{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T03:10:54Z","timestamp":1761621054449},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2010,12,16]],"date-time":"2010-12-16T00:00:00Z","timestamp":1292457600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2012,2]]},"DOI":"10.1007\/s11036-010-0287-x","type":"journal-article","created":{"date-parts":[[2010,12,15]],"date-time":"2010-12-15T16:31:09Z","timestamp":1292430669000},"page":"75-89","source":"Crossref","is-referenced-by-count":21,"title":["Energy Efficiency Routing with Node Compromised Resistance in Wireless Sensor Networks"],"prefix":"10.1007","volume":"17","author":[{"given":"Kai","family":"Lin","sequence":"first","affiliation":[]},{"given":"Chin-Feng","family":"Lai","sequence":"additional","affiliation":[]},{"given":"Xingang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Guan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,12,16]]},"reference":[{"issue":"17","key":"287_CR1","doi-asserted-by":"crossref","first-page":"3368","DOI":"10.1016\/j.comcom.2007.01.016","volume":"30","author":"M Chen","year":"2007","unstructured":"Chen M, Leung V, Mao S, Yuan Y (2007) DGR: directional geographical routing for real-time video communications in wireless sensor networks. Elsevier Comput Commun 30(17):3368\u20133383","journal-title":"Elsevier Comput Commun"},{"issue":"1","key":"287_CR2","doi-asserted-by":"crossref","first-page":"5","DOI":"10.3837\/tiis.2010.01.001","volume":"1","author":"K Lin","year":"2010","unstructured":"Lin K, Wang L, Li K, Shu L (2010) Multi-attribute data fusion for energy equilibrium routing in wireless sensor networks. KSII Trans Internet Inf Syst 1(1):5\u201324","journal-title":"KSII Trans Internet Inf Syst"},{"issue":"3","key":"287_CR3","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1002\/wcm.543","volume":"9","author":"M Chen","year":"2009","unstructured":"Chen M, Leung V, Mao S, Kwon T (2009) RLRR: receiver-oriented load-balancing and reliable routing in in wireless sensor networks. Wirel Commun Mobile Comput 9(3):405\u2013416","journal-title":"Wirel Commun Mobile Comput"},{"key":"287_CR4","unstructured":"Lin K, Chen M, Ge X (2010) Adaptive reliable routing based on cluster hierarchy for wirelessmultimedia sensor networks. EURASIP J Wirel Commun Netw 341\u2013349"},{"key":"287_CR5","unstructured":"Peng M, Xiao Y, Chen H, Hao Q, Vasilakos AV, Wu J (2010) Sensor distribution on coverage in sensor networks. QShine, ID. 567952"},{"key":"287_CR6","doi-asserted-by":"crossref","first-page":"7177","DOI":"10.3390\/s90907177","volume":"9","author":"Q Fan","year":"2009","unstructured":"Fan Q, Wu Q, Magoules F, Xiong N, Vasilakos AV, He Y (2009) Game and balance multicast architecture algorithms for sensor grid. Sensors 9:7177\u20137202","journal-title":"Sensors"},{"issue":"1","key":"287_CR7","first-page":"219","volume":"2007","author":"M Chen","year":"2007","unstructured":"Chen M, Kwon T, Yuan Y, Choi Y, Leung V (2007) MADD: mobile-agent-based directed diffusion in wireless sensor networks. EURASIP J Appl Signal Process 2007(1):219\u2013242","journal-title":"EURASIP J Appl Signal Process"},{"issue":"8","key":"287_CR8","doi-asserted-by":"crossref","first-page":"2349","DOI":"10.1007\/s11276-010-0276-9","volume":"16","author":"T Spyropoulos","year":"2010","unstructured":"Spyropoulos T, Rais R, Turletti T, Obraczka K, Vasilakos AV (2010) Routing for disruption tolerant networks: taxonomy and design. Wirel Netw 16(8):2349\u20132370","journal-title":"Wirel Netw"},{"issue":"9","key":"287_CR9","doi-asserted-by":"crossref","first-page":"4976","DOI":"10.1109\/TVT.2009.2025767","volume":"58","author":"M Chen","year":"2009","unstructured":"Chen M, Leung V, Mao S, Xiao Y, Chlamtac I (2009) Hybrid geographical routing for flexible energy-delay trade-offs. IEEE Trans Veh Technol 58(9):4976\u20134988","journal-title":"IEEE Trans Veh Technol"},{"issue":"2","key":"287_CR10","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1016\/j.comcom.2005.05.019","volume":"29","author":"M Chen","year":"2006","unstructured":"Chen M, Kwon T, Choi Y (2006) EDDD: energy-efficient differentiated directed diffusion (EDDD) for real-time traffic in wireless sensor networks. Elsevier Comput Commun 29(2):231\u2013245","journal-title":"Elsevier Comput Commun"},{"issue":"2","key":"287_CR11","doi-asserted-by":"crossref","first-page":"220","DOI":"10.1007\/s11036-008-0133-6","volume":"14","author":"M Chen","year":"2009","unstructured":"Chen M, Leung V, Mao S (2009) Directional controlled fusion in wireless sensor networks. Mobile Netw Appl 14(2):220\u2013229","journal-title":"Mobile Netw Appl"},{"issue":"6","key":"287_CR12","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/MWC.2007.4407223","volume":"14","author":"M Chen","year":"2007","unstructured":"Chen M, Gonzalez S, Leung V (2007) Applications and design issues of mobile agents in wireless sensor networks. Wirel Commun Mag 14(6):20\u201326","journal-title":"Wirel Commun Mag"},{"key":"287_CR13","doi-asserted-by":"crossref","unstructured":"Giridhar A, Kumar PR (2005) Maximizing the functional lifetime of sensor networks. In: Proceedings of the 4th international conference on information processing in sensor networks (IPSN), pp 5\u201312","DOI":"10.1109\/IPSN.2005.1440885"},{"issue":"8","key":"287_CR14","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1016\/j.pmcj.2006.11.001","volume":"3","author":"J Li","year":"2007","unstructured":"Li J, Mohapatra P (2007) Analytical model and mitigation techniques for the energy hole problems in sensor networks. Pervasive Mob Comput 3(8):233\u2013254","journal-title":"Pervasive Mob Comput"},{"key":"287_CR15","doi-asserted-by":"crossref","first-page":"302","DOI":"10.1016\/j.jpdc.2006.10.007","volume":"67","author":"O Powell","year":"2007","unstructured":"Powell O, Leone P, Rolim J (2007) Energy optimal data propagation in wireless sensor networks. J Parallel Distrib Comput 67:302\u2013317","journal-title":"J Parallel Distrib Comput"},{"key":"287_CR16","doi-asserted-by":"crossref","first-page":"691","DOI":"10.1007\/s11276-006-6529-y","volume":"12","author":"C Efthymiou","year":"2006","unstructured":"Efthymiou C, Nikoletseas S, Rolim J (2006) Energy balanced data propagation in wireless sensor networks. Wirel Netw 12:691\u2013707","journal-title":"Wirel Netw"},{"key":"287_CR17","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1016\/S1570-8705(03)00047-7","volume":"2","author":"V Mhatre","year":"2004","unstructured":"Mhatre V, Rosenberg C (2004) Design guidelines for wireless sensor networks: communication, clustering and aggregation. Ad Hoc Networks 2:45\u201363","journal-title":"Ad Hoc Networks"},{"issue":"10","key":"287_CR18","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1109\/MC.2002.1039518","volume":"35","author":"A Wood","year":"2002","unstructured":"Wood A, Stankovic J (2002) Denial of service in sensor networks. IEEE Comput 35(10):54\u201362","journal-title":"IEEE Comput"},{"key":"287_CR19","doi-asserted-by":"crossref","unstructured":"Douceur J (2002) The sybil attack. In: Proc. of first international workshop on peer-to-peer systems (IPTPS\u201902). LNCS 2002, vol. 2429. Cambridge, MA, USA, pp 251\u2013260","DOI":"10.1007\/3-540-45748-8_24"},{"key":"287_CR20","unstructured":"Hu Y, Perrig A, Johnson U (2002) Wormhole detection in wireless ad hoc networks. Depmenent of Computer Science, Rice University Tech. Rep. TR01-384"},{"key":"287_CR21","doi-asserted-by":"crossref","unstructured":"Porras P, Fong M, Valdes A (2002) A mission-impact based approach to infosec alarm correlation. In: Proceedings of the 15th international symposium on recent advances in intrusion detection, Zurich, pp 95\u2013114","DOI":"10.1007\/3-540-36084-0_6"},{"issue":"3","key":"287_CR22","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1016\/S1363-4127(99)80078-8","volume":"4","author":"A Blyth","year":"1999","unstructured":"Blyth A (1999) Footprinting for intrusion detection and threat assessment. Inf Secur Tech Rep 4(3):43\u201353","journal-title":"Inf Secur Tech Rep"},{"key":"287_CR23","doi-asserted-by":"crossref","unstructured":"Ren K, Lou W, Zhang Y (2006) LEDS: providing location-aware end-to-end data security in wireless sensor networks. In: INFOCOM 2006. 25th IEEE international conference on computer communications. Proceedings, pp. 1\u201312","DOI":"10.1109\/INFOCOM.2006.303"},{"key":"287_CR24","doi-asserted-by":"crossref","unstructured":"Yu Z, Guan Y (2006) A dynamic en-route scheme for filtering false data injection in wireless sensor networks. In: INFOCOM 2006. 25th IEEE international conference on computer communications. Proceedings, pp 1\u201312","DOI":"10.1109\/INFOCOM.2006.304"},{"key":"287_CR25","unstructured":"Miller MJ, Vaidya NH (2006) Leveraging channel diversity for key establishment in wireless sensor networks. In: INFOCOM 2006. 25th IEEE international conference on computer communications. Proceedings, pp 1\u201312"},{"key":"287_CR26","doi-asserted-by":"crossref","unstructured":"Eschenauer L, Gligor VD (2002) A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM conference on computer and communication security, pp 41\u201347","DOI":"10.1145\/586110.586117"},{"key":"287_CR27","unstructured":"Chan H, Perrig A, Song D (2003) Random key predistribution schemes for sensor networks. IEEE Comput Soc 197\u2013213"},{"key":"287_CR28","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1145\/948109.948119","volume-title":"Proc. of the 10th ACM conf. on computer and communications security","author":"D Liu","year":"2003","unstructured":"Liu D, Ning P (2003) Establishing pairwise keys in distributed sensor networks. In: Proc. of the 10th ACM conf. on computer and communications security. ACM Press, New York, pp 52\u201361"},{"key":"287_CR29","first-page":"293","volume-title":"Proc. of the computer securityDESORICS","author":"S Camtepe","year":"2004","unstructured":"Camtepe S, Yener B (2004) Combinatorial design of key distribution mechanisms for wireless sensor networks. In: Proc. of the computer securityDESORICS. Springer, Berlin, pp 293\u2013308"},{"issue":"2","key":"287_CR30","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1109\/JSAC.2005.861382","volume":"24","author":"Y Zhang","year":"2006","unstructured":"Zhang Y, Liu W, Lou W, Fang Y (2006) Location-based compromise-tolerant security mechanisms for wireless sensor networks. IEEE J Sel Areas Commun 24(2):247\u2013260","journal-title":"IEEE J Sel Areas Commun"},{"issue":"2\u20133","key":"287_CR31","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1016\/S1570-8705(03)00008-8","volume":"1","author":"C Karlof","year":"2003","unstructured":"Karlof C, Wagner D (2003) Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Networks 1(2\u20133):293-315","journal-title":"Ad Hoc Networks"},{"issue":"5","key":"287_CR32","doi-asserted-by":"crossref","first-page":"521","DOI":"10.1023\/A:1016598314198","volume":"8","author":"A Perrig","year":"2002","unstructured":"Perrig A, Szewczyk R, Tygar JD, Wen V, Culler D (2002) SPINS: security protocols for sensor networks. Wirel Netw 8(5):521\u2013534","journal-title":"Wirel Netw"},{"issue":"2","key":"287_CR33","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1002\/sec.75","volume":"2","author":"K Dhurandher","year":"2009","unstructured":"Dhurandher K, Misra S, Obaidat M, Gupta N (2009) An ant colony optimization approach for reputation and quality-of-service-based security in wireless sensor networks. Secur Commun Netw 2(2):215\u2013224","journal-title":"Secur Commun Netw"},{"issue":"4","key":"287_CR34","doi-asserted-by":"crossref","first-page":"839","DOI":"10.1109\/JSAC.2005.843561","volume":"23","author":"F Ye","year":"2005","unstructured":"Ye F, Luo H, Lu S, Zhang L (2005) Statistical en-route filtering of injected false data in sensor networks. IEEE J Sel Areas Commun 23(4):839\u2013850","journal-title":"IEEE J Sel Areas Commun"},{"issue":"6","key":"287_CR35","doi-asserted-by":"crossref","first-page":"1490","DOI":"10.1109\/TNET.2007.897956","volume":"15","author":"PC Lee","year":"2007","unstructured":"Lee PC, Misra V, Rubenstein D (2007) Distributed algorithms for secure multipath routing in attack-resistant networks. IEEE\/ACM Trans Netw 15(6):1490\u20131501","journal-title":"IEEE\/ACM Trans Netw"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-010-0287-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11036-010-0287-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-010-0287-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T03:18:00Z","timestamp":1559877480000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11036-010-0287-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,12,16]]},"references-count":35,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2012,2]]}},"alternative-id":["287"],"URL":"https:\/\/doi.org\/10.1007\/s11036-010-0287-x","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"value":"1383-469X","type":"print"},{"value":"1572-8153","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,12,16]]}}}