{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T14:00:49Z","timestamp":1730296849000,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1109\/siu.2017.7960292","type":"proceedings-article","created":{"date-parts":[[2017,6,29]],"date-time":"2017-06-29T21:28:34Z","timestamp":1498771714000},"page":"1-4","source":"Crossref","is-referenced-by-count":0,"title":["Effects of selective forwarding attacks on wireless sensor network efficiency"],"prefix":"10.1109","author":[{"given":"Seyyit Alper","family":"Sert","sequence":"first","affiliation":[]},{"given":"Adnan","family":"Yazici","sequence":"additional","affiliation":[]},{"given":"Ahmet","family":"Cosar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/BROADNETS.2004.77"},{"key":"ref11","first-page":"1","article-title":"Wormhole attack detection algorithms in wireless network coding systems","author":"zhong","year":"2014","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2012.6214260"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCNT.2013.6726833"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CCCM.2009.5268016"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIT.2009.290"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3390\/s16010118"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2000.926982"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2006.315852"},{"journal-title":"X 800 Security Architecture for Open Systems Interconnection for Ccitt Applications","year":"1991","key":"ref3"},{"key":"ref6","first-page":"9","article-title":"A survey of attacks, security mechanisms and challenges in wireless sensor networks","volume":"4","author":"padmavathi","year":"2009","journal-title":"International Journal of Information and Computer Security"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2010.2045373"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2014.11.063"},{"key":"ref7","first-page":"910","article-title":"Impacts of routing attacks on Surveillance Wireless Sensor Networks","author":"sert","year":"2015","journal-title":"proc International Wireless Communicationsand Mobile Computing Conference (IWCMC)"},{"journal-title":"Cryptography and Network Security Principles and Practice","year":"2011","author":"stallings","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/S1570-8705(03)00008-8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/984622.984660"}],"event":{"name":"2017 25th Signal Processing and Communications Applications Conference (SIU)","start":{"date-parts":[[2017,5,15]]},"location":"Antalya, Turkey","end":{"date-parts":[[2017,5,18]]}},"container-title":["2017 25th Signal Processing and Communications Applications Conference (SIU)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7951214\/7960135\/07960292.pdf?arnumber=7960292","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,8,16]],"date-time":"2017-08-16T15:57:16Z","timestamp":1502899036000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7960292\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/siu.2017.7960292","relation":{},"subject":[],"published":{"date-parts":[[2017,5]]}}}