{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T17:09:26Z","timestamp":1742922566755,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319607160"},{"type":"electronic","value":"9783319607177"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-60717-7_40","type":"book-chapter","created":{"date-parts":[[2017,8,8]],"date-time":"2017-08-08T10:58:10Z","timestamp":1502189890000},"page":"406-415","source":"Crossref","is-referenced-by-count":0,"title":["Industrial Wireless Sensor Network-Oriented Energy-Efficient Secure AODV Protocol"],"prefix":"10.1007","author":[{"given":"Weidong","family":"Fang","sequence":"first","affiliation":[]},{"given":"Chuanlei","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Wei","family":"He","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Fengying","family":"Ma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,9]]},"reference":[{"key":"40_CR1","doi-asserted-by":"crossref","first-page":"1317","DOI":"10.1109\/TIE.2014.2334653","volume":"2","author":"C Zhu","year":"2015","unstructured":"Zhu, C., Yang, L.T., Shu, L., Leung, V.C.M., Hara, T., Nishio, S.: Insights of top-k query in duty-cycled wireless sensor networks. IEEE Trans. Ind. Electron. 2, 1317\u20131328 (2015)","journal-title":"IEEE Trans. Ind. Electron."},{"key":"40_CR2","doi-asserted-by":"crossref","unstructured":"Zhu, C., Leung, V.C.M., Hu, X., Shu, L., Yang, L.T.: A review of key issues that concern the feasibility of mobile cloud computing. In: The IEEE International Conference on Cyber, Physical and Social Computing (CPSCom), pp. 769\u2013776. IEEE Press, New York (2013)","DOI":"10.1109\/GreenCom-iThings-CPSCom.2013.138"},{"key":"40_CR3","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/MNET.2016.7389829","volume":"1","author":"K Wang","year":"2016","unstructured":"Wang, K., Shao, Y., Shu, L., Zhang, Y., Zhu, C.: Mobile big data fault-tolerant processing for eHealth networks. IEEE Netw. 1, 36\u201342 (2016)","journal-title":"IEEE Netw."},{"key":"40_CR4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/JSYST.2015.2475276","volume":"10","author":"L Shu","year":"2015","unstructured":"Shu, L., Wang, L., Niu, J., Zhu, C., Mukherjee, M.: Releasing network isolation problem in group-based industrial wireless sensor networks. IEEE Syst. J. 10, 1\u201311 (2015)","journal-title":"IEEE Syst. J."},{"key":"40_CR5","first-page":"3033","volume":"2","author":"P Luis","year":"2014","unstructured":"Luis, P., Francisco, A., Lorenzo, F., Oscar, R.: Performance of global-appearance descriptors in map building and localization using omni-directional vision. Sens. (Basel) 2, 3033\u20133064 (2014)","journal-title":"Sens. (Basel)"},{"key":"40_CR6","doi-asserted-by":"crossref","unstructured":"Liu, T., Gao, X., Wang, L.: Study on multi-objective optimization of oil production process. In: The 11th World Congress on Intelligent Control and Automation, pp. 1824\u20131829 (2014)","DOI":"10.1109\/WCICA.2014.7052997"},{"key":"40_CR7","doi-asserted-by":"crossref","unstructured":"Moyne, J., Yedatore, M., Iskandar, J., Hawkins, P., Scoville, J.: Chamber matching across multiple dimensions utilizing predictive maintenance, equipment health monitoring, virtual metrology and run-to-run control. In: The 25th Annual SEMI on Advanced Semiconductor Manufacturing Conference, pp. 86\u201391 (2014)","DOI":"10.1109\/ASMC.2014.6846983"},{"key":"40_CR8","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/MCOM.2014.6979984","volume":"12","author":"D Dujovne","year":"2014","unstructured":"Dujovne, D., Watteyne, T., Vilajosana, X., Thubert, P.: 6TiSCH: deterministic IP-enabled industrial internet (of things). IEEE Commun. Mag. 12, 36\u201341 (2014)","journal-title":"IEEE Commun. Mag."},{"key":"40_CR9","doi-asserted-by":"crossref","unstructured":"Gandhewar, N., Patel, R.: Detection and prevention of sinkhole attack on AODV protocol in mobile ad hoc network. In: The Fourth International Conference on Computational Intelligence and Communication Networks, pp. 714\u2013718 (2012)","DOI":"10.1109\/CICN.2012.96"},{"key":"40_CR10","doi-asserted-by":"crossref","unstructured":"Tomar, S.P.S., Chaurasia, B.K.: Detection and isolation of sinkhole attack from AODV routing protocol in MANET. In: The International Conference on the Computational Intelligence and Communication Networks, pp. 799\u2013802 (2014)","DOI":"10.1109\/CICN.2014.171"},{"key":"40_CR11","doi-asserted-by":"crossref","unstructured":"Xiong, K., Yin, M., Li, W., Jiang, H.: A rank sequence method for detecting black hole attack in ad hoc network. In: The International Conference on Intelligent Computing and Wireless Sensor Network, pp. 155\u2013159 (2015)","DOI":"10.1109\/ICAIOT.2015.7111559"},{"key":"40_CR12","doi-asserted-by":"crossref","unstructured":"Perkins, C.E., Royer, E.M.: Ad-hoc on-demand distance vector routing. In: The Second Workshop on Mobile Computing Systems and Applications, pp. 90\u2013100. IEEE Press, New York (1999)","DOI":"10.1109\/MCSA.1999.749281"},{"key":"40_CR13","doi-asserted-by":"crossref","unstructured":"Jain, P., Suryavanshi, A.: Energy efficient local route repair multicast AODV routing schemes in wireless ad hoc network. In: The International Conference on Advanced Communication Control and Computing Technologies, pp. 1168\u20131173 (2014)","DOI":"10.1109\/ICACCCT.2014.7019282"},{"key":"40_CR14","doi-asserted-by":"crossref","unstructured":"Joshi, A., Kaur, R.: A novel multi-cast routing protocol for VANET. In: The IEEE International Advance Computing Conference, pp. 41\u201345. IEEE Press, New York (2015)","DOI":"10.1109\/IADCC.2015.7154665"},{"key":"40_CR15","first-page":"753","volume":"8\u20139","author":"W Fang","year":"2015","unstructured":"Fang, W., Shi, Z., Shan, L., Li, F., Xiong, Y.: A multi-parameter joint evaluation scheme in energy consumption for wireless sensor networks. Chin. High Technol. Lett. 8\u20139, 753\u2013759 (2015)","journal-title":"Chin. High Technol. Lett."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Quality, Reliability, Security and Robustness in Heterogeneous Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-60717-7_40","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,2]],"date-time":"2019-10-02T00:05:07Z","timestamp":1569974707000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-60717-7_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319607160","9783319607177"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-60717-7_40","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2017]]}}}