{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T10:08:21Z","timestamp":1725703701591},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642328909"},{"type":"electronic","value":"9783642328916"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-32891-6_41","type":"book-chapter","created":{"date-parts":[[2012,10,6]],"date-time":"2012-10-06T04:54:11Z","timestamp":1349499251000},"page":"331-336","source":"Crossref","is-referenced-by-count":0,"title":["A New Security Routing Algorithm Based on MST for Wireless Sensor Network"],"prefix":"10.1007","author":[{"given":"Meimei","family":"Zeng","sequence":"first","affiliation":[]},{"given":"Hua","family":"Jiang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"41_CR1","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1007\/978-3-642-04117-4_26","volume-title":"Handbook of Information and Communication Security","author":"K. Kifayat","year":"2010","unstructured":"Kifayat, K., Merabti, M., Shi, Q.: Security in Wireless Sensor Networks. In: Staroulakis, P., Stamp, M. (eds.) Handbook of Information and Communication Security, pp. 513\u2013552. Springer, Berlin (2010)"},{"key":"41_CR2","first-page":"55","volume":"2","author":"S. Jaydip","year":"2009","unstructured":"Jaydip, S.: A Survey on Wireless Sensor Network Security. International Journal of Communication Networks and Information Security\u00a02, 55\u201378 (2009)","journal-title":"International Journal of Communication Networks and Information Security"},{"key":"41_CR3","doi-asserted-by":"publisher","first-page":"2413","DOI":"10.1016\/j.comcom.2007.04.022","volume":"30","author":"A. Boukerch","year":"2007","unstructured":"Boukerch, A., Xu, L., El-khatib, K.: Trust-based Security for Wireless Ad Hoc and Sensor Networks. Computer Communications\u00a030, 2413\u20132427 (2007)","journal-title":"Computer Communications"},{"key":"41_CR4","first-page":"221","volume":"1","author":"Y.F. Wu","year":"2012","unstructured":"Wu, Y.F., Zhou, X., Feng, R.J., Wan, J.W., Xu, X.F.: Secure Routing based on Node Trust Value in Wireless Sensor Networks. Chinese Journal of Scientific Instrument\u00a01, 221\u2013227 (2012)","journal-title":"Chinese Journal of Scientific Instrument"},{"issue":"3","key":"41_CR5","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1016\/S1004-4132(08)60102-4","volume":"19","author":"B.Q. Kan","year":"2008","unstructured":"Kan, B.Q., Cai, L., Zhu, H.S., Xu, Y.J.: Accurate Energy Model for WSN Node and Its Optimal Design. Journal of Systems Engineering and Electronics\u00a019(3), 427\u2013433 (2008)","journal-title":"Journal of Systems Engineering and Electronics"},{"issue":"11","key":"41_CR6","first-page":"2636","volume":"31","author":"X.D. Hu","year":"2010","unstructured":"Hu, X.D., Wei, Q.F., Tang, H.: Model and Simulation of Creditability-based Data Aggregation for the Internet of Things. Chinese Journal of Scientific Instrument\u00a031(11), 2636\u20132640 (2010)","journal-title":"Chinese Journal of Scientific Instrument"},{"issue":"4","key":"41_CR7","doi-asserted-by":"publisher","first-page":"500","DOI":"10.1016\/j.comcom.2011.11.016","volume":"35","author":"D. Chang","year":"2012","unstructured":"Chang, D., Cho, K., Choi, N., Kwon, T., Choi, Y.: A Probabilistic and Opportunistic Flooding Algorithm in Wireless Sensor Networks. Computer Communications\u00a035(4), 500\u2013506 (2012)","journal-title":"Computer Communications"},{"issue":"11","key":"41_CR8","doi-asserted-by":"publisher","first-page":"1418","DOI":"10.1002\/dac.1224","volume":"24","author":"J.H. Tang","year":"2011","unstructured":"Tang, J.H., Dai, S.S., Li, J.H.: Gossip-based Scalable Directed Diffusion for Wireless Sensor Networks. International Journal of Communication Systems\u00a024(11), 1418\u20131430 (2011)","journal-title":"International Journal of Communication Systems"},{"key":"41_CR9","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1023\/A:1013715909417","volume":"8","author":"K. Joanna","year":"2002","unstructured":"Joanna, K., Wendi, H., Hari, B.: Negotiation-Based Protocols for Disseminating Information in Wireless Sensor Networks. Wireless Networks\u00a08, 169\u2013185 (2002)","journal-title":"Wireless Networks"},{"issue":"2","key":"41_CR10","first-page":"216","volume":"25","author":"Y.R. Cui","year":"2008","unstructured":"Cui, Y.R., Cao, J.H., He, N., Zhu, F.: Energy-efficient Data Query Protocol for Wireless Sensor Network. Application Research of Computers\u00a025(2), 216\u2013217 (2008)","journal-title":"Application Research of Computers"},{"key":"41_CR11","volume-title":"Wireless Communications: Principles and Practice","author":"T. Rappaport","year":"1996","unstructured":"Rappaport, T.: Wireless Communications: Principles and Practice. Prentice Hall Inc., New Jersey (1996)"},{"key":"41_CR12","doi-asserted-by":"crossref","unstructured":"Heinzelman, W.R., Chandrakasan, A.B., Krishnan, H.: An Application Specific Protocol Architecture for Wireless Micro Sensor Networks. IEEE Trans. on Wireless Communications, 660\u2013670 (2002)","DOI":"10.1109\/TWC.2002.804190"},{"issue":"27","key":"41_CR13","first-page":"2426","volume":"10","author":"J. Zhang","year":"2007","unstructured":"Zhang, J., Xu, L., Xu, D.W.: Secure Clustering Algorithm based on Trust Evaluation in Ad Hoc Network. Computer Application\u00a010(27), 2426\u20132429 (2007)","journal-title":"Computer Application"},{"issue":"12","key":"41_CR14","doi-asserted-by":"publisher","first-page":"1527","DOI":"10.1134\/S1064226911120059","volume":"5","author":"M.S. Levin","year":"2011","unstructured":"Levin, M.S., Zamkovoy, A.: A Multicriteria Steiner Tree with the Cost of Steiner Vertices. Journal of Communications Technology and Electronics\u00a05(12), 1527\u20131542 (2011)","journal-title":"Journal of Communications Technology and Electronics"}],"container-title":["IFIP Advances in Information and Communication Technology","Intelligent Information Processing VI"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-32891-6_41.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T08:19:42Z","timestamp":1620116382000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-32891-6_41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642328909","9783642328916"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-32891-6_41","relation":{},"ISSN":["1868-4238","1861-2288"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1861-2288"}],"subject":[],"published":{"date-parts":[[2012]]}}}