{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T05:32:39Z","timestamp":1729661559358,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,6]]},"DOI":"10.1109\/civemsa.2016.7524319","type":"proceedings-article","created":{"date-parts":[[2016,7,28]],"date-time":"2016-07-28T20:45:14Z","timestamp":1469738714000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Secured and energy efficient architecture for sensor networks"],"prefix":"10.1109","author":[{"given":"Jetendra","family":"Joshi","sequence":"first","affiliation":[]},{"given":"Amrit","family":"Bagga","sequence":"additional","affiliation":[]},{"given":"Abhinandan","family":"Bhargava","sequence":"additional","affiliation":[]},{"given":"Abhinav","family":"Goel","sequence":"additional","affiliation":[]},{"given":"Divya Sara","family":"Kurian","sequence":"additional","affiliation":[]},{"given":"Urijit","family":"Kurulkar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"903981","article-title":"Energy-Efficient Data Fusion Technique and Applications in Wireless Sensor Networks","volume":"501","author":"yun","year":"2015","journal-title":"Journal of Sensors"},{"article-title":"Data aggregation techniques in sensor networks: A survey","year":"2006","author":"ramesh","key":"ref11"},{"key":"ref12","first-page":"2393","article-title":"Security for Wireless Sensor Network","author":"saurabh","year":"2011","journal-title":"International Journal on Computer Science and Engineering"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1145\/990680.990707","article-title":"Security in wireless sensor networks","volume":"47","author":"adrian","year":"2004","journal-title":"Communications of the ACM"},{"key":"ref14","article-title":"Security of wireless sensor network","author":"jinat","year":"2009","journal-title":"Technical Report TKK-CSE-B5"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICACT.2006.206151"},{"key":"ref16","article-title":"Security Issues in Wireless Sensor Networks: Attacks and Countermeasures","volume":"1","author":"chelli","year":"2015","journal-title":"Proceedings of WorId Congress on Engineering"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"2314","DOI":"10.1016\/j.comcom.2007.04.009","article-title":"A survey of key management schemes in wireless sensor networks","volume":"30","author":"yang","year":"2007","journal-title":"Computer Communications"},{"key":"ref18","first-page":"529","article-title":"A Survey on Wireless Sensor Network Security and its Countermeasures: An Overview","volume":"a247","author":"usham","year":"2013","journal-title":"International Journal of Engineering Science Invention"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2002.804190"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1016\/j.inffus.2011.08.001","article-title":"Multisensor data fusion: A review of the state-of-the-art","volume":"14","author":"bahador","year":"2013","journal-title":"Information Fusion"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2003.1213472"},{"article-title":"Hierarchical Energy Efficient Clustering Algorithm for WSN","year":"2015","author":"rajeshwari","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2006.10.002"},{"key":"ref8","first-page":"107","article-title":"Energy Efficient Data Aggregation Using Packet Driven Timing Algorithm in Wireless Sensor Network","volume":"1","author":"kalaiselvi","year":"2015","journal-title":"International Journal of Innovative Research in Science"},{"key":"ref7","first-page":"38","article-title":"Analysis of Node Clustering Algorithms on Data Aggregation in Wireless Sensor Network","volume":"74","author":"nithyakalyani","year":"2015","journal-title":"Journal of Scientific & Industrial Research"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"621","DOI":"10.1016\/j.adhoc.2007.05.003","article-title":"Strategies and techniques for node placement in wireless sensor networks: A survey","volume":"6","author":"mohamed","year":"2008","journal-title":"Ad Hoc Networks"},{"key":"ref1","first-page":"699","article-title":"A delay-aware data collection network structure for wireless sensor networks","volume":"11 3","author":"chi-tsun","year":"2011","journal-title":"Sensors Journal IEEE"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"63","DOI":"10.5121\/ijcses.2010.1206","article-title":"Routing protocols in wireless sensor networks-A survey","volume":"1","author":"shio kumar","year":"2010","journal-title":"International Journal of Computer Science & Engineering Survey (IJCSES)"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2007.05.016"},{"key":"ref22","article-title":"Key-note: Trust Management for Public Key Infrastructures","volume":"1550","author":"matt","year":"0","journal-title":"Springerlink"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"2826","DOI":"10.1016\/j.comcom.2007.05.024","article-title":"A survey on clustering algorithms for wireless sensor networks","volume":"30","author":"abbasi","year":"2007","journal-title":"Comput Commun"},{"key":"ref23","article-title":"A Security Framework for Wireless Sensor Networks","author":"tanveer","year":"2006","journal-title":"Proc IEEE Sensors Applications Symp"}],"event":{"name":"2016 IEEE International Conference on Computational Intelligence and Virtual Environments for Measurement Systems and Applications (CIVEMSA)","start":{"date-parts":[[2016,6,27]]},"location":"Budapest, Hungary","end":{"date-parts":[[2016,6,28]]}},"container-title":["2016 IEEE International Conference on Computational Intelligence and Virtual Environments for Measurement Systems and Applications (CIVEMSA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7518535\/7524242\/07524319.pdf?arnumber=7524319","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T15:46:12Z","timestamp":1602690372000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7524319"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/civemsa.2016.7524319","relation":{},"subject":[],"published":{"date-parts":[[2016,6]]}}}