{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T06:13:13Z","timestamp":1768284793682,"version":"3.49.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,1]]},"DOI":"10.1109\/comsnets.2011.5716524","type":"proceedings-article","created":{"date-parts":[[2011,2,18]],"date-time":"2011-02-18T14:10:46Z","timestamp":1298038246000},"page":"1-6","source":"Crossref","is-referenced-by-count":4,"title":["HySecNJoining: A hybrid secure node joining algorithm for wireless sensor network"],"prefix":"10.1109","author":[{"given":"H K","family":"Kalita","sequence":"first","affiliation":[]},{"given":"A","family":"Kar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","author":"kalita","year":"2010","journal-title":"Key management in secure self organized wireless sensor network A new approach"},{"key":"ref11","author":"kalita","year":"2010","journal-title":"A new algorithm for end to end security of data in a secure self organized wireless sensor network"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/941360.941364"},{"key":"ref13","article-title":"Wmnsec security for wireless mesh networks","author":"lukas","year":"2009","journal-title":"IWCMC09"},{"key":"ref14","article-title":"Faultbased attack of rsa authentication","author":"pellegrini","year":"2010"},{"key":"ref15","first-page":"47907","article-title":"Security in wireless sensor networks - a layer based classification","author":"saxena","year":"2007","journal-title":"Technical Report"},{"key":"ref16","author":"soderman","year":"2008","journal-title":"An analysis of wsn security managemant"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/98.878532"},{"key":"ref18","author":"sohrabi","year":"2002","journal-title":"Scalable self-assembly for ad hoc wireless sensor networks"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2004.43"},{"key":"ref4","article-title":"Self-organization in ad hoc networks: Overview and classification","author":"dressler","year":"2006","journal-title":"Technical Report 02"},{"key":"ref3","article-title":"Self-organization in sensor networks","author":"c collier","year":"2003"},{"key":"ref6","author":"haque","year":"2008","journal-title":"An asymmetric key-based security architecture for wireless sensor networks"},{"key":"ref5","author":"fotschl","year":"2006","journal-title":"Security versus power consumption in wireless sensor networks"},{"key":"ref8","article-title":"Ssl-based lightweight security of in-based wireless sensor networks","author":"jung","year":"2007"},{"key":"ref7","article-title":"secfieck: A public key technology platform for wireless sensor networks","author":"hu","year":"2009"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2004.833122"},{"key":"ref1","article-title":"Analysis of public-key cryptography for wireless sensor networks security","volume":"41","author":"amin","year":"2008","journal-title":"World Academy of Science Engineering and Technology"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS.2010.5431968"},{"key":"ref20","article-title":"Wireless Sensor Network Simulator v1.1","author":"stein","year":"2005"},{"key":"ref22","article-title":"Public key infrastructure overview","author":"weise","year":"2001"},{"key":"ref21","first-page":"339","article-title":"Research on the security in wireless sensor network","volume":"5","author":"weimin","year":"2006","journal-title":"Asian Journal of Information Technology"},{"key":"ref23","article-title":"Security solutions for wireless sensor networks","author":"westoff","year":"2006","journal-title":"Special Issue Dependable IT and Network Technology"}],"event":{"name":"2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)","location":"Bangalore","start":{"date-parts":[[2011,1,4]]},"end":{"date-parts":[[2011,1,8]]}},"container-title":["2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5710820\/5716386\/05716524.pdf?arnumber=5716524","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T03:10:22Z","timestamp":1490065822000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5716524\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,1]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/comsnets.2011.5716524","relation":{},"subject":[],"published":{"date-parts":[[2011,1]]}}}