{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T02:48:29Z","timestamp":1742957309423,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642134043"},{"type":"electronic","value":"9783642134050"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-13405-0_6","type":"book-chapter","created":{"date-parts":[[2010,9,10]],"date-time":"2010-09-10T13:36:37Z","timestamp":1284125797000},"page":"56-63","source":"Crossref","is-referenced-by-count":2,"title":["A Feedback-Based Secure Path Approach for Wireless Sensor Networks Data Collection"],"prefix":"10.1007","author":[{"given":"Yuxin","family":"Mao","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","first-page":"83","volume":"119","author":"K.S. Low","year":"1992","unstructured":"Low, K.S., Win, W.N., Er, M.J.: Wireless Sensor Networks for Industrial Environments. Mater. Sci. Forum\u00a0119, 83\u201387 (1992)","journal-title":"Mater. Sci. Forum"},{"issue":"8","key":"6_CR2","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1109\/MCOM.2002.1024422","volume":"40","author":"F. Akyildiz","year":"2002","unstructured":"Akyildiz, F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A survey on sensor networks. IEEE Communications Magazine\u00a040(8), 102\u2013114 (2002)","journal-title":"IEEE Communications Magazine"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Lee, W.: Intrusion Detection in Wireless Ad-Hoc Networks. In: Proc. the 6th Annual International Conference on Mobile Computing and Networking (2000)","DOI":"10.1145\/345910.345958"},{"issue":"11","key":"6_CR4","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1109\/35.965371","volume":"39","author":"A. Tsirigos","year":"2001","unstructured":"Tsirigos, A., Haas, Z.J.: Multipath routing in the presence of frequent topological changes. IEEE Communication Magazine\u00a039(11), 132\u2013138 (2001)","journal-title":"IEEE Communication Magazine"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Shu, T., Liu, S., KrunzSecure, M.: Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes. In: Proc. IEEE INFOCOM Conference, pp. 2846\u20132850 (2009)","DOI":"10.1109\/INFCOM.2009.5062244"},{"key":"6_CR6","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1016\/S1389-1286(01)00302-4","volume":"38","author":"F. Akyildiz","year":"2002","unstructured":"Akyildiz, F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless Sensor Networks: A Survey. Computer Networks\u00a038, 393\u2013422 (2002)","journal-title":"Computer Networks"},{"key":"6_CR7","unstructured":"Ioannis, K., Dimitriou, T., Freiling, F.C.: Towards Intrusion Detection in Wireless Sensor Networks. In: Proc. the 13th European Wireless Conference (2007)"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Onat, I., Miri, A.: An Intrusion Detection System for Wireless Sensor Networks. In: Proc. IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (2005)","DOI":"10.1109\/WIMOB.2005.1512911"},{"issue":"11","key":"6_CR9","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"Shamir, A.: How to Share a Secret. Communication of the ACM\u00a022(11), 612\u2013613 (1979)","journal-title":"Communication of the ACM"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Lou, W., Liu, W., Fang, Y.: Spread: enhancing data confidentiality in mobile ad hoc networks. In: Proc. IEEE INFOCOM Conference, vol.\u00a04, pp. 2404\u20132413 (2004)","DOI":"10.1109\/INFCOM.2004.1354662"},{"issue":"4","key":"6_CR11","doi-asserted-by":"publisher","first-page":"1320","DOI":"10.1109\/TVT.2006.877707","volume":"55","author":"W. Lou","year":"2006","unstructured":"Lou, W., Kwon, Y.: H-spread: a hybrid multipath scheme for secure and reliable data collection in wireless sensor networks. IEEE Transactions on Vehicular Technology\u00a055(4), 1320\u20131330 (2006)","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"6","key":"6_CR12","doi-asserted-by":"publisher","first-page":"1490","DOI":"10.1109\/TNET.2007.897956","volume":"15","author":"P.C. Lee","year":"2007","unstructured":"Lee, P.C., Misra, V., Rubenstein, D.: Distributed algorithms for secure multipath rout-ing in attack-resistant networks. IEEE\/ACM Transactions on Networking\u00a015(6), 1490\u20131501 (2007)","journal-title":"IEEE\/ACM Transactions on Networking"},{"issue":"11-12","key":"6_CR13","doi-asserted-by":"publisher","first-page":"2401","DOI":"10.1016\/j.comcom.2007.04.014","volume":"30","author":"N. Nasser","year":"2007","unstructured":"Nasser, N., Chen, Y.: SEEM: Secure and energy-efficient multipath routing protocol for wireless sensor networks. Computer Communications\u00a030(11-12), 2401\u20132412 (2007)","journal-title":"Computer Communications"},{"issue":"2","key":"6_CR14","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1016\/j.comcom.2005.05.018","volume":"29","author":"J. Deng","year":"2006","unstructured":"Deng, J., Han, R., Mishra, S.: INSENS: Intrusion-tolerant routing for wireless sensor networks. Computer Communication\u00a029(2), 216\u2013230 (2006)","journal-title":"Computer Communication"}],"container-title":["Communications in Computer and Information Science","Advanced Communication and Networking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-13405-0_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,25]],"date-time":"2025-02-25T17:55:53Z","timestamp":1740506153000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-13405-0_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642134043","9783642134050"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-13405-0_6","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2010]]}}}