{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:21:11Z","timestamp":1761402071570},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2020,4,20]],"date-time":"2020-04-20T00:00:00Z","timestamp":1587340800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,4,20]],"date-time":"2020-04-20T00:00:00Z","timestamp":1587340800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2021,4]]},"DOI":"10.1007\/s11277-020-07356-5","type":"journal-article","created":{"date-parts":[[2020,4,20]],"date-time":"2020-04-20T06:02:32Z","timestamp":1587362552000},"page":"3029-3050","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Enhancing the Robustness and Security Against Various Attacks in a Scale: Free Network"],"prefix":"10.1007","volume":"117","author":[{"given":"G.","family":"Keerthana","sequence":"first","affiliation":[]},{"given":"P.","family":"Anandan","sequence":"additional","affiliation":[]},{"given":"N.","family":"Nandhagopal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,4,20]]},"reference":[{"issue":"5","key":"7356_CR1","doi-asserted-by":"publisher","first-page":"2944","DOI":"10.1109\/TNET.2017.2713530","volume":"25","author":"T Qiu","year":"2017","unstructured":"Qiu, T., Zhao, A., Xia, F., Si, W., & Wu, D. O. (2017). ROSE: Robustness strategy for scale-free wireless sensor networks. IEEE\/ACM Transactions on Networking, 25(5), 2944\u20132959.","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"7356_CR2","unstructured":"Bellardo, J., & Savage, S. (2003). 802.11 Denial-of-service attacks: Real vulnerabilities and practical solutions. In USENIX security symposium (Vol. 12, pp. 2\u20132)."},{"key":"7356_CR3","unstructured":"Bernard Ab oba. IEEE 802.1X Pre-Authentication. Prese Ntation to 802.11 WGi, July 2002"},{"key":"7356_CR4","doi-asserted-by":"crossref","unstructured":"Bohge, M., & Trappe, W. (2003). An authentication framework for hierarchical ad hoc sensor networks. In Proceedings of the 2nd ACM workshop on wireless security (pp. 79\u201387).","DOI":"10.1145\/941311.941324"},{"issue":"1","key":"7356_CR5","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/TMC.2003.1195151","volume":"2","author":"S Capkun","year":"2003","unstructured":"Capkun, S., Butty\u00e1n, L., & Hubaux, J. P. (2003). Self-organized public-key management for mobile ad hoc networks. IEEE Transactions on mobile computing, 2(1), 52\u201364.","journal-title":"IEEE Transactions on mobile computing"},{"issue":"5","key":"7356_CR6","doi-asserted-by":"publisher","first-page":"319587","DOI":"10.1155\/2014\/319587","volume":"10","author":"P Sivakumar","year":"2014","unstructured":"Sivakumar, P., Amirthavalli, K., & Senthil, M. (2014). Power conservation and security enhancement in wireless sensor networks: A priority based approach. International Journal of Distributed Sensor Networks, 10(5), 319587.","journal-title":"International Journal of Distributed Sensor Networks"},{"key":"7356_CR7","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1016\/S1389-1286(01)00302-4","volume":"38","author":"IF Akyildiz","year":"2002","unstructured":"Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). Wireless sensor networks: A survey. Computer Networks., 38, 393\u2013422.","journal-title":"Computer Networks."},{"issue":"2","key":"7356_CR8","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/COMST.2006.315852","volume":"8","author":"Y Wang","year":"2006","unstructured":"Wang, Y., Attebury, G., & Ramamurthy, B. (2006). A survey of security issues in wireless sensor networks. IEEE Communication Surveys & Tutorials, 8(2), 2\u201323.","journal-title":"IEEE Communication Surveys & Tutorials"},{"issue":"3","key":"7356_CR9","doi-asserted-by":"publisher","first-page":"374251","DOI":"10.1155\/2014\/374251","volume":"10","author":"L Liu","year":"2014","unstructured":"Liu, L., Qi, X., Xue, J., & Xie, M. (2014). A topology construct and control model with small-world and scale-free concepts for heterogeneous sensor networks. International Journal of Distributed Sensor Networks, 10(3), 374251.","journal-title":"International Journal of Distributed Sensor Networks"},{"issue":"17","key":"7356_CR10","doi-asserted-by":"publisher","first-page":"3505","DOI":"10.1016\/j.physa.2013.03.032","volume":"392","author":"WB Du","year":"2013","unstructured":"Du, W. B., Wu, Z. X., & Cai, K. Q. (2013). Effective usage of shortest paths promotes transportation efficiency on scale-free networks. Physica A: Statistical Mechanics and Its Applications, 392(17), 3505\u20133512.","journal-title":"Physica A: Statistical Mechanics and Its Applications"},{"issue":"3","key":"7356_CR11","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1016\/j.compeleceng.2011.11.024","volume":"38","author":"G Zheng","year":"2012","unstructured":"Zheng, G., Liu, S., & Qi, X. (2012). Scale-free topology evolution for wireless sensor networks with reconstruction mechanism. Computers & Electrical Engineering, 38(3), 643\u2013651.","journal-title":"Computers & Electrical Engineering"},{"issue":"6","key":"7356_CR12","doi-asserted-by":"publisher","first-page":"1779","DOI":"10.1016\/j.compeleceng.2013.01.009","volume":"39","author":"G Zheng","year":"2013","unstructured":"Zheng, G., & Liu, Q. (2013). Scale-free topology evolution for wireless sensor networks. Computers & Electrical Engineering, 39(6), 1779\u20131788.","journal-title":"Computers & Electrical Engineering"},{"key":"7356_CR13","doi-asserted-by":"crossref","unstructured":"Jian, Y., Wang, Y., Zhang, Z., & Lin, C. (2013). Scale-free model for wireless sensor networks. In 2013 IEEE wireless communications and networking conference (WCNC) (pp. 2329\u20132332). IEEE.","DOI":"10.1109\/WCNC.2013.6554924"},{"issue":"2","key":"7356_CR14","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1093\/comnet\/cnt010","volume":"1","author":"VH Louzada","year":"2013","unstructured":"Louzada, V. H., Daolio, F., Herrmann, H. J., & Tomassini, M. (2013). Smart rewiring for network robustness. Journal of Complex networks, 1(2), 150\u2013159.","journal-title":"Journal of Complex networks"},{"key":"7356_CR15","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.physa.2014.05.002","volume":"410","author":"M Zhou","year":"2014","unstructured":"Zhou, M., & Liu, J. (2014). A memetic algorithm for enhancing the robustness of scale-free networks against malicious attacks. Physica A: Statistical Mechanics and its Applications, 410, 131\u2013143.","journal-title":"Physica A: Statistical Mechanics and its Applications"},{"issue":"10","key":"7356_CR16","doi-asserted-by":"publisher","first-page":"3838","DOI":"10.1073\/pnas.1009440108","volume":"108","author":"CM Schneider","year":"2011","unstructured":"Schneider, C. M., Moreira, A. A., Andrade, J. S., Havlin, S., & Herrmann, H. J. (2011). Mitigation of malicious attacks on networks. Proceedings of the National Academy of Sciences, 108(10), 3838\u20133841.","journal-title":"Proceedings of the National Academy of Sciences"},{"issue":"01","key":"7356_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1088\/1742-5468\/2011\/01\/P01027","volume":"2011","author":"HJ Herrmann","year":"2011","unstructured":"Herrmann, H. J., Schneider, C. M., Moreira, A. A., Andrade, J. S., Jr., & Havlin, S. (2011). Onion-like network topology enhances robustness against malicious attacks. Journal of Statistical Mechanics: Theory and Experiment, 2011(01), 1\u20139.","journal-title":"Journal of Statistical Mechanics: Theory and Experiment"},{"key":"7356_CR18","doi-asserted-by":"crossref","unstructured":"Buesser, P., Daolio, F., & Tomassini, M. (2011). Optimizing the robustness of scale-free networks with simulated annealing. In International conference on adaptive and natural computing algorithms (pp. 167\u2013176). Springer, Berlin.","DOI":"10.1007\/978-3-642-20267-4_18"},{"key":"7356_CR19","doi-asserted-by":"crossref","unstructured":"Demirbas, M., & Song, Y. (2006). An RSSI-based scheme for sybil attack detection in wireless sensor networks. In 2006 International symposium on a world of wireless, mobile and multimedia networks (WoWMoM'06) (pp. 5-pp). IEEE.","DOI":"10.1109\/WOWMOM.2006.27"},{"key":"7356_CR20","doi-asserted-by":"crossref","unstructured":"Faria, D. B., & Cheriton, D. R. (2006). Detecting identity-based attacks in wireless networks using signalprints. In Proceedings of the 5th ACM workshop on wireless security (pp. 43\u201352).","DOI":"10.1145\/1161289.1161298"},{"key":"7356_CR21","unstructured":"Mishra, A., & Arbaugh, W. A. (2002). An initial security analysis of the IEEE 802.1 X standard. In CS-TR 4328, Department of Computer Science, University of Maryland, College Park, December 2002"},{"key":"7356_CR22","unstructured":"Sheng, Y., Tan, K., Chen, G., Kotz, D., & Campbell, A. (2008). Detecting 802.11 MAC layer spoofing using received signal strength. In IEEE INFOCOM 2008-The 27th conference on computer communications (pp. 1768\u20131776). IEEE."},{"key":"7356_CR23","doi-asserted-by":"crossref","unstructured":"Patwari, N., & Kasera, S. K. (2007). Robust location distinction using temporal link signatures. In Proceedings of the 13th annual ACM international conference on Mobile computing and networking (pp. 111\u2013122).","DOI":"10.1145\/1287853.1287867"},{"issue":"6","key":"7356_CR24","doi-asserted-by":"publisher","first-page":"677","DOI":"10.1007\/s11276-005-3522-9","volume":"11","author":"A Wool","year":"2005","unstructured":"Wool, A. (2005). Lightweight key management for IEEE 802.11 wireless lans with key refresh and host revocation. Wireless Networks, 11(6), 677\u2013686.","journal-title":"Wireless Networks"},{"issue":"6","key":"7356_CR25","doi-asserted-by":"publisher","first-page":"1910","DOI":"10.1109\/JIOT.2017.2749883","volume":"4","author":"I Tomi\u0107","year":"2017","unstructured":"Tomi\u0107, I., & McCann, J. A. (2017). A survey of potential security issues in existing wireless sensor network protocols. IEEE Internet of Things Journal, 4(6), 1910\u20131923.","journal-title":"IEEE Internet of Things Journal"},{"key":"7356_CR26","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1109\/ACCESS.2016.2517321","volume":"4","author":"J Wu","year":"2016","unstructured":"Wu, J., Ota, K., Dong, M., & Li, C. (2016). A hierarchical security framework for defending against sophisticated attacks on wireless sensor networks in smart cities. IEEE Access, 4, 416\u2013424.","journal-title":"IEEE Access"},{"issue":"4","key":"7356_CR27","doi-asserted-by":"publisher","first-page":"3097","DOI":"10.1109\/TWC.2015.2507124","volume":"15","author":"J Wei","year":"2015","unstructured":"Wei, J., Yang, G., & Mu, Y. (2015). Comments on accountable and privacy-enhanced access control in wireless sensor networks. IEEE Transactions on Wireless Communications, 15(4), 3097\u20133099.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"9","key":"7356_CR28","doi-asserted-by":"publisher","first-page":"2013","DOI":"10.1109\/TIFS.2016.2570740","volume":"11","author":"Y Liu","year":"2016","unstructured":"Liu, Y., Dong, M., Ota, K., & Liu, A. (2016). ActiveTrust: Secure and trustable routing in wireless sensor networks. IEEE Transactions on Information Forensics and Security, 11(9), 2013\u20132027.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"10","key":"7356_CR29","doi-asserted-by":"publisher","first-page":"9448","DOI":"10.1109\/TVT.2017.2703305","volume":"66","author":"K Wang","year":"2017","unstructured":"Wang, K., Yuan, L., Miyazaki, T., Zeng, D., Guo, S., & Sun, Y. (2017). Strategic antieavesdropping game for physical layer security in wireless cooperative networks. IEEE Transactions on Vehicular Technology, 66(10), 9448\u20139457.","journal-title":"IEEE Transactions on Vehicular Technology"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07356-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-020-07356-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07356-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,20]],"date-time":"2021-04-20T00:31:28Z","timestamp":1618878688000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-020-07356-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,20]]},"references-count":29,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,4]]}},"alternative-id":["7356"],"URL":"https:\/\/doi.org\/10.1007\/s11277-020-07356-5","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,4,20]]},"assertion":[{"value":"20 April 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}