{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T19:20:21Z","timestamp":1767900021012,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2005,11,7]],"date-time":"2005-11-07T00:00:00Z","timestamp":1131321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2005,11,7]]},"DOI":"10.1145\/1102219.1102235","type":"proceedings-article","created":{"date-parts":[[2006,2,6]],"date-time":"2006-02-06T15:52:40Z","timestamp":1139241160000},"page":"89-96","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":110,"title":["Defending against path-based DoS attacks in wireless sensor networks"],"prefix":"10.1145","author":[{"given":"Jing","family":"Deng","sequence":"first","affiliation":[{"name":"University of Colorado, Boulder, CO"}]},{"given":"Richard","family":"Han","sequence":"additional","affiliation":[{"name":"University of Colorado, Boulder, CO"}]},{"given":"Shivakant","family":"Mishra","sequence":"additional","affiliation":[{"name":"University of Colorado, Boulder, CO"}]}],"member":"320","published-online":{"date-parts":[[2005,11,7]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"6th International Financial Cryptography 2002 (FC'02)","author":"Coppersmith D.","year":"2002","unstructured":"D. Coppersmith and M. Jakobsson . Almost optimal hash sequence traversal. In 6th International Financial Cryptography 2002 (FC'02) , Bermuda , March 2002 . D. Coppersmith and M. Jakobsson. Almost optimal hash sequence traversal. In 6th International Financial Cryptography 2002 (FC'02), Bermuda, March 2002."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1031495.1031516"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/1765991.1766015"},{"key":"e_1_3_2_1_4_1","volume-title":"Insens: Intrusion-tolerant routing for wireless sensor networks","author":"Deng J.","unstructured":"J. Deng , R. Han , and S. Mishra . Insens: Intrusion-tolerant routing for wireless sensor networks . Elsevier Journal on Computer Communications, Special Issue on Dependable Wireless Sensor Networks, 2005, to appear. J. Deng, R. Han, and S. Mishra. Insens: Intrusion-tolerant routing for wireless sensor networks. Elsevier Journal on Computer Communications, Special Issue on Dependable Wireless Sensor Networks, 2005, to appear."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/509506.509514"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/570645.570648"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2002.1023709"},{"key":"e_1_3_2_1_9_1","unstructured":"C. Karlof N. Sastry and D. Wagner. Tinysec website. http:\/\/www.cs.berkeley.edu\/~nks\/tinysec\/.  C. Karlof N. Sastry and D. Wagner. Tinysec website. http:\/\/www.cs.berkeley.edu\/~nks\/tinysec\/."},{"key":"e_1_3_2_1_10_1","volume-title":"September","author":"Karlof C.","year":"2003","unstructured":"C. Karlof and D. Wagner . Secure routing in wireless sensor networks: Attacks and countermeasures. Ad Hoc Networks, 1(2--3) , September 2003 . C. Karlof and D. Wagner. Secure routing in wireless sensor networks: Attacks and countermeasures. Ad Hoc Networks, 1(2--3), September 2003."},{"key":"e_1_3_2_1_11_1","volume-title":"SRI International","author":"Lamport L.","year":"1979","unstructured":"L. Lamport . Constructing digital signatures from one-way function. In technical report SRI-CSL-98 , SRI International , October 1979 . L. Lamport. Constructing digital signatures from one-way function. In technical report SRI-CSL-98, SRI International, October 1979."},{"key":"e_1_3_2_1_12_1","volume-title":"10th Annual Network and Distributed System Security Symposium","author":"Liu D.","year":"2003","unstructured":"D. Liu and P. Ning . Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks . In 10th Annual Network and Distributed System Security Symposium , San Diego, CA, USA , February 2003 . D. Liu and P. Ning. Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks. In 10th Annual Network and Distributed System Security Symposium, San Diego, CA, USA, February 2003."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2004.1381904"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/882494.884425"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1016598314198"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/958491.958521"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45126-6_20"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/958491.958494"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2002.1039518"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/956418.956593"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-005-6612-9"},{"key":"e_1_3_2_1_22_1","volume-title":"IEEE INFOCOM","author":"Ye F.","year":"2004","unstructured":"F. Ye , H. Luo , S. Lu , and L. Zhang . Statistical en-route detection and filtering of injected false data in sensor networks . In IEEE INFOCOM 2004 . F. Ye, H. Luo, S. Lu, and L. Zhang. Statistical en-route detection and filtering of injected false data in sensor networks. In IEEE INFOCOM 2004."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/958491.958493"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/990064.990081"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948120"},{"key":"e_1_3_2_1_26_1","volume-title":"2004 IEEE Symposium on Security and Privacy","author":"Zhu S.","year":"2004","unstructured":"S. Zhu , S. Setia , S. Jajodia , and P. Ning . An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks . In 2004 IEEE Symposium on Security and Privacy , Oakland, CA, USA , May 2004 . S. Zhu, S. Setia, S. Jajodia, and P. Ning. An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks. In 2004 IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 2004."}],"event":{"name":"CCS05: 12th ACM Conference on Computer and Communications Security 2005","location":"Alexandria VA USA","acronym":"CCS05","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1102219.1102235","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1102219.1102235","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:08:08Z","timestamp":1750262888000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1102219.1102235"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,11,7]]},"references-count":25,"alternative-id":["10.1145\/1102219.1102235","10.1145\/1102219"],"URL":"https:\/\/doi.org\/10.1145\/1102219.1102235","relation":{},"subject":[],"published":{"date-parts":[[2005,11,7]]},"assertion":[{"value":"2005-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}