{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:42:39Z","timestamp":1725550959244},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642121784"},{"type":"electronic","value":"9783642121791"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12179-1_14","type":"book-chapter","created":{"date-parts":[[2010,3,31]],"date-time":"2010-03-31T15:23:41Z","timestamp":1270049021000},"page":"142-157","source":"Crossref","is-referenced-by-count":6,"title":["SecDEACH: Secure and Resilient Dynamic Clustering Protocol Preserving Data Privacy in WSNs"],"prefix":"10.1007","author":[{"given":"Young-Ju","family":"Han","sequence":"first","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Min-Woo","family":"Park","sequence":"additional","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Tai-Myoung","family":"Chung","sequence":"additional","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]}],"member":"297","reference":[{"key":"14_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"449","DOI":"10.1007\/978-3-540-31956-6_53","volume-title":"Networking - ICN 2005","author":"A.C. Ferreira","year":"2005","unstructured":"Ferreira, A.C., Vilaca, M.A., et al.: On the security of cluster-based communication protocols for wireless sensor networks. In: Lorenz, P., Dini, P. (eds.) ICN 2005. LNCS, vol.\u00a03420, pp. 449\u2013458. Springer, Heidelberg (2005)"},{"issue":"5","key":"14_CR2","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1023\/A:1016598314198","volume":"8","author":"A. Perring","year":"2002","unstructured":"Perring, A., Szewczyk, R., Well, V., Culler, D., Tygar, J.D.: SPINS: Security Protocol for Sensor Networks. Wireless Networks\u00a08(5), 521\u2013534 (2002)","journal-title":"Wireless Networks"},{"issue":"2-3","key":"14_CR3","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1016\/S1570-8705(03)00008-8","volume":"1","author":"C. Karlof","year":"2003","unstructured":"Karlof, C., Wagner, D., et al.: Secure routing in wireless sensor networks: attacks and countermeasures. Elsevier\u2019s AdHoc Networks J.\u00a01(2-3), 293\u2013315 (2003)","journal-title":"Elsevier\u2019s AdHoc Networks J."},{"key":"14_CR4","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1145\/948109.948119","volume-title":"CCS 2003, Proceeding of the 10th ACM conference on Computer and communications security","author":"D. Liu","year":"2003","unstructured":"Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: CCS 2003, Proceeding of the 10th ACM conference on Computer and communications security, pp. 52\u201361. ACM Press, New York (2003), Network"},{"issue":"2","key":"14_CR5","first-page":"4709","volume":"9","author":"G. Wang","year":"2009","unstructured":"Wang, G., Cho, G.: Secure Cluster Head Sensor Elections using Signal Strength Estimation and Ordered Transmissions, Sensors. MDPI (Molecular Diversity Preservation International)\u00a09(2), 4709\u20134727 (2009)","journal-title":"MDPI (Molecular Diversity Preservation International)"},{"key":"14_CR6","doi-asserted-by":"publisher","DOI":"10.1002\/0470095121","volume-title":"Protocols and Architectures for Wireless sensor Networks","author":"H. Karl","year":"2005","unstructured":"Karl, H., Willig, A.: Protocols and Architectures for Wireless sensor Networks. John Wiley & Suns, Ltd., Chichester (2005)"},{"issue":"6","key":"14_CR7","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/MWC.2004.1368893","volume":"11","author":"J.N. Al-Karaki","year":"2004","unstructured":"Al-Karaki, J.N., Kamal, A.E.: Routing techniques in wireless sensor networks: a survey. IEEE Wireless Communications\u00a011(6), 6\u201328 (2004)","journal-title":"IEEE Wireless Communications"},{"issue":"8","key":"14_CR8","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1109\/MCOM.2002.1024422","volume":"40","author":"L.F. Akyildiz","year":"2002","unstructured":"Akyildiz, L.F., et al.: A Survey on Sensor Networks. IEEE Communications Magazine\u00a040(8), 102\u2013114 (2002)","journal-title":"IEEE Communications Magazine"},{"issue":"12","key":"14_CR9","doi-asserted-by":"publisher","first-page":"2882","DOI":"10.1016\/j.sigpro.2007.05.016","volume":"87","author":"L.B. Oliveira","year":"2007","unstructured":"Oliveira, L.B., Ferreira, A., et al.: Secleach-on the security of clustered sensor networks. Signal Process\u00a087(12), 2882\u20132895 (2007)","journal-title":"Signal Process"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Sirivianos, M., et al.: Non-manipulable aggregator node election for wireless sensor networks. In: ICST wiOpt (January 2007)","DOI":"10.1109\/WIOPT.2007.4480031"},{"issue":"4","key":"14_CR11","doi-asserted-by":"publisher","first-page":"660","DOI":"10.1109\/TMC.2004.41","volume":"3","author":"O. Younis","year":"2004","unstructured":"Younis, O., Fahmy, S.: HEED: A Hybrid, Energy-Efficient, Distributed Clustering Approach for Ad Hoc Sensor Networks. IEEE Transactions on Mobile Computing\u00a03(4), 660\u2013669 (2004)","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"3","key":"14_CR12","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MNET.2006.1637928","volume":"20","author":"O. Younis","year":"2006","unstructured":"Younis, O., et al.: Node Clustering in Wireless Snsor Networks: Recent Developments and Deployment Challenges. IEEE Network\u00a020(3), 20\u201325 (2006)","journal-title":"IEEE Network"},{"key":"14_CR13","unstructured":"Tiwari, P.: Data Aggregation in Cluster-based Wireless Sensor Networks, A master thesis, Deemed University (July 2008)"},{"key":"14_CR14","doi-asserted-by":"crossref","unstructured":"Dong, Q., Liu, D.: Resilient Cluster Leader Election for Wireless Sensor Networks. In: Proceedings of The IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), June 2009, pp. 1\u20139 (2009)","DOI":"10.1109\/SAHCN.2009.5168966"},{"key":"14_CR15","doi-asserted-by":"crossref","unstructured":"heinzelman, W., et al.: An application-Specific Protocol Architecture for Wireless Microsensor Networks. IEEE Transactions on Wireless Communications\u00a01(4) (October 2002)","DOI":"10.1109\/TWC.2002.804190"},{"key":"14_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/978-3-540-74477-1_20","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2007","author":"Y.-J. Han","year":"2007","unstructured":"Han, Y.-J., Park, S.-H., Eom, J.-H., Chung, T.-M.: Energy-Efficient Distance based Clustering Routing Scheme for Wireless Sensor Networks. In: Gervasi, O., Gavrilova, M.L. (eds.) ICCSA 2007, Part II. LNCS, vol.\u00a04706, pp. 195\u2013206. Springer, Heidelberg (2007)"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2010"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12179-1_14.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T21:50:26Z","timestamp":1606168226000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12179-1_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642121784","9783642121791"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12179-1_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}