{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T21:42:13Z","timestamp":1729633333928,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,9]]},"DOI":"10.1109\/icdim.2013.6694001","type":"proceedings-article","created":{"date-parts":[[2014,1,6]],"date-time":"2014-01-06T12:10:38Z","timestamp":1389010238000},"page":"41-48","source":"Crossref","is-referenced-by-count":10,"title":["Secure multi-hop routing protocols in Wireless Sensor Networks: Requirements, challenges and solutions"],"prefix":"10.1109","author":[{"given":"Nouman M","family":"Durrani","sequence":"first","affiliation":[]},{"given":"Nadeem","family":"Kafi","sequence":"additional","affiliation":[]},{"given":"Jawwad","family":"Shamsi","sequence":"additional","affiliation":[]},{"given":"Waleej","family":"Haider","sequence":"additional","affiliation":[]},{"given":"Asad M","family":"Abbsi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"crossref","DOI":"10.1109\/ICON.2007.4444087","article-title":"Trusted greedy perimeter stateless routing","author":"pirzada","year":"2007","journal-title":"Networks 2007 ICON 2007 15th IEEE International Conference On IEEE"},{"key":"17","volume":"2","author":"rappaport","year":"1996","journal-title":"Wireless Communications Principles and Practice"},{"key":"18","article-title":"A trust model based routing protocol for secure ad hoc networks","volume":"2","author":"li","year":"2004","journal-title":"Aerospace Conference 2004 Proceedings 2004 IEEE"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/AERO.2002.1035242"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1023\/A:1016598314198"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2007.72"},{"journal-title":"INSENS Intrusion-tolerant Routing in Wireless Sensor Networks","year":"2002","author":"deng","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2007.06095"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2008.128"},{"key":"21","first-page":"42","article-title":"Energy-aware data-centric routing in microsensor networks","author":"azzedine","year":"2003","journal-title":"Proceedings of the 8th MSWiM 03 San Diego"},{"key":"20","first-page":"3005","article-title":"Energy-efficient communication protocol for wireless microsensor networks","author":"heinzelman","year":"2000","journal-title":"Proc of HICSS"},{"key":"22","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1007\/978-3-540-74742-0_38","article-title":"A secure energy-efficient routing protocol for WSN","author":"pathan","year":"2007","journal-title":"Parallel and Distributed Processing and Applications"},{"journal-title":"Routing Security Issues in Wireless Sensor Networks Attacks and Defenses","year":"2011","author":"sen","key":"23"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1016\/S1570-8705(03)00008-8"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/ICACT.2006.206151"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/ICRTIT.2012.6206806"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.3390\/s120100650"},{"key":"2","article-title":"Secure routing in wireless sensor networks","volume":"9","author":"sahoo","year":"2012","journal-title":"International Journal of Computer Science"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-34805-0_40"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.4303\/ijsndc\/235548"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/984622.984660"},{"key":"6","article-title":"Adhoc on-demand distance vector (AODV) routing","author":"perkins","year":"2003","journal-title":"IETF RFC 3561"},{"key":"5","article-title":"An energy and trust-aware routing protocol for large wireless sensor networks","author":"zahariadis","year":"2009","journal-title":"Proceedings of the 9th WSEAS International Conference on Applied Informatics and Communications World Scientific and Engineering Academy and Society (WSEAS)"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345920"},{"key":"9","first-page":"59","author":"jing","year":"2008","journal-title":"An Efficiency Security Model of Routing Protocol in Wireless Sensor Networks Second Asia International Conference on Modeling &Simulation"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA.2007.370892"}],"event":{"name":"2013 Eighth International Conference on Digital Information Management (ICDIM)","start":{"date-parts":[[2013,9,10]]},"location":"Islamabad, Pakistan","end":{"date-parts":[[2013,9,12]]}},"container-title":["Eighth International Conference on Digital Information Management (ICDIM 2013)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6684408\/6693962\/06694001.pdf?arnumber=6694001","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T01:23:21Z","timestamp":1498094601000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6694001\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/icdim.2013.6694001","relation":{},"subject":[],"published":{"date-parts":[[2013,9]]}}}