{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T06:56:55Z","timestamp":1758265015658},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/perser.2005.1506391","type":"proceedings-article","created":{"date-parts":[[2005,9,12]],"date-time":"2005-09-12T11:19:24Z","timestamp":1126523964000},"page":"59-68","source":"Crossref","is-referenced-by-count":5,"title":["A fault localized scheme for false report filtering in sensor networks"],"prefix":"10.1109","author":[{"family":"Li Zhou","sequence":"first","affiliation":[]},{"given":"C.V.","family":"Ravishankar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/948117.948120"},{"key":"16","article-title":"An interleaved hop-by-hop authetication scheme for filtering false data in sensor networks","author":"zhu","year":"2004","journal-title":"IEEE Symposium SP"},{"key":"13","article-title":"Statistical en-route filtering of injected false data in sensor networks","author":"ye","year":"2004","journal-title":"INFOCOM"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-005-6612-9"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/958491.958496"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2004.1400217"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2005.863478"},{"key":"2","article-title":"A pairwise key pre-distribution scheme for wireless sensor networks","author":"du","year":"2003","journal-title":"1st ACM Conf on Computer and Communication Security"},{"key":"1","article-title":"A key management scheme for wireless sensor networks using deployment knowledge","author":"du","year":"2004","journal-title":"INFOCOM"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139168724"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/986858.986869"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948119"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/358790.358797"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/378993.379006"},{"key":"9","article-title":"Spins: Security protocols for sensor networks","author":"perrig","year":"2001","journal-title":"ACM MOBICOM"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2004.1381904"}],"event":{"name":"ICPS '05. International Conference on Pervasive Services, 2005.","location":"Santorini, Greece"},"container-title":["ICPS '05. Proceedings. International Conference on Pervasive Services, 2005."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10064\/32279\/01506391.pdf?arnumber=1506391","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,15]],"date-time":"2017-03-15T00:52:32Z","timestamp":1489539152000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1506391\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/perser.2005.1506391","relation":{},"subject":[]}}