{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T14:26:22Z","timestamp":1725978382681},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319911915"},{"type":"electronic","value":"9783319911922"}],"license":[{"start":{"date-parts":[[2018,5,17]],"date-time":"2018-05-17T00:00:00Z","timestamp":1526515200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-319-91192-2_39","type":"book-chapter","created":{"date-parts":[[2018,5,16]],"date-time":"2018-05-16T17:45:41Z","timestamp":1526492741000},"page":"393-402","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["DSP-IR: Delay Sensitive Protocol for Intelligent Routing with Medium Access Control"],"prefix":"10.1007","author":[{"given":"A. C.","family":"Yogeesh","sequence":"first","affiliation":[]},{"given":"Shantakumar B.","family":"Patil","sequence":"additional","affiliation":[]},{"given":"Premajyothi","family":"Patil","sequence":"additional","affiliation":[]},{"given":"H. R.","family":"Roopashree","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,17]]},"reference":[{"key":"39_CR1","doi-asserted-by":"publisher","unstructured":"Nukala, R., Panduru, K., Shields, A., Riordan, D., Doody, P., Walsh, J.: Internet of Things: a review from \u2018Farm to Fork\u2019. In: 2016 27th Irish Signals and Systems Conference (ISSC), Londonderry, pp. 1\u20136 (2016). https:\/\/doi.org\/10.1109\/issc.2016.7528456","DOI":"10.1109\/issc.2016.7528456"},{"key":"39_CR2","doi-asserted-by":"publisher","unstructured":"Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. In: Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, pp. 113\u2013127 (2003). https:\/\/doi.org\/10.1109\/snpa.2003.1203362","DOI":"10.1109\/snpa.2003.1203362"},{"key":"39_CR3","doi-asserted-by":"publisher","unstructured":"Bai, Y.: Industrial Internet of Things over tactile internet in the context of intelligent manufacturing. Cluster Comput., 1\u20139 (2017). https:\/\/doi.org\/10.1007\/s10586-017-0925-1","DOI":"10.1007\/s10586-017-0925-1"},{"key":"39_CR4","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/978-3-319-66923-6_13","volume-title":"Advances in Production Management Systems. The Path to Intelligent, Collaborative and Sustainable Manufacturing","author":"Rakshith Badarinath","year":"2017","unstructured":"Badarinath, R., Prabhu, V.V.: Advances in Internet of Things (IoT) in manufacturing. In: IFIP International Conference on Advances in Production Management Systems, APMS, pp. 111\u2013118 (2017). https:\/\/doi.org\/10.1007\/978-3-319-66923-6_13"},{"key":"39_CR5","doi-asserted-by":"publisher","unstructured":"Tayebi, A., Berber, S., Swain, A.: Wireless sensor network attacks: an overview and critical analysis. In: 2013 Seventh International Conference on Sensing Technology (ICST), Wellington, pp. 97\u2013102 (2013). https:\/\/doi.org\/10.1109\/icsenst.2013.6727623","DOI":"10.1109\/icsenst.2013.6727623"},{"issue":"8","key":"39_CR6","doi-asserted-by":"publisher","first-page":"3181","DOI":"10.1007\/s11227-015-1435-7","volume":"71","author":"C Lin","year":"2015","unstructured":"Lin, C., Wu, G., Yu, C.W., Yao, L.: Maximizing destructiveness of node capture attack in wireless sensor networks. J. Supercomput. 71(8), 3181\u20133212 (2015)","journal-title":"J. Supercomput."},{"key":"39_CR7","doi-asserted-by":"crossref","unstructured":"Buch, D., Jinwala, D.: Detection of wormhole attacks in wireless sensor network. In: 3rd International Conference on Advances in Recent Technologies in Communication and Computing (ARTCom 2011), Bangalore, pp. 7\u201314 (2011)","DOI":"10.1049\/ic.2011.0042"},{"key":"39_CR8","doi-asserted-by":"crossref","unstructured":"Basan, A., Basan, E., Makarevich, O.: A trust evaluation method for active attack counteraction in wireless sensor networks. In: 2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), Nanjing, China, pp. 369\u2013372 (2017)","DOI":"10.1109\/CyberC.2017.14"},{"issue":"6","key":"39_CR9","doi-asserted-by":"publisher","first-page":"1910","DOI":"10.1109\/jiot.2017.2749883","volume":"4","author":"I Tomi\u0107","year":"2017","unstructured":"Tomi\u0107, I., McCann, J.A.: A survey of potential security issues in existing wireless sensor network protocols. IEEE Internet Things J. 4(6), 1910\u20131923 (2017). https:\/\/doi.org\/10.1109\/jiot.2017.2749883","journal-title":"IEEE Internet Things J."},{"key":"39_CR10","doi-asserted-by":"crossref","unstructured":"Jedidi, A., Mohammad, A.: History trust routing algorithm to improve efficiency and security in wireless sensor network. In: 2017 14th International Multi-Conference on Systems, Signals & Devices (SSD), Marrakech, pp. 750\u2013754 (2017)","DOI":"10.1109\/SSD.2017.8166988"},{"key":"39_CR11","doi-asserted-by":"publisher","first-page":"9599","DOI":"10.1109\/ACCESS.2017.2706973","volume":"5","author":"D Qin","year":"2017","unstructured":"Qin, D., Yang, S., Jia, S., Zhang, Y., Ma, J., Ding, Q.: Research on trust sensing based secure routing mechanism for wireless sensor network. IEEE Access 5, 9599\u20139609 (2017)","journal-title":"IEEE Access"},{"issue":"1","key":"39_CR12","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1109\/surv.2013.050113.00191","volume":"16","author":"I Butun","year":"2014","unstructured":"Butun, I., Morgera, S.D., Sankar, R.: A survey of intrusion detection systems in wireless sensor networks. IEEE Commun. Surv. Tutor. 16(1), 266\u2013282 (2014). https:\/\/doi.org\/10.1109\/surv.2013.050113.00191","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"3","key":"39_CR13","doi-asserted-by":"publisher","first-page":"1677","DOI":"10.1109\/TIT.2016.2634422","volume":"63","author":"F Yavuz","year":"2017","unstructured":"Yavuz, F., Zhao, J., Ya\u011fan, O., Gligor, V.: k-connectivity in random K-out graphs intersecting Erd\u0151s-R\u00e9nyi graphs. IEEE Trans. Inf. Theory 63(3), 1677\u20131692 (2017). https:\/\/doi.org\/10.1109\/TIT.2016.2634422","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"5","key":"39_CR14","doi-asserted-by":"publisher","first-page":"1223","DOI":"10.1109\/TPDS.2013.119","volume":"25","author":"J Li","year":"2014","unstructured":"Li, J., Li, Y., Ren, J., Wu, J.: Hop-by-Hop message authentication and source privacy in wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 25(5), 1223\u20131232 (2014). https:\/\/doi.org\/10.1109\/TPDS.2013.119","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"5","key":"39_CR15","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1109\/JCN.2015.000083","volume":"17","author":"J Shen","year":"2015","unstructured":"Shen, J., Tan, H., Moh, S., Chung, I., Liu, Q., Sun, X.: Enhanced secure sensor association and key management in wireless body area networks. J. Commun. Netw. 17(5), 453\u2013462 (2015). https:\/\/doi.org\/10.1109\/JCN.2015.000083","journal-title":"J. Commun. Netw."},{"issue":"4","key":"39_CR16","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1049\/el.2014.3327","volume":"51","author":"S Lee","year":"2015","unstructured":"Lee, S., Kim, K.: Key renewal scheme with sensor authentication under clustered wireless sensor networks. Electron. Lett. 51(4), 368\u2013369 (2015). https:\/\/doi.org\/10.1049\/el.2014.3327","journal-title":"Electron. Lett."},{"issue":"2","key":"39_CR17","doi-asserted-by":"publisher","first-page":"1133","DOI":"10.1109\/TII.2013.2288063","volume":"10","author":"F Gandino","year":"2014","unstructured":"Gandino, F., Montrucchio, B., Rebaudengo, M.: Key management for static wireless sensor networks with node adding. IEEE Trans. Ind. Inform. 10(2), 1133\u20131143 (2014). https:\/\/doi.org\/10.1109\/TII.2013.2288063","journal-title":"IEEE Trans. Ind. Inform."},{"issue":"8","key":"39_CR18","first-page":"17702","volume":"5","author":"AC Yogeesh","year":"2016","unstructured":"Yogeesh, A.C., Patil, S.B., Patil, P.: A survey on energy efficient, secure routing protocols for wireless sensor networks. Int. J. Eng. Comput. Sci. 5(8), 17702\u201317709 (2016). ISSN 2319-7242","journal-title":"Int. J. Eng. Comput. Sci."},{"key":"39_CR19","doi-asserted-by":"crossref","unstructured":"Yogeesh, A.C., Patil, S.B., Patil, P.: FEESR: framework for energy efficient secured routing in heterogeneous sensor network. In: 2016 International Conference on Circuits, Controls, Communications and Computing (I4C), Bangalore, pp. 1\u20137 (2016)","DOI":"10.1109\/CIMCA.2016.8053272"},{"key":"39_CR20","doi-asserted-by":"crossref","first-page":"443","DOI":"10.1007\/978-981-10-1023-1_44","volume-title":"Advanced Computing and Communication Technologies","author":"Kamanashis Biswas","year":"2016","unstructured":"Biswas, K., Muthukkumarasamy, V., Wu, X.W., Singh, K.: Performance evaluation of block ciphers for wireless sensor networks. In: Choudhary, R., Mandal, J., Auluck, N., Nagarajaram, H. (eds.) Advanced Computing and Communication Technologies. Advances in Intelligent Systems and Computing, vol. 452. Springer, Singapore (2016)"},{"key":"39_CR21","doi-asserted-by":"publisher","unstructured":"Bandirmali, N., Erturk, I., Ceken, C.: Securing data transfer in delay-sensitive and energy-aware WSNs using the scalable encryption algorithm. In: 2009 4th International Symposium on Wireless Pervasive Computing, Melbourne, VIC, pp. 1\u20136 (2009). https:\/\/doi.org\/10.1109\/iswpc.2009.4800606","DOI":"10.1109\/iswpc.2009.4800606"},{"key":"39_CR22","doi-asserted-by":"publisher","unstructured":"Shi, Y., Wang, J., Fang, X., Gu, S., Dong, L.: Modelling and control of S-MAC based wireless sensor networks control system with network-induced delay in industrial. In: 2017 4th International Conference on Information Science and Control Engineering (ICISCE), Changsha, pp. 1539\u20131544 (2017). https:\/\/doi.org\/10.1109\/icisce.2017.321","DOI":"10.1109\/icisce.2017.321"},{"key":"39_CR23","doi-asserted-by":"publisher","unstructured":"Liu, Y., Elhanany, I., Qi, H.: An energy-efficient QoS-aware media access control protocol for wireless sensor networks. In: IEEE International Conference on Mobile Adhoc and Sensor Systems, Washington, DC, pp. 189\u2013191 (2005). https:\/\/doi.org\/10.1109\/mahss.2005.1542798","DOI":"10.1109\/mahss.2005.1542798"},{"issue":"1","key":"39_CR24","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1016\/j.csi.2007.06.001","volume":"30","author":"C Ceken","year":"2008","unstructured":"Ceken, C.: An energy efficient and delay sensitive centralized MAC protocol for wireless sensor networks. Comput. Stand. Interfaces 30(1), 20\u201331 (2008)","journal-title":"Comput. Stand. Interfaces"}],"container-title":["Advances in Intelligent Systems and Computing","Cybernetics and Algorithms in Intelligent Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-91192-2_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,18]],"date-time":"2019-10-18T03:53:29Z","timestamp":1571370809000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-91192-2_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,17]]},"ISBN":["9783319911915","9783319911922"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-91192-2_39","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2018,5,17]]}}}