{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T03:28:27Z","timestamp":1761708507833,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642121784"},{"type":"electronic","value":"9783642121791"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12179-1_25","type":"book-chapter","created":{"date-parts":[[2010,3,31]],"date-time":"2010-03-31T19:23:41Z","timestamp":1270063421000},"page":"277-290","source":"Crossref","is-referenced-by-count":7,"title":["A Secure Routing Protocol for Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Jaydip","family":"Sen","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Arijit","family":"Ukil","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"issue":"8","key":"25_CR1","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1109\/MCOM.2002.1024422","volume":"40","author":"I.F. Akyildiz","year":"2002","unstructured":"Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A Survey on Sensor Networks. IEEE Communications Magazine\u00a040(8), 102\u2013114 (2002)","journal-title":"IEEE Communications Magazine"},{"key":"25_CR2","doi-asserted-by":"crossref","unstructured":"Karlof, C., Wagner, D.: Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures. In: Proc. of 1st IEEE International Workshop on Sensor Network Protocols and Applications, pp. 113\u2013127 (2005)","DOI":"10.1109\/SNPA.2003.1203362"},{"issue":"6","key":"25_CR3","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1145\/990680.990707","volume":"47","author":"A. Perrig","year":"2004","unstructured":"Perrig, A., Stankovic, J., Wagner, D.: Security in Wireless Sensor Networks. Communications of the ACM\u00a047(6), 53\u201357 (2004)","journal-title":"Communications of the ACM"},{"key":"25_CR4","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1109\/MC.2002.1039518","volume":"35","author":"A. Wood","year":"2002","unstructured":"Wood, A., Stankovic, J.: Denial of Service in Sensor Networks. IEEE Computer\u00a035, 54\u201362 (2002)","journal-title":"IEEE Computer"},{"issue":"1","key":"25_CR5","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/TNET.2002.808417","volume":"11","author":"C. Intanagonwiwat","year":"2003","unstructured":"Intanagonwiwat, C., Govindan, R., Estrin, D., Heidemann, J., Silva, F.: Directed Diffusion for Wireless Sensor Networking. ACM\/IEEE Transactions on Networking\u00a011(1), 2\u201316 (2003)","journal-title":"ACM\/IEEE Transactions on Networking"},{"key":"25_CR6","doi-asserted-by":"crossref","unstructured":"Gupta, G., Younis, M.: Fault-Tolerant Clustering of Wireless Sensor Networks. In: Proc. of IEEE Wireless Communications and Network Conference (WCNC), pp. 1579\u20131584 (2003)","DOI":"10.1109\/WCNC.2003.1200622"},{"key":"25_CR7","doi-asserted-by":"crossref","unstructured":"Lee, S.-B., Choi, Y.-H.: A Resilient Packet-Forwarding Scheme against Maliciously Packet-Dropping Nodes in Sensor Networks. In: Proc. of the 4th ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 59\u201370 (2006)","DOI":"10.1145\/1180345.1180353"},{"key":"25_CR8","unstructured":"Chan, H., Perrig, A., Song, D.: Random Key Pre-Distribution Schemes for Sensor Networks. In: Proc. of IEEE Symposium on Security and Privacy, pp. 197\u2013213 (2003)"},{"key":"25_CR9","doi-asserted-by":"crossref","unstructured":"Eschenauer, L., Gligor, V.D.: A Key Management Scheme for Distributed Sensor Networks. In: Proc. of the 9th ACM Conference on Computer and Communication Security (CCS), pp. 41\u201347 (2002)","DOI":"10.1145\/586110.586117"},{"key":"25_CR10","doi-asserted-by":"crossref","unstructured":"Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.: SPINS: Security Protocols for Sensor Networks. In: Proc. of ACM MobiCom, pp. 189\u2013199 (2001)","DOI":"10.1145\/381677.381696"},{"key":"25_CR11","doi-asserted-by":"crossref","unstructured":"Karlof, C., Sastry, N., Wagner, D.: TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. In: Proc. of ACM SensSys, pp. 162\u2013175 (2004)","DOI":"10.1145\/1031495.1031515"},{"key":"25_CR12","doi-asserted-by":"crossref","unstructured":"Parno, B., Perrig, A., Gligor, V.D.: Distributed Detection of Node Replication Attacks in Sensor Networks. In: Proc. of IEEE Symposium on Security and Privacy, pp. 49\u201363 (2005)","DOI":"10.1109\/SP.2005.8"},{"key":"25_CR13","doi-asserted-by":"crossref","unstructured":"Newsome, J., Shi, E., Song, D., Perrig, A.: The Sybil Attack in Sensor Networks: Analysis and Defenses. In: Proc. of IEEE IPSN, pp. 259\u2013268 (2004)","DOI":"10.1145\/984622.984660"},{"key":"25_CR14","unstructured":"Deng, J., Han, R., Mishra, S.: INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks. Technical Report CU-CS-939-02, Dept. of Computer Science, University of Colorado at Boulder (2002)"},{"key":"25_CR15","doi-asserted-by":"crossref","unstructured":"Tanachaiwiwat, S., Dave, P., Bhindwale, R., Helmy, A.: Routing on Trust and Isolating Compromised Sensors in Location-Aware Sensor Networks. In: Proc. of 1st International Conference on Embedded Networked Sensor Systems, pp. 324\u2013325 (2003)","DOI":"10.1145\/958491.958542"},{"key":"25_CR16","doi-asserted-by":"crossref","unstructured":"Zhu, S., Setia, S., Jajodia, S.: LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. In: Proc. of the 10th ACM Conference on Computer and Communications Security (CCS), pp. 62\u201372 (2003)","DOI":"10.1145\/948109.948120"},{"key":"25_CR17","first-page":"11","volume":"1","author":"D. Ganesan","year":"2002","unstructured":"Ganesan, D., Govindan, R., Shenker, S., Estrin, D.: Highly Resilient, Energy-Efficient Multipath Routing in Wireless Sensor Networks. Computing and Communications Review (MC2R)\u00a01, 11\u201325 (2002)","journal-title":"Computing and Communications Review (MC2R)"},{"key":"25_CR18","doi-asserted-by":"crossref","unstructured":"Deng, J., Han, R., Mishra, S.: A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks. In: Proc. of the 2nd International Workshop on Information Processing in Sensor Networks (IPSN), pp. 349\u2013364 (2003)","DOI":"10.1007\/3-540-36978-3_23"},{"key":"25_CR19","doi-asserted-by":"crossref","unstructured":"Ye, F., Zhong, G., Lu, S., Zhang, L.: GRAdient Broadcast: A Robust Data Delivery Protocol for Large Scale Sensor Networks. ACM Wireless Networks, WINET (2005)","DOI":"10.1007\/s11276-005-6612-9"},{"key":"25_CR20","doi-asserted-by":"crossref","unstructured":"Carbunar, B., Ioannidis, I., Nita-Rotaru, C.: JANUS: Towards Robust and Malicious Resilient Routing in Hybrid Wireless Networks. In: Proc. of ACM Workshop on Wireless Security, WiSe (2004)","DOI":"10.1145\/1023646.1023649"},{"key":"25_CR21","doi-asserted-by":"crossref","unstructured":"Morcos, H., Matta, I., Bestavros, A.: M2RC: Multiplicative-Increase\/Additive-Decrease Multipath Routing Control for Wireless Sensor Networks. ACM SIGBED Review\u00a02 (2005)","DOI":"10.1145\/1031495.1031539"},{"key":"25_CR22","doi-asserted-by":"crossref","unstructured":"Yang, H., Ye, F., Yuan, Y., Lu, S., Arbough, W.: Towards Resilient Security in Wireless Sensor Networks. In: Proc. of ACM MobiHoc, pp. 34\u201345 (2005)","DOI":"10.1145\/1062689.1062696"},{"key":"25_CR23","doi-asserted-by":"crossref","unstructured":"Hill, J., Szewczyk, R., Woo, A., Hollar, S., Culler, D., Pister, K.: Systems Architecture Directions for Networked Sensors. In: ACU ASPLOS IX (2000)","DOI":"10.1145\/378993.379006"},{"key":"25_CR24","doi-asserted-by":"crossref","unstructured":"Ssu, K.-F., Wu, T.-T., Huang, S.-K., Jiau, H.C.: A Dependable Routing Protocol in Wireless Sensor Networks. In: Proc. of ICWMC, pp. 1\u20136 (2006)","DOI":"10.1109\/ICWMC.2006.2"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2010"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12179-1_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,19]],"date-time":"2025-02-19T20:12:00Z","timestamp":1739995920000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12179-1_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642121784","9783642121791"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12179-1_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}