{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T04:54:49Z","timestamp":1725512089831},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540724834"},{"type":"electronic","value":"9783540725244"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-72524-4_42","type":"book-chapter","created":{"date-parts":[[2007,6,25]],"date-time":"2007-06-25T20:15:32Z","timestamp":1182802532000},"page":"395-406","source":"Crossref","is-referenced-by-count":4,"title":["A Clustered Routing Protocol with Distributed Intrusion Detection for Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Lan","family":"Yao","sequence":"first","affiliation":[]},{"given":"Na","family":"An","sequence":"additional","affiliation":[]},{"given":"Fuxiang","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Ge","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"10","key":"42_CR1","first-page":"1717","volume":"14","author":"J. Li","year":"2003","unstructured":"Li, J., Li, J.-B., Shi, S.-F.: Concepts, Issues and Advance of Sensor Networks and Data Management of Sensor Networks. Journal of Software\u00a014(10), 1717\u20131727 (2003)","journal-title":"Journal of Software"},{"key":"42_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"220","DOI":"10.1007\/978-3-540-39863-9_17","volume-title":"Ambient Intelligence","author":"N. Kern","year":"2003","unstructured":"Kern, N., Schiele, B., Schmidt, A.: Multi-sensor Activity Context Detection for Wearable Computing. In: Aarts, E., Collier, R.W., van Loenen, E., de Ruyter, B. (eds.) EUSAI 2003. LNCS, vol.\u00a02875, pp. 220\u2013232. Springer, Heidelberg (2003)"},{"issue":"4","key":"42_CR3","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1023\/A:1015467429243","volume":"7","author":"Y. Villate","year":"2002","unstructured":"Villate, Y., Illarramendi, A., Piroura, E.: Keep Your Data Safe and Available While Roaming. Mobil Networks and Applications\u00a07(4), 315\u2013328 (2002)","journal-title":"Mobil Networks and Applications"},{"issue":"2","key":"42_CR4","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1145\/1065545.1065548","volume":"8","author":"W. Du","year":"2005","unstructured":"Du, W., Deng, J.: A Pairwise Key Predistribution Scheme for Wireless Sensor Networks. ACM TISS\u00a08(2), 228\u2013258 (2005)","journal-title":"ACM TISS"},{"key":"42_CR5","doi-asserted-by":"crossref","unstructured":"Deshpande, A., Guestrin, C., Madden, S.R., Hellerstein, J.M., Hong, W.: Model-Driven Data Acquisition in Sensor Networks. In: Proceedings of the 30th VLDB Conference, Toronto, Canada, pp. 588\u2013599 (2004)","DOI":"10.1016\/B978-012088469-8.50053-X"},{"key":"42_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1007\/978-3-540-30470-8_32","volume-title":"On the Move to Meaningful Internet Systems 2004: OTM 2004 Workshops","author":"A. Cuzzocrea","year":"2004","unstructured":"Cuzzocrea, A., Furfaro, F., Mazzeo, G.M., Sacc\u00e1, D.: A Grid Framework for Approximate Aggregate Query Answering on Summarized Sensor Network Readings. In: Meersman, R., Tari, Z., Corsaro, A. (eds.) OTM-WS 2004. LNCS, vol.\u00a03292, pp. 144\u2013153. Springer, Heidelberg (2004)"},{"issue":"4","key":"42_CR7","doi-asserted-by":"publisher","first-page":"660","DOI":"10.1109\/TWC.2002.804190","volume":"1","author":"W.B. Heinzelman","year":"2002","unstructured":"Heinzelman, W.B., Chandrakasan, A.P.: An Application-Specific Protocol Architecture for Wireless Microsensor Networks. IEEE Trans. On Wireless Comunication\u00a01(4), 660\u2013670 (2002)","journal-title":"IEEE Trans. On Wireless Comunication"},{"key":"42_CR8","doi-asserted-by":"crossref","unstructured":"Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Networks, 293\u2013315 (2003)","DOI":"10.1016\/S1570-8705(03)00008-8"},{"key":"42_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"449","DOI":"10.1007\/978-3-540-31956-6_53","volume-title":"Networking - ICN 2005","author":"A.C. Ferreira","year":"2005","unstructured":"Ferreira, A.C., Vila\u00e7a, M.A., Oliveira, L.B., Habib, E., Wong, H.C., Loureiro, A.A.F.: On the Security of Cluster-Based Communication Protocols for Wireless Sensor Networks. In: Lorenz, P., Dini, P. (eds.) ICN 2005. LNCS, vol.\u00a03420, pp. 449\u2013458. Springer, Heidelberg (2005)"},{"key":"42_CR10","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1023\/A:1016598314198","volume":"8","author":"A. Perrig","year":"2002","unstructured":"Perrig, A., Szewczyk, R.: SPINS: Security Protocols for Sensor Networks. Wireless Networks\u00a08, 521\u2013534 (2002)","journal-title":"Wireless Networks"},{"key":"42_CR11","doi-asserted-by":"crossref","unstructured":"Oliveira, L.B., Wong, H.C., Bern, M.: SecLEACH\u2013A Random Key Distribution Solution for Securing Clustered Sensor Networks. In: Fifth IEEE International Symposium on Network Computing and Applications (2006)","DOI":"10.5753\/sbseg.2005.21529"},{"key":"42_CR12","volume-title":"Proc. of the 1st ACM Workshop Security of Ad Hoc and Sensor Networks","author":"R.D. Pietro","year":"2003","unstructured":"Pietro, R.D., Mancini, L.V.: Random Key Assignment for Secure Wireless Sensor Networks. In: Proc. of the 1st ACM Workshop Security of Ad Hoc and Sensor Networks, Fairfax, Virginia, ACM Press, New York (2003)"},{"key":"42_CR13","first-page":"2009","volume-title":"Proc. of the 15th Parallel and Distributed Processing Symp.","author":"A. Manjeshwar","year":"2001","unstructured":"Manjeshwar, A., Grawal, D.P.: TEEN: A protocol for enhanced efficiency in wireless sensor networks. In: Proc. of the 15th Parallel and Distributed Processing Symp., San Francisco, pp. 2009\u20132015. IEEE Computer Society Press, Los Alamitos (2001)"},{"key":"42_CR14","first-page":"368","volume-title":"Proc. of the 4th IEEE Conf. on Mobile and Wireless Communications Networks","author":"M.J. Handy","year":"2002","unstructured":"Handy, M.J., Haase, M., Timmermann, D.: Low energy adaptive clustering hierarchy with deterministic cluster-head selection. In: Proc. of the 4th IEEE Conf. on Mobile and Wireless Communications Networks, Stockholm, pp. 368\u2013372. IEEE Communications Society, Los Alamitos (2002)"},{"key":"42_CR15","doi-asserted-by":"crossref","unstructured":"Sion, R., Atallah, M., Prabhakar, S.: Resilient Rights Protection for Sensor Streams. In: Proceedings of the 30th VLDB Conference, Toronto, Canada (2004)","DOI":"10.1016\/B978-012088469-8.50065-6"}],"container-title":["Lecture Notes in Computer Science","Advances in Data and Web Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-72524-4_42.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,12]],"date-time":"2023-05-12T16:59:41Z","timestamp":1683910781000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-72524-4_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540724834","9783540725244"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-72524-4_42","relation":{},"subject":[]}}