{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T15:32:48Z","timestamp":1762875168708,"version":"3.35.0"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"9-10","license":[{"start":{"date-parts":[[2008,7,19]],"date-time":"2008-07-19T00:00:00Z","timestamp":1216425600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Ann. Telecommun."],"published-print":{"date-parts":[[2008,10]]},"DOI":"10.1007\/s12243-008-0042-5","type":"journal-article","created":{"date-parts":[[2008,7,18]],"date-time":"2008-07-18T09:53:48Z","timestamp":1216374828000},"page":"529-541","source":"Crossref","is-referenced-by-count":32,"title":["SERP: secure energy-efficient routing protocol for densely deployed wireless sensor networks"],"prefix":"10.1007","volume":"63","author":[{"given":"Al-Sakib Khan","family":"Pathan","sequence":"first","affiliation":[]},{"given":"Choong Seon","family":"Hong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2008,7,19]]},"reference":[{"key":"42_CR1","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1016\/S1389-1286(01)00302-4","volume":"38","author":"IF Akyildiz","year":"2002","unstructured":"Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E (2002) Wireless sensor net-works: a survey. Comput Networks 38:393\u2013422","journal-title":"Comput Networks"},{"key":"42_CR2","doi-asserted-by":"crossref","unstructured":"Dai S, Jing X, Li L (2005) Research and analysis on routing protocols for wireless sensor networks. Proceedings of the International Conference on Communications, Circuits and Systems, volume 1, pp 407\u2013411 (27\u201330 May)","DOI":"10.1109\/ICCCAS.2005.1493435"},{"key":"42_CR3","doi-asserted-by":"crossref","unstructured":"Karlof C, Wagner D (2003) Secure routing in wireless sensor networks: attacks and countermeasures. Elsevier\u2019s Ad Hoc Network Journal, Special Issue on Sensor Network Applications and Protocols, pp 293\u2013315, (September)","DOI":"10.1016\/S1570-8705(03)00008-8"},{"key":"42_CR4","doi-asserted-by":"crossref","unstructured":"Pathan A-SK, Lee H-W, Hong CS (2006) Security in wireless sensor networks: issues and challenges. Proceedings of the 8th IEEE ICACT 2006, Volume II, Phoenix Park, Korea, pp 1043\u20131048, (20\u201322 February)","DOI":"10.1109\/ICACT.2006.206151"},{"key":"42_CR5","unstructured":"Pathan A-SK, Hong CS (2007) A secure energy-efficient routing protocol for WSN. ISPA 2007, LNCS 4742, Springer, pp 407\u2013418"},{"key":"42_CR6","doi-asserted-by":"crossref","unstructured":"\u00c7am H, \u00d6zdemir S, Muthuavinashiappan D, Nair P (2003) Energy efficient security protocol for wireless sensor networks. IEEE 58th Vehicular Technology Conference, 2003, VTC 2003-Fall 2003, volume 5, pp 2981\u20132984, (6\u20139 Oct)","DOI":"10.1109\/VETECF.2003.1286170"},{"issue":"4","key":"42_CR7","doi-asserted-by":"crossref","first-page":"446","DOI":"10.1016\/j.comcom.2004.12.029","volume":"29","author":"H \u00c7am","year":"2006","unstructured":"\u00c7am H, \u00d6zdemir S, Nair P, Muthuavinashiappan D, Sanli HO (2006) Energy-efficient secure pattern based data aggregation for wireless sensor networks. Comput Commun 29(4):446\u2013455","journal-title":"Comput Commun"},{"issue":"4","key":"42_CR8","doi-asserted-by":"crossref","first-page":"839","DOI":"10.1109\/JSAC.2005.843561","volume":"23","author":"F Ye","year":"2005","unstructured":"Ye F, Luo H, Lu S, Zhang L (2005) Statistical en-route filtering of injected false data in sensor networks. IEEE J Sel Area Commun 23(4):839\u2013850 (April)","journal-title":"IEEE J Sel Area Commun"},{"key":"42_CR9","unstructured":"Zhu S, Setia S, Jajodia S, Ning P (2004) An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks. Proceedings of S&P, pp 259\u2013271"},{"key":"42_CR10","unstructured":"Lee HY, Cho TH (2006) Key inheritance-based false data filtering scheme in wireless sensor networks. Lecture notes in computer science, LNCS 4317, Springer, pp 116\u2013127"},{"key":"42_CR11","doi-asserted-by":"crossref","unstructured":"Heinzelman WR, Chandrakasan A, Balakrishnan H (2000) Energy-efficient communication protocol for wireless microsensor networks. Proceedings of the 33rd Annual Hawaii Inter-national Conference on System Sciences (HICSS), pp 3005\u20133014","DOI":"10.1109\/HICSS.2000.926982"},{"key":"42_CR12","unstructured":"Azzedine B, Xiuzhen C, Joseph L (2003) Energy-aware data-centric routing in microsensor networks. Proceedings of the 8th MSWiM 03, San Diego, pp 42\u201349"},{"issue":"5","key":"42_CR13","doi-asserted-by":"crossref","first-page":"1654","DOI":"10.1093\/ietisy\/e89-d.5.1654","volume":"E89-D","author":"TT Hyunh","year":"2006","unstructured":"Hyunh TT, Hong CS (2006) An energy delay efficient multi-hop routing scheme for wireless sensor networks. IEICE Trans Inf Syst E89-D(5):1654\u20131661 (May)","journal-title":"IEICE Trans Inf Syst"},{"key":"42_CR14","doi-asserted-by":"crossref","unstructured":"Yin C, Huang S, Su P, Gao C (2003) Secure routing for large-scale wireless sensor networks. In Proceedings of IEEE ICCT 2003, volume 2, pp 1282\u20131286, (9\u201311 April)","DOI":"10.1109\/ICCT.2003.1209765"},{"key":"42_CR15","doi-asserted-by":"crossref","first-page":"521","DOI":"10.1023\/A:1016598314198","volume":"8","author":"A Perrig","year":"2002","unstructured":"Perrig A, Szewczyk R, Tygar JD, Wen V, Culler DE (2002) SPINS: security protocols for sensor networks. Wirel Netw 8:521\u2013534","journal-title":"Wirel Netw"},{"key":"42_CR16","unstructured":"Xbow Sensor Networks. Available at: http:\/\/www.xbow.com\/"},{"issue":"11","key":"42_CR17","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1109\/MCOM.2001.965366","volume":"39","author":"ZJ Hass","year":"2001","unstructured":"Hass ZJ (2001) Design methodologies for adaptive and multimedia networks. IEEE Commun Mag 39(11):106\u2013107 (November)","journal-title":"IEEE Commun Mag"},{"issue":"4","key":"42_CR18","doi-asserted-by":"crossref","first-page":"660","DOI":"10.1109\/TWC.2002.804190","volume":"1","author":"WB Heinzelman","year":"2002","unstructured":"Heinzelman WB, Chandrakasan AP, Balakrishnan H (2002) An application-specific protocol architecture for wireless microsensor networks. IEEE Trans Wirel Commun 1(4):660\u2013670 (October)","journal-title":"IEEE Trans Wirel Commun"},{"key":"42_CR19","unstructured":"Lamport L (1979) Constructing digital signatures from one-way function. Technical report SRI-CSL-98, SRI International, October"},{"key":"42_CR20","unstructured":"The Network Simulator-ns-2. http:\/\/www.isi.edu\/nsnam\/ns\/"},{"key":"42_CR21","doi-asserted-by":"crossref","unstructured":"Coppersmith D, Jakobsson M (2002) Almost optimal hash sequence traversal. 6th International Financial Cryptography 2002, Bermuda, (March)","DOI":"10.1007\/3-540-36504-4_8"},{"key":"42_CR22","unstructured":"Jakobsson M (2002) Fractal hash sequence representation and traversal. 2002 IEEE International Symposium on Information Theory, Switzerland (July)"},{"key":"42_CR23","doi-asserted-by":"crossref","unstructured":"Sella Y (2003) On the computation-storage trade-offs of hash chain traversal. The 7th International Financial Cryptography Conference, Guadeloupe, (January)","DOI":"10.1007\/978-3-540-45126-6_20"},{"key":"42_CR24","doi-asserted-by":"crossref","unstructured":"Ee CT, Bajcsy R (2004) Congestion control and fairness for many-to-one routing in sensor networks. Proceedings of ACM SenSys\u201904, 148-161","DOI":"10.1145\/1031495.1031513"}],"container-title":["annals of telecommunications - annales des t\u00e9l\u00e9communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-008-0042-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12243-008-0042-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-008-0042-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,31]],"date-time":"2025-01-31T02:26:32Z","timestamp":1738290392000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12243-008-0042-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,7,19]]},"references-count":24,"journal-issue":{"issue":"9-10","published-print":{"date-parts":[[2008,10]]}},"alternative-id":["42"],"URL":"https:\/\/doi.org\/10.1007\/s12243-008-0042-5","relation":{},"ISSN":["0003-4347","1958-9395"],"issn-type":[{"type":"print","value":"0003-4347"},{"type":"electronic","value":"1958-9395"}],"subject":[],"published":{"date-parts":[[2008,7,19]]}}}