{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T23:54:54Z","timestamp":1772063694448,"version":"3.50.1"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2016,9,1]],"date-time":"2016-09-01T00:00:00Z","timestamp":1472688000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2016,9,27]],"date-time":"2016-09-27T00:00:00Z","timestamp":1474934400000},"content-version":"vor","delay-in-days":26,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1111512;CICI-1547358"],"award-info":[{"award-number":["CNS-1111512;CICI-1547358"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Jiangsu Provincial Science and Technology Project","award":["BA2015161"],"award-info":[{"award-number":["BA2015161"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Data Sci. Eng."],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1007\/s41019-016-0017-x","type":"journal-article","created":{"date-parts":[[2016,9,27]],"date-time":"2016-09-27T02:15:04Z","timestamp":1474942504000},"page":"189-200","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["Provenance for Wireless Sensor Networks: A Survey"],"prefix":"10.1007","volume":"1","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7024-4559","authenticated-orcid":false,"given":"Changda","family":"Wang","sequence":"first","affiliation":[]},{"given":"Wenyi","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Elisa","family":"Bertino","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,27]]},"reference":[{"issue":"8","key":"17_CR1","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1109\/MCOM.2002.1024422","volume":"40","author":"IF Akyildiz","year":"2002","unstructured":"Akyildiz IF, Su WL, Sankarasubramaniam Y, Cayirci E (2002) A survey on sensor networks. IEEE Commun Mag 40(8):102\u2013114. doi:\n                    10.1109\/mcom.2002.1024422","journal-title":"IEEE Commun Mag"},{"key":"17_CR2","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1016\/j.adhoc.2013.12.001","volume":"16","author":"SI Alam","year":"2014","unstructured":"Alam SI, Fahmy S (2014) A practical approach for provenance transmission in wireless sensor networks. Ad Hoc Netw 16:28\u201345. doi:\n                    10.1016\/j.adhoc.2013.12.001","journal-title":"Ad Hoc Netw"},{"key":"17_CR3","doi-asserted-by":"publisher","unstructured":"Archibald R, Ghosal D (2012) A covert timing channel based on fountain codes. In: 2012 IEEE 11th international conference on trust, security and privacy in computing and communications, IEEE. pp. 970\u2013977. doi:\n                    10.1109\/TrustCom.2012.21","DOI":"10.1109\/TrustCom.2012.21"},{"key":"17_CR4","volume-title":"Computer security: art and science","author":"M Bishop","year":"2002","unstructured":"Bishop M (2002) Computer security: art and science. Addison Wesley, Englewood Cliffs"},{"issue":"4","key":"17_CR5","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1080\/15427951.2004.10129096","volume":"1","author":"A Broder","year":"2004","unstructured":"Broder A, Mitzenmacher M (2004) Network applications of bloom filters: a survey. Internet Math 1(4):485\u2013509. doi:\n                    10.1080\/15427951.2004.10129096","journal-title":"Internet Math"},{"issue":"4","key":"17_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1513601.1513604","volume":"12","author":"S Cabuk","year":"2009","unstructured":"Cabuk S, Brodley CE, Shields C (2009) IP covert channel detection. ACM Trans Inf Syst Secur 12(4):1\u201329. doi:\n                    10.1145\/1513601.1513604.1513604","journal-title":"ACM Trans Inf Syst Secur"},{"key":"17_CR7","doi-asserted-by":"publisher","unstructured":"Garofalakis M, Hellerstein JM, Maniatis P (2007) IEEE: proof sketches: verifiable in-network aggregation. In: IEEE 23rd international conference on data engineering, pp 971\u2013980. doi:\n                    10.1109\/ICDE.2007.368958","DOI":"10.1109\/ICDE.2007.368958"},{"issue":"1","key":"17_CR8","doi-asserted-by":"publisher","first-page":"16:1","DOI":"10.1145\/2529988","volume":"10","author":"O Gnawali","year":"2013","unstructured":"Gnawali O, Fonseca R, Jamieson K, Kazandjieva M, Moss D, Levis P (2013) Ctp: an efficient, robust, and reliable collection tree protocol for wireless sensor networks. ACM Trans Sens Netw 10(1):16:1\u201316:49. doi:\n                    10.1145\/2529988","journal-title":"ACM Trans Sens Netw"},{"issue":"1","key":"17_CR9","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1109\/TNET.2007.910594","volume":"16","author":"MT Goodrich","year":"2008","unstructured":"Goodrich MT (2008) Probabilistic packet marking for large-scale ip traceback. IEEE\/ACM Trans Netw 16(1):15\u201324. doi:\n                    10.1109\/TNET.2007.910594","journal-title":"IEEE\/ACM Trans Netw"},{"key":"17_CR10","unstructured":"Hasan R, Sion R, Winslett M (2009) The case of the fake picasso: preventing history forgery with secure provenance. In: Proceedings of the 7th conference on File and storage technologies\n, FAST \u201909, USENIX Association, Berkeley, CA, USA, pp 1\u201314"},{"key":"17_CR11","doi-asserted-by":"publisher","unstructured":"Hussain S, Wang C, Sultana S, Bertino E (2014) Secure data provenance compression using arithmetic coding in wireless sensor networks. In: Performance computing and communications conference (IPCCC), 2014 IEEE international, pp 1\u201310. doi:\n                    10.1109\/PCCC.2014.7017068","DOI":"10.1109\/PCCC.2014.7017068"},{"issue":"suppl 1","key":"17_CR12","doi-asserted-by":"publisher","first-page":"D566","DOI":"10.1093\/nar\/gkl859","volume":"35","author":"M Jayapandian","year":"2007","unstructured":"Jayapandian M, Chapman A, Tarcea VG, Yu C, Elkiss A, Ianni A, Liu B, Nandi A, Santos C, Andrews P, Athey B, States D, Jagadish HV (2007) Michigan molecular interactions (mimi): putting the jigsaw puzzle together. Nucleic Acids Res 35(suppl 1):D566\u2013D571. doi:\n                    10.1093\/nar\/gkl859","journal-title":"Nucleic Acids Res"},{"key":"17_CR13","doi-asserted-by":"publisher","unstructured":"Karlof C, Sastry N, Wagner D (2004) Tinysec: a link layer security architecture for wireless sensor networks. In: Proceedings of the 2nd international conference on Embedded networked sensor systems\u2014SenSys \u201904, vol 3. ACM Press, New York, New York, USA, pp 162\u2013175. doi:\n                    10.1145\/1031495.1031515","DOI":"10.1145\/1031495.1031515"},{"key":"17_CR14","doi-asserted-by":"publisher","unstructured":"Lim HS, Moon YS, Bertino E (2010) Provenance-based trustworthiness assessment in sensor networks. In: Proceedings of the seventh international workshop on data management for sensor networks, DMSN \u201910. ACM, New York, NY, USA, pp 2\u20137. doi:\n                    10.1145\/1858158.1858162","DOI":"10.1145\/1858158.1858162"},{"key":"17_CR15","doi-asserted-by":"publisher","unstructured":"Liu A, Ning P (2008) Tinyecc: a configurable library for elliptic curve cryptography in wireless sensor networks. In: 2008 international conference on information processing in sensor networks (ipsn 2008), IEEE. pp 245\u2013256. doi:\n                    10.1109\/IPSN.2008.47","DOI":"10.1109\/IPSN.2008.47"},{"key":"17_CR16","unstructured":"Rabin MO (1981) Fingerprinting by random polynomials. Report, tr-cse-03-01, Center for Research in Computing Technology, Harvard University"},{"issue":"5","key":"17_CR17","doi-asserted-by":"publisher","first-page":"604","DOI":"10.1109\/TNET.2002.803864","volume":"10","author":"M Mitzenmacher","year":"2002","unstructured":"Mitzenmacher M (2002) Compressed bloom filters. IEEE\/ACM Trans Netw 10(5):604\u2013612. doi:\n                    10.1109\/TNET.2002.803864","journal-title":"IEEE\/ACM Trans Netw"},{"key":"17_CR18","volume-title":"Spread spectrum systems with commercial applications","author":"CD Robert","year":"1994","unstructured":"Robert CD (1994) Spread spectrum systems with commercial applications, 3rd edn. Wiley, Hoboken","edition":"3"},{"issue":"6","key":"17_CR19","doi-asserted-by":"publisher","first-page":"1364","DOI":"10.1016\/j.comnet.2010.12.005","volume":"55","author":"C Rothenberg","year":"2011","unstructured":"Rothenberg C, Macapuna C (2011) In-packet bloom filters: Design and networking applications. Comput Netw 55(6):1364\u20131378. doi:\n                    10.1016\/j.comnet.2010.12.005","journal-title":"Comput Netw"},{"issue":"6","key":"17_CR20","doi-asserted-by":"publisher","first-page":"672","DOI":"10.1109\/TIT.1979.1056107","volume":"25","author":"F Rubin","year":"1979","unstructured":"Rubin F (1979) Arithmetic stream coding using fixed precision registers. IEEE Trans Inf Theory 25(6):672\u2013675. doi:\n                    10.1109\/TIT.1979.1056107","journal-title":"IEEE Trans Inf Theory"},{"key":"17_CR21","doi-asserted-by":"publisher","unstructured":"Shebaro B, Sultana S, Reddy Gopavaram S, Bertino E (2012) Demonstrating a lightweight data provenance for sensor networks. In: Proceedings of the 2012 ACM conference on computer and communications security, CCS \u201912. ACM, New York, NY, USA, pp 1022\u20131024. doi:\n                    10.1145\/2382196.2382312","DOI":"10.1145\/2382196.2382312"},{"key":"17_CR22","doi-asserted-by":"publisher","unstructured":"Sultana S, Ghinita G, Bertino E, Shehab M (2012) A lightweight secure provenance scheme for wireless sensor networks. In: 2012 IEEE 18th international conference on parallel and distributed systems (ICPADS), pp 101\u2013108. doi:\n                    10.1109\/ICPADS.2012.24","DOI":"10.1109\/ICPADS.2012.24"},{"issue":"3","key":"17_CR23","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1109\/TDSC.2013.44","volume":"12","author":"S Sultana","year":"2015","unstructured":"Sultana S, Ghinita G, Bertino E, Shehab M (2015) A lightweight secure scheme for detecting provenance forgery and packet dropattacks in wireless sensor networks. IEEE Trans Dependable Secure Comput 12(3):256\u2013269. doi:\n                    10.1109\/TDSC.2013.44","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"8","key":"17_CR24","doi-asserted-by":"publisher","first-page":"1890","DOI":"10.1109\/TKDE.2012.31","volume":"25","author":"S Sultana","year":"2013","unstructured":"Sultana S, Shehab M, Bertino E (2013) Secure provenance transmission for streaming data. IEEE Trans Knowl Data Eng 25(8):1890\u20131903. doi:\n                    10.1109\/TKDE.2012.31","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"17_CR25","doi-asserted-by":"publisher","unstructured":"Sy D, Bao L (2006) Captra: coordinated packet traceback. In: Proceedings of the 5th international conference on information processing in sensor networks, IPSN \u201906, ACM, New York, NY, USA, pp 152\u2013159. doi:\n                    10.1145\/1127777.1127803","DOI":"10.1145\/1127777.1127803"},{"key":"17_CR26","unstructured":"Vitter JS, Howard PG, Howard PG, Vitter JS (1994) Arithmetic coding for data compression. In: Information processing and management, pp 749\u2013763"},{"issue":"2","key":"17_CR27","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1109\/TPDS.2015.2402156","volume":"27","author":"C Wang","year":"2016","unstructured":"Wang C, Hussain SR, Bertino E (2016) Dictionary-based secure provenance compression for wireless sensor networks. IEEE Trans Parallel Distrib Syst 27(2):405\u2013418. doi:\n                    10.1109\/TPDS.2015.2402156","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"6","key":"17_CR28","doi-asserted-by":"publisher","first-page":"520","DOI":"10.1145\/214762.214771","volume":"30","author":"IH Witten","year":"1987","unstructured":"Witten IH, Neal RM, Cleary JG (1987) Arithmetic coding for data compression. ACM Commun 30(6):520\u2013540. doi:\n                    10.1145\/214762.214771","journal-title":"ACM Commun"},{"key":"17_CR29","volume-title":"Introduction to internet of things","author":"L Yunhao","year":"2013","unstructured":"Yunhao L (2013) Introduction to internet of things, 2nd edn. Science, Beijing","edition":"2"},{"key":"17_CR30","doi-asserted-by":"publisher","unstructured":"Zhang Q, Zhou X, Yang F, Li X (2007) Contact-based traceback in wireless sensor networks. In: 2007 international conference on wireless communications, networking and mobile computing, pp 2487\u20132490. doi:\n                    10.1109\/WICOM.2007.619","DOI":"10.1109\/WICOM.2007.619"},{"key":"17_CR31","doi-asserted-by":"publisher","unstructured":"Zhou W, Fei Q, Narayan A, Haeberlen A, Loo BT, Sherr M (2011) Secure network provenance. In: Proceedings of the twenty-third ACM symposium on operating systems principles, SOSP \u201911. ACM, New York, NY, USA, pp 295\u2013310. doi:\n                    10.1145\/2043556.2043584","DOI":"10.1145\/2043556.2043584"},{"key":"17_CR32","doi-asserted-by":"publisher","unstructured":"Zhou W, Sherr M, Tao T, Li X, Loo BT, Mao Y (2010) Efficient querying and maintenance of network provenance at internet-scale. In: Proceedings of the 2010 ACM SIGMOD international conference on management of data, SIGMOD \u201910. ACM, New York, NY, USA, pp 615\u2013626. doi:\n                    10.1145\/1807167.1807234","DOI":"10.1145\/1807167.1807234"},{"issue":"5","key":"17_CR33","doi-asserted-by":"publisher","first-page":"530","DOI":"10.1109\/TIT.1978.1055934","volume":"24","author":"J Ziv","year":"1978","unstructured":"Ziv J, Lempel A (1978) Compression of individual sequences via variable-rate coding. IEEE Trans Inf Theory 24(5):530\u2013536. doi:\n                    10.1109\/TIT.1978.1055934","journal-title":"IEEE Trans Inf Theory"}],"container-title":["Data Science and Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s41019-016-0017-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s41019-016-0017-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s41019-016-0017-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,16]],"date-time":"2020-05-16T18:36:59Z","timestamp":1589654219000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s41019-016-0017-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9]]},"references-count":33,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2016,9]]}},"alternative-id":["17"],"URL":"https:\/\/doi.org\/10.1007\/s41019-016-0017-x","relation":{},"ISSN":["2364-1185","2364-1541"],"issn-type":[{"value":"2364-1185","type":"print"},{"value":"2364-1541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,9]]},"assertion":[{"value":"8 August 2016","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 August 2016","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 September 2016","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}