{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:20:30Z","timestamp":1763457630838,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1109\/fuzz-ieee.2017.8015552","type":"proceedings-article","created":{"date-parts":[[2017,8,24]],"date-time":"2017-08-24T16:55:37Z","timestamp":1503593737000},"page":"1-6","source":"Crossref","is-referenced-by-count":11,"title":["An efficient fuzzy path selection approach to mitigate selective forwarding attacks in wireless sensor networks"],"prefix":"10.1109","author":[{"given":"Seyyit Alper","family":"Sert","sequence":"first","affiliation":[]},{"given":"Carol","family":"Fung","sequence":"additional","affiliation":[]},{"given":"Roy","family":"George","sequence":"additional","affiliation":[]},{"given":"Adnan","family":"Yazici","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/BROADNETS.2004.77"},{"key":"ref11","first-page":"1","article-title":"Wormhole attack detection algorithms in wireless network coding systems","author":"zhong","year":"2014","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2012.6214260"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2010.2045373"},{"key":"ref14","first-page":"910","article-title":"Impacts of routing attacks on Surveillance Wireless Sensor Networks","author":"sert","year":"2015","journal-title":"Proc International Wireless Communications and Mobile Computing Conference (IWCMC)"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CCCM.2009.5268016"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1504\/IJAHUC.2009.023897"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ITCC.2005.295"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIT.2009.290"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCNT.2013.6726833"},{"journal-title":"X 800 Security Architecture for Open Systems Interconnection for Ccitt Applications","year":"1991","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/S1570-8705(03)00008-8"},{"journal-title":"Cryptography and Network Security Principles and Practice","year":"2011","author":"stallings","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2006.315852"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICACT.2006.206151"},{"key":"ref7","first-page":"9","article-title":"A survey of attacks, security mechanisms and challenges in wireless sensor networks","volume":"4","author":"padmavathi","year":"2009","journal-title":"International Journal of Information and Computer Security"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7060498"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(01)00302-4"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/984622.984660"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CSNT.2014.153"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2014.11.063"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3390\/s16010118"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2000.926982"}],"event":{"name":"2017 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)","start":{"date-parts":[[2017,7,9]]},"location":"Naples, Italy","end":{"date-parts":[[2017,7,12]]}},"container-title":["2017 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8011834\/8015374\/08015552.pdf?arnumber=8015552","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,9,7]],"date-time":"2017-09-07T00:48:12Z","timestamp":1504745292000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8015552\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/fuzz-ieee.2017.8015552","relation":{},"subject":[],"published":{"date-parts":[[2017,7]]}}}