{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T04:55:24Z","timestamp":1743137724338,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319571409"},{"type":"electronic","value":"9783319571416"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-57141-6_3","type":"book-chapter","created":{"date-parts":[[2017,4,7]],"date-time":"2017-04-07T06:14:00Z","timestamp":1491545640000},"page":"23-35","source":"Crossref","is-referenced-by-count":1,"title":["RASK: Request Authentication Using Shared Keys for Secured Data Aggregation in Sensor Network"],"prefix":"10.1007","author":[{"given":"Jyoti","family":"Metan","sequence":"first","affiliation":[]},{"given":"K. N.","family":"Narasimha Murthy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,4,8]]},"reference":[{"key":"3_CR1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-19692-8","volume-title":"Glocalized Solutions for Sustainability in Manufacturing","author":"J Hesselbach","year":"2011","unstructured":"Hesselbach, J., Herrmann, C.: Glocalized Solutions for Sustainability in Manufacturing. Springer, Heidelberg (2011)"},{"key":"3_CR2","unstructured":"Athawale, R.P., Rana, J.G.: Wireless sensor network based environmental temperature monitoring system. In: International Conference on Information Engineering, Management, and Security (2015)"},{"key":"3_CR3","unstructured":"Mostafa, M., Azim, A., Jiang, X.: Wireless Sensor Multimedia Networks: Architectures, Protocols, and Applications, 279 p. CRC Press, Boca Raton (2015). Computers"},{"key":"3_CR4","volume-title":"Industrial Wireless Sensor Networks: Applications, Protocols, and Standards","author":"V Cagn Gungor","year":"2013","unstructured":"Cagn Gungor, V., Hancke, G.P.: Industrial Wireless Sensor Networks: Applications, Protocols, and Standards. CRC Press, Boca Raton (2013)"},{"key":"3_CR5","unstructured":"Kumari, J., Prachi: A comprehensive survey of routing protocols in wireless sensor networks. In: 2nd IEEE-International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, pp. 325\u2013330 (2015)"},{"key":"3_CR6","unstructured":"El-Aaasser, M., Ashour, M.: Energy aware classification for wireless sensor networks routing. In: 15th IEEE-International Conference on Advanced Communication Technology (ICACT), PyeongChang, pp. 66\u201371 (2013)"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Chitnis, M., Pagano, P., Lipari, G., Liang, Y.: A survey on bandwidth resource allocation and scheduling in wireless sensor networks. In: IEEE-International Conference on Network-Based Information Systems, Indianapolis, IN, pp. 121\u2013128 (2009)","DOI":"10.1109\/NBiS.2009.77"},{"key":"3_CR8","unstructured":"Chelli, K.: Security issues in wireless sensor networks: attacks and countermeasures. In: Proceedings of the World Congress on Engineering (2015)"},{"key":"3_CR9","volume-title":"Guide to Elliptic Curve Cryptography","author":"D Hankerson","year":"2006","unstructured":"Hankerson, D., Menezes, A.J., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer, New York (2006)"},{"key":"3_CR10","first-page":"2169","volume":"4","author":"J Wu","year":"2016","unstructured":"Wu, J., Ota, K., Dong, M., Li, C.: A hierarchical security framework for defending against sophisticated attacks on wireless sensor networks in smart cities. IEEE Access 4, 2169\u20133536 (2016)","journal-title":"IEEE Access"},{"issue":"3","key":"3_CR11","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1016\/j.eij.2012.09.001","volume":"13","author":"NS Fayed","year":"2012","unstructured":"Fayed, N.S., Daydamoni, E.M., Atwan, A.: Efficient combined security system for wireless sensor network. Egypt. Inf. J. 13(3), 185\u2013190 (2012)","journal-title":"Egypt. Inf. J."},{"key":"3_CR12","doi-asserted-by":"crossref","first-page":"1039","DOI":"10.1016\/j.procs.2012.06.144","volume":"10","author":"SU Khan","year":"2012","unstructured":"Khan, S.U., Pastrone, C., Lavagno, L., Spirito, M.A.: An authentication and Key establishment scheme for the IP-based wireless sensor networks. Procedia Comput. Sci. 10, 1039\u20131045 (2012)","journal-title":"Procedia Comput. Sci."},{"issue":"5","key":"3_CR13","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1016\/j.procs.2011.07.027","volume":"31","author":"O Cheikhrouhou","year":"2011","unstructured":"Cheikhrouhou, O., Koub\u00e2a, A., Dini, G., Alzaid, H., Abid, M.: LNT: a logical neighbor tree for secure group management in wireless sensor networks. Procedia Comput. Sci. 31(5), 198\u2013207 (2011)","journal-title":"Procedia Comput. Sci."},{"key":"3_CR14","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1016\/j.procs.2011.07.028","volume":"5","author":"A Guermazi","year":"2011","unstructured":"Guermazi, A., Abid, M.: An efficient key distribution scheme to secure data-centric routing protocols in hierarchical wireless sensor networks. Procedia Comput. Sci. 5, 208\u2013215 (2011)","journal-title":"Procedia Comput. Sci."},{"key":"3_CR15","unstructured":"The Keccak Sponge Function Family. \nhttp:\/\/keccak.noekeon.org\/\n\n. Retrieved 8 Feb 2017"},{"key":"3_CR16","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1007\/978-3-662-44966-0_3","volume-title":"Security in Computing and Communications","author":"S Roy","year":"2014","unstructured":"Roy, S., Das, A.K.: Secure hierarchical routing protocol (SHRP) for wireless sensor network. In: Mauri, J.L., Thampi, S.M., Rawat, D.B., Jin, D. (eds.) SSCC 2014. CCIS, vol. 467, pp. 20\u201329. Springer, Heidelberg (2014). doi:\n10.1007\/978-3-662-44966-0_3"},{"key":"3_CR17","doi-asserted-by":"crossref","first-page":"960","DOI":"10.1109\/TPDS.2014.2318296","volume":"26","author":"D Tang","year":"2013","unstructured":"Tang, D., Li, T., Ren, J., Wu, J.: Cost-aware secure routing (CASER) protocol design for wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 26, 960\u2013973 (2013)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"3_CR18","doi-asserted-by":"publisher","first-page":"229","DOI":"10.2991\/978-94-6239-145-1_23","volume-title":"Proceedings of the 6th International Asia Conference on Industrial Engineering and Management Innovation","author":"L-Z Zheng","year":"2016","unstructured":"Zheng, L.-Z., Gao, L., Yu, T.-G.: An energy-balanced clustering algorithm for wireless sensor networks based on distance and distribution. In: Qi, E. (ed.) Proceedings of the 6th International Asia Conference on Industrial Engineering and Management Innovation, pp. 229\u2013240. Atlantis Press, Paris (2016). doi:\n10.2991\/978-94-6239-145-1_23"}],"container-title":["Advances in Intelligent Systems and Computing","Software Engineering Trends and Techniques in Intelligent Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-57141-6_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,7,12]],"date-time":"2017-07-12T11:27:13Z","timestamp":1499858833000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-57141-6_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319571409","9783319571416"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-57141-6_3","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017]]}}}