{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:10:55Z","timestamp":1763467855875},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1109\/seccom.2007.4550372","type":"proceedings-article","created":{"date-parts":[[2008,6,25]],"date-time":"2008-06-25T14:08:16Z","timestamp":1214402896000},"page":"494-503","source":"Crossref","is-referenced-by-count":6,"title":["Sybil attack detection in a hierarchical sensor network"],"prefix":"10.1109","author":[{"family":"Jian Yin","sequence":"first","affiliation":[]},{"given":"Sanjay Kumar","family":"Madria","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2005.57"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/984622.984660"},{"key":"ref12","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45748-8_24","article-title":"The Sybil Attack","author":"douceur","year":"2002","journal-title":"Proceedings of the First International Workshop on Peer-to-Peer Systems (IPTPS)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SNPD-SAWN.2005.15"},{"key":"ref14","article-title":"Practical Byzantine Fault Tolerance","author":"castro","year":"1999","journal-title":"OSDI Symposium on Operating Systems Design and Implementation"},{"key":"ref15","first-page":"340","article-title":"A Routing Protocol for Finding Two Node-disjoint Paths in Computer Networks","author":"ishida","year":"1992","journal-title":"International Conference on Network Protocols"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/941360.941364"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1980.10006"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1031495.1031515"},{"year":"0","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/986858.986870"},{"key":"ref3","article-title":"A Topology Discovery Algorithm for Sensor Networks with Applications to Network Management","author":"deb","year":"2002","journal-title":"IEEE CAS Workshop"},{"key":"ref6","article-title":"A Hierarchical Secure Routing Protocol against Black Hole Attacks in Sensor Networks","author":"yin","year":"2006","journal-title":"Proceedings of IEEE SUTC"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/381677.381696"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209219"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/S1570-8705(03)00008-8"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/974121.974123"},{"key":"ref1","article-title":"SecRout: A Secure Routing Protocol for Sensor Networks","author":"yin","year":"2007","journal-title":"Proceedings of IEEE AINA April 2006 extended version to appear in Intl journal of Distributed Sensor Networks"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/948117.948120"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2005.1440767"},{"key":"ref22","article-title":"HMAC: Keyed-Hashing for Message Authentication","author":"krawczyk","year":"1997","journal-title":"RFC 2104"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2004.17"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/358790.358797"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1007\/3-540-60590-8_7","article-title":"The RC5 Encryption Algorithm","author":"rivest","year":"1995","journal-title":"Proc Int Workshop Fast Software Encrypt"}],"event":{"name":"2007 3rd International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007","start":{"date-parts":[[2007,9,17]]},"location":"Nice, France","end":{"date-parts":[[2007,9,21]]}},"container-title":["2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4543879\/4550291\/04550372.pdf?arnumber=4550372","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,12]],"date-time":"2019-05-12T05:56:43Z","timestamp":1557640603000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4550372\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/seccom.2007.4550372","relation":{},"subject":[],"published":{"date-parts":[[2007]]}}}