{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T00:45:25Z","timestamp":1775609125157,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540253396","type":"print"},{"value":"9783540319566","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-31956-6_53","type":"book-chapter","created":{"date-parts":[[2010,7,7]],"date-time":"2010-07-07T21:00:56Z","timestamp":1278536456000},"page":"449-458","source":"Crossref","is-referenced-by-count":59,"title":["On the Security of Cluster-Based Communication Protocols for Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Adrian Carlos","family":"Ferreira","sequence":"first","affiliation":[]},{"given":"Marcos Aur\u00e9lio","family":"Vila\u00e7a","sequence":"additional","affiliation":[]},{"given":"Leonardo B.","family":"Oliveira","sequence":"additional","affiliation":[]},{"given":"Eduardo","family":"Habib","sequence":"additional","affiliation":[]},{"given":"Hao Chi","family":"Wong","sequence":"additional","affiliation":[]},{"given":"Antonio A.","family":"Loureiro","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"53_CR1","doi-asserted-by":"crossref","unstructured":"Heinzelman, W.R., Chandrakasan, A., Balakrishnan, H.: Energy-efficient communication protocol for wireless microsensor networks. In: IEEE Hawaii Int. Conf. on System Sciences, pp. 4\u20137 (2000)","DOI":"10.1109\/HICSS.2000.926982"},{"key":"53_CR2","first-page":"293","volume":"1","author":"C. Karlof","year":"2003","unstructured":"Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: Attacks and countermeasures. Elsevier\u2019s AdHoc Networks Journal, Special Issue on Sensor Network Applications and Protocols\u00a01, 293\u2013315 (2003); Also appeared in First IEEE International Workshop on Sensor Network Protocols and Applications.","journal-title":"Elsevier\u2019s AdHoc Networks Journal, Special Issue on Sensor Network Applications and Protocols"},{"key":"53_CR3","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1109\/MC.2002.1039518","volume":"35","author":"A.D. Wood","year":"2002","unstructured":"Wood, A.D., Stankovic, J.A.: Denial of service in sensor networks. IEEE Computer\u00a035, 54\u201362 (2002)","journal-title":"IEEE Computer"},{"key":"53_CR4","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1023\/A:1016598314198","volume":"8","author":"A. Perrig","year":"2002","unstructured":"Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: SPINS: Security protocols for sensor networks. Wireless Networks\u00a08, 521\u2013534 (2002); Also appeared in Mobile Computing and Networking","journal-title":"Wireless Networks"},{"key":"53_CR5","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1145\/586110.586117","volume-title":"Proceedings of the 9th ACM conference on Computer and communications security","author":"L. Eschenauer","year":"2002","unstructured":"Eschenauer, L., Gligor, V.D.: A key management scheme for distributed sensor networks. In: Proceedings of the 9th ACM conference on Computer and communications security, pp. 41\u201347. ACM Press, New York (2002)"},{"key":"53_CR6","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1145\/948109.948120","volume-title":"Proceedings of the 10th ACM conference on Computer and communication security","author":"S. Zhu","year":"2003","unstructured":"Zhu, S., Setia, S., Jajodia, S.: Leap: efficient security mechanisms for large-scale distributed sensor networks. In: Proceedings of the 10th ACM conference on Computer and communication security, pp. 62\u201372. ACM Press, New York (2003)"},{"key":"53_CR7","unstructured":"Przydatek, B., Song, D., Perrig, A.: SIA: Secure information aggregation in sensor networks. In: ACM SenSys 2003, pp. 175\u2013192 (2003)"},{"key":"53_CR8","unstructured":"Yea, F., Luo, H., Lu, S., Zhang, L.: Statistical en-route filtering of injected false data in sensor networks. In: INFOCOM 2004 (2004)"},{"key":"53_CR9","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1145\/941311.941324","volume-title":"Proceedings of the 2003 ACM workshop on Wireless security","author":"M. Bohge","year":"2003","unstructured":"Bohge, M., Trappe, W.: An authentication framework for hierarchical ad hoc sensor networks. In: Proceedings of the 2003 ACM workshop on Wireless security, pp. 79\u201387. ACM Press, New York (2003)"},{"key":"53_CR10","doi-asserted-by":"crossref","unstructured":"Oliveira, L.B., Wong, H.C., Loureiro, A.A.F.: LHA-SP: Secure protocols for hierarchical wireless sensor networks. In: 9th IFIP\/IEEE International Symposium on Integrated Network Management (IM 2005), Nice, France (2005) (to appear)","DOI":"10.1109\/INM.2005.1440767"},{"key":"53_CR11","unstructured":"Melo, E.J.D., Liu, M.: The effect of organization on energy consumption in wireless sensor networks. In: IEEE Globecom 2002 (2002)"}],"container-title":["Lecture Notes in Computer Science","Networking - ICN 2005"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-31956-6_53.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T03:43:34Z","timestamp":1620013414000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-31956-6_53"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540253396","9783540319566"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-31956-6_53","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005]]}}}