{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T10:48:13Z","timestamp":1761648493567,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1109\/iscc.2017.8024586","type":"proceedings-article","created":{"date-parts":[[2017,9,4]],"date-time":"2017-09-04T20:26:54Z","timestamp":1504556814000},"page":"552-557","source":"Crossref","is-referenced-by-count":32,"title":["Using repeated game for maximizing high priority data trustworthiness in Wireless Sensor Networks"],"prefix":"10.1109","author":[{"given":"Mohamed S.","family":"Abdalzaher","sequence":"first","affiliation":[]},{"given":"Karim","family":"Seddik","sequence":"additional","affiliation":[]},{"given":"Osamu","family":"Muta","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Game Theory in Wireless and Communication Networks Theory Models and Applications","year":"2012","author":"han","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2016.2526601"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MED.2009.5164584"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SENSORCOMM.2009.76"},{"key":"ref14","first-page":"8","article-title":"Detecting selective forwarding attacks in wireless sensor networks","author":"yu","year":"2006","journal-title":"Parallel and Distributed Processing Symposium 2006 IPDPS 2006 20th International"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.5815\/ijwmt.2012.02.06"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2012.07.006"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"1218","DOI":"10.1016\/j.jpdc.2007.04.014","article-title":"Chemas: Identify suspect nodes in selective forwarding attacks","volume":"67","author":"xiao","year":"2007","journal-title":"Journal of Parallel and Distributed Computing"},{"key":"ref18","first-page":"1","article-title":"Protecting against malicious and selective forwarding attacks for p2p search & retrieval system","author":"chuang","year":"2016","journal-title":"Peer-to-Peer Networking and Applications"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"1","DOI":"10.5815\/ijcnis.2011.01.01","article-title":"Comprehensive study of selective forwarding attack in wireless sensor networks","volume":"3","author":"khan","year":"2011","journal-title":"International Journal of Computer Network and Information Security"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2012.78"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"1003","DOI":"10.3390\/s16071003","article-title":"Game theory meets wireless sensor networks security requirements and threats mitigation: A survey","volume":"16","author":"abdalzaher","year":"2016","journal-title":"SENSORS"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2016.1336"},{"key":"ref5","first-page":"538","article-title":"A simplified stackelberg game approach for securing data trustworthiness in wireless sensor networks","author":"abdalzaher","year":"2016","journal-title":"Institute of Electronics Information and Communication Engineers (IEICE) General Conference B-18-40"},{"journal-title":"Application and Multidisciplinary Aspects of Wireless Sensor Networks Concepts Integration and Case Studies","year":"2010","author":"gavrilovska","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2017.8024697"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2016.7444900"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1016\/j.jpdc.2015.12.002","article-title":"Distributed travel-time seismic tomography in large-scale sensor networks","volume":"89","author":"kamath","year":"2016","journal-title":"Journal of Parallel and Distributed Computing"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.050113.00191"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.042711.00083"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2013.121906"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2010.05.090700"},{"key":"ref24","first-page":"259","article-title":"A game theory based approach for security in wireless sensor networks","author":"agah","year":"2004","journal-title":"Performance Computing and Communications 2004 IEEE International Conference on"},{"journal-title":"Data and Computer Communications","year":"2007","author":"stallings","key":"ref23"},{"journal-title":"C product Chipcon cc 1000 single chip very low power rf transceiver","year":"0","key":"ref25"}],"event":{"name":"2017 IEEE Symposium on Computers and Communications (ISCC)","start":{"date-parts":[[2017,7,3]]},"location":"Heraklion, Greece","end":{"date-parts":[[2017,7,6]]}},"container-title":["2017 IEEE Symposium on Computers and Communications (ISCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8016448\/8024490\/08024586.pdf?arnumber=8024586","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,3]],"date-time":"2019-10-03T03:52:11Z","timestamp":1570074731000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8024586\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/iscc.2017.8024586","relation":{},"subject":[],"published":{"date-parts":[[2017,7]]}}}