{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T00:54:40Z","timestamp":1768697680617,"version":"3.49.0"},"reference-count":40,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2016,7,1]],"date-time":"2016-07-01T00:00:00Z","timestamp":1467331200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Automat. Sci. Eng."],"published-print":{"date-parts":[[2016,7]]},"DOI":"10.1109\/tase.2015.2497663","type":"journal-article","created":{"date-parts":[[2015,12,10]],"date-time":"2015-12-10T01:28:38Z","timestamp":1449710918000},"page":"1281-1293","source":"Crossref","is-referenced-by-count":118,"title":["On Secure Wireless Communications for IoT Under Eavesdropper Collusion"],"prefix":"10.1109","volume":"13","author":[{"given":"Yuanyu","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Yulong","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Hua","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jianming","family":"Yong","sequence":"additional","affiliation":[]},{"given":"Xiaohong","family":"Jiang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","year":"0","journal-title":"C++ Simulator for Two-Hop Transmission With Colluding Eavesdroppers"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511841224"},{"key":"ref33","first-page":"79","article-title":"Order statistics for nonidentically distributed variables and permanents","volume":"51","author":"bapat","year":"1989","journal-title":"Sankhya The Indian J Statist Ser A"},{"key":"ref32","author":"abramowitz","year":"1972","journal-title":"Handbook of Mathematical Functions with Formulas Graphs and Mathematical Tables"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1080\/03610920500476325"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921680"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23162"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2012.2184692"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.111216"},{"key":"ref34","first-page":"1281","article-title":"Berry-esseen bounds for random sums of non-iid random variables","volume":"4","author":"chaidee","year":"2009","journal-title":"Int Math Forum"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2014.2334602"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2013.2256953"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"449","DOI":"10.1109\/TVT.2008.923683","article-title":"A secure routing protocol against byzantine attacks for manets in adversarial environments","volume":"58","author":"yu","year":"2009","journal-title":"IEEE Trans Veh Technol"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2297835"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.130903"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2403367"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ITA.2010.5454080"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2013.2244230"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848088"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2014.7036827"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2014.2354031"},{"key":"ref28","author":"murthy","year":"2004","journal-title":"Ad Hoc Wireless Networks Architectures and Protocols"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2014.012314.00178"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2004.838089"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1994.365700"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/WCL.2012.122612.120787"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.862417"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2010.5601960"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1155\/2009\/283060"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2015.7145622"},{"key":"ref2","first-page":"9","article-title":"The internet of things strategic research roadmap","volume":"1","author":"vermesan","year":"2011","journal-title":"Internet Things-Global Technol Soc Trends"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2009.2038412"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2013.2288784"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2013.040413.120972"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2363033"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2014.041014.131101"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2014.2327627"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2002.801403"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2011.011811.102433"}],"container-title":["IEEE Transactions on Automation Science and Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8856\/7502194\/07350251.pdf?arnumber=7350251","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,11]],"date-time":"2021-10-11T02:34:27Z","timestamp":1633919667000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7350251\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7]]},"references-count":40,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tase.2015.2497663","relation":{},"ISSN":["1545-5955","1558-3783"],"issn-type":[{"value":"1545-5955","type":"print"},{"value":"1558-3783","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,7]]}}}