{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T12:58:39Z","timestamp":1773406719347,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540885818","type":"print"},{"value":"9783540885825","type":"electronic"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-88582-5_47","type":"book-chapter","created":{"date-parts":[[2008,10,15]],"date-time":"2008-10-15T01:28:50Z","timestamp":1224034130000},"page":"503-514","source":"Crossref","is-referenced-by-count":14,"title":["Designing Secure Protocols for Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"A. Selcuk","family":"Uluagac","sequence":"first","affiliation":[]},{"given":"Christopher P.","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Raheem A.","family":"Beyah","sequence":"additional","affiliation":[]},{"given":"John A.","family":"Copeland","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"47_CR1","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1016\/S1389-1286(01)00302-4","volume":"38","author":"I.F. Akyildiz","year":"2002","unstructured":"Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: A survey. Computer Networks (Elsevier) Journal\u00a038(4), 393\u2013422 (2002)","journal-title":"Computer Networks (Elsevier) Journal"},{"key":"47_CR2","unstructured":"Xbow, Crossbow technology (2008), \n                  \n                    http:\/\/www.xbow.com\/"},{"key":"47_CR3","doi-asserted-by":"crossref","unstructured":"Akyildiz, I.F., Vuran, M.C., Akan, O.B.: A cross layer protocol for wireless sensor networks. In: Proc. CISS 2006, Princeton, NJ (March 2006)","DOI":"10.1109\/CISS.2006.286630"},{"key":"47_CR4","volume-title":"Cryptography and Network Security: Principles and Practices","author":"W. Stallings","year":"2003","unstructured":"Stallings, W.: Cryptography and Network Security: Principles and Practices, 3rd edn. Prentice Hall, Englewood Cliffs (2003)","edition":"3"},{"key":"47_CR5","unstructured":"Roosta, T., Shieh, S., Sastry, S.: Taxonomy of security attacks in sensor networks. In: The First IEEE International Conference on System Integration and Reliability Improvements, Hanoi, Vietnam (December 2006)"},{"issue":"6","key":"47_CR6","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MWC.2004.1368895","volume":"11","author":"E. Shi","year":"2004","unstructured":"Shi, E., Perrig, A.: Designing secure sensor networks. IEEE Wireless Communications\u00a011(6), 38\u201343 (2004)","journal-title":"IEEE Wireless Communications"},{"key":"47_CR7","unstructured":"ITU. X. 800, Security architecture for open systems interconnection for ccitt applications (1991)"},{"key":"47_CR8","doi-asserted-by":"crossref","unstructured":"Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the ACM CCS 2002, pp. 41\u201347 (2002)","DOI":"10.1145\/586110.586117"},{"issue":"1","key":"47_CR9","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1145\/1138127.1138130","volume":"2","author":"Y.W. Law","year":"2006","unstructured":"Law, Y.W., Doumen, J., Hartel, P.: Survey and benchmark of block ciphers for wireless sensor networks. ACM Trans. Sen. Netw.\u00a02(1), 65\u201393 (2006)","journal-title":"ACM Trans. Sen. Netw."},{"issue":"4","key":"47_CR10","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1109\/MCOM.2006.1632659","volume":"44","author":"M. Eltoweissy","year":"2006","unstructured":"Eltoweissy, M., Moharrum, M., Mukkamala, R.: Dynamic key management in sensor networks. IEEE Communications Magazine\u00a044(4), 122\u2013130 (2006)","journal-title":"IEEE Communications Magazine"},{"issue":"5","key":"47_CR11","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1023\/A:1016598314198","volume":"8","author":"A. Perrig","year":"2002","unstructured":"Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: Spins: security protocols for sensor networks. Wireles Networks\u00a08(5), 521\u2013534 (2002)","journal-title":"Wireles Networks"},{"key":"47_CR12","doi-asserted-by":"crossref","unstructured":"Karlof, C., Sastry, N., Wagner, D.: Tinysec: A link layer security architecture for wireless sensor networks. In: ACM SenSys 2004 (November 2004)","DOI":"10.1145\/1031495.1031515"},{"issue":"1","key":"47_CR13","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.adhoc.2006.05.014","volume":"5","author":"Y. Zhou","year":"2007","unstructured":"Zhou, Y., Zhang, Y., Fang, Y.: Access control in wireless sensor networks. Elsevier\u2019s AdHoc Networks Journal\u00a05(1), 3\u201313 (2007)","journal-title":"Elsevier\u2019s AdHoc Networks Journal"},{"issue":"10","key":"47_CR14","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MC.2002.1039518","volume":"35","author":"A.D. Wood","year":"2002","unstructured":"Wood, A.D., Stankovic, J.A.: Denial of service in sensor networks. IEEE Computer\u00a035(10), 54\u201362 (2002)","journal-title":"IEEE Computer"},{"key":"47_CR15","unstructured":"Pietro, R.D., Mancini, L., Mei, A., Panconesi, A., Radhakrishnan, J.: How to design connected sensor networks that are provably secure. Securecomm, 89\u2013100 (2006)"},{"key":"47_CR16","doi-asserted-by":"crossref","unstructured":"Hou, H., Corbett, C., Li, Y., Beyah, R.: Dynamic energy-based encoding and filtering in sensor networks. In: Proc. of the IEEE MILCOM (October 2007)","DOI":"10.1109\/MILCOM.2007.4454929"},{"key":"47_CR17","doi-asserted-by":"crossref","unstructured":"Vu, C., Beyah, R., Li, Y.: A composite event detection in wireless sensor networks. In: Proc. of the IEEE IPCCC (April 2007)","DOI":"10.1109\/PCCC.2007.358903"}],"container-title":["Lecture Notes in Computer Science","Wireless Algorithms, Systems, and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-88582-5_47","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,3]],"date-time":"2019-03-03T18:41:03Z","timestamp":1551638463000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-88582-5_47"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540885818","9783540885825"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-88582-5_47","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008]]}}}