{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T03:05:15Z","timestamp":1729652715548,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,10]]},"DOI":"10.1109\/cisim.2010.5643459","type":"proceedings-article","created":{"date-parts":[[2010,11,30]],"date-time":"2010-11-30T21:34:10Z","timestamp":1291152850000},"page":"491-496","source":"Crossref","is-referenced-by-count":0,"title":["Secure data collection in Sensor Networks using tree based key management scheme and secret sharing"],"prefix":"10.1109","author":[{"given":"A.S.","family":"Poornima","sequence":"first","affiliation":[]},{"given":"B.B.","family":"Amberker","sequence":"additional","affiliation":[]},{"given":"H.S.","family":"Likith Raj","sequence":"additional","affiliation":[]},{"given":"S.","family":"Naveen Kumar","sequence":"additional","affiliation":[]},{"given":"K.N.","family":"Pradeep","sequence":"additional","affiliation":[]},{"given":"S.V.","family":"Ravithej","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"527","article-title":"data Dissemination based on Mobile Agent in wireless sensor Networks","author":"chen","year":"2005","journal-title":"Proc of LCN 2005"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.4304\/jcp.1.1.14-21"},{"key":"ref12","first-page":"2621","article-title":"Research on Mechanism of Mobile Agent for WSN","author":"jietai","year":"2007","journal-title":"International Conference on Wireless Communications Networking and Mobile Computing WiCOM"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/INFOCOM.2006.261"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/COMSWA.2008.4554475"},{"key":"ref15","article-title":"Mobility based communication in wireless Sensor Networks","author":"ekili","year":"2006","journal-title":"IEEE Communications Magazine"},{"key":"ref16","article-title":"Power saving mobility protocol for sensor networks","author":"chae","year":"2004","journal-title":"wstfeus"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/SNPA.2003.1203354"},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.1007\/s11036-006-5186-9","article-title":"Exploiting mobility for energy efficient data collection in WSN","author":"jain","year":"2006","journal-title":"Mobile Networks and Applications"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1145\/990064.990080"},{"key":"ref4","first-page":"629","article-title":"Distributed clustering in adhoc sensor networks: a hybrid, energy-efficient approach","author":"younis","year":"2004","journal-title":"23rd Conference of the TEEE Computers and Communication Societies"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/INFCOM.2003.1209194"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/ICCCN.2004.1401721"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/MCOM.2002.1024422"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/SARNOF.2007.4567337"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1145\/1062689.1062737"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/HICSS.2000.926982"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/NCA.2008.31"},{"key":"ref9","first-page":"1172","article-title":"Mobile agent Based Colobarative Signal and Information Processing in Sensor Networks","volume":"92","author":"qi","year":"2003","journal-title":"Proceedings of the IEEE"},{"key":"ref20","article-title":"joint mobility and routing for lifetime elongation in WSN","author":"luo","year":"2005","journal-title":"INFOCOM"},{"key":"ref22","first-page":"188","article-title":"Simulating the power consumption of large scale sensor network applications","year":"2004","journal-title":"Proceedings of the 2nd international conference on Embedded networked sensor systems (SenSys 2004)"},{"key":"ref21","doi-asserted-by":"crossref","DOI":"10.1145\/285237.285260","article-title":"Secure Group Communication Using kev Graphs","author":"wong","year":"1998","journal-title":"Proc ACM SIGCOMM 98"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1145\/359168.359176"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/ICON.2008.4772567"}],"event":{"name":"2010 International Conference on Computer Information Systems and Industrial Management Applications (CISIM)","start":{"date-parts":[[2010,10,8]]},"location":"Krackow, Poland","end":{"date-parts":[[2010,10,10]]}},"container-title":["2010 International Conference on Computer Information Systems and Industrial Management Applications (CISIM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5637902\/5643452\/05643459.pdf?arnumber=5643459","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T16:42:29Z","timestamp":1497890549000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5643459\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/cisim.2010.5643459","relation":{},"subject":[],"published":{"date-parts":[[2010,10]]}}}