{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,10]],"date-time":"2025-11-10T13:41:13Z","timestamp":1762782073312,"version":"3.41.0"},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2017,5,26]],"date-time":"2017-05-26T00:00:00Z","timestamp":1495756800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1007\/s10916-017-0743-2","type":"journal-article","created":{"date-parts":[[2017,5,26]],"date-time":"2017-05-26T03:43:14Z","timestamp":1495770194000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Secure Data Aggregation in Wireless Sensor Network-Fujisaki Okamoto(FO) Authentication Scheme against Sybil Attack"],"prefix":"10.1007","volume":"41","author":[{"given":"K.","family":"Nirmal Raja","sequence":"first","affiliation":[]},{"given":"M.","family":"Maraline Beno","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,26]]},"reference":[{"key":"743_CR1","doi-asserted-by":"crossref","unstructured":"Racherla, G., Wireless sensor networks (WSNs). In: Encyclopedia of Wireless and Mobile Communications, pp 1487\u20131494, 2008.","DOI":"10.1201\/NOE1420043266.ch163"},{"issue":"11","key":"743_CR2","doi-asserted-by":"crossref","first-page":"3622","DOI":"10.1109\/TIE.2009.2036033","volume":"57","author":"W Granzer","year":"2010","unstructured":"Granzer, W., Praus, F., and Kastner, W., Security in building automation systems. IEEE Transactions on industrial Electronics. 57(11):3622\u20133640, 2010.","journal-title":"IEEE Transactions on industrial Electronics"},{"key":"743_CR3","doi-asserted-by":"crossref","unstructured":"Du, X., and Chen, H. H., Security in wireless sensor networks. IEEE Wirel. Commun. :60\u201366, 2008.","DOI":"10.1109\/MWC.2008.4599222"},{"key":"743_CR4","unstructured":"Badache, N., and Khelladi, L., Wireless sensor networks (WSNs): Security. In: Encyclopedia of Wireless and Mobile Communications, pp 1554\u20131562, 2008."},{"key":"743_CR5","doi-asserted-by":"crossref","unstructured":"Zhou, Y, Fang, Y., and Zhang, Y., Securing wireless sensor networks: a survey. IEEE Commun. Surv. :6\u201328, 2008.","DOI":"10.1109\/COMST.2008.4625802"},{"key":"743_CR6","doi-asserted-by":"crossref","unstructured":"Raymond, D. R., and Midkiff S. F., Denial of service in wireless sensor networks-attacks and defenses. IEEE CS :74\u201381, 2008.","DOI":"10.1109\/MPRV.2008.6"},{"key":"743_CR7","doi-asserted-by":"crossref","unstructured":"Pathan, A. S. K., Lee, H. W., and Hong, C. S., Security in wireless sensor networks: Issues and challenges. Icact :1043\u20131048, 2006.","DOI":"10.1109\/ICACT.2006.206151"},{"key":"743_CR8","unstructured":"Martins, D., and Guyennet, H., Wireless sensor network attacks and security mechanisms: A short survey. In: 2010 13th International Conference on Network-Based Information Systems, pp 313\u2013320, 2010"},{"key":"743_CR9","doi-asserted-by":"crossref","unstructured":"Shu, T., Krunz, M., and Liu, S., Secure data collection in wireless sensor networks using randomized dispersive routes. IEEE Trans. Mob. Comput. :941\u2013954, 2010.","DOI":"10.1109\/TMC.2010.36"},{"key":"743_CR10","doi-asserted-by":"crossref","unstructured":"Lasheng, Y., Jie, L., and Renjie, L., An effective data collection algorithm for wireless sensor network. Computing, 2012.","DOI":"10.1007\/s00607-012-0249-1"},{"key":"743_CR11","doi-asserted-by":"crossref","unstructured":"Gnana Kousalya, C., and Anandha Mala, G. S., Secure and energy-efficient traffic-aware key management scheme for wireless sensor network. Int. J. Wireless Inf. Networks :112\u2013121, 2011.","DOI":"10.1007\/s10776-011-0169-6"},{"key":"743_CR12","unstructured":"Amara, S. O., Beghdad, R., and Oussalah, M., Securing wireless sensor networks: A survey. EDPACS :6\u201328, 2013."},{"key":"743_CR13","doi-asserted-by":"crossref","unstructured":"Prasad, N. R., and Alam, M., Security framework for wireless sensor networks. Wirel Pers Commun :455\u2013469, 2006.","DOI":"10.1007\/s11277-006-9044-7"},{"key":"743_CR14","doi-asserted-by":"crossref","unstructured":"Yua, B., Xua, C. Z., and Xiao, B., Detecting Sybil attacks in VANETs. J. Parallel Distrib. Comput. :746\u2013756, 2013.","DOI":"10.1016\/j.jpdc.2013.02.001"},{"key":"743_CR15","doi-asserted-by":"crossref","unstructured":"Tian, B., Yao, Y., Shi, L., Shao, S., Liu, Z., and Xu, C., A novel Sybil attack detection scheme for wireless sensor network. In: Proceedings of IEEE IC-BNMT2013, pp 294\u2013297, 2013.","DOI":"10.1109\/ICBNMT.2013.6823960"},{"key":"743_CR16","doi-asserted-by":"crossref","unstructured":"Najafabadi, S. G., Naji, H. R., and Mahani, A., Sybil attack detection: Improving Security of WSNs for Smart Power Grid Application, 2012 Conference on Smart Electric Grids Technology (SEGT2012) December 18-19, 2012, Tehran, Iran, pp 273\u2013278, 2012.","DOI":"10.1109\/SGC.2013.6733831"},{"key":"743_CR17","unstructured":"Zhang, Q., Wang, P., Reeves, D. S., and Ning, P., Defending against Sybil attacks in sensor networks. In: Proceedings of the 25th IEEE International Conference on Distributed Computing Systems Workshops (ICDCSW\u201905), 2005."},{"key":"743_CR18","unstructured":"Galindo, D., Mart\u2019\u0131n, S., Morillo, P., and Villar, J. L., Fujisaki-Okamoto hybrid encryption revisited. Int. J. Inf. Secur. :1\u201328, 1999."},{"key":"743_CR19","doi-asserted-by":"crossref","unstructured":"Raja, K. N., and Beno, M. M., On securing wireless sensor network-novel authentication scheme against DOS attacks. J. Med. Syst. :1\u20135, 2014.","DOI":"10.1007\/s10916-014-0084-3"},{"key":"743_CR20","doi-asserted-by":"crossref","unstructured":"Ameen, M. A., Liu, J., and Kwak, K., Security and privacy issues in wireless sensor networks for healthcare applications. J. Med. Syst. :93\u2013101, 2012.","DOI":"10.1007\/s10916-010-9449-4"},{"key":"743_CR21","doi-asserted-by":"crossref","unstructured":"Baig, M. M., Gholamhosseini, H., and Connolly, M. J., A comprehensive survey of wearable and wireless ECG monitoring systems for older adults. Med. Biol. Eng. Comput.:485\u2013495, 2013","DOI":"10.1007\/s11517-012-1021-6"},{"key":"743_CR22","doi-asserted-by":"crossref","unstructured":"Hsu, W. S., and Pan, J. I., Secure mobile agent for telemedicine based on P2P networks. J. Med. Syst. :1\u20136, 2013.","DOI":"10.1007\/s10916-013-9947-2"}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-017-0743-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-017-0743-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-017-0743-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:19:40Z","timestamp":1750277980000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-017-0743-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,26]]},"references-count":22,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2017,7]]}},"alternative-id":["743"],"URL":"https:\/\/doi.org\/10.1007\/s10916-017-0743-2","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"type":"print","value":"0148-5598"},{"type":"electronic","value":"1573-689X"}],"subject":[],"published":{"date-parts":[[2017,5,26]]},"article-number":"107"}}