{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T22:52:10Z","timestamp":1725749530654},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642409240"},{"type":"electronic","value":"9783642409257"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40925-7_20","type":"book-chapter","created":{"date-parts":[[2013,9,19]],"date-time":"2013-09-19T15:54:58Z","timestamp":1379606098000},"page":"206-217","source":"Crossref","is-referenced-by-count":10,"title":["Study of Security Issues in Pervasive Environment of Next Generation Internet of Things"],"prefix":"10.1007","author":[{"given":"Tapalina","family":"Bhattasali","sequence":"first","affiliation":[]},{"given":"Rituparna","family":"Chaki","sequence":"additional","affiliation":[]},{"given":"Nabendu","family":"Chaki","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","unstructured":"Sundmaeker, H., Guillemin,\u00a0P., Friess, P.: Vision and Challenges for Realising the Internet of Things (2010) ISBN: 978-92-79-15088-3, doi:10.2759\/26127"},{"key":"20_CR2","unstructured":"Libelium Unveils the Top 50 Internet of Things Applications, \n                    \n                      http:\/\/www.itwire.com\/opinion-and-analysis\/beerfiles\/54432-libelium-unveils-the-top-50-internet-of-things-applications"},{"key":"20_CR3","unstructured":"Internet of Things in 2020: A roadmap for the future, Workshop report by EPoSS (European Technology Platform on Smart Systems Integration), \n                    \n                      http:\/\/www.iot-visitthefuture.eu\/fileadmin\/documents\/researchforeurope270808_IoT_in_2020_Workshop_Report_V1_1.pdf"},{"key":"20_CR4","unstructured":"Dash, S.K., Mohapatra, S., Pattnaik, P.K.: A Survey on Applications of Wireless Sensor Network Using Cloud Computing. International Journal of Computer Science & Emerging Technologies\u00a01(4) (December 2010) (E-ISSN: 2044-6004)"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"Ahmed, K., Gregory, M.: Integrating Wireless Sensor Networks with Cloud Computing. In: Proceedigs of the Seventh International Conference on Mobile Ad-hoc and Sensor Networks (2011)","DOI":"10.1109\/MSN.2011.86"},{"key":"20_CR6","unstructured":"The Internet of Things 2012 New Horizons, \n                    \n                      www.internet-of-things-research.eu"},{"key":"20_CR7","unstructured":"White Paper:\u00a0Smart Networked Objects\u00a0and\u00a0Internet of Things, \n                    \n                      http:\/\/www.iot-a.eu\/public\/news\/white-paper-smart-networked-objects-and-internet-of-things"},{"issue":"9","key":"20_CR8","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1109\/MC.2011.291","volume":"44","author":"R. Roman","year":"2011","unstructured":"Roman, R., Najera, P., Lopez, J.: Securing the Internet of Things. IEEE Computer\u00a044(9), 51\u201358 (2011)","journal-title":"IEEE Computer"},{"key":"20_CR9","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1007\/978-3-642-22540-6_27","volume-title":"Advances in Network Security and Applications","author":"T. Bhattasali","year":"2011","unstructured":"Bhattasali, T., Chaki, R.: A Survey of Recent Intrusion Detection Systems for Wireless Sensor Network. In: Wyld, D.C., Wozniak, M., Chaki, N., Meghanathan, N., Nagamalai, D. (eds.) CNSA 2011. CCIS, vol.\u00a0196, pp. 268\u2013280. Springer, Heidelberg (2011)"},{"issue":"2","key":"20_CR10","doi-asserted-by":"publisher","first-page":"17","DOI":"10.5121\/ijassn.2011.1202","volume":"1","author":"T. Bhattasali","year":"2011","unstructured":"Bhattasali, T., Chaki, R.: Lightweight Hierarchical Model for HWSNET. International Journal of Advanced Smart Sensor Network Systems (IJASSN)\u00a01(2), 17\u201332 (2011), doi:10.5121\/ijassn.2011.1202, ISSN: 2231-4482 [Online], 2231-5225 [Print]","journal-title":"International Journal of Advanced Smart Sensor Network Systems (IJASSN)"},{"issue":"15","key":"20_CR11","doi-asserted-by":"publisher","first-page":"19","DOI":"10.5120\/5056-7374","volume":"40","author":"T. Bhattasali","year":"2012","unstructured":"Bhattasali, T., Chaki, R., Sanyal, S.: Sleep Deprivation Attack Detection in Wireless Sensor Network. International Journal of Computer Applications\u00a040(15), 19\u201325 (2012), doi:10.5120\/5056-7374, ISBN: 978-93-80866-55-8","journal-title":"International Journal of Computer Applications"},{"key":"20_CR12","unstructured":"IPv6 and IPv4 Threat Comparison and Best Practice Evaluation, Cisco, \n                    \n                      www.cisco.com\/security_services\/ciag\/documents\/v6-v4-threats.pdf"},{"key":"20_CR13","unstructured":"Yuriyama, M., Kushida, T.: Sensor-Cloud Infrastructure. In: Proceedings of the 13th International Conference on Network- Based Information Systems (2010)"},{"key":"20_CR14","doi-asserted-by":"crossref","unstructured":"Kapadia, A., Kotz, D., Triandopoulos, N.: Opportunistic Sensing: Security Challenges for the New Paradigm. In: Proceedings of the First International Conference on Communication Systems and Networks (COMSNETS) (January 2009)","DOI":"10.1109\/COMSNETS.2009.4808850"},{"key":"20_CR15","doi-asserted-by":"crossref","unstructured":"Kapadia, A., Myvers, S., Wang, X., Fox, G.: Secure Cloud Computing with Brokered Trusted Sensor Networks. In: Proceedings of the International Symposium on Collaborative Technologies and Systems (CTS 2010) (May 2010)","DOI":"10.1109\/CTS.2010.5478459"},{"key":"20_CR16","unstructured":"Zhang, L., Zhao, K.: Study on Security of Next Generation Network, IEEE, Supported by Open Fund from Resources and Environment Management Lab (2008)"},{"key":"20_CR17","unstructured":"Sethi, M.: Security in Smart object Networks (2012), \n                    \n                      nordsecmob.aalto.fi\/en\/publications\/theses_2012\/sethi-mohit_thesis.pdf"},{"key":"20_CR18","unstructured":"Zhou, S., Xie, Z.: On Cryptographic Approaches to Internet-of-Things Security, \n                    \n                      www.lix.polytechnique.fr\/hipercom\/...\/papers\/ZhouSujing.pdf"},{"key":"20_CR19","unstructured":"Cirani, S., Ferrari, G., Veltri, L.: Enforcing Security Mechanisms in the IP-Based Internet of Things: An Algorithmic Overview (2013), \n                    \n                      http:\/\/www.mdpi.com\/1999-4893\/6\/2\/197"},{"key":"20_CR20","doi-asserted-by":"crossref","unstructured":"Amin, S.O., Siddiqui, M.S., Hong, C.S., Choe, J.: A Novel Coding Scheme to Implement Signature Based IDS in IP Based Sensor Networks. In: Conference Proceedings of International Symposium on Integrated Network Management Workshops (IM 2009), New York (2009) ISBN: 978-1-4244-3923-2","DOI":"10.1109\/INMW.2009.5195973"},{"key":"20_CR21","unstructured":"Amin, S.O., Yoon, Y.J., Siddiqui, M.S., Hong, C.S.: A Novel Intrusion Detection Framework for IP Based Sensor Networks. In: Conference Proceedings of International Conference on Information Networking, Chiang Mai (2009) ISBN: 978-89-960761-3-1"},{"key":"20_CR22","unstructured":"Fu, R., Zheng, K., Zhang, D., Yang, Y.: An Intrusion Detection Scheme Based on Anomaly Mining in Internet of Things. In: Conference Proceedings of the 4th International Conference on Wireless, Mobile and Multimedia Networks (ICWMMN 2011), China (2011)"},{"key":"20_CR23","unstructured":"Liu, C., Yang, J., Zhang, Y., Chen, R., Zeng, J.: Research on Immunity-based Intrusion Detection Technology for the Internet of Things. In: Conference Proceedings of the Seventh International Conference on Natural Computation (ICNC), Shanghai (2011) ISBN: 978-1-4244-9950-2"},{"key":"20_CR24","unstructured":"Dash, B.: Security in Pervasive Computing (2006), \n                    \n                      web.cs.wpi.edu\/~kven\/papers\/Sec_Pervasive_Healthcare.pdf"},{"key":"20_CR25","unstructured":"Varshney, U: Pervasive Healthcare and Wireless Health Monitoring (2007), \n                    \n                      www.cens.ucla.edu\/~mhr\/cs219\/varshney07.pdf"}],"container-title":["Lecture Notes in Computer Science","Computer Information Systems and Industrial Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40925-7_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,17]],"date-time":"2019-05-17T11:33:42Z","timestamp":1558092822000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40925-7_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642409240","9783642409257"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40925-7_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}