{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:42:32Z","timestamp":1725550952945},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642121784"},{"type":"electronic","value":"9783642121791"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12179-1_28","type":"book-chapter","created":{"date-parts":[[2010,3,31]],"date-time":"2010-03-31T15:23:41Z","timestamp":1270049021000},"page":"321-335","source":"Crossref","is-referenced-by-count":18,"title":["Ensuring Basic Security and Preventing Replay Attack in a Query Processing Application Domain in WSN"],"prefix":"10.1007","author":[{"given":"Amrita","family":"Ghosal","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Subir","family":"Halder","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sanjib","family":"Sur","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Avishek","family":"Dan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sipra","family":"DasBit","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"issue":"8","key":"28_CR1","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1109\/MCOM.2002.1024422","volume":"40","author":"I.F. Akyildiz","year":"2002","unstructured":"Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A survey on sensor networks. IEEE Communications Magazine\u00a040(8), 102\u2013114 (2002)","journal-title":"IEEE Communications Magazine"},{"issue":"3","key":"28_CR2","first-page":"211","volume":"33","author":"S. DasBit","year":"2008","unstructured":"DasBit, S., Ragupathy, R.: Routing in MANET and Sensor Network- A 3D position based approach. Journal of Foundation of Computing and Decision Sciences\u00a033(3), 211\u2013239 (2008)","journal-title":"Journal of Foundation of Computing and Decision Sciences"},{"key":"28_CR3","series-title":"Lecture Notes in Computer Science","first-page":"296","volume-title":"FGIT 2009","author":"S. Halder","year":"2009","unstructured":"Halder, S., Ghosal, A., Sur, S., Dan, A., DasBit, S.: A Lifetime Enhancing Node Deployment Strategy in WSN. In: Lee, Y.-h., et al. (eds.) FGIT 2009. LNCS, vol.\u00a05899, pp. 296\u2013308. Springer, Heidelberg (2009)"},{"key":"28_CR4","first-page":"948","volume-title":"Proceedings of Wireless VITAE","author":"A. Ghosal","year":"2009","unstructured":"Ghosal, A., Halder, S., DasBit, S.: A Scheme to tolerate Jamming in multiple nodes in Wireless Sensor Networks. In: Proceedings of Wireless VITAE, pp. 948\u2013951. IEEE Press, Los Alamitos (2009)"},{"key":"28_CR5","doi-asserted-by":"crossref","unstructured":"Ghosal, A., Halder, S., Chatterjee, S., Sen, J., DasBit, S.: Estimating delay in a data forwarding scheme for defending jamming attack in wireless sensor network. In: Proceedings of 3rd International Conference NGMAST, pp. 351\u2013356. IEEE CS Press, Los Alamitos (2009)","DOI":"10.1109\/NGMAST.2009.15"},{"issue":"10","key":"28_CR6","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1109\/MC.2002.1039518","volume":"35","author":"A.D. Wood","year":"2002","unstructured":"Wood, A.D., Stankovic, J.A.: Denial of Service in Sensor Networks. IEEE Computer\u00a035(10), 54\u201362 (2002)","journal-title":"IEEE Computer"},{"issue":"3\/4","key":"28_CR7","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1504\/IJSN.2006.011776","volume":"1","author":"J. Deng","year":"2006","unstructured":"Deng, J., Han, R., Mishra, S.: Limiting DoS attacks during multihop data delivery in wireless sensor networks. Journal of Security and Networks\u00a01(3\/4), 167\u2013178 (2006)","journal-title":"Journal of Security and Networks"},{"key":"28_CR8","unstructured":"Liu, D., Ning, P.: Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks. In: Proceedings of 10th annual Network and Distributed System Security Symposium, pp. 263\u2013276 (2003)"},{"issue":"5","key":"28_CR9","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1023\/A:1016598314198","volume":"8","author":"A. Perrig","year":"2002","unstructured":"Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.: SPINS: Security Protocols for Sensor Networks. Wireless Networks Journal (WINET)\u00a08(5), 521\u2013534 (2002)","journal-title":"Wireless Networks Journal (WINET)"},{"key":"28_CR10","unstructured":"Song, H., Zhu, S., Cao, G.: Attack-Resilient Time Synchronization for Wireless Sensor Network. In: Proceedings of IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, vol.\u00a0(7-7), pp. 772\u2013779 (2005)"},{"key":"28_CR11","doi-asserted-by":"crossref","unstructured":"Dong, J., Ackermann, K.E., Bavar, B., Nita-Rotaru, C.: Mitigating Attacks against Virtual Coordinate Based Routing in Wireless Sensor Networks. In: Proceedings of 1st ACM conference on Wireless Network Security, pp. 89\u201399 (2008)","DOI":"10.1145\/1352533.1352548"},{"key":"28_CR12","doi-asserted-by":"crossref","unstructured":"Soroush, H., Salajegheh, M., Dimitriou, T.: Providing Transparent Security Services to Sensor Networks. In: Proceedings of IEEE International Conference on Communications, pp. 3431\u20133436 (2007)","DOI":"10.1109\/ICC.2007.568"},{"key":"28_CR13","doi-asserted-by":"crossref","unstructured":"Heinzelman, W.R., Chandrakasan, A., Balakrishnan, H.: Energy Efficient Communication protocol for Wireless Microsensor Networks. In: Proceedings of the 33rd Hawaii International Conference on System Sciences, vol.\u00a02, pp. 8020\u20138029 (2000)","DOI":"10.1109\/HICSS.2000.926982"},{"key":"28_CR14","doi-asserted-by":"crossref","unstructured":"Zia, T., Zomaya, A.: Security Issues in Wireless Sensor Networks. In: Proceedings of International Conference on Systems and Network Communications, p. 40 (2006)","DOI":"10.1109\/ICSNC.2006.66"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2010"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12179-1_28.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T08:04:24Z","timestamp":1619769864000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12179-1_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642121784","9783642121791"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12179-1_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}