{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T22:46:51Z","timestamp":1743115611272,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642227196"},{"type":"electronic","value":"9783642227202"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22720-2_10","type":"book-chapter","created":{"date-parts":[[2011,7,25]],"date-time":"2011-07-25T16:14:51Z","timestamp":1311610491000},"page":"102-110","source":"Crossref","is-referenced-by-count":3,"title":["A Collaborative, Secure and Energy Efficient Intrusion Detection Method for Homogeneous WSN"],"prefix":"10.1007","author":[{"given":"T. Mohamed","family":"Mubarak","sequence":"first","affiliation":[]},{"given":"Syed Abdul","family":"Sattar","sequence":"additional","affiliation":[]},{"given":"Appa","family":"Rao","sequence":"additional","affiliation":[]},{"given":"M.","family":"Sajitha","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"8","key":"10_CR1","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1109\/MCOM.2002.1024422","volume":"40","author":"I.F. Akyildiz","year":"2002","unstructured":"Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A Survey on Sensor Networks. IEEE Communication Magazine\u00a040(8), 102\u2013114 (2002)","journal-title":"IEEE Communication Magazine"},{"key":"10_CR2","unstructured":"Lee, J.J., Krishnamachari, B., Kuo, C.C.J.: Impact of Heterogeneous Deployment on Lifetime Sensing Coverage in Sensor Networks, IEEE SECON (2004)"},{"issue":"6","key":"10_CR3","doi-asserted-by":"publisher","first-page":"749","DOI":"10.1016\/j.adhoc.2005.09.002","volume":"4","author":"W. Hu","year":"2006","unstructured":"Hu, W., Chou, C.T., Jha, S., Bulusu, N.: Deploying Long-Lived and Cost-effective Hybrid Sensor Networks. Elsevier Ad-Hoc Networks\u00a04(6), 749\u2013767 (2006)","journal-title":"Elsevier Ad-Hoc Networks"},{"key":"10_CR4","unstructured":"da Silva, A.P., Martins, M., Rocha, B., Loureiro, A., Ruiz, L., Wong, H.C.: Decentralized intrusion detection in wireless sensor networks. In: Proceedings of the 1st ACM International Workshop on Quality of Service & Security in Wireless and Mobile Networks"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Onat, I., Miri, A.: An intrusion detection system for wireless sensor networks. In: Proceeding of the IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, Montreal, Canada, vol.\u00a03, pp. 253\u2013259 (August 2005)","DOI":"10.1109\/WIMOB.2005.1512911"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Lee, W.: Intrusion Detection in Wireless Ad-Hoc Networks. In: Proc. ACM MobiCom, pp. 275\u2013283 (2000)","DOI":"10.1145\/345910.345958"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Liu, B., Brass, P., Dousse, O., Nain, P., Towsley, D.: Mobility improves coverage of sensor networks. In: Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc (2005)","DOI":"10.1145\/1062689.1062728"},{"issue":"6","key":"10_CR8","doi-asserted-by":"publisher","first-page":"698","DOI":"10.1109\/TMC.2008.19","volume":"7","author":"Y. Wang","year":"2008","unstructured":"Wang, Y., Wang, X., Xie, B., Wang, D., Agrawal, D.P.: Intrusion detection in homogeneous and heterogeneous wireless sensor networks. IEEE Transactions on Mobile Computing\u00a07(6), 698\u2013711 (2008)","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Wang, Y., Leow, Y.K., Yin, J.: Is Straight-line Path Always the Best for Intrusion Detection in Wireless Sensor Networks. In: 15th International Conference on Parallel and Distributed Systems (2009)","DOI":"10.1109\/ICPADS.2009.87"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Xiao, Y., Chen, H., Zhang, Y., Du, X., Sun, B., Wu, K.: Intrusion Objects with Shapes under Randomized Scheduling Algorithm. In: The 28th International Conference on Distributed Sensor Networks, in Computing Systems Workshops (2008)","DOI":"10.1109\/ICDCS.Workshops.2008.39"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Peng, X., Wu, Z., Xiao, D., Yu, Y.: Study on Security Management Architecture for Sensor Network based on Intrusion Detection. In: 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing (2009)","DOI":"10.1109\/NSWCTC.2009.210"},{"key":"10_CR12","first-page":"16","volume-title":"2003 Symposium on Applications and the Internet Workshops (SAINT 2003 Workshops), 2003. (Q2SWinet 2005)","author":"P. Brutch","year":"2005","unstructured":"Brutch, P., Ko, C.: Challenges in intrusion detection for wireless ad-hoc networks. In: 2003 Symposium on Applications and the Internet Workshops (SAINT 2003 Workshops), 2003 (Q2SWinet 2005), pp. 16\u201323. ACM Press, New York (2005)"},{"key":"10_CR13","doi-asserted-by":"publisher","first-page":"1698","DOI":"10.1109\/TPDS.2008.258","volume":"20","author":"J. Shaikh","year":"2009","unstructured":"Shaikh, J., Lee, H., Lee, S., Song, Y.-J.: Group Based Trust Management Scheme for Clustered WSN. IEE Transaction on Parallel and Distributed Systems\u00a020, 1698\u20131712 (2009)","journal-title":"IEE Transaction on Parallel and Distributed Systems"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Mubarak, M., Sattar, S.A., Rao, A., Sajitha, M.: Energy efficient intrusion detection in three dimensional wireless sensor networks. In: 2010 International Conference on Computational Intelligence and Computing Research (December 2010)","DOI":"10.1109\/ICCIC.2010.5705872"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Mubarak, M., Sattar, S.A., Rao, A., Sajitha, M.: Intrusion detection: A probability Model for 3D Heterogeneous WSN. International Journal of Computer Applications\u00a06(12) (September 2010)","DOI":"10.5120\/1125-1475"}],"container-title":["Communications in Computer and Information Science","Advances in Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22720-2_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T11:06:06Z","timestamp":1741345566000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22720-2_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642227196","9783642227202"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22720-2_10","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}