{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T14:22:25Z","timestamp":1730298145484,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,9]]},"DOI":"10.1109\/softcom.2013.6671865","type":"proceedings-article","created":{"date-parts":[[2013,12,3]],"date-time":"2013-12-03T21:58:14Z","timestamp":1386107894000},"page":"1-5","source":"Crossref","is-referenced-by-count":11,"title":["Detecting Sybil attack based on state information in Underwater Wireless Sensor Networks"],"prefix":"10.1109","author":[{"given":"Xun","family":"Li","sequence":"first","affiliation":[]},{"given":"Guangjie","family":"Han","sequence":"additional","affiliation":[]},{"given":"Aihua","family":"Qian","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Shu","sequence":"additional","affiliation":[]},{"given":"Joel","family":"Rodrigues","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","first-page":"442","article-title":"Detecting the Sybil attack Cooperatively in Wireless Sensor Networks","volume":"1","author":"shaohe","year":"2008","journal-title":"Computational Intelligence and Security"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2000.926982"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2009.07.013"},{"key":"14","first-page":"6402","article-title":"A novel Sybil Attack Detection Scheme in wireless sensor networks","author":"chao","year":"2010","journal-title":"Information Science and Engineering (ICISE)"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2007.374772"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2011.050311.100028"},{"key":"3","first-page":"251","article-title":"The Sybil attack","volume":"2002","author":"douceur","year":"0","journal-title":"Proceedings of the International Workshop on Peer-to-Peer Systems"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.01.002"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2010.148"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.03.011"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/WIRELESSVITAE.2011.5940835"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/SPCA.2006.297488"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2011.160"},{"key":"4","first-page":"406","article-title":"Efficient and secure Routing Protocol Based on Encryption and Authentication for Wireless Sensor Networks","author":"zhou","year":"2010","journal-title":"Artificial Intelligence and Education (ICAIE)"},{"key":"9","first-page":"564","article-title":"An RSSI-based scheme for Sybil attack detection in wireless sensor networks","author":"mural","year":"2006","journal-title":"Proceedings of the 2006 international Symposium on World of Wireless Mobile and Multimedia Networks"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/s11741-008-0113-2"}],"event":{"name":"2013 21st International Conference on Software, Telecommunications and Computer Networks - (SoftCOM 2013)","start":{"date-parts":[[2013,9,18]]},"location":"Split-Primosten, Croatia","end":{"date-parts":[[2013,9,20]]}},"container-title":["2013 21st International Conference on Software, Telecommunications and Computer Networks - (SoftCOM 2013)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6657883\/6671843\/06671865.pdf?arnumber=6671865","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T00:18:57Z","timestamp":1490228337000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6671865\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/softcom.2013.6671865","relation":{},"subject":[],"published":{"date-parts":[[2013,9]]}}}