{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:11:32Z","timestamp":1742911892021,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642038181"},{"type":"electronic","value":"9783642038198"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-03819-8_9","type":"book-chapter","created":{"date-parts":[[2009,8,8]],"date-time":"2009-08-08T13:01:09Z","timestamp":1249736469000},"page":"85-92","source":"Crossref","is-referenced-by-count":6,"title":["A Distributed Energy-Aware Trust Management System for Secure Routing in Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Yannis","family":"Stelios","sequence":"first","affiliation":[]},{"given":"Nikos","family":"Papayanoulas","sequence":"additional","affiliation":[]},{"given":"Panagiotis","family":"Trakadas","sequence":"additional","affiliation":[]},{"given":"Sotiris","family":"Maniatis","sequence":"additional","affiliation":[]},{"given":"Helen C.","family":"Leligou","sequence":"additional","affiliation":[]},{"given":"Theodore","family":"Zahariadis","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/wcm.422","volume":"8","author":"V.C. Giruka","year":"2008","unstructured":"Giruka, V.C., Singhal, M., Royalty, J., Varanasi, S.: Security in wireless sensor networks. Wireless Comm. Mob. Comput.\u00a08, 1\u201324 (2008)","journal-title":"Wireless Comm. Mob. Comput."},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Kannhavong, B., Nakayama, H., Nemoto, Y., Kato, N., Jamalipour, A.: A survey of routing attacks in mobile ad hoc networks. IEEE Wireless Comm., 85\u201391 (2007)","DOI":"10.1109\/MWC.2007.4396947"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Karlof, C., Wagner, D.: Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures. In: IEEE Int. Workshop on Sensor Network Protocols and Applications, pp. 113\u2013127 (2003)","DOI":"10.1109\/SNPA.2003.1203362"},{"key":"9_CR4","unstructured":"Li, H., Singhal, M.: A Secure Routing Protocol for Wireless ad hoc Networks. In: 39th Hawaii International Conf. on system Sciences (2006)"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Rezgui, A., Eltoweissy, M.: TARP: A Trust-Aware Routing Protocol for Sensor-Actuator Networks. In: IEEE Int. Conf. on Mobile Adhoc and Sensor Systems (2007)","DOI":"10.1109\/MOBHOC.2007.4428674"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Hur, J., Lee, Y., Yoon, H., Choi, D., Jin, S.: Trust evaluation model for wireless sensor networks. In: Advanced Comm. Tech. Conference, ICACT 2005, pp. 491\u2013496 (2005)","DOI":"10.1109\/ICACT.2005.245914"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Crosby, G.V., Pissinou, N.: Cluster-based Reputation and Trust for Wireless Sensor Networks. In: Consumer Communications and Networking Conference, CCNC (2007)","DOI":"10.1109\/CCNC.2007.124"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Lewis, N., Foukia, N.: Using Trust for Key Distribution and Route Selection in Wireless Sensor Networks. In: IEEE Globecom 2007 (2007)","DOI":"10.1109\/GLOCOMW.2007.4437800"},{"key":"9_CR9","unstructured":"Mahoney, G., Myrvold, W., Shoja, G.C.: Generic Reliability Trust Model. In: 3rd Annual Conference on Privacy, Security and Trust (2005)"},{"key":"9_CR10","unstructured":"Tanachaiwiwat, S., Dave, P., Bhindwale, R., Helmy, A.: Location-centric Isolation of Misbehavior and Trust Routing in Energy-constrained Sensor Networks. In: IEEE Int. Conf. on Performance, Computing, and Communications (2004)"},{"key":"9_CR11","unstructured":"Ghazaleh, N., Kang, K.D., Liu, K.: Towards Resilient Geographic Routing in Wireless Sensor Networks. In: 1st ACM Workshop on QoS and Security for Wireless and Mobile Networks (2005)"},{"key":"9_CR12","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/s11277-006-1574-5","volume":"37","author":"A. Pirzada","year":"2006","unstructured":"Pirzada, A., McDonald, C.: Trust Establishment In Pure Ad-hoc Networks. Wireless Personal Comm.\u00a037, 139\u2013163 (2006)","journal-title":"Wireless Personal Comm."},{"key":"9_CR13","unstructured":"Marias, G., Tsetsos, V., Sekkas, O., Georgiadis, P.: Performance evaluation of a self-evolving trust building framework. In: 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks (2005)"},{"key":"9_CR14","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1109\/MCOM.2008.4473092","volume":"25","author":"Y.L. Sun","year":"2008","unstructured":"Sun, Y.L., Han, Z., Ray Liu, K.J.: Defense of Trust Management Vulnerabilities in Distributed Networks. IEEE Communications Magazine\u00a025, 112\u2013119 (2008)","journal-title":"IEEE Communications Magazine"},{"key":"9_CR15","unstructured":"http:\/\/www.j-sim.org\/"},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Karp, K., Kung, H.T.: GPSR: Greedy Perimeter Stateless Routing for WirelessNetworks. In: MobiCom 2000 (2000)","DOI":"10.1145\/345910.345953"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Mobile Lightweight Wireless Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-03819-8_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,11]],"date-time":"2025-02-11T18:04:43Z","timestamp":1739297083000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-03819-8_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642038181","9783642038198"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-03819-8_9","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2009]]}}}