{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T01:09:30Z","timestamp":1749776970733,"version":"3.28.0"},"reference-count":42,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1109\/afrcon.2017.8095705","type":"proceedings-article","created":{"date-parts":[[2017,11,28]],"date-time":"2017-11-28T11:04:21Z","timestamp":1511867061000},"page":"1508-1513","source":"Crossref","is-referenced-by-count":18,"title":["Software defined wireless sensor networks security challenges"],"prefix":"10.1109","author":[{"given":"Tebogo","family":"Kgogo","sequence":"first","affiliation":[]},{"given":"Bassey","family":"Isong","sequence":"additional","affiliation":[]},{"given":"Adnan M.","family":"Abu-Mahfouz","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2011.6089085"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICUFN.2014.6876752"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2015.2421391"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7378421"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/SECON.2016.7506770"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-28430-9_9"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2012.6212011"},{"journal-title":"A Survey of Attacks Security Mechanisms and Challenges in Wireless Sensor Networks","year":"2009","author":"padmavathi","key":"ref36"},{"key":"ref35","first-page":"199","article-title":"Securs and dependable software defined networks","volume":"61","author":"akhunzada","year":"2016","journal-title":"J Netw"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.422"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2000.5340804"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2013.6654813"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/s17051031"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/AERO.2013.6496914"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2017.02.026"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2666200"},{"key":"ref15","article-title":"Security in wireless sensor networks","author":"du","year":"2008","journal-title":"IEEE Wirel Commun"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.04.239"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2016.7819342"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/AFRCON.2013.6757656"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1121776.1121780"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2015.02.014"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2687619"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/COMCAS.2013.6685237"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/QBSC.2014.6841187"},{"key":"ref6","first-page":"1","article-title":"Toward developing a distributed autonomous energy management system (DAEMS)","author":"abu-mahfouz","year":"2015","journal-title":"AFRICON 2015 IEEE"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.07.004"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICMIRA.2013.18"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2015.7281870"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.proeng.2016.07.426"},{"key":"ref2","first-page":"91","article-title":"Positioning system in wireless sensor networks using NS-2","volume":"2","author":"abu-mahfouz","year":"2012","journal-title":"Softw Eng"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6553676"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSNET.2017.10007406"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2008.4625802"},{"key":"ref22","first-page":"513","article-title":"Security in Wireless Sensor Networks","author":"saraogi","year":"2004","journal-title":"ACM SenSys"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2009.090205"},{"article-title":"DISCO: Distributed multidomain SDN controllers","year":"0","author":"phemius","key":"ref42"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.10.011"},{"key":"ref41","article-title":"A NICE Way to Test OpenFlow Applications","author":"canini","year":"2012","journal-title":"NSDI"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"4","DOI":"10.3390\/jimaging1010004","article-title":"A Survey of Image Security in Wireless Sensor Networks","volume":"1","author":"de","year":"2015","journal-title":"Journal of Imaging"},{"key":"ref26","first-page":"2","author":"luo","year":"2012","journal-title":"Sensor OpenFlow Enabling Software-Defined Wireless Sensor Networks"},{"article-title":"Using Software-defined Networking Principles for Wireless Sensor Networks","year":"0","author":"jacobsson","key":"ref25"}],"event":{"name":"2017 IEEE AFRICON","start":{"date-parts":[[2017,9,18]]},"location":"Cape Town","end":{"date-parts":[[2017,9,20]]}},"container-title":["2017 IEEE AFRICON"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8085624\/8095433\/08095705.pdf?arnumber=8095705","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,6]],"date-time":"2019-10-06T20:14:28Z","timestamp":1570392868000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8095705\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/afrcon.2017.8095705","relation":{},"subject":[],"published":{"date-parts":[[2017,9]]}}}