{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T16:16:12Z","timestamp":1772554572701,"version":"3.50.1"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1109\/glocom.2017.8254138","type":"proceedings-article","created":{"date-parts":[[2018,1,15]],"date-time":"2018-01-15T22:50:54Z","timestamp":1516056654000},"page":"1-6","source":"Crossref","is-referenced-by-count":14,"title":["Secure Routing in Cluster-Based Wireless Sensor Networks"],"prefix":"10.1109","author":[{"given":"Fares","family":"Mezrag","sequence":"first","affiliation":[]},{"given":"Salim","family":"Bitam","sequence":"additional","affiliation":[]},{"given":"Abdelhamid","family":"Mellouk","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"449","author":"ferreira","year":"2005","journal-title":"On the Security of Cluster - Based Communication Protocols for Wireless Sensor Networks"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1023\/A:1016598314198"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2007.05.016"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSC.2008.186"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2003.1199337"},{"key":"ref15","year":"0","journal-title":"NesC A Programming Language for Deeply Networked Systems"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/958503.958506"},{"key":"ref17","year":"2001","journal-title":"FIPS PUB 197 Specification for the Advanced Encryption Standard (AES)"},{"key":"ref18","year":"0","journal-title":"Multilinear-Modular-Hashing function"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2008.47"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/S1570-8705(03)00008-8"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2000.926982"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2005.1593277"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/WiCom.2008.889"},{"key":"ref8","article-title":"Elliptic curve cryptography (ECC) for security in wireless sensor network","volume":"1","author":"mishra","year":"2012","journal-title":"IJERT"},{"key":"ref7","article-title":"A survey on measures for secure routing in wireless sensor networks","volume":"1","author":"kellner","year":"2012","journal-title":"IJSNDC"},{"key":"ref2","first-page":"569","author":"haas","year":"2014","journal-title":"Current Challenges and Approaches in Securing Communications for Sensors and Actuators"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2004.1368893"},{"key":"ref9","year":"1999","journal-title":"Elliptic Curve Key Agreement and Key Transport Protocols"},{"key":"ref20","year":"2007","journal-title":"Single-chip 2 4 Ghz IEEE 802 15 4 Compliant and Zigbee(tm) Ready RF Transceiver"}],"event":{"name":"2017 IEEE Global Communications Conference (GLOBECOM 2017)","location":"Singapore","start":{"date-parts":[[2017,12,4]]},"end":{"date-parts":[[2017,12,8]]}},"container-title":["GLOBECOM 2017 - 2017 IEEE Global Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8253768\/8253909\/08254138.pdf?arnumber=8254138","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,2,20]],"date-time":"2018-02-20T00:14:45Z","timestamp":1519085685000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8254138\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/glocom.2017.8254138","relation":{},"subject":[],"published":{"date-parts":[[2017,12]]}}}