":[[2015,8,3]],"date-time":"2015-08-03T12:47:20Z","timestamp":1438606040000},"page":"572-587","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["The Research on Path-Based DoS Attack Detection Algorithm in Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"ZhenJiang","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Dong","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Yun","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Fei","family":"Xiong","sequence":"additional","affiliation":[]},{"given":"Han-Chieh","family":"Chao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,4]]},"reference":[{"key":"43_CR1","volume-title":"Introduction of the security technology in wireless sensor networks","author":"S Yulong","year":"2008","unstructured":"Yulong, S., Qingqi, P.: Introduction of the security technology in wireless sensor networks. People\u2019s Posts and Telecommunications Press, Beijing (2008)"},{"key":"43_CR2","unstructured":"Deng, J., Han, R., Mishra, S.: Defending against path-based DoS attacks in wireless sensor networks. In: Proceedings of 3rd ACM Workshop Security of Ad Hoc and Sensor Networks, pp. 89\u201396. ACM Press (2007)"},{"issue":"10","key":"43_CR3","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MC.2002.1039518","volume":"35","author":"AD Wood","year":"2002","unstructured":"Wood, A.D., Stankovic, J.A.: Denial of service in sensor networks. Computer 35(10), 54\u201362 (2002)","journal-title":"Computer"},{"issue":"1","key":"43_CR4","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/MPRV.2008.6","volume":"7","author":"DR Raymond","year":"2008","unstructured":"Raymond, D.R., Midkiff, S.F.: Denial-of-service in wireless sensor networks: attacks and defenses. IEEE Pervasive Comput. 7(1), 74\u201381 (2008)","journal-title":"IEEE Pervasive Comput."},{"key":"43_CR5","doi-asserted-by":"crossref","unstructured":"Xu, W. et al.: The feasibility of launching and detecting jamming attacks in wireless networks. In: Proceedings of 11th Annual International Conference on Mobile Computing and Networking, pp. 46\u201357. ACM Press (2005)","DOI":"10.1145\/1062689.1062697"},{"key":"43_CR6","unstructured":"Woo, A., Tong T., Culler, D.: Taming the underlying challenges for reliable multi-hop routing in sensor networks. In: Proceedings of 3rd ACM International Conference on Embedded Networked Sensor Systems, pp. 14\u201327. ACM Press (2010)"},{"key":"43_CR7","doi-asserted-by":"crossref","unstructured":"Raymond, D. et al.: Effects of denial of sleep attacks on wireless sensor network MAC protocols. In: Proceedings of 7th Annual IEEE Systems, Man, and Cybernetics (SMC) Information Assurance Workshop (IAW), pp. 297\u2013304. IEEE Press (2006)","DOI":"10.1109\/IAW.2006.1652109"},{"key":"43_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1007\/10720107_24","volume-title":"Security Protocols","author":"F Stajano","year":"2011","unstructured":"Stajano, F., Anderson, R.: The resurrecting duckling: security issues for ad-hoc wireless networks. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2000. LNCS, vol. 1796, pp. 172\u2013182. Springer, Heidelberg (2011)"},{"key":"43_CR9","doi-asserted-by":"crossref","unstructured":"Crosby, G.V., Pissinou, N., Gadze, J.: A framework for trust-based cluster head election in wireless sensor networks. In: Proceedings of 2nd IEEE Workshop Dependability and Security in Sensor Networks and Systems, pp. 13\u201322. IEEE Press (2006)","DOI":"10.1109\/DSSNS.2006.1"},{"key":"43_CR10","unstructured":"Jakobsson, M.: Fractal hash sequence representation and traversal. In: 2002 IEEE International Symposium on Information Theory (ISIT 2002), Switzerland, July 2002"},{"key":"43_CR11","unstructured":"Liu, D., Ning, P.: Efficient distribution of key chain commitments for broadcast authentication in distributed Sensor Networks. In: NDSS (2003)"},{"key":"43_CR12","unstructured":"Zhu, S., Setia, S., Jajodia, S., Ning, P.: An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks. In: 2004 IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 2004"}],"container-title":["Lecture Notes in Business Information Processing","Knowledge Management in Organizations"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-21009-4_43","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T21:16:29Z","timestamp":1748553389000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-21009-4_43"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319210087","9783319210094"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-21009-4_43","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"4 August 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}