{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T06:24:28Z","timestamp":1774160668861,"version":"3.50.1"},"reference-count":33,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"7","license":[{"start":{"date-parts":[[2012,9,1]],"date-time":"2012-09-01T00:00:00Z","timestamp":1346457600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Veh. Technol."],"published-print":{"date-parts":[[2012,9]]},"DOI":"10.1109\/tvt.2012.2205284","type":"journal-article","created":{"date-parts":[[2012,6,19]],"date-time":"2012-06-19T18:14:17Z","timestamp":1340129657000},"page":"3255-3265","source":"Crossref","is-referenced-by-count":106,"title":["Secure and Energy-Efficient Disjoint Multipath Routing for WSNs"],"prefix":"10.1109","volume":"61","author":[{"given":"Anfeng","family":"Liu","sequence":"first","affiliation":[]},{"given":"Zhongming","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Chao","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Zhigang","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Xuemin","family":"Shen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","year":"0","journal-title":"OMNeT++ Network Simulation Framework"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2005.11010"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"2472","DOI":"10.1109\/TVT.2010.2044592","article-title":"On optimal information capture by energy-constrained mobile sensors","volume":"59","author":"he","year":"2010","journal-title":"IEEE Trans Veh Technol"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1080\/15501320500201276"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2011.03.022"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/S1570-8705(03)00008-8"},{"key":"ref12","first-page":"1","article-title":"An efficient countermeasure to the selective forwarding attack in wireless sensor networks","author":"sun","year":"2007","journal-title":"Proc IEEE TENCON"},{"key":"ref13","first-page":"139","article-title":"Dsr: The dynamic source routing protocol for multi-hop wireless ad hoc networks","volume":"5","author":"johnson","year":"2001","journal-title":"Ad Hoc Netw"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2001.992756"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1208679"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2004.1354662"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2006.877707"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861392"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2010.10.016"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2010.2102375"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"1501","DOI":"10.1016\/j.adhoc.2009.04.009","article-title":"Privacy preservation in wireless sensor networks: A state-of-the-art survey","volume":"7","author":"li","year":"2009","journal-title":"Ad Hoc Netw"},{"key":"ref27","first-page":"197","article-title":"Random key predistribution schemes for sensor networks","author":"chan","year":"2003","journal-title":"Proc IEEE Security Privacy"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.01.023"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2010.2051468"},{"key":"ref29","author":"stinson","year":"2006","journal-title":"Cryptography Theory and Practice"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.237"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2002.1039518"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2010.36"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(01)00302-4"},{"key":"ref9","first-page":"127","article-title":"Multipath energy-aware routing protocol in wireless sensor networks","author":"kim","year":"2008","journal-title":"Proc IEEE INSS"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"365","DOI":"10.1109\/JSAC.2009.090502","article-title":"Sage: A strong privacy-preserving scheme against global eavesdropping for ehealth systems","volume":"27","author":"lin","year":"2009","journal-title":"IEEE J Sel Areas Commun"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2008.09.027"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1023\/A:1016598314198"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/IIT.2007.4430383"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2011.05.003"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ITCC.2005.305"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.863855"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2009.02.002"}],"container-title":["IEEE Transactions on Vehicular Technology"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/25\/6299052\/06220907.pdf?arnumber=6220907","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,10]],"date-time":"2021-10-10T23:51:16Z","timestamp":1633909876000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6220907\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9]]},"references-count":33,"journal-issue":{"issue":"7"},"URL":"https:\/\/doi.org\/10.1109\/tvt.2012.2205284","relation":{},"ISSN":["0018-9545","1939-9359"],"issn-type":[{"value":"0018-9545","type":"print"},{"value":"1939-9359","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,9]]}}}