{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,14]],"date-time":"2024-08-14T05:59:42Z","timestamp":1723615182976},"reference-count":70,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2010,10,1]],"date-time":"2010-10-01T00:00:00Z","timestamp":1285891200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Wireless Commun."],"published-print":{"date-parts":[[2010,10]]},"DOI":"10.1109\/mwc.2010.5601953","type":"journal-article","created":{"date-parts":[[2010,10,19]],"date-time":"2010-10-19T18:57:36Z","timestamp":1287514656000},"page":"12-21","source":"Crossref","is-referenced-by-count":44,"title":["Security and privacy in emerging wireless networks [Invited Paper]"],"prefix":"10.1109","volume":"17","author":[{"given":"Di","family":"Ma","sequence":"first","affiliation":[]},{"given":"Gene","family":"Tsudik","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref70","article-title":"Authentication for Fragments","author":"partridge","year":"2005","journal-title":"ACM SIGCOMM HotNets-IV"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/WONS.2005.7"},{"key":"ref38","article-title":"Towards Characterizing and Classifying Communication-Based Automotive Applications from a Wireless Networking Perspective","author":"bai","year":"2006","journal-title":"IEEE Autonet"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/LPE.2003.1231958"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1005686.1005714"},{"key":"ref31","article-title":"Towards Autonomously-Powered CRFIDs","author":"clark","year":"2009","journal-title":"HotPower'09"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/4.668982"},{"key":"ref37","article-title":"CCCP: Secure Remote Storage for Computational RFIDs","author":"salajegheh","year":"2009","journal-title":"18th USENIX Security Symp"},{"key":"ref36","article-title":"Wirelessly-Charged UHF Tags for Sensor Data Collection","author":"prasad","year":"2008","journal-title":"IEEE RFID '08"},{"key":"ref35","first-page":"495","article-title":"A Wirelessly-Powered Platform for Sensing and Computation","author":"smith","year":"2006","journal-title":"UbiComp '06"},{"key":"ref34","author":"roundy","year":"2003","journal-title":"Energy Scavenging for Wireless Sensor Networks with Special Focus on Vibrations"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/MDSO.2006.49"},{"key":"ref62","author":"asokan","year":"2007","journal-title":"Towards Securing Disruption-tolerant Networking"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2008.4753464"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2003.1204759"},{"key":"ref28","article-title":"Revisiting Smart Dust with RFID Sensor Networks","author":"buettner","year":"2008","journal-title":"ACM SIGCOMM HotNets-VII"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/NPSEC.2005.1532050"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2009.5235352"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/SECCOM.2007.4550373"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/1247694.1247705"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2009.4917879"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/1397705.1397710"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2009.43"},{"key":"ref69","year":"2005","journal-title":"Delay tolerant networking research group Dtn-interest mailing list archive"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JCN.2000.6596708"},{"key":"ref1","article-title":"Mobile Malware ? An Outlook and a New Defense Paradigm","author":"jakobsson","year":"2010","journal-title":"RSA Conf '10"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.4304\/jcm.4.11.894-901"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1007\/978-3-540-89335-6_7","article-title":"DISH: Distributed Self-Healing in Unattended Wireless Sensor Networks","author":"ma","year":"2008","journal-title":"Symp Stabilization Safety & Security Distrib Sys"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2008.23"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462056"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1514274.1514307"},{"key":"ref26","doi-asserted-by":"crossref","DOI":"10.1109\/INFCOM.2009.5062039","article-title":"DP2AC: Distributed Privacy-Preserving Access Control in Sensor Networks","author":"zhang","year":"2009","journal-title":"IEEE INFOCOM"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1062689.1062737"},{"key":"ref50","article-title":"Challenges in Securing Vehicular Networks","author":"parno","year":"2005","journal-title":"ACM SIGCOMM HotNets-IV"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/1102219.1102223"},{"key":"ref59","year":"0","journal-title":"NASA DTN Project Page"},{"key":"ref58","author":"miles","year":"2009","journal-title":"Developing System Gives Hope to Improved Battlefield Communications"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2009.5168976"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/MOVE.2007.4300813"},{"key":"ref55","first-page":"258","article-title":"Prism: Privacy-Friendly Routing in Suspicious MANETs (and VANETs)","author":"el defrawy","year":"2008","journal-title":"IEEE ICNP '08"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2007.4375861"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/JCN.2009.6388411"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/WC-M.2006.250352"},{"key":"ref10","doi-asserted-by":"crossref","DOI":"10.1145\/1132905.1132944","article-title":"SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks","author":"yang","year":"2006","journal-title":"ACM Mobihoc"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2009.4804335"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/MOVE.2007.4300814"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2008.60"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2007.06.002"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.154"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.18"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.4108\/ICST.MOBIQUITOUS2009.6824"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2008.31"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2009.109"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2009.04.002"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.7"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.8"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1029102.1029117"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2007.4375862"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180440"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.19"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4689252"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1029102.1029116"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/MOBIQW.2006.361765"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/1080754.1080759"},{"key":"ref48","article-title":"Security Issues in a Future Vehicular Network","author":"el zarki","year":"2002","journal-title":"EuroWireless '02"},{"key":"ref47","year":"2003","journal-title":"Standard Specification for Telecommunications and Information Exchange Between Roadside and Vehicle Systems 5 GHz Band Dedicated Short Range Communications (DSRC) Medium Access Control (MAC) and Physical Layer (PHY) Specifications"},{"key":"ref42","doi-asserted-by":"crossref","first-page":"882","DOI":"10.1109\/TVT.2008.928899","article-title":"Dissemination and Harvesting of Urban Data using Vehicular Sensor Platforms","volume":"58","author":"lee","year":"2009","journal-title":"IEEE Trans Vehic Tech"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/1161252.1161254"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/WC-M.2006.250358"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2008.03.009"}],"container-title":["IEEE Wireless Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/7742\/5601945\/05601953.pdf?arnumber=5601953","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,31]],"date-time":"2024-03-31T14:03:28Z","timestamp":1711893808000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/5601953\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10]]},"references-count":70,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/mwc.2010.5601953","relation":{},"ISSN":["1536-1284"],"issn-type":[{"value":"1536-1284","type":"print"}],"subject":[],"published":{"date-parts":[[2010,10]]}}}