{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T10:34:56Z","timestamp":1706783696574},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"11-12","license":[{"start":{"date-parts":[[2009,3,27]],"date-time":"2009-03-27T00:00:00Z","timestamp":1238112000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Ann. Telecommun."],"published-print":{"date-parts":[[2009,12]]},"DOI":"10.1007\/s12243-009-0088-z","type":"journal-article","created":{"date-parts":[[2009,3,26]],"date-time":"2009-03-26T11:04:32Z","timestamp":1238065472000},"page":"723-734","source":"Crossref","is-referenced-by-count":3,"title":["Energy conserving security mechanisms for wireless sensor networks"],"prefix":"10.1007","volume":"64","author":[{"given":"Md. Abdul","family":"Hamid","sequence":"first","affiliation":[]},{"given":"Choong Seon","family":"Hong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,3,27]]},"reference":[{"issue":"8","key":"88_CR1","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1109\/MCOM.2002.1024422","volume":"40","author":"IF Akyildiz","year":"2002","unstructured":"Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E (2002) A survey on sensor networks. Commun Mag IEEE 40(8):102\u2013114. doi: 10.1109\/MCOM.2002.1024422","journal-title":"Commun Mag IEEE"},{"issue":"2","key":"88_CR2","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1016\/j.comcom.2005.05.017","volume":"29","author":"SS Kulkarni","year":"2006","unstructured":"Kulkarni SS, Gouda MG, Arora A (2006) Secret instantiation in ad-hoc networks. Comput Commun 29(2):200\u2013215","journal-title":"Comput Commun"},{"key":"88_CR3","doi-asserted-by":"crossref","unstructured":"Hamid MA, Rahman M, Hong CS (2006) Energy conserving security mechanism for wireless sensor network. In: ICCSA (2), Glasgow, 8\u201311 May 2006, pp 866\u2013875","DOI":"10.1007\/11751588_90"},{"key":"88_CR4","doi-asserted-by":"crossref","unstructured":"Gui C, Mohapatra P (2004) Power conservation and quality of surveillance in target tracking sensor networks. In: MobiCom \u201904: Proceedings of the 10th annual international conference on mobile computing and networking. ACM, New York, pp 129\u2013143. doi: http:\/\/doi.acm.org\/10.1145\/1023720.1023734","DOI":"10.1145\/1023720.1023734"},{"key":"88_CR5","doi-asserted-by":"crossref","unstructured":"Wang N, Chang CH (2007) Performance evaluation of geographic probabilistic flow-based spreading routing in wireless sensor networks. In: PE-WASUN \u201907: Proceedings of the 4th ACM workshop on performance evaluation of wireless ad hoc, sensor,and ubiquitous networks. ACM, New York, pp\u00a032\u201338. doi: http:\/\/doi.acm.org\/10.1145\/1298197.1298204","DOI":"10.1145\/1298197.1298204"},{"key":"88_CR6","doi-asserted-by":"crossref","unstructured":"Ye W, Heidemann J, Estrin D (2002) An energy-efficient mac protocol for wireless sensor networks. INFOCOM 2002. In: Twenty-first annual joint conference of the IEEE computer and communications societies, vol 3. IEEE, Piscataway, pp\u00a01567\u20131576. doi: 10.1109\/INFCOM.2002.1019408","DOI":"10.1109\/INFCOM.2002.1019408"},{"issue":"6","key":"88_CR7","doi-asserted-by":"crossref","first-page":"837","DOI":"10.1007\/s11036-005-4442-8","volume":"10","author":"K Wu","year":"2005","unstructured":"Wu K, Gao Y, Li F, Xiao Y (2005) Lightweight deployment-aware scheduling for wireless sensor networks. Mob Netw Appl 10(6):837\u2013852. doi: 10.1007\/s11036-005-4442-8","journal-title":"Mob Netw Appl"},{"key":"88_CR8","doi-asserted-by":"crossref","unstructured":"Cerpa A, Estrin D (2002) ASCENT: Adaptive self-configuring sensor networks topologies. In: INFOCOM 2002. Twenty-First annual joint conference of the IEEE computer and communications societies, vol 3. IEEE, Piscataway, pp\u00a01278\u20131287. doi: 10.1109\/INFCOM.2002.1019378","DOI":"10.1109\/INFCOM.2002.1019378"},{"key":"88_CR9","first-page":"1713","volume":"3","author":"S Bandyopadhyay","year":"2003","unstructured":"Bandyopadhyay S, Coyle E (2003) An energy efficient hierarchical clustering algorithm for wireless sensor networks. INFOCOM 2003. Twenty-second annual joint conference of the IEEE computer and communications societies. IEEE 3:1713\u20131723","journal-title":"IEEE"},{"issue":"1","key":"88_CR10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/S1389-1286(03)00320-7","volume":"44","author":"S Bandyopadhyay","year":"2004","unstructured":"Bandyopadhyay S, Coyle EJ (2004) Minimizing communication costs in hierarchically-clustered networks of wireless sensors. Comput Netw 44(1):1\u201316","journal-title":"Comput Netw"},{"key":"88_CR11","doi-asserted-by":"crossref","unstructured":"Manjeshwar A, Agrawal D (2001) TEEN: a routing protocol for enhanced efficiency in wireless sensor networks. In: Parallel and distributed processing symposium. Proceedings 15th international, San Francisco, 23\u201327 April 2001, pp 2009\u20132015","DOI":"10.1109\/IPDPS.2001.925197"},{"issue":"2\u20133","key":"88_CR12","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1016\/S1570-8705(03)00008-8","volume":"1","author":"C Karlof","year":"2003","unstructured":"Karlof C, Wagner D (2003) Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Netw 1(2\u20133):293\u2013315","journal-title":"Ad Hoc Netw"},{"key":"88_CR13","doi-asserted-by":"crossref","first-page":"299","DOI":"10.1145\/501416.501464","volume-title":"ACM international symposium on mobile ad hoc networking and computing","author":"S Yi","year":"2001","unstructured":"Yi S, Naldurg P, Kravets R (2001) Security-aware ad hoc routing for wireless networks. In: ACM international symposium on mobile ad hoc networking and computing. ACM, New York, pp 299\u2013302"},{"key":"88_CR14","first-page":"30","volume-title":"WiSe \u201903: proceedings of the 2nd ACM workshop on wireless security","author":"YC Hu","year":"2003","unstructured":"Hu YC, Perrig A, Johnson DB (2003) Rushing attacks and defense in wireless ad hoc network routing protocols. In: WiSe \u201903: proceedings of the 2nd ACM workshop on wireless security. ACM, New York, pp 30\u201340. doi: http:\/\/doi.acm.org\/10.1145\/941311.941317"},{"key":"88_CR15","unstructured":"Chan H, Perrig A, Song D (2003) Random key predistribution schemes for sensor networks. In: IEEE symposium on security and privacy, Berkeley, 11\u201314 May 2003, pp 197\u2013213"},{"key":"88_CR16","doi-asserted-by":"crossref","unstructured":"Du W, Deng J, Han YS, Varshney PK, Katz J, Khalili A (2003) A pairwise key pre-distribution scheme for wireless sensor networks. In: ACM conference on computer and communications security (CCS). ACM, New York, pp 42\u201351","DOI":"10.1145\/948109.948118"},{"key":"88_CR17","doi-asserted-by":"crossref","DOI":"10.1201\/9781439821916","volume-title":"Handbook of applied cryptography","author":"AJ Menezes","year":"1996","unstructured":"Menezes AJ, Vanstone SA, Oorschot PCV (1996) Handbook of applied cryptography. CRC, Boca Raton"},{"issue":"1","key":"88_CR18","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1145\/1138127.1138130","volume":"2","author":"YW Law","year":"2006","unstructured":"Law YW, Doumen J, Hartel P (2006) Survey and benchmark of block ciphers for wireless sensor networks. ACM Trans Sen Netw 2(1):65\u201393. doi: http:\/\/doi.acm.org\/10.1145\/1138127.1138130","journal-title":"ACM Trans Sen Netw"},{"key":"88_CR19","unstructured":"Barrett CL, Marathe MV, Engelhart DC, Sivasubramaniam A (2002) Analyzing the short-term fairness of ieee 802.11 in wireless multi-hop radio networks. In: MASCOTS \u201902: proceedings of the 10th IEEE international symposium on modeling, analysis, and simulation of computer and telecommunications systems (MASCOTS\u201902). IEEE Computer Society, Washington, DC, p 137"},{"key":"88_CR20","unstructured":"C. T. Inc. (2005) MPR400\/410\/420 mica2 mote. Datasheet 2005"},{"key":"88_CR21","unstructured":"The Network Simulator - ns-2 (2003) http:\/\/www.isi.edu\/nsnam\/ns\/index.html"},{"key":"88_CR22","unstructured":"The Zigbee Alliance (2008) http:\/\/www.zigbee.org\/en"},{"key":"88_CR23","volume-title":"Latin squares and their applications","author":"J Denes","year":"1974","unstructured":"Denes J, Keedwell AD (1974) Latin squares and their applications. Academic, New York"}],"container-title":["annals of telecommunications - annales des t\u00e9l\u00e9communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-009-0088-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12243-009-0088-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-009-0088-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,3]],"date-time":"2021-10-03T16:31:57Z","timestamp":1633278717000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12243-009-0088-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,3,27]]},"references-count":23,"journal-issue":{"issue":"11-12","published-print":{"date-parts":[[2009,12]]}},"alternative-id":["88"],"URL":"https:\/\/doi.org\/10.1007\/s12243-009-0088-z","relation":{},"ISSN":["0003-4347","1958-9395"],"issn-type":[{"value":"0003-4347","type":"print"},{"value":"1958-9395","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,3,27]]}}}