{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T18:32:18Z","timestamp":1773081138528,"version":"3.50.1"},"reference-count":19,"publisher":"Elsevier BV","issue":"4","license":[{"start":{"date-parts":[[2003,11,1]],"date-time":"2003-11-01T00:00:00Z","timestamp":1067644800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[2003,11]]},"DOI":"10.1016\/s1389-1286(03)00352-9","type":"journal-article","created":{"date-parts":[[2003,9,12]],"date-time":"2003-09-12T13:21:28Z","timestamp":1063372888000},"page":"421-435","source":"Crossref","is-referenced-by-count":21,"title":["Secure sensor networks for perimeter protection"],"prefix":"10.1016","volume":"43","author":[{"given":"Sasikanth","family":"Avancha","sequence":"first","affiliation":[]},{"given":"Jeffrey","family":"Undercoffer","sequence":"additional","affiliation":[]},{"given":"Anupam","family":"Joshi","sequence":"additional","affiliation":[]},{"given":"John","family":"Pinkston","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S1389-1286(03)00352-9_BIB1","unstructured":"Ball Semiconductor Inc., Medical Applications\u2013\u2013Benefits of Spherical Geometry, Ball Semiconductor, Inc, 1997. Available from <http:\/\/www.ballsemi.com\/medical\/MedPage.html>"},{"key":"10.1016\/S1389-1286(03)00352-9_BIB2","unstructured":"J.M. Kahn, R.H. Katz, K.S.J. Pister, Mobile networking for smart dust, in: ACM\/IEEE Intl. Conf. on Mobile Computing and Networking, 1999"},{"key":"10.1016\/S1389-1286(03)00352-9_BIB3","doi-asserted-by":"crossref","first-page":"521","DOI":"10.1023\/A:1016598314198","article-title":"SPINS: security protocols for sensor networks","volume":"8","author":"Perrig","year":"2002","journal-title":"Wireless Networks"},{"key":"10.1016\/S1389-1286(03)00352-9_BIB4","doi-asserted-by":"crossref","unstructured":"S. Park, A. Savvides, M.B. Srivastava, Sensorsim: a simulation framework for sensor networks, in: Proc. of ACM MSWiM 2000, 2000, pp. 104\u2013111","DOI":"10.1145\/346855.346870"},{"key":"10.1016\/S1389-1286(03)00352-9_BIB5","doi-asserted-by":"crossref","unstructured":"S. Yi, P. Naldurg, R. Kravets, Security-aware ad hoc routing for wireless networks, in: Proc. of 2001 ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2001, pp. 299\u2013302","DOI":"10.1145\/501416.501464"},{"key":"10.1016\/S1389-1286(03)00352-9_BIB6","unstructured":"D.E. Bell, L.J. LaPadula, Secure computer systems: mathematical foundations and model, Technical Report M74-244, Mitre Corporation, 1975"},{"key":"10.1016\/S1389-1286(03)00352-9_BIB7","doi-asserted-by":"crossref","first-page":"4361","DOI":"10.1063\/1.1319859","article-title":"Low cost optical instrumentation for biomedical measurement","author":"Kostov","year":"2000","journal-title":"J. Rev. Sci. Instrum."},{"key":"10.1016\/S1389-1286(03)00352-9_BIB8","doi-asserted-by":"crossref","unstructured":"C. Intanagonwiwat, R. Govindan, D. Estrin, Directed diffusion: a scalable and robust communication paradigm for sensor networks, in: Proc. of Mobicom \u201900, 2000","DOI":"10.1145\/345910.345920"},{"key":"10.1016\/S1389-1286(03)00352-9_BIB9","doi-asserted-by":"crossref","unstructured":"J. Kulik, W.R. Heinzelman, H. Balakrishnan, Adaptive protocols for information dissemination in wireless sensor networks, in: Proc. of Mobicom \u201999, Seattle, WA, 1999","DOI":"10.1145\/313451.313529"},{"key":"10.1016\/S1389-1286(03)00352-9_BIB10","doi-asserted-by":"crossref","unstructured":"S. Madden, M.J. Franklin, Fjording the stream: an architecture for queries over streaming sensor data, in: Proc. of ICDE 2002, 2002","DOI":"10.1109\/ICDE.2002.994774"},{"key":"10.1016\/S1389-1286(03)00352-9_BIB11","doi-asserted-by":"crossref","unstructured":"P. Bonnet, J.E. Gehrke, P. Seshadri, Towards sensor database systems, in: Proc. of Second International Conference on Mobile Data Management, 2001","DOI":"10.1007\/3-540-44498-X_1"},{"key":"10.1016\/S1389-1286(03)00352-9_BIB12","unstructured":"National Institute of Standards and Technology, FIPS 140-2; Security Requirements for Cryptographic Modules, November 2002"},{"key":"10.1016\/S1389-1286(03)00352-9_BIB13","unstructured":"National Institute of Standards and Technology, FIPS 46-2; Data Encryption Standard, December 1993"},{"key":"10.1016\/S1389-1286(03)00352-9_BIB14","unstructured":"National Institute of Standards and Technology, FIPS 81; DES Modes of Operation, December 1980"},{"key":"10.1016\/S1389-1286(03)00352-9_BIB15","series-title":"Cryptography and Data Security","author":"Denning","year":"1982"},{"key":"10.1016\/S1389-1286(03)00352-9_BIB16","series-title":"Applied Cryptography","author":"Schneier","year":"1996"},{"key":"10.1016\/S1389-1286(03)00352-9_BIB17","unstructured":"X. Chen, T. Woo, Energy Efficient Data Encryption Algorithms, December 2002. Available from <http:\/\/www.vlsi.uwaterloo.ca\/thwoo\/ece750report.pdf>"},{"key":"10.1016\/S1389-1286(03)00352-9_BIB18","unstructured":"The Network Simulator, 1996. Available from <http:\/\/www-mash.berkeley.edu\/ns>"},{"key":"10.1016\/S1389-1286(03)00352-9_BIB19","unstructured":"Mote. Available from <http:\/\/kingkong.me.berkeley.edu\/nota\/RunningMan\/Mote.htm>, page from the Smart Dust program giving an overview of the Berkeley Renee Mote"}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128603003529?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128603003529?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,3,25]],"date-time":"2020-03-25T14:51:32Z","timestamp":1585147892000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1389128603003529"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,11]]},"references-count":19,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2003,11]]}},"alternative-id":["S1389128603003529"],"URL":"https:\/\/doi.org\/10.1016\/s1389-1286(03)00352-9","relation":{},"ISSN":["1389-1286"],"issn-type":[{"value":"1389-1286","type":"print"}],"subject":[],"published":{"date-parts":[[2003,11]]}}}