{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T16:51:57Z","timestamp":1767372717257},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"S2","license":[{"start":{"date-parts":[[2018,3,15]],"date-time":"2018-03-15T00:00:00Z","timestamp":1521072000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2019,3]]},"DOI":"10.1007\/s10586-018-2147-6","type":"journal-article","created":{"date-parts":[[2018,3,15]],"date-time":"2018-03-15T10:50:48Z","timestamp":1521111048000},"page":"3301-3311","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Design and implementation of an efficient attack resilient computation algorithm in WSN nodes"],"prefix":"10.1007","volume":"22","author":[{"given":"A.","family":"Saravanaselvan","sequence":"first","affiliation":[]},{"given":"B.","family":"Paramasivan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,3,15]]},"reference":[{"issue":"5","key":"2147_CR1","doi-asserted-by":"crossref","first-page":"2801","DOI":"10.1109\/JSEN.2014.2380816","volume":"15","author":"K Biswas","year":"2015","unstructured":"Biswas, K., Muthukkumarasamy, V., Singh, K.: An encryption scheme using chaotic map and genetic operations for wireless sensor networks. IEEE Sens. J. 15(5), 2801\u20132809 (2015)","journal-title":"IEEE Sens. J."},{"key":"2147_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2015.11.001","author":"M Elhoseny","year":"2015","unstructured":"Elhoseny, M., et al.: A secure data routing schema for WSN using elliptic curve cryptography and homomorphic encryption. J. King Saud Univ.-Comput. Inf. Sci. (2015). \n                    https:\/\/doi.org\/10.1016\/j.jksuci.2015.11.001","journal-title":"J. King Saud Univ.-Comput. Inf. Sci."},{"issue":"9","key":"2147_CR3","doi-asserted-by":"crossref","first-page":"4647","DOI":"10.1109\/TWC.2013.072313.121949","volume":"12","author":"B Li","year":"2013","unstructured":"Li, B., Li, H., Wang, W., Yin, Q., Liu, H.: Performance analysis and optimization for energy-efficient cooperative transmission in random wireless sensor network. IEEE Trans. Wirel. Commun. 12(9), 4647\u20134657 (2013)","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"4","key":"2147_CR4","doi-asserted-by":"crossref","first-page":"422","DOI":"10.1109\/JCN.2013.000073","volume":"15","author":"S Ganesh","year":"2013","unstructured":"Ganesh, S., Amutha, R.: Efficient and secure routing protocol for wireless sensor networks through snr based dynamic clustering mechanisms. J. Commun. Netw. 15(4), 422\u2013429 (2013)","journal-title":"J. Commun. Netw."},{"issue":"3","key":"2147_CR5","doi-asserted-by":"crossref","first-page":"750","DOI":"10.1109\/TPDS.2013.43","volume":"25","author":"L Huang","year":"2014","unstructured":"Huang, L., Jie, L., Guizani, M.: Secure and efficient data transmission for cluster-based wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 25(3), 750\u2013761 (2014)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"1","key":"2147_CR6","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1007\/BF02828633","volume":"10","author":"W Xiao","year":"2005","unstructured":"Xiao, W., Li, Y., Ke, C.: SLEACH secure lowenergy adaptive clustering hierarchy protocol for wireless sensor networks. Wuhan Univ. J. Nat. Sci. 10(1), 127\u2013131 (2005)","journal-title":"Wuhan Univ. J. Nat. Sci."},{"issue":"4","key":"2147_CR7","doi-asserted-by":"crossref","first-page":"6701","DOI":"10.3390\/s140406701","volume":"14","author":"Q Zhou","year":"2014","unstructured":"Zhou, Q., Yang, G., He, L.: A secure enhanced data aggregation based on ecc in wireless sensor network. Sens. J. 14(4), 6701\u20136721 (2014)","journal-title":"Sens. J."},{"issue":"7","key":"2147_CR8","doi-asserted-by":"crossref","first-page":"1073","DOI":"10.1016\/j.adhoc.2006.05.004","volume":"5","author":"J Girao","year":"2007","unstructured":"Girao, J., Westhoff, D., Mykletun, E., Araki, T.: TinyPEDS tiny persistent encrypted data storage in asynchronous wireless sensor networks. Ad Hoc Netw. 5(7), 1073\u20131089 (2007)","journal-title":"Ad Hoc Netw."},{"key":"2147_CR9","unstructured":"https:\/\/en.wikipedia.org\/wiki\/List_of_states_and_union_territories_of_India_by_population"},{"key":"2147_CR10","unstructured":"https:\/\/en.wikipedia.org\/wiki\/List_of_districts_in_Tamil_Nadu"},{"key":"2147_CR11","unstructured":"https:\/\/en.wikipedia.org\/wiki\/Mobile_network_operators_of_India"},{"issue":"2","key":"2147_CR12","first-page":"317","volume":"8","author":"RH Rahman","year":"2013","unstructured":"Rahman, R.H., Benson, C.R., Jiang, F., Frater, M.R.: LOARP: a low overhead routing protocol for underwater acoustic sensor networks. J. Netw. 8(2), 317\u2013330 (2013)","journal-title":"J. Netw."},{"issue":"1","key":"2147_CR13","first-page":"4","volume":"1","author":"HC Chaudhari","year":"2011","unstructured":"Chaudhari, H.C., Kadam, L.U.: Wireless sensor networks: security, attacks and challenges. Int. J. Netw. 1(1), 4\u201316 (2011)","journal-title":"Int. J. Netw."},{"key":"2147_CR14","doi-asserted-by":"crossref","first-page":"1246","DOI":"10.1109\/TSMCC.2007.905824","volume":"37","author":"R Brooks","year":"2007","unstructured":"Brooks, R., Govindaraju, P.Y., Pirretti, M., Vijaykrishnan, N., Kandemir, M.T.: Detection of clones in sensor networks using random key predistribution. IEEE Trans. Syst. Man Cybern. 37, 1246\u20131258 (2007)","journal-title":"IEEE Trans. Syst. Man Cybern."},{"key":"2147_CR15","unstructured":"Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Proceedings on IEEE Symposium on Security and Privacy, IEEE Xplore Press, pp. 197\u2013213 (2003)"},{"issue":"5","key":"2147_CR16","doi-asserted-by":"crossref","first-page":"685","DOI":"10.1109\/TDSC.2010.25","volume":"8","author":"M Conti","year":"2011","unstructured":"Conti, M., Di Pietro, R., Mancini, L., Mei, A.: Distributed detection of clone attacks in wireless sensor networks. IEEE Trans. Dependable Secur. Comput. 8(5), 685\u2013698 (2011)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"2147_CR17","doi-asserted-by":"crossref","unstructured":"Zhu, B., Addada, V.G.K., Setia, S., Jajodia, S., Roy, S.: Efficient distributed detection of node replication attacks in sensor networks. In: Proceedings of Computer security applications, IEEE Xplore Press, pp. 257\u2013267 (2007)","DOI":"10.1109\/ACSAC.2007.26"},{"issue":"2015","key":"2147_CR18","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1016\/j.adhoc.2015.01.002","volume":"32","author":"ORM Boudia","year":"2015","unstructured":"Boudia, O.R.M., Senouci, S.M., Feham, M.: A novel secure aggregation scheme for wireless sensor networks using stateful public key cryptography. Ad Hoc Netw. 32(2015), 98\u2013113 (2015)","journal-title":"Ad Hoc Netw."},{"key":"2147_CR19","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1016\/j.dam.2015.06.022","volume":"198","author":"D Fern\u00e1ndez-Duque","year":"2016","unstructured":"Fern\u00e1ndez-Duque, D., Goranko, V.: Secure aggregation of distributed information: how a team of agents can safely share secrets in front of a spy. Discret. Appl. Math. 198, 118\u2013135 (2016)","journal-title":"Discret. Appl. Math."},{"issue":"2014","key":"2147_CR20","first-page":"108","volume":"37","author":"L Hongjuan","year":"2014","unstructured":"Hongjuan, L., Keqiu, L., Wenyu, Q., Ivan, S.: Secure and energy-efficient data aggregation with malicious aggregator identification in wireless sensor network. Future Gener. Comput. Syst. 37(2014), 108\u2013116 (2014)","journal-title":"Future Gener. Comput. Syst."},{"issue":"2011","key":"2147_CR21","doi-asserted-by":"crossref","first-page":"3308","DOI":"10.1016\/j.ins.2011.04.002","volume":"181","author":"L Wang","year":"2011","unstructured":"Wang, L., Wang, L., Pan, Y., Zhang, Z., Yang, Y.: Discrete logarithm based additively homomorphic encryption and secure data aggregation. Inf. Sci. 181(2011), 3308\u20133322 (2011)","journal-title":"Inf. Sci."},{"key":"2147_CR22","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2316816","author":"M Rezvani","year":"2013","unstructured":"Rezvani, M., Ignjatovic, A., Jha, S.: Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks. IEEE Trans. Dependable Secur. Comput. (2013). \n                    https:\/\/doi.org\/10.1109\/TDSC.2014.2316816","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"2147_CR23","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-017-1571-3","author":"SS Ilango","year":"2018","unstructured":"Ilango, S.S., Vimal, S., Kaliappan, M., et al.: Optimization using artificial bee colony based clustering approach for big data. Clust. Comput. (2018). \n                    https:\/\/doi.org\/10.1007\/s10586-017-1571-3","journal-title":"Clust. Comput."},{"key":"2147_CR24","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-018-1851-6","author":"RK Abirami","year":"2018","unstructured":"Abirami, R.K., Sumithra, M.G.: Evaluation of neighbor credit value based AODV routing algorithms for selfish node behavior detection. Clust. Comput. (2018). \n                    https:\/\/doi.org\/10.1007\/s10586-018-1851-6","journal-title":"Clust. Comput."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-018-2147-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-018-2147-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-018-2147-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,25]],"date-time":"2019-10-25T17:51:15Z","timestamp":1572025875000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-018-2147-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3,15]]},"references-count":24,"journal-issue":{"issue":"S2","published-print":{"date-parts":[[2019,3]]}},"alternative-id":["2147"],"URL":"https:\/\/doi.org\/10.1007\/s10586-018-2147-6","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,3,15]]},"assertion":[{"value":"26 December 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 February 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 February 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 March 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}