{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T12:51:42Z","timestamp":1648990302095},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2011,4,2]],"date-time":"2011-04-02T00:00:00Z","timestamp":1301702400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Inf Syst E-Bus Manage"],"published-print":{"date-parts":[[2012,12]]},"DOI":"10.1007\/s10257-011-0176-2","type":"journal-article","created":{"date-parts":[[2011,4,1]],"date-time":"2011-04-01T16:07:07Z","timestamp":1301674027000},"page":"521-548","source":"Crossref","is-referenced-by-count":6,"title":["Management and security of remote sensor networks in hazardous environments using over the air programming"],"prefix":"10.1007","volume":"10","author":[{"given":"Rashmi","family":"Parthasarathy","sequence":"first","affiliation":[]},{"given":"Behrooz A.","family":"Shirazi","sequence":"additional","affiliation":[]},{"given":"Nina","family":"Peterson","sequence":"additional","affiliation":[]},{"given":"Wen-Zhan","family":"Song","sequence":"additional","affiliation":[]},{"given":"Ali","family":"Hurson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,4,2]]},"reference":[{"key":"176_CR2","unstructured":"Crossbow (2003) Tmote-Sky. Crossbow technology, http:\/\/www.cs.uvm.edu\/~crobinso\/mote\/tmote-sky-datasheet-102.pdf"},{"key":"176_CR3","unstructured":"CrossBow (2007) iMote2. (Crossbow, http:\/\/www.xbow.com\/Products\/Product_pdf_files\/Wireless_pdf\/Imote2_Datasheet.pdf"},{"key":"176_CR4","unstructured":"Culler D, Hui JW (2004) The dynamic behavior of a data dissemination protocol for network programming at scale. Proceedings ACM SenSystems"},{"key":"176_CR5","unstructured":"Culler D, Levis P (2004) The firecracker protocol. Leuven, Belgium: Proceedings of 11th ACM SIGOPS, Sept. 2004"},{"key":"176_CR6","doi-asserted-by":"crossref","unstructured":"Das ML, Joshi A (2008) Dynamic program update in wireless sensor networks using orthogonality principle. Commun Lett IEEE 12(6):471\u2013473","DOI":"10.1109\/LCOMM.2008.080213"},{"key":"176_CR8","doi-asserted-by":"crossref","unstructured":"Deng J, Han R, Mishra S (2006) Secure code distribution in dynamically programmable wireless sensor networks. Proceedings of the fifth international conference on Information processing in sensor networks. pp 292\u2013300","DOI":"10.1145\/1127777.1127822"},{"key":"176_CR9","doi-asserted-by":"crossref","unstructured":"Dutta PK, Hui JW, Chu DC, Culler DE (2006) Securing the Deluge network programming system. IPSN \u201806: Proceedings of the fifth international conference on Information processing in sensor networks. pp 326\u2013333","DOI":"10.1145\/1127777.1127826"},{"key":"176_CR10","doi-asserted-by":"crossref","unstructured":"Hagedorn A, Starobinski D, Trachtenberg A (2008) Rateless Deluge: over-the-air programming of wireless sensor networks using random linear codes. IPSN, 2008","DOI":"10.1109\/IPSN.2008.9"},{"key":"176_CR11","doi-asserted-by":"crossref","unstructured":"Karlof C, Sastry N, Wagner D (2004) TinySec: a link layer security architecture for wireless sensor networks. Proceedings of the 2nd international conference on Embedded networked sensor systems. pp 162\u2013175","DOI":"10.1145\/1031495.1031515"},{"key":"176_CR12","unstructured":"Kaufman C, Perlman R, Speciner M (2002) Network security: private communication in a public world"},{"key":"176_CR13","doi-asserted-by":"crossref","unstructured":"Kulkarni SS, Wang L (2005) MNP: multihop network reprogramming service for sensor networks. Proceedings IEEE ICDCS","DOI":"10.1109\/ICDCS.2005.50"},{"key":"176_CR14","doi-asserted-by":"crossref","unstructured":"Lanigan PE, Gandhi R, Narasimhan P (2006) Sluice: secure dissemination of code updates in sensor networks. 26th IEEE international conference on distributed computing systems (ICDCS 2006). pp 53\u201362","DOI":"10.1109\/ICDCS.2006.77"},{"key":"176_CR1","unstructured":"Levis P, Patel N, Shenker S, Culler D (2004) Trickle: a self-regulating algorithm for code propagation and maintenance in wireless sensor networks. Proceedings 1st symposium. Networked systems design and implementation"},{"key":"176_CR15","unstructured":"Liu An, Ning P (2008) TinyECC: a configurable library for elliptic curve cryptography in wireless sensor networks. Seventh international conference on information processing in sensor networks. pp 245\u2013256"},{"key":"176_CR16","doi-asserted-by":"crossref","unstructured":"Luk M, Mezzour G, Perrig A, Gligor V (2007) MiniSec: a secure sensor network communication architecture. Proceedings of the 6th international conference on Information processing in sensor networks. pp 479\u2013488","DOI":"10.1145\/1236360.1236421"},{"key":"176_CR17","unstructured":"Mote In-Network Programming User Reference (2003) http:\/\/www.tinyos.net\/tinyos-1.x\/doc\/Xnp.pdf . 2003. 8"},{"key":"176_CR18","doi-asserted-by":"crossref","unstructured":"Naik V, Arora A, Sinha P, Zhang H (2005) Sprinkler: a reliable and energy efficient data dissemination service for wireless embedded devices. 26th IEEE real-time systems symposum. Dec 2005","DOI":"10.1109\/RTSS.2005.37"},{"key":"176_CR19","unstructured":"Pao, Lau KS, Derek (2006) Tree-based versus gossip-based reliable multicast in wireless Ad hoc networks. IEEE CCNC 2006 proceedings"},{"key":"176_CR20","doi-asserted-by":"crossref","unstructured":"Parthasarathy R, Pererson N, Song WZ, Hurson AR, Shirazi BA (2010) Over the air programming on Imote2-based sensor networks. HICSS 43. Hawai\u2019i","DOI":"10.1109\/HICSS.2010.300"},{"key":"176_CR21","doi-asserted-by":"crossref","unstructured":"Perrig A, Szewczyk R, Wen V, Culler D, Tygar JD (2001) SPINS: security protocols for sensor networks. Proceedings of the 7th annual international conference on mobile computing and networking. pp 189\u2013199","DOI":"10.1145\/381677.381696"},{"key":"176_CR22","unstructured":"Peterson N, Anusuya-Rangappa L, Shirazi B, Huang R, Song W-Z, Miceli M, Mcbride D, Hurson A, LaHusen R (2009) TinyOS-based QoS management in wireless sensor networks. Hawaii international conference on system sciences (HICSS)"},{"key":"176_CR23","unstructured":"Phillips LA (2005) Aqueduct: robust and efficient code propagation in heterogeneous wireless sensor networks. Master\u2019s thesis, Univ. CO"},{"key":"176_CR24","volume-title":"Applied cryptography","author":"B Schneier","year":"1996","unstructured":"Schneier B (1996) Applied cryptography. Wiley, NY"},{"key":"176_CR25","unstructured":"Sokjoon L, Kim H, Chung K (2006) Hash-based secure sensor network programming method without public key cryptography. Proceedings of the workshop on world-sensor-web at international conference on embedded networked sensor systems"},{"key":"176_CR26","doi-asserted-by":"crossref","unstructured":"Song WZ, Shirazi B, Kedar S, Chien S, Webb F, Tran D, Davis A, Pieri D, LaHusen R, Pallister J (2008) Optimized autonomous space in situ sensor-web for volcano monitoring. IEEE aerospace conference","DOI":"10.1109\/AERO.2008.4526457"},{"key":"176_CR27","doi-asserted-by":"crossref","unstructured":"Song W-Z, Huang R, Shirazi B, LaHusen R (2009) TreeMAC: localized TDMA MAC protocol for high-throughput and fairness in sensor networks. Seventh annual IEEE international conference on pervasive computing and communications (PERCOM)","DOI":"10.1109\/PERCOM.2009.4912757"},{"key":"176_CR28","volume-title":"Classical and contemporary cryptology","author":"RJ Spillman","year":"2005","unstructured":"Spillman RJ (2005) Classical and contemporary cryptology. Prentice Hall, NJ"},{"key":"176_CR29","unstructured":"Stallings W (2006) Cryptography and network security: principles and practice. Pearson Edition"},{"key":"176_CR30","doi-asserted-by":"crossref","unstructured":"Stathopoulos T, Heidemann J, Estrin D (2003) A remote code update mechanism for wireless sensor networks. Tech. Rep. CENS-TR-30, UCLA: Center for Embedded Networked Computing, Nov. 2003","DOI":"10.21236\/ADA482630"},{"key":"176_CR31","unstructured":"Steven DG, Welsh M, Von Behren R, Brewer EA, Culler D, Borisov N, Czerwinski S, Gummadi R, Hill J, Joseph A, Katz RH, Mao ZM, Ross S, Zhao B (2001) The Ninja architecture for robust internet-scale systems and services. Comput Netw Int J Comput Telecommun Netw 473\u2013497"},{"key":"176_CR32","doi-asserted-by":"crossref","unstructured":"Tan H, Ostry D, Zic J, Jha S (2009) A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks. ACM, New York","DOI":"10.1145\/1514274.1514308"},{"key":"176_CR33","doi-asserted-by":"crossref","unstructured":"Ugus O, Westhoff D, Bohli J-M (2009) A ROM-friendly secure code update mechanism for WSNs using a stateful-verifier T -time signature scheme. Proceedings of the second ACM conference on wireless network security. pp 29\u201340","DOI":"10.1145\/1514274.1514279"},{"key":"176_CR34","doi-asserted-by":"crossref","unstructured":"Van Renesse R, Birman KP, Vogels W (2003) Astrolabe: a robust and scalable technology for distributed system monitoring, management, and data mining. ACM transactions on computer systems (TOCS). pp 164\u2013206","DOI":"10.1145\/762483.762485"},{"key":"176_CR35","doi-asserted-by":"crossref","unstructured":"Watro RJ, Kong D, Cuti S-F, Gardiner C, Lynn C, Kruus P (2004) TinyPK: securing sensor networks with public key technology. 2nd ACM workshop on security of Ad hoc and sensor networks. Washington DC. pp 59\u201364","DOI":"10.1145\/1029102.1029113"},{"key":"176_CR36","unstructured":"Wiki (2007) SensorWeb. http:\/\/sensorweb.vancouver.wsu.edu\/people.html"},{"key":"176_CR37","unstructured":"WSU (2007) Optimized autonomous space in situ Sensorweb, https:\/\/sensorweb.vancouver.wsu.edu\/wiki\/index.php\/Main_Page"}],"container-title":["Information Systems and e-Business Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10257-011-0176-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10257-011-0176-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10257-011-0176-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,9]],"date-time":"2019-06-09T12:17:33Z","timestamp":1560082653000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10257-011-0176-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,4,2]]},"references-count":36,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2012,12]]}},"alternative-id":["176"],"URL":"https:\/\/doi.org\/10.1007\/s10257-011-0176-2","relation":{},"ISSN":["1617-9846","1617-9854"],"issn-type":[{"value":"1617-9846","type":"print"},{"value":"1617-9854","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,4,2]]}}}