{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T08:07:42Z","timestamp":1768550862447,"version":"3.49.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,11]]},"DOI":"10.1109\/iswcs.2011.6125353","type":"proceedings-article","created":{"date-parts":[[2012,1,27]],"date-time":"2012-01-27T23:05:35Z","timestamp":1327705535000},"page":"276-280","source":"Crossref","is-referenced-by-count":4,"title":["Reputation routing to avoid sybil attacks in wireless sensor networks using distributed beamforming"],"prefix":"10.1109","author":[{"given":"James","family":"Harbin","sequence":"first","affiliation":[]},{"given":"Paul","family":"Mitchell","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SECCOMW.2006.359558"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/984622.984660"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2008.927073"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JCN.2005.6387982"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ISWCS.2010.5624357"},{"key":"ref15","first-page":"90","article-title":"Ad-hoc on-demand distance vector (aodv) routing","volume":"100","author":"perkins","year":"1999","journal-title":"IEEE Workshop on Mobile Computer Systems and Applications"},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45748-8_24","article-title":"The sybil attack","author":"douceur","year":"2002","journal-title":"Proc 1st International Workshop on Peer-to-Peer Systems (IPTPS)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/S1570-8705(03)00008-8"},{"key":"ref6","year":"2006","journal-title":"AusWireless (In-ternational conference on Wireless Broadband and Ultra Wideband Communication)"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2009.4785387"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CHINACOM.2008.4685243"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2005.857028"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/18.825799"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2004.1368897"},{"key":"ref9","article-title":"A survey of solutions to the sybil attack","volume":"52","author":"levine","year":"2006","journal-title":"University of Massachusetts Amherst Amherst MA Tech report"}],"event":{"name":"2011 8th International Symposium on Wireless Communication Systems (ISWCS 2011)","location":"Aachen, Germany","start":{"date-parts":[[2011,11,6]]},"end":{"date-parts":[[2011,11,9]]}},"container-title":["2011 8th International Symposium on Wireless Communication Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6099689\/6125266\/06125353.pdf?arnumber=6125353","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T13:25:14Z","timestamp":1497965114000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6125353\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,11]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/iswcs.2011.6125353","relation":{},"subject":[],"published":{"date-parts":[[2011,11]]}}}