{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,4]],"date-time":"2025-06-04T17:33:29Z","timestamp":1749058409456},"publisher-location":"Berlin, Heidelberg","reference-count":34,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642225765"},{"type":"electronic","value":"9783642225772"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22577-2_55","type":"book-chapter","created":{"date-parts":[[2011,7,6]],"date-time":"2011-07-06T12:41:43Z","timestamp":1309956103000},"page":"406-416","source":"Crossref","is-referenced-by-count":4,"title":["Wireless Sensor Network Security Research and Challenges: A Backdrop"],"prefix":"10.1007","author":[{"given":"Dimple","family":"Juneja","sequence":"first","affiliation":[]},{"given":"Atul","family":"Sharma","sequence":"additional","affiliation":[]},{"given":"A. K","family":"Sharma","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"55_CR1","doi-asserted-by":"publisher","first-page":"94","DOI":"10.5539\/cis.v3n2p94","volume":"3","author":"D. Juneja","year":"2010","unstructured":"Juneja, D., Sharma, A., Kumar, A.: A Novel and Efficient Algorithm for Deploying Mobile Sensors in Subsurface. Computer and Information Science\u00a03(2), 94\u2013105 (2010); ISSN 1913-8989 (Print), ISSN 1913-8997 (Online)","journal-title":"Computer and Information Science"},{"key":"55_CR2","unstructured":"Juneja, D., Sharma, A., Kumar, A.: A Query Driven Routing Protocol for Wireless Sensor Nodes in Subsurface. International Journal of Engineering Science and Technology\u00a02(6), 1836\u20131843; ISSN: 0975-5462"},{"issue":"2","key":"55_CR3","doi-asserted-by":"publisher","first-page":"28","DOI":"10.5120\/2192-2783","volume":"17","author":"D. Juneja","year":"2011","unstructured":"Juneja, D., Sharma, A., Kumar, A.: A Novel Application Of Extended Kalman Filter For Efficient Information Processing In Subsurfaces. International Journal of Computer Applications\u00a017(2), 28\u201332 (2011); Published By FCS (Foundation of Computer Science, USA). ISSN: 0975-8887","journal-title":"International Journal of Computer Applications"},{"key":"55_CR4","doi-asserted-by":"crossref","unstructured":"Al-Sakib, Pathan, K., Lee, W., Hyung, Hong, S., Choong.: Security in Wireless Sensor Networks: Issues and Challenges. In: ICACT 2006 (2006)","DOI":"10.1109\/ICACT.2006.206151"},{"key":"55_CR5","first-page":"145","volume-title":"Sensors","author":"B. Lu","year":"2005","unstructured":"Lu, B., Habetler, T.G., Harley, R.G., Guti\u00e9rrez, J.A.: Applying Wireless Sensor Networks in Industrial Plant Energy Management Systems \u2013 Part I: A Closed-Loop Scheme. In: Sensors, October 30 -November 3, pp. 145\u2013150. IEEE, Los Alamitos (2005)"},{"key":"55_CR6","unstructured":"Virone, G., Wood, A., Selavo, L., Cao, Q., Fang, L., Doan, T., He, Z., Stankovic, J.A.: An Advanced Wireless Sensor Network for Health Monitoring. In: Transdisciplinary Conference on Distributed Diagnosis and Home Healthcare (D2H2), Arlington, VA, April 2-4 (2006)"},{"key":"55_CR7","unstructured":"Bokareva, T., Hu, W., Kanhere, S., Ristic, B., Gordon, N., Bessell, T., Rutten, M., Jha, S.: Wireless Sensor Networks for Battlefield Surveillance. In: Land Warfare Conference 2006, Brisbane, Australia (October 2006)"},{"key":"55_CR8","doi-asserted-by":"crossref","unstructured":"Mainwaring, A., Polastre, J., Szewczyk, R., Culler, D., Anderson, J.: Wireless Sensor Networks for Habitat Monitoring. In: ACM WSNA 2002, Atlanta, Georgia, USA, September 28, pp. 88\u201397 (2002)","DOI":"10.1145\/570738.570751"},{"key":"55_CR9","unstructured":"Wireless Sensor Networks, http:\/\/en.wikipedia.org\/wiki\/Wireless_Sensor_Networks"},{"key":"55_CR10","unstructured":"Tiny Operating System, http:\/\/en.wikipedia.org\/wiki\/TinyOS"},{"key":"55_CR11","volume-title":"Proceedings of the 2004 ACM Workshop on Wireless Security","author":"N. Sastry","year":"2004","unstructured":"Sastry, N., Wagner, D.: Security considerations for IEEE 802.15.4 networks. In: Proceedings of the 2004 ACM Workshop on Wireless Security. ACM Press, New York (2004)"},{"key":"55_CR12","doi-asserted-by":"crossref","unstructured":"Malan, D., Welsh, M., Smith, M.: A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography. In: Sensor and Ad Hoc Communications and Networks (2004)","DOI":"10.1109\/SAHCN.2004.1381904"},{"key":"55_CR13","unstructured":"Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Proceedings of the Symposium Security and Privacy (2003)"},{"key":"55_CR14","unstructured":"Du, W., Deng, J., Han, Y., Chen, S., Varshney, P.: A key management scheme for wireless sensor networks using deployment knowledge. In: INFOCOM 2004: Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies (2004)"},{"key":"55_CR15","volume-title":"Proceedings of the 9th ACM Conference on Computer and Communications Security","author":"L. Eschenauer","year":"2002","unstructured":"Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security. ACM Press, New York (2002)"},{"key":"55_CR16","doi-asserted-by":"crossref","unstructured":"Wagner, D.: Resilient aggregation in sensor networks. In: SASN 2004: Proceedings of the 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks (2004)","DOI":"10.1145\/1029102.1029116"},{"key":"55_CR17","doi-asserted-by":"crossref","unstructured":"Du, W., Han, Y.S., Deng, J., Varshney, P.K.: A Pairwise key predistribution scheme for wireless sensor networks. In: Proceedings of the ACM Conference on Computer and Communications Security (2003)","DOI":"10.1145\/948109.948118"},{"key":"55_CR18","unstructured":"Ye, F., Luo, H., Lu, S., Zhang, L.: Statistical en-route filtering of injected false data in Sensor Networks. In: Proceedings - IEEE INFOCOM (2004)"},{"key":"55_CR19","volume-title":"Protocols and Architecture for Wireless Sensor Networks.","author":"K. Hoger","year":"2005","unstructured":"Hoger, K., Andreas, W.: Protocols and Architecture for Wireless Sensor Networks. John Wiley & Sons Ltd, Chichester (2005); ISBN: 0-470-09510-5"},{"key":"55_CR20","doi-asserted-by":"crossref","unstructured":"Perrig, R., Szewczyk, V., Wen, D., Culler, J.D.: SPINS: security protocols for sensor networks. In: Proceedings of ACM MobiCom 2001, Rome, Italy, pp. 189\u2013199 (2001)","DOI":"10.1145\/381677.381696"},{"issue":"1","key":"55_CR21","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1109\/TVT.2008.921621","volume":"58","author":"D.R. Raymond","year":"2009","unstructured":"Raymond, D.R., Marchany, R.C., Brownfield, M.I., Midkiff, S.F.: Effects of Denial-of-Sleep Attacks on Wireless Sensor Network MAC Protocols. IEEE Transactions on Vehicular Technology\u00a058(1), 367\u2013380 (2009)","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"10","key":"55_CR22","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/MC.2002.1039518","volume":"35","author":"A.D. Wood","year":"2002","unstructured":"Wood, A.D., Stankovic, J.A.: Denial of Service in Sensor Networks. IEEE Computer\u00a035(10), 48\u201356 (2002)","journal-title":"IEEE Computer"},{"key":"55_CR23","doi-asserted-by":"crossref","unstructured":"Brownfield, M., Gupta, Y., Davis, N.: Wireless sensor network denial of sleep attack. In: Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop, IAW 2005, pp. 356\u2013364 (2005)","DOI":"10.1109\/IAW.2005.1495974"},{"key":"55_CR24","doi-asserted-by":"crossref","unstructured":"Wood, A.D., Stankovic, J.A.: Denial of Service in Sensor Networks. IEEE Computers, 54\u201362 (October 2002)","DOI":"10.1109\/MC.2002.1039518"},{"issue":"1 & 2","key":"55_CR25","first-page":"1","volume":"4","author":"G. Padmavathi","year":"2009","unstructured":"Padmavathi, G., Shanmugapriya, D.: A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks. International Journal of Computer Science and Information Security (IJCSIS)\u00a04(1 & 2), 1\u20139 (2009)","journal-title":"International Journal of Computer Science and Information Security (IJCSIS)"},{"key":"55_CR26","doi-asserted-by":"crossref","unstructured":"Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. In: Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, pp. 113\u2013127 (2003)","DOI":"10.1109\/SNPA.2003.1203362"},{"key":"55_CR27","unstructured":"Yu, B., Xiao, B.: Detecting selective forwarding attacks in wireless sensor networks. In: Proceedings of the Second International Workshop on Security in Systems and Networks (IPDPS 2006 Workshop), pp. 1\u20138 (2006)"},{"key":"55_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1007\/978-3-540-77871-4_14","volume-title":"Algorithmic Aspects of Wireless Sensor Networks","author":"I. Krontiris","year":"2008","unstructured":"Krontiris, I., Dimitriou, T.D., Giannetsos, T., Mpasoukos, M.: Intrusion detection of sinkhole attacks in wireless sensor networks. In: Kuty\u0142owski, M., Cicho\u0144, J., Kubiak, P. (eds.) ALGOSENSORS 2007. LNCS, vol.\u00a04837, pp. 150\u2013161. Springer, Heidelberg (2008)"},{"key":"55_CR29","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1145\/984622.984660","volume-title":"IPSN 2004: Proceedings of the Third International Symposium on Information Processing in Sensor Networks","author":"E. Newsome","year":"2004","unstructured":"Newsome, E., Song, S.D., Perrig, A.: The sybil attack in sensor networks: analysis & defenses. In: IPSN 2004: Proceedings of the Third International Symposium on Information Processing in Sensor Networks, pp. 259\u2013268. ACM Press, New York (2004)"},{"key":"55_CR30","unstructured":"Hu, Y.-C., Perrig, A., Johnson, D.B.: Wormhole detection in wireless ad hoc networks. Department of Computer Science, Rice University, Tech. Rep. TR01-384 (June 2002)"},{"key":"55_CR31","unstructured":"Tumrongwittayapak, C., Varakulsiripunth, R.: Detecting Sinkhole Attacks In Wireless Sensor Networks. In: Proceedings of the IEEE ICROS-SICE International Joint Conference, pp. 1966\u20131971 (2009)"},{"key":"55_CR32","unstructured":"Feng, Z., Leonidas, G.: Wireless Sensor Networks (An Information Processing Approach). Morgan Kaufmann Publisher under Elsevier; ISBN:1-55860-914-8"},{"key":"55_CR33","volume-title":"Networking Issues in Wireless Sensor Networks","author":"G. Deepak","year":"2003","unstructured":"Deepak, G., Alberto, C., Wei, Y., Yan, Y., Jerry, Z., Deborah, E.: Networking Issues in Wireless Sensor Networks. Elsevier Science, Amsterdam (2003)"},{"key":"55_CR34","unstructured":"CrossBow Technology Inc., www.xbow.com\/"}],"container-title":["Communications in Computer and Information Science","High Performance Architecture and Grid Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22577-2_55","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,12]],"date-time":"2019-06-12T19:51:26Z","timestamp":1560369086000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22577-2_55"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642225765","9783642225772"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22577-2_55","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}