{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,25]],"date-time":"2024-08-25T15:26:23Z","timestamp":1724599583745},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,4]]},"DOI":"10.1109\/icnsc.2013.6548756","type":"proceedings-article","created":{"date-parts":[[2013,7,9]],"date-time":"2013-07-09T10:57:54Z","timestamp":1373367474000},"source":"Crossref","is-referenced-by-count":12,"title":["Data link layer security protocols in Wireless Sensor Networks: A survey"],"prefix":"10.1109","author":[{"given":"S. M.","family":"AlMheiri","sequence":"first","affiliation":[]},{"given":"H. S.","family":"AlQamzi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","author":"pister","year":"1999","journal-title":"Smart Dust Wireless Networks of Millimeter-Scale Sensor Nodes"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2012.6181090"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/1454630.1454637"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2011.07.017"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1023\/A:1016598314198"},{"key":"15","author":"hinrich hauer","year":"2009","journal-title":"TKN Technical Reports Series"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2005.1440978"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/MINES.2010.175"},{"key":"14","year":"2003","journal-title":"IEEE 802 15 4 Wireless medium access control and physical layer specifications for low rate wireless personal area networks"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2007.4379708"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1031495.1031518"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2000.848446"},{"key":"3","first-page":"282","article-title":"A framework for providing e-services to the rural areas using wireless ad hoc and sensor networks","author":"pathan","year":"2006","journal-title":"IEEE ICNEWS"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/378993.379006"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/ICACT.2006.206151"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1024422"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/378993.379006"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.8"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1031495.1031515"},{"key":"5","article-title":"Wireless sensor network security: A survey","author":"walters","year":"2006","journal-title":"Security in Distributed Grid and Pervasive Computing"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.5121\/jgraphhoc.2011.3103"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ICMA.2006.257548"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/EIT.2007.4374458"}],"event":{"name":"2013 IEEE 10th International Conference on Networking, Sensing and Control (ICNSC 2013)","location":"Evry","start":{"date-parts":[[2013,4,10]]},"end":{"date-parts":[[2013,4,12]]}},"container-title":["2013 10th IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL (ICNSC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6530812\/6548700\/06548756.pdf?arnumber=6548756","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T14:31:25Z","timestamp":1490193085000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6548756\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,4]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/icnsc.2013.6548756","relation":{},"subject":[],"published":{"date-parts":[[2013,4]]}}}