{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,28]],"date-time":"2025-02-28T07:40:06Z","timestamp":1740728406122,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642175015"},{"type":"electronic","value":"9783642175022"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-17502-2_11","type":"book-chapter","created":{"date-parts":[[2010,11,27]],"date-time":"2010-11-27T05:32:28Z","timestamp":1290835948000},"page":"127-138","source":"Crossref","is-referenced-by-count":1,"title":["Network Resilience in Low-Resource Mobile Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Bai","family":"Li","sequence":"first","affiliation":[]},{"given":"Lynn Margaret","family":"Batten","sequence":"additional","affiliation":[]},{"given":"Robin","family":"Doss","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Li, B., Doss, R., Batten, L., Schott, W.: Fast Recovery from Node Compromise in Wireless Sensor Networks. In: NTMS 2009, pp. 186\u2013191 (2009)","DOI":"10.1109\/NTMS.2009.5384778"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Li, M., Liu, Y.: Underground structure monitoring with wireless sensor networks. In: IPSN 2007, Cambridge, Mass., pp. 69\u201378 (2007)","DOI":"10.1109\/IPSN.2007.4379666"},{"key":"11_CR3","first-page":"158","volume-title":"Proceedings of Mobile Computing Systems and Applications","author":"D. Johnson","year":"1994","unstructured":"Johnson, D.: Routing in ad hoc networks of mobile hosts. In: Proceedings of Mobile Computing Systems and Applications, pp. 158\u2013163. IEEE Computer Society, Los Alamitos (1994)"},{"key":"11_CR4","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/978-0-585-29603-6_5","volume-title":"Mobile Computing, ch. 5","author":"D. Johnson","year":"1996","unstructured":"Johnson, D., Maltz, D.: Dynamic source routing in ad hoc wireless networks. In: Imielinski, T., Korth, H. (eds.) Mobile Computing, ch. 5, vol.\u00a0353, pp. 153\u2013181. Kluwer Academic Publishers, Dordrecht (1996)"},{"issue":"3","key":"11_CR5","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/MNET.2006.1637932","volume":"20","author":"Q. Wang","year":"2006","unstructured":"Wang, Q., Zhu, Y., Cheng, L.: Reprogramming wireless sensor networks: Challenges and approaches. IEEE Network Magazine\u00a020(3), 48\u201355 (2006)","journal-title":"IEEE Network Magazine"},{"key":"11_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1281492.1281497","volume":"3","author":"A. Kansal","year":"2007","unstructured":"Kansal, A., Kaiser, W., Pottie, G., Srivastava, M., Sukhatme, G.: Reconfiguration methods for mobile sensor networks. ACM Transactions on Sensor networks\u00a03, Article 22, 1\u201328 (2007)","journal-title":"ACM Transactions on Sensor networks"},{"key":"11_CR7","doi-asserted-by":"publisher","first-page":"872","DOI":"10.1109\/TMC.2007.1005","volume":"6","author":"Y. Zou","year":"2007","unstructured":"Zou, Y., Chakrabarty, K.: Distributed mobility management for target tracking in mobile sensor networks. IEEE Transactions on Mobile Computing\u00a06, 872\u2013887 (2007)","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Eriksson, K., Girod, L., Hull, B., Newton, R., Madden, S., Balakrishnan, H.: The pothole patrol: using a mobile sensor network for road surface monitoring. In: Proceedings of MobiSys 2008, Colorado, pp. 29\u201339 (2008)","DOI":"10.1145\/1378600.1378605"},{"key":"11_CR9","doi-asserted-by":"publisher","first-page":"602","DOI":"10.1109\/TNET.2007.893235","volume":"15","author":"D. Alparslan","year":"2007","unstructured":"Alparslan, D., Sohraby, K.: A generalized random mobility model for wireless and ad hoc networks and its analysis: one-dimensional case. IEEE\/ACM Transactions on Networking\u00a015, 602\u2013615 (2007)","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"11_CR10","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/s11276-006-4600-3","volume":"13","author":"E. Hyytia","year":"2007","unstructured":"Hyytia, E., Virtamo, J.: Random waypoint mobility model in cellular networks. Wireless Networks\u00a013, 177\u2013188 (2007)","journal-title":"Wireless Networks"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Hu, L., Evans, D.: Localization for mobile sensor networks. In: Proceedings of MobiCom 2004, Pennsylvania, pp. 45\u201357 (2004)","DOI":"10.1145\/1023720.1023726"},{"key":"11_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1007\/11502593_5","volume-title":"Distributed Computing in Sensor Systems","author":"M. Ma","year":"2005","unstructured":"Ma, M., Yang, Y.: Adaptive triangular deployment algorithm for unattended mobile sensor networks. In: Prasanna, V.K., Iyengar, S.S., Spirakis, P.G., Welsh, M. (eds.) DCOSS 2005. LNCS, vol.\u00a03560, pp. 20\u201334. Springer, Heidelberg (2005)"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Wu, J.: An enhanced approach to determine a small forward node set based on multipoint relay. In: Proc. IEEE Conference VTC 2003, pp. 2774\u20132777 (2003)","DOI":"10.1109\/VETECF.2003.1286086"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Wu, J., Lou, W., Dai, F.: Extended multipoint relays to determine connected dominating sets in MANETs. In: Proceedings of IEEE SECON 2004, vol.\u00a055, pp. 334\u2013347 (2004)","DOI":"10.1109\/TC.2006.40"},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"Hu, L., Li, Y., Chen, Q., Liu, J., Long, K.: A New Energy-Aware Routing Protocol for Wireless Sensor Networks. In: Proceedings of WiCom 2007, pp. 2444\u20132447 (2007)","DOI":"10.1109\/WICOM.2007.609"},{"key":"11_CR16","unstructured":"National Institute of Standards and Technology: \u2018Secure hash standard\u2019, FIPS Publication 180\u20132. 32 pages (2002)"},{"key":"11_CR17","unstructured":"Rabin, M.: Digitalized Signatures and Public-Key Functions as Intractable as Factorization. MIT Laboratory for Computer Science, 16 pages (January 1979)"},{"key":"11_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/978-3-540-71039-4_9","volume-title":"Fast Software Encryption","author":"A. Shamir","year":"2008","unstructured":"Shamir, A.: SQUASH \u2013 A new MAC with provable security properties for highly constrained devices such as RFID tags. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol.\u00a05086, pp. 144\u2013157. Springer, Heidelberg (2008)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Mobile Information and Communication Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-17502-2_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,28]],"date-time":"2025-02-28T07:07:51Z","timestamp":1740726471000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-17502-2_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642175015","9783642175022"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-17502-2_11","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2010]]}}}