{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T13:21:59Z","timestamp":1725456119353},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642356056"},{"type":"electronic","value":"9783642356063"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-35606-3_70","type":"book-chapter","created":{"date-parts":[[2012,12,7]],"date-time":"2012-12-07T00:40:17Z","timestamp":1354840817000},"page":"589-598","source":"Crossref","is-referenced-by-count":0,"title":["Energy-Efficiency Protocol for Securing the Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Luu Hoang","family":"Long","sequence":"first","affiliation":[]},{"given":"Eunmi","family":"Choi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"70_CR1","doi-asserted-by":"crossref","unstructured":"Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: SPINS: Security Protocols for Sensor Networks. In: The Seventh Annual International Conference on Mobile Computing and Networking (MobiCom 2001), (2001)","DOI":"10.1145\/381677.381696"},{"key":"70_CR2","doi-asserted-by":"crossref","unstructured":"Karlof, C., Sastry, N., Wagner, D.: TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. In: ACM SenSys 2004, November 3-5 (2004)","DOI":"10.1145\/1031495.1031515"},{"key":"70_CR3","doi-asserted-by":"crossref","unstructured":"Zhu, S., Setia, S., Jajodia, S.: LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. In: The Proceedings of the 10th ACM Conference on Computer and Communications Security (2003)","DOI":"10.1145\/948109.948120"},{"key":"70_CR4","unstructured":"Saraogi, M.: Security in Wireless Sensor Networks. In: ACM SenSys 2004 (2004)"},{"key":"70_CR5","doi-asserted-by":"crossref","unstructured":"Casado, L., Tsigas, P.: ContikiSec: A Secure Network Layer for Wireless Sensor Networks under the Contiki Operating System. Identity and Privacy in the Internet Age, September 30 (2009)","DOI":"10.1007\/978-3-642-04766-4_10"},{"issue":"1","key":"70_CR6","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1145\/1138127.1138130","volume":"2","author":"Y.W. Law","year":"2006","unstructured":"Law, Y.W., Doumen, J., Hartel, P.: Survey and Benchmark of Block Ciphers forWireless Sensor Networks. ACM Transactions on Sensor Networks (TOSN)\u00a02(1), 65\u201393 (2006)","journal-title":"ACM Transactions on Sensor Networks (TOSN)"},{"key":"70_CR7","doi-asserted-by":"crossref","unstructured":"Wang, S., Liu, K.Z., Hu, F.P.: Simulation of Wireless Sensor Networks Localization with OMNeT. In: 2005 2nd International Conference on Mobile Technology, Applications and Systems, November 15-17, pp. 1\u20136 (2005)","DOI":"10.1109\/MTAS.2005.207141"},{"key":"70_CR8","unstructured":"Rivest, R.L., Robshaw, M.J.B., Sidney, R., Yin, Y.L.: The RC6 Block Cipher. AES submission (June 1998)"},{"key":"70_CR9","unstructured":"Perrig, A., Canetti, R., Song, D., Tygar, J.D.: Efficient and secure source authentication for multicast. In: Network and Distributed System Security Symposium, NDSS 2001 (February 2001)"},{"issue":"3","key":"70_CR10","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1006\/jcss.1999.1694","volume":"61","author":"M. Bellare","year":"2000","unstructured":"Bellare, M., Kilian, J., Rogaway, P.: The security of the cipher blocks chaining message authentication code. Journal of Computer and System Sciences\u00a061(3), 362\u2013399 (2000)","journal-title":"Journal of Computer and System Sciences"},{"key":"70_CR11","unstructured":"Carman, D.W., Kruus, P.S., Matt, B.J.: Constraints and approaches for distributed sensor network security, NAI Labs Technical Report No. 00010 (2002)"},{"key":"70_CR12","doi-asserted-by":"crossref","unstructured":"Rivest, R.L.: The RC5 encryption algorithm. In: Workshop on Fast Software Encryption, pp. 86\u201396 (1995)","DOI":"10.1007\/3-540-60590-8_7"},{"key":"70_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1007\/10720107_24","volume-title":"Security Protocols","author":"F. Stajano","year":"2000","unstructured":"Stajano, F., Anderson, R.: The Resurrecting Duckling: Security Issues for Ad-Hoc Wireless Networks. In: Malcolm, J.A., Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols 1999. LNCS, vol.\u00a01796, pp. 172\u2013182. Springer, Heidelberg (2000)"},{"key":"70_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/3-540-45748-8_24","volume-title":"Peer-to-Peer Systems","author":"J.R. Douceur","year":"2002","unstructured":"Douceur, J.R.: The Sybil Attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol.\u00a02429, pp. 251\u2013260. Springer, Heidelberg (2002)"},{"key":"70_CR15","unstructured":"Karlof, C., Wagner, D.: Secure Routing in Sensor Networks: Attacks and Counter measures. To appear in Proc. of First IEEE Workshop on Sensor Network Protocols and Applications (May 2003)"}],"container-title":["Lecture Notes in Computer Science","Network and Parallel Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-35606-3_70.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T13:20:38Z","timestamp":1620134438000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-35606-3_70"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642356056","9783642356063"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-35606-3_70","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}