{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,5]],"date-time":"2025-04-05T06:09:46Z","timestamp":1743833386942,"version":"3.37.3"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2018,4,3]],"date-time":"2018-04-03T00:00:00Z","timestamp":1522713600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1007\/s11227-018-2346-1","type":"journal-article","created":{"date-parts":[[2018,4,3]],"date-time":"2018-04-03T10:17:02Z","timestamp":1522750622000},"page":"5022-5040","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["SCOUT: a sink camouflage and concealed data delivery paradigm for circumvention of sink-targeted cyber threats in wireless sensor networks"],"prefix":"10.1007","volume":"74","author":[{"given":"Saqib","family":"Ubaid","sequence":"first","affiliation":[]},{"given":"M. Farrukh","family":"Shafeeq","sequence":"additional","affiliation":[]},{"given":"Majid","family":"Hussain","sequence":"additional","affiliation":[]},{"given":"Ali Hammad","family":"Akbar","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6576-8932","authenticated-orcid":false,"given":"Abdelrahman","family":"Abuarqoub","sequence":"additional","affiliation":[]},{"given":"M. Sultan","family":"Zia","sequence":"additional","affiliation":[]},{"given":"Beenish","family":"Abbas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,4,3]]},"reference":[{"key":"2346_CR1","doi-asserted-by":"crossref","unstructured":"Karlof C, Sastry N, Wagner D (2004) Tinysec: a link layer security architecture for wireless sensor networks. In: International Conference on Embedded Networked Sensor Systems, pp 162\u2013175","DOI":"10.1145\/1031495.1031515"},{"key":"2346_CR2","doi-asserted-by":"crossref","unstructured":"Drissi J, Gu Q (2006) Localized broadcast authentication in large sensor networks. In: ICNS","DOI":"10.1109\/ICNS.2006.72"},{"key":"2346_CR3","doi-asserted-by":"crossref","unstructured":"Eschenauer L, Gligor VD (2002) A key-management scheme for distributed sensor networks. In: ACM CCS, pp 41\u201347","DOI":"10.1145\/586110.586117"},{"key":"2346_CR4","unstructured":"Zhu S, Xu S, Setia S, Jajodia S (2003) Establishing pairwise keys for secure communication in ad hoc networks: a probabilistic approach. In: IEEE ICNP, pp 326\u2013335"},{"key":"2346_CR5","unstructured":"Xi Y, Schwiebert L, Shi W (2006) Preserving source location privacy in monitoring-based wireless sensor networks. In: Proceedings of Parallel and Distributed Processing Symposium"},{"key":"2346_CR6","doi-asserted-by":"crossref","unstructured":"Mehta K, Liu D, Wright M (2007) Location privacy in sensor networks against a global eavesdropper. In: Proceedings of IEEE International Conference on Network Protocols","DOI":"10.1109\/ICNP.2007.4375862"},{"key":"2346_CR7","doi-asserted-by":"crossref","unstructured":"Kamat P, Zhang Y, Trappe W, Ozturk C (2005) Enhancing source location privacy in sensor network routing. In: Proceedings of IEEE ICDCS, pp 599\u2013608","DOI":"10.1109\/ICDCS.2005.31"},{"issue":"1","key":"2346_CR8","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1109\/COMST.2017.2759725","volume":"20","author":"M Raza","year":"2017","unstructured":"Raza M et al (2017) A critical analysis of research potential, challenges and future directives in industrial wireless sensor networks. IEEE Commun Surv Tutor 20(1):39\u201395","journal-title":"IEEE Commun Surv Tutor"},{"key":"2346_CR9","doi-asserted-by":"crossref","unstructured":"Gu Q, Chen X (2008) Privacy-preserving mobility control protocols in wireless sensor networks. In: The International Symposium on Parallel Architectures, Algorithms, and Networks, IEEE, pp 159\u2013164","DOI":"10.1109\/I-SPAN.2008.20"},{"key":"2346_CR10","unstructured":"Jiang Z, Wu J, Kline R (2007) Mobility control for achieving optimal configuration in mobile networks. Technical Report, Department of Computer Science, West Chester University"},{"key":"2346_CR11","unstructured":"S. Muhammad, Z. Furqan, R. Guha, \u201cWireless sensor network security: a secure sink node architecture\u201d IEEE International Conference on Performance, Computing, and Communications Conference, IPCCC 2005"},{"key":"2346_CR12","unstructured":"Chen X, Jiang Z, Wu J (2007) Quick convergence mobility control schemes in wireless sensor networks. Technical Report, Texas State University"},{"key":"2346_CR13","doi-asserted-by":"crossref","unstructured":"Golden Berg C, Lin J, Morse A, Rosen B, Yang Y (2004) Towards mobility as a networks control primitive. In: Proceeding of 5th ACM International Symposium on Mobile Ad Hoc Networking and Computing (Mobihoc\u2019 04), pp 163\u2013174","DOI":"10.1145\/989459.989481"},{"key":"2346_CR14","unstructured":"Deng J, Han R, Mishra S (2005) Countermeasures against traffic analysis attacks in wireless sensor networks. In: Proceedings of IEEE\/Create NetInternational Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm)"},{"key":"2346_CR15","doi-asserted-by":"crossref","unstructured":"Ngai E (2009) On providing sink anonymity for sensor networks. In: International Conference on Wireless Communications and Mobile Computing 2009","DOI":"10.1145\/1582379.1582439"},{"key":"2346_CR16","doi-asserted-by":"crossref","unstructured":"Prathima EG et al (2017) DAMS: data aggregation using mobile sink in wireless sensor networks. In: Proceedings of the 5th International Conference on Communications and Broadband Networking. ACM","DOI":"10.1145\/3057109.3057118"},{"key":"2346_CR17","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1186\/1687-5281-2014-32","volume":"1","author":"S Jabbar","year":"2014","unstructured":"Jabbar S et al (2014) VISTA: achieving cumulative vision through energy efficient Silhouette recognition of mobile targets through collaboration of visual sensor nodes. EURASIP J Image Video Process 1:32","journal-title":"EURASIP J Image Video Process"},{"key":"2346_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2016\/6319830","volume":"2016","author":"M Hussain","year":"2016","unstructured":"Hussain M et al (2016) CRAM: a conditioned reflex action inspired adaptive model for context addition in wireless sensor networks. J Sens. \n                    https:\/\/doi.org\/10.1155\/2016\/6319830","journal-title":"J Sens"},{"issue":"8","key":"2346_CR19","doi-asserted-by":"publisher","first-page":"7595038","DOI":"10.1177\/155014777595038","volume":"12","author":"M Hussain","year":"2016","unstructured":"Hussain M et al (2016) A gateway deployment heuristic for enhancing the availability of sensor grids. Int J Distrib Sens Netw 12(8):7595038","journal-title":"Int J Distrib Sens Netw"},{"key":"2346_CR20","doi-asserted-by":"crossref","unstructured":"Zhu J, Zou Y, Zheng B (2017) Physical-layer security and reliability challenges for industrial wireless sensor networks. In: Proceedings of IEEE, pp 5313\u20135320","DOI":"10.1109\/ACCESS.2017.2691003"},{"key":"2346_CR21","unstructured":"Bartariya S, Rastogi A (2016) Security in wireless sensor networks: attacks and solutions. Int J Adv Res Comput Comm Eng 5(3)"},{"issue":"8","key":"2346_CR22","first-page":"4006","volume":"11","author":"T Muhammad","year":"2017","unstructured":"Muhammad T, Ferzund J, Jabbar S, Shahzadi R (2017) Towards designing efficient lightweight ciphers for internet of things. KSII Trans Internet Inf Syst 11(8):4006\u20134024","journal-title":"KSII Trans Internet Inf Syst"},{"key":"2346_CR23","doi-asserted-by":"publisher","first-page":"12727","DOI":"10.1007\/s11042-015-2918-5","volume":"75","author":"KR Malik","year":"2016","unstructured":"Malik KR, Ahmad T et al (2016) Big-data: transformation from heterogeneous data to semantically-enriched simplified data. Multimed Tools Appl 75:12727","journal-title":"Multimed Tools Appl"},{"key":"2346_CR24","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1007\/s11227-015-1488-7","volume":"72","author":"S Jabbar","year":"2016","unstructured":"Jabbar S, Naseer K, Gohar M, Rho S, Chang H (2016) Trust model at service layer of cloud computing for educational institutes. J Supercomput 72:58","journal-title":"J Supercomput"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-018-2346-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-018-2346-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-018-2346-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,27]],"date-time":"2019-08-27T11:38:42Z","timestamp":1566905922000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-018-2346-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4,3]]},"references-count":24,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2018,10]]}},"alternative-id":["2346"],"URL":"https:\/\/doi.org\/10.1007\/s11227-018-2346-1","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"type":"print","value":"0920-8542"},{"type":"electronic","value":"1573-0484"}],"subject":[],"published":{"date-parts":[[2018,4,3]]},"assertion":[{"value":"3 April 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}