{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:27:50Z","timestamp":1761611270844,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540225430"},{"type":"electronic","value":"9783540286349"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-28634-9_6","type":"book-chapter","created":{"date-parts":[[2010,9,20]],"date-time":"2010-09-20T20:28:36Z","timestamp":1285014516000},"page":"70-81","source":"Crossref","is-referenced-by-count":19,"title":["Energy-Memory-Security Tradeoffs in Distributed Sensor Networks"],"prefix":"10.1007","author":[{"given":"David D.","family":"Hwang","sequence":"first","affiliation":[]},{"given":"Bo-Cheng Charles","family":"Lai","sequence":"additional","affiliation":[]},{"given":"Ingrid","family":"Verbauwhede","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"Kansal, A., Srivastava, M.B.: An environmental energy harvesting framework for sensor networks. In: Proc. Int. Symposium on Low power Electronics and Design (ISLPED 2003), August 2003, pp. 481\u2013486 (2003)","DOI":"10.1145\/871506.871624"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: SPINS: Security protocols for sensor networks. In: Proc. 7th ACM Mobile Computing and Networks (MobiCom 2001), July 2001, pp. 189\u2013199 (2001)","DOI":"10.1145\/381677.381696"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Basagni, S., Herrin, K., Rosti, E., Bruschi, D.: Secure pebblenets. In: Proc. 2nd ACM International Symposium on Mobile Ad Hoc Networking & Computing (MobiHoc 2001), October 2001, pp. 156\u2013163 (2001)","DOI":"10.1145\/501416.501438"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Eschenauer, L., Gligor, V.: A key-management scheme for distributed sensor networks. In: Proc. 9th ACM Conference on Computer and Communications security (CCS 2002), November 2002, pp. 41\u201347 (2002)","DOI":"10.1145\/586110.586117"},{"key":"6_CR5","unstructured":"Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Proc. 2003 IEEE Symposium on Research in Security and Privacy, May 2003, pp. 197\u2013213 (2003)"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A pairwise key pre-distribution scheme for wireless sensor networks. In: Proc. 10th ACM Conference on Computer and Communications security (CCS 2003), October 2003, pp. 42\u201351 (2003)","DOI":"10.1145\/948109.948118"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Kong, J., Zerfos, P., Luo, H., Lu, S., Zhang, L.: Providing robust and ubiquitous security support for mobile ad hoc networks. In: Proc. 9th IEEE International Conference on Network Protocols (ICNP 2001), November 2001, pp. 251\u2013260 (2001)","DOI":"10.1109\/ICNP.2001.992905"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Zhou, L., Haas, Z.J.: Securing ad hoc networks. IEEE Network, 24\u201330 (November\/December 1999)","DOI":"10.1109\/65.806983"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Hubaux, J.-P., Buttyan, L., Capkun, S.: The quest for security in mobile ad hoc networks. In: Proc. 2nd ACM International Symposium on Mobile Ad Hoc Networking & Computing (MobiHoc 2001), October 2001, pp. 156\u2013163 (2001)","DOI":"10.1145\/501416.501437"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Wood, D., Stankovic, J.A.: Denial of service in sensor networks. IEEE Computer, 54\u201362 (October 2002)","DOI":"10.1109\/MC.2002.1039518"},{"key":"6_CR11","series-title":"Lecture Notes in Computer Science","volume-title":"Security Protocols","author":"F. Stajano","year":"2000","unstructured":"Stajano, F., Anderson, R.: The resurrecting duckling: security issues for ad-hoc wireless networks. In: Malcolm, J.A., Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols 1999. LNCS, vol.\u00a01796, Springer, Heidelberg (2000)"},{"key":"6_CR12","unstructured":"Carman, D.W., Kruss, P.S., Matt, B.J.: Constraints and approaches for distributed sensor network security. NAI Labs Technical Report #00-010 (September 2000)"},{"key":"6_CR13","unstructured":"Hodjat, A., Verbauwhede, I.: The energy cost of secrets in ad-hoc networks. In: Proc. IEEE CAS Workshop on Wireless Communication and Networking (September 2002)"}],"container-title":["Lecture Notes in Computer Science","Ad-Hoc, Mobile, and Wireless Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-28634-9_6.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,25]],"date-time":"2025-02-25T23:12:07Z","timestamp":1740525127000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-28634-9_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540225430","9783540286349"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-28634-9_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}