{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T01:00:45Z","timestamp":1743037245480,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":12,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811506369"},{"type":"electronic","value":"9789811506376"}],"license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-0637-6_21","type":"book-chapter","created":{"date-parts":[[2019,12,2]],"date-time":"2019-12-02T12:09:32Z","timestamp":1575288572000},"page":"259-269","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Game Theory for Wireless Sensor Network Security"],"prefix":"10.1007","author":[{"given":"Hanane","family":"Saidi","sequence":"first","affiliation":[]},{"given":"Driss","family":"Gretete","sequence":"additional","affiliation":[]},{"given":"Adnane","family":"Addaim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,12,1]]},"reference":[{"key":"21_CR1","doi-asserted-by":"crossref","unstructured":"M. Elappila, S. Chinara, D.R. Parhi, Survivable path routing in WSN for IoT applications. Pervasive Mob. Comput. (2017)","DOI":"10.1016\/j.pmcj.2017.11.004"},{"key":"21_CR2","unstructured":"P. Spachos, L. Song, D. Hatzinakos, Comparison of traditional and opportunistic multihop routing in wireless networking scalability, vol. 1, pp. 182\u2013185 (2012)"},{"key":"21_CR3","unstructured":"E. Efficiency, K. Zeng, Opportunistic routing in multihop wireless networks (2008)"},{"issue":"3","key":"21_CR4","first-page":"148","volume":"10","author":"AA Abins","year":"2015","unstructured":"A.A. Abins, N. Duraipandian, A survey on opportunistic routing protocols in wireless networks. Proc. Comput. Sci. 10(3), 148\u2013153 (2015)","journal-title":"Proc. Comput. Sci."},{"key":"21_CR5","unstructured":"Y. Xu, P. Scerri, M. Lewis, K. Sycara, Token-based approach for scalable team coordination"},{"issue":"12","key":"21_CR6","doi-asserted-by":"publisher","first-page":"1622","DOI":"10.1109\/TMC.2009.82","volume":"8","author":"E Rozner","year":"2009","unstructured":"E. Rozner, J. Seshadri, Y. Mehta, L. Qiu, SOAR: Simple opportunistic adaptive routing protocol for wireless mesh networks. IEEE Trans. Mob. Comput. 8(12), 1622\u20131635 (2009)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"21_CR7","doi-asserted-by":"crossref","unstructured":"F.A. Aoudia, M. Gautier, O. Berder, OPWUM\u202f: opportunistic MAC protocol leveraging wake-up receivers in WSNs, vol. 2016 (2016)","DOI":"10.1155\/2016\/6263719"},{"key":"21_CR8","doi-asserted-by":"crossref","unstructured":"G. Hosseinabadi, N. Vaidya, Token-DCF: an opportunistic MAC protocol for wireless networks (2012)","DOI":"10.1109\/COMSNETS.2013.6465559"},{"key":"21_CR9","unstructured":"F. Wu, K. Gong, T. Zhang, G. Chen, COMO: A game-theoretic approach for joint multirate opportunistic routing and forwarding in non-cooperative wireless networks, vol. 1276, pp. 1\u201312 (2014)"},{"key":"21_CR10","doi-asserted-by":"crossref","unstructured":"A. Chhabra, V. Vashishth, D.K. Sharma, A game theory based secure model against black hole attacks in opportunistic networks (2017)","DOI":"10.1109\/CISS.2017.7926114"},{"key":"21_CR11","doi-asserted-by":"crossref","unstructured":"J. Newsome, D. Song, A. Perrig, The sybil attack in sensor networks: analysis & defenses (2004)","DOI":"10.1145\/984622.984660"},{"key":"21_CR12","doi-asserted-by":"crossref","unstructured":"K. Zhang, R. Wang, D. Qian, AIM: An auction incentive mechanism in wireless networks with opportunistic routing (2010)","DOI":"10.1109\/CSE.2010.13"}],"container-title":["Advances in Intelligent Systems and Computing","Fourth International Congress on Information and Communication Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-0637-6_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,3]],"date-time":"2020-04-03T05:06:29Z","timestamp":1585890389000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-0637-6_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,1]]},"ISBN":["9789811506369","9789811506376"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-0637-6_21","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,12,1]]},"assertion":[{"value":"1 December 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}