{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T07:21:44Z","timestamp":1725520904976},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540895237"},{"type":"electronic","value":"9783540895244"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-89524-4_55","type":"book-chapter","created":{"date-parts":[[2008,11,19]],"date-time":"2008-11-19T06:10:09Z","timestamp":1227075009000},"page":"554-563","source":"Crossref","is-referenced-by-count":1,"title":["A Secure Message Percolation Scheme for Wireless Sensor Network"],"prefix":"10.1007","author":[{"given":"Md. Abdul","family":"Hamid","sequence":"first","affiliation":[]},{"given":"Choong Seon","family":"Hong","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"55_CR1","volume-title":"Computers and Intractability: A Guide to the Theory of NP-Completeness","author":"M.L. Garey","year":"1979","unstructured":"Garey, M.L., Johnson, D.S.: Computers and Intractability: A Guide to the Theory of NP-Completeness. W. H. Freeman, San Francisco (1979)"},{"key":"55_CR2","doi-asserted-by":"crossref","unstructured":"Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: Attacks and countermeasures. Elsevier\u2019s Ad Hoc Network Journal, Special Issue on Sensor Network Applications and Protocols, 293\u2013315 (September 2003)","DOI":"10.1016\/S1570-8705(03)00008-8"},{"key":"55_CR3","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1016\/S1389-1286(01)00302-4","volume":"38","author":"I.F. Akyildiz","year":"2002","unstructured":"Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Computer Networks\u00a038, 393\u2013422 (2002)","journal-title":"Computer Networks"},{"key":"55_CR4","doi-asserted-by":"crossref","first-page":"290","DOI":"10.5486\/PMD.1959.6.3-4.12","volume":"6","author":"Erdos","year":"1959","unstructured":"Erdos, Renyi: On Random Graphs. Publ. Math. Debrecen\u00a06, 290\u2013297 (1959)","journal-title":"Publ. Math. Debrecen"},{"issue":"4","key":"55_CR5","doi-asserted-by":"publisher","first-page":"839","DOI":"10.1109\/JSAC.2005.843561","volume":"23","author":"F. Ye","year":"2005","unstructured":"Ye, F., Luo, H., Lu, S., Zhang, L.: Statistical en-route filtering of injected false data in sensor networks. IEEE Journal on Selected Areas in Communications\u00a023(4), 839\u2013850 (2005)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"55_CR6","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1145\/984622.984660","volume-title":"Proc. of the third international symposium on Information processing in sensor networks","author":"J. Newsome","year":"2004","unstructured":"Newsome, J., Shi, E., Song, D., Perrig, A.: The sybil attack in sensor networks:\u00a0analysis & defenses. In: Proc. of the third international symposium on Information processing in sensor networks, pp. 259\u2013268. ACM, New York (2004)"},{"key":"55_CR7","doi-asserted-by":"crossref","unstructured":"Hu, Y.-C., Perrig, A., Johnson, D.B.: Packet leashes: a defense against wormhole attacks in wireless networks. In: Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies. IEEE INFOCOM 2003, March 30- April 3, 2003, vol.\u00a03, pp. 1976\u20131986 (2003)","DOI":"10.1109\/INFCOM.2003.1209219"},{"key":"55_CR8","doi-asserted-by":"crossref","unstructured":"Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A pairwise key pre-distribution scheme for wireless sensor networks. In: Proc. of the 10th ACM conference on Computer and communications security, pp. 42\u201351 (2003)","DOI":"10.1145\/948109.948118"},{"key":"55_CR9","unstructured":"Oniz, C.C., Tasci, S.E., Savas, E., Ercetin, O., and Levi, A.: SeFER: Secure, Flexible and Efficient Routing Protocol for Distributed Sensor Networks, http:\/\/people.sabanciuniv.edu\/~levi\/SeFER_EWSN.pdf"},{"key":"55_CR10","unstructured":"Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: IEEE Symposium on Security and Privacy, Berkeley, California, May 11-14, 2003, pp. 197\u2013213 (2003)"},{"key":"55_CR11","unstructured":"Karakehayov, Z.: Using REWARD to detect team black-hole attacks in wireless sensor networks. In: Workshop on Real-World Wireless Sensor Networks (REALWSN 2005), Stockholm, Sweden, June 20-21 (2005)"},{"issue":"5","key":"55_CR12","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1023\/A:1016598314198","volume":"8","author":"A. Perrig","year":"2002","unstructured":"Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: SPINS: Security Protocols for Sensor Networks. Wireless Networks\u00a08(5), 521\u2013534 (2002)","journal-title":"Wireless Networks"},{"key":"55_CR13","doi-asserted-by":"publisher","DOI":"10.1201\/9781439821916","volume-title":"Handbook of Applied Cryptography","author":"A. Menezes","year":"1996","unstructured":"Menezes, A., Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)"},{"issue":"2","key":"55_CR14","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1142\/S0129054103001741","volume":"14","author":"Y.P. Chen","year":"2003","unstructured":"Chen, Y.P., Liestman, A.L.: A Zonal Algorithm for Clustering Ad Hoc Networks. International Journal of Foundations of Computer Science\u00a014(2), 305\u2013322 (2003)","journal-title":"International Journal of Foundations of Computer Science"},{"key":"55_CR15","doi-asserted-by":"crossref","unstructured":"Liu, D., Ning, P., Du., W.: Group-Based Key Pre-Distribution in Wireless Sensor Networks. In: Proc. ACM WiSE 2005, September 2 (2005)","DOI":"10.1145\/1080793.1080798"},{"key":"55_CR16","doi-asserted-by":"crossref","unstructured":"Walters, J.P., Liang, Z., Shi, W., Chaudhary, V.: Wireless Sensor Network Security: A Survey. Auerbach Publications, CRC Press (2006)","DOI":"10.1201\/9780849379253-20"},{"key":"55_CR17","doi-asserted-by":"crossref","unstructured":"Wong, C.K., Gouda, M., Lam, S.S.: Secure Group Communications using Key Graphs. IEEE\/ACM Transactions on Networking\u00a08(1) (February 2000)","DOI":"10.1109\/90.836475"}],"container-title":["Lecture Notes in Computer Science","Information Networking. Towards Ubiquitous Networking and Services"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-89524-4_55","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,21]],"date-time":"2023-05-21T04:17:02Z","timestamp":1684642622000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-89524-4_55"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540895237","9783540895244"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-89524-4_55","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}