{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T06:15:50Z","timestamp":1725862550729},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319428352"},{"type":"electronic","value":"9783319428369"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-42836-9_43","type":"book-chapter","created":{"date-parts":[[2016,8,2]],"date-time":"2016-08-02T22:30:38Z","timestamp":1470177038000},"page":"487-498","source":"Crossref","is-referenced-by-count":5,"title":["MPBSD: A Moving Target Defense Approach for Base Station Security in Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Tommy","family":"Chin","sequence":"first","affiliation":[]},{"given":"Kaiqi","family":"Xiong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,8,4]]},"reference":[{"issue":"1","key":"43_CR1","doi-asserted-by":"crossref","first-page":"266","DOI":"10.1109\/SURV.2013.050113.00191","volume":"16","author":"I Butun","year":"2014","unstructured":"Butun, I., Morgera, S.D., Sankar, R.: A survey of intrusion detection systems in wireless sensor networks. IEEE Commun. Surv. Tutorials 16(1), 266\u2013282 (2014)","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"8","key":"43_CR2","doi-asserted-by":"crossref","first-page":"791","DOI":"10.1016\/j.adhoc.2010.03.001","volume":"8","author":"U Acharya","year":"2010","unstructured":"Acharya, U., Younis, M.: Increasing base-station anonymity in wireless sensor networks. Ad Hoc Netw. 8(8), 791\u2013809 (2010)","journal-title":"Ad Hoc Netw."},{"issue":"2","key":"43_CR3","doi-asserted-by":"crossref","first-page":"216","DOI":"10.1016\/j.comcom.2005.05.018","volume":"29","author":"J Deng","year":"2006","unstructured":"Deng, J., Han, R., Mishra, S.: Insens: intrusion-tolerant routing for wireless sensor networks. Comput. Commun. 29(2), 216\u2013230 (2006)","journal-title":"Comput. Commun."},{"issue":"3","key":"43_CR4","doi-asserted-by":"crossref","first-page":"1022","DOI":"10.1016\/j.jnca.2012.01.002","volume":"35","author":"WT Zhu","year":"2012","unstructured":"Zhu, W.T., Zhou, J., Deng, R.H., Bao, F.: Detecting node replication attacks in wireless sensor networks: a survey. J. Netw. Comput. Appl. 35(3), 1022\u20131034 (2012)","journal-title":"J. Netw. Comput. Appl."},{"issue":"9","key":"43_CR5","doi-asserted-by":"crossref","first-page":"1086","DOI":"10.1016\/j.comcom.2010.02.006","volume":"33","author":"J Lopez","year":"2010","unstructured":"Lopez, J., Roman, R., Agudo, I., Fernandez-Gago, C.: Trust management systems for wireless sensor networks: best practices. Comput. Commun. 33(9), 1086\u20131093 (2010)","journal-title":"Comput. Commun."},{"key":"43_CR6","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1016\/j.bjp.2013.12.037","volume":"61","author":"M Berman","year":"2014","unstructured":"Berman, M., Chase, J.S., Landweber, L., Nakao, A., Ott, M., Raychaudhuri, D., Ricci, R., Seskar, I.: Geni: a federated testbed for innovative network experiments. Comput. Netw. 61, 5\u201323 (2014). Special issue on Future Internet Testbeds Part I","journal-title":"Comput. Netw."},{"key":"43_CR7","doi-asserted-by":"crossref","unstructured":"Raychaudhuri, D., Seskar, I., Ott, M., Ganu, S., Ramachandran, K., Kremo, H., Siracusa, R., Liu, H., Singh, M.: Overview of the orbit radio grid testbed for evaluation of next-generation wireless network protocols. In: IEEE Wireless Communications and Networking Conference, vol. 3, pp. 1664\u20131669. IEEE (2005)","DOI":"10.1109\/WCNC.2005.1424763"},{"key":"43_CR8","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1007\/978-3-642-17851-1_11","volume-title":"Testbeds and Research Infrastructures","author":"S Bouckaert","year":"2011","unstructured":"Bouckaert, S., Vandenberghe, W., Jooris, B., Moerman, I., Demeester, P.: The w-iLab.t testbed. In: Magedanz, T., Gavras, A., Thanh, N.H., Chase, J.S. (eds.) TridentCom 2010. LNICST, vol. 46, pp. 145\u2013154. Springer, Heidelberg (2011)"},{"issue":"3","key":"43_CR9","doi-asserted-by":"crossref","first-page":"867","DOI":"10.1016\/j.jnca.2011.03.005","volume":"35","author":"Y Yu","year":"2012","unstructured":"Yu, Y., Li, K., Zhou, W., Li, P.: Trust mechanisms in wireless sensor networks: attack analysis and countermeasures. J. Netw. Comput. Appl. 35(3), 867\u2013880 (2012)","journal-title":"J. Netw. Comput. Appl."},{"key":"43_CR10","doi-asserted-by":"crossref","unstructured":"Camtepe, S.A., Yener, B.: Key distribution mechanisms for wireless sensor networks: a survey, Rensselaer Polytechnic Institute, Troy, New York, pp. 5\u20137. Technical Report (2005)","DOI":"10.1109\/ICC.2006.255107"},{"issue":"3","key":"43_CR11","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1016\/j.cose.2008.11.009","volume":"28","author":"M Omar","year":"2009","unstructured":"Omar, M., Challal, Y., Bouabdallah, A.: Reliable and fully distributed trust model for mobile ad hoc networks. Comput. Secur. 28(3), 199\u2013214 (2009)","journal-title":"Comput. Secur."},{"key":"43_CR12","unstructured":"Chin, T., Xiong, K., Blasch, E.: Nonlinear target tracking for threat detection using rssi and optical fusion. In: 18th International Conference on Information Fusion (Fusion), pp. 1946\u20131953, July 2015"}],"container-title":["Lecture Notes in Computer Science","Wireless Algorithms, Systems, and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-42836-9_43","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,11]],"date-time":"2019-09-11T22:58:20Z","timestamp":1568242700000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-42836-9_43"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319428352","9783319428369"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-42836-9_43","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}