{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T11:13:07Z","timestamp":1772104387037,"version":"3.50.1"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,4]]},"DOI":"10.1109\/wiopt.2008.4586064","type":"proceedings-article","created":{"date-parts":[[2008,8,6]],"date-time":"2008-08-06T20:13:51Z","timestamp":1218053631000},"page":"192-196","source":"Crossref","is-referenced-by-count":9,"title":["Wireless sensor networks of battlefields hotspot: Challenges and solutions"],"prefix":"10.1109","author":[{"given":"Naif","family":"Alsharabi","sequence":"first","affiliation":[]},{"family":"Li Ren Fa","sequence":"additional","affiliation":[]},{"family":"Fan Zing","sequence":"additional","affiliation":[]},{"given":"Mossa","family":"Ghurab","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","year":"0"},{"key":"17","first-page":"1","author":"douceur","year":"2002","journal-title":"The Sybil Attack"},{"key":"18","first-page":"2503","article-title":"security adaptive self-organization for wsns ieee computer society press, wireless communications networking and mobile","author":"alsharabi","year":"2007","journal-title":"Computing"},{"key":"15","first-page":"53","author":"perrig","year":"2004","journal-title":"Security in Wireless Sensor Network"},{"key":"16","first-page":"54","author":"wood","year":"2002","journal-title":"Denial of Service in Sensor Networks"},{"key":"13","author":"martin","year":"2004","journal-title":"Denial-of-Service Attacks on Battery-Powered Mobile Computers"},{"key":"14","year":"0"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/984622.984660"},{"key":"12","first-page":"356","author":"brownfield","year":"2005","journal-title":"Wireless Sensor Network Denial of Sleep Attack"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209194"},{"key":"2","year":"0"},{"key":"1","article-title":"constraints and approachesfor distributed sensor network security","author":"carman","year":"2000"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1102219.1102235"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/ISPAN.1999.778957"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/378583.378666"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2000.926982"},{"key":"4","first-page":"21","article-title":"analysis of energy consumption and lifetime of heterogeneous wireless sensor networks","author":"duarte-melo","year":"2002","journal-title":"Globecom"},{"key":"9","first-page":"197","article-title":"routing in clustered multihop, mobile wireless networks with fading chanel","author":"chiang","year":"1997","journal-title":"SICON"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/BF01200845"}],"event":{"name":"2008 6th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks and Workshops (WiOPT)","location":"Berlin, Germany","start":{"date-parts":[[2008,4,1]]},"end":{"date-parts":[[2008,4,3]]}},"container-title":["2008 6th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks and Workshops"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4568415\/4586016\/04586064.pdf?arnumber=4586064","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T18:20:49Z","timestamp":1489688449000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4586064\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,4]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/wiopt.2008.4586064","relation":{},"subject":[],"published":{"date-parts":[[2008,4]]}}}