{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T04:10:47Z","timestamp":1748751047032,"version":"3.41.0"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319271361"},{"type":"electronic","value":"9783319271378"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-27137-8_30","type":"book-chapter","created":{"date-parts":[[2015,11,16]],"date-time":"2015-11-16T11:24:23Z","timestamp":1447673063000},"page":"403-416","source":"Crossref","is-referenced-by-count":1,"title":["Minimizing Resource Expenditure While Maximizing Destructiveness for Node Capture Attacks"],"prefix":"10.1007","author":[{"given":"Chi","family":"Lin","sequence":"first","affiliation":[]},{"given":"Guowei","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Xiaochen","family":"Lai","sequence":"additional","affiliation":[]},{"given":"Tie","family":"Qiu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,16]]},"reference":[{"issue":"2","key":"30_CR1","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1002\/sec.570","volume":"6","author":"G Wu","year":"2013","unstructured":"Wu, G., Chen, X., Obaidat, M.S., Lin, C.: A high efficient node capture attack algorithm in wireless sensor network based on route minimum key set. Secur. Commun. Netw. 6(2), 230\u2013238 (2013)","journal-title":"Secur. Commun. Netw."},{"doi-asserted-by":"crossref","unstructured":"Tague, P., Lee, J., Poovendran, R.: A set-covering approach for modeling attacks on key predistribution in wireless sensor networks. In: Third International Conference on Intelligent Sensing and Information Processing, ICISIP 2005, pp. 254\u2013259. IEEE (2005)","key":"30_CR2","DOI":"10.1109\/ICISIP.2005.1619445"},{"issue":"4","key":"30_CR3","doi-asserted-by":"publisher","first-page":"19-es","DOI":"10.1145\/1281492.1281494","volume":"3","author":"P Tague","year":"2007","unstructured":"Tague, P., Poovendran, R.: A canonical seed assignment model for key predistribution in wireless sensor networks. ACM Trans. Sens. Netw. (TOSN) 3(4), 19-es (2007)","journal-title":"ACM Trans. Sens. Netw. (TOSN)"},{"unstructured":"Tague, P.: Identifying, modeling, and mitigating attacks in wireless ad-hoc and sensor networks. PhD thesis, University of Washington (2009)","key":"30_CR4"},{"issue":"2","key":"30_CR5","doi-asserted-by":"publisher","first-page":"989","DOI":"10.1007\/s11227-013-0965-0","volume":"66","author":"C Lin","year":"2013","unstructured":"Lin, C., Wu, G.: Enhancing the attacking efficiency of the node capture attack in WSN: a matrix approach. J. Supercomputing 66(2), 989\u20131007 (2013)","journal-title":"J. Supercomputing"},{"issue":"6","key":"30_CR6","doi-asserted-by":"publisher","first-page":"908","DOI":"10.1007\/s11036-013-0469-4","volume":"18","author":"C Lin","year":"2013","unstructured":"Lin, C., Wu, G., Xia, F., Yao, L.: Enhancing efficiency of node compromise attacks in vehicular ad-hoc networks using connected dominating set. Mob. Netw. Appl. 18(6), 908\u2013922 (2013)","journal-title":"Mob. Netw. Appl."},{"doi-asserted-by":"crossref","unstructured":"Lin, C., Wu, G., Yim, K., Yao, L., Hou, G.: Compromising ad-hoc networks by attacking weakly connected dominating set. In: The 9-th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2015). IEEE (2015) (to appear)","key":"30_CR7","DOI":"10.1109\/IMIS.2015.33"},{"doi-asserted-by":"publisher","unstructured":"Lin, C., Wu, G., Yu, C.W., Yao, L.: Maximizing destructiveness of node capture attack in wireless sensor networks. J. Supercomputing (2015) (to appear) doi: 10.1007\/s11227-015-1435-7","key":"30_CR8","DOI":"10.1007\/s11227-015-1435-7"},{"doi-asserted-by":"crossref","unstructured":"Tague, P., Slater, D., Rogers, J., Poovendran, R.: Vulnerability of network traffic under node capture attacks using circuit theoretic analysis. In: The 27th Conference on Computer Communications, INFOCOM 2008, IEEE, pp. 161\u2013165. IEEE (2008)","key":"30_CR9","DOI":"10.1109\/INFOCOM.2007.41"},{"key":"30_CR10","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1109\/TDSC.2008.60","volume":"6","author":"P Tague","year":"2008","unstructured":"Tague, P., Slater, D., Rogers, J., Poovendran, R.: Evaluating the vulnerability of network traffic using joint security and routing analysis. IEEE Trans. Dependable Secure Comput. 6, 111\u2013123 (2008)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"1","key":"30_CR11","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1145\/1053283.1053287","volume":"8","author":"D Liu","year":"2005","unstructured":"Liu, D., Ning, P., Li, R.: Establishing pairwise keys in distributed sensor networks. ACM Trans. Inf. Syst. Secur. (TISSEC) 8(1), 41\u201377 (2005)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"doi-asserted-by":"crossref","unstructured":"Perkins, C., Belding-Royer, E., Das, S., et al.: Ad hoc on-demand distance vector (AODV) routing (2003)","key":"30_CR12","DOI":"10.17487\/rfc3561"},{"doi-asserted-by":"crossref","unstructured":"Schurgers, C., Srivastava, M.: Energy efficient routing in wireless sensor networks. In: Military Communications Conference on Communications for Network-Centric Operations: Creating the Information Force, IEEE, MILCOM 2001, vol. 1, pp. 357\u2013361. IEEE (2001)","key":"30_CR13","DOI":"10.1109\/MILCOM.2001.985819"},{"issue":"1","key":"30_CR14","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1109\/MWC.2004.1269720","volume":"11","author":"K Jain","year":"2004","unstructured":"Jain, K.: Security based on network topology against the wiretapping attack. IEEE Wirel. Commun. 11(1), 68\u201371 (2004)","journal-title":"IEEE Wirel. Commun."},{"issue":"1\u20137","key":"30_CR15","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/S0169-7552(98)00110-X","volume":"30","author":"S Brin","year":"1998","unstructured":"Brin, S., Page, L.: The anatomy of a large-scale hypertextual web search engine* 1. Comput. Netw. ISDN Syst. 30(1\u20137), 107\u2013117 (1998)","journal-title":"Comput. Netw. ISDN Syst."},{"key":"30_CR16","doi-asserted-by":"crossref","DOI":"10.1515\/9781400830329","volume-title":"Google Page Rank and Beyond","author":"A Langville","year":"2006","unstructured":"Langville, A., Meyer, C.: Google Page Rank and Beyond. Princeton University Press, Princeton (2006)"},{"unstructured":"http:\/\/www.math.uwaterloo.ca\/tsp\/concorde.html","key":"30_CR17"},{"unstructured":"Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensornetworks (2003)","key":"30_CR18"},{"doi-asserted-by":"crossref","unstructured":"Eschenauer, L., Gligor, V.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 41\u201347. ACM (2002)","key":"30_CR19","DOI":"10.1145\/586110.586117"},{"issue":"3","key":"30_CR20","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1016\/j.adhoc.2003.09.010","volume":"3","author":"K Akkaya","year":"2005","unstructured":"Akkaya, K., Younis, M.: A survey on routing protocols for wireless sensor networks. Ad hoc Netw. 3(3), 325\u2013349 (2005)","journal-title":"Ad hoc Netw."}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-27137-8_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T12:04:49Z","timestamp":1748693089000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-27137-8_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319271361","9783319271378"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-27137-8_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}