{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T13:31:52Z","timestamp":1773322312008,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,10,30]]},"DOI":"10.1145\/1180345.1180351","type":"proceedings-article","created":{"date-parts":[[2007,1,16]],"date-time":"2007-01-16T20:15:56Z","timestamp":1168978556000},"page":"35-48","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":54,"title":["SIGF"],"prefix":"10.1145","author":[{"given":"Anthony D.","family":"Wood","sequence":"first","affiliation":[{"name":"University of Virginia"}]},{"given":"Lei","family":"Fang","sequence":"additional","affiliation":[{"name":"University of Virginia"}]},{"given":"John A.","family":"Stankovic","sequence":"additional","affiliation":[{"name":"University of Virginia"}]},{"given":"Tian","family":"He","sequence":"additional","affiliation":[{"name":"University of Minnesota"}]}],"member":"320","published-online":{"date-parts":[[2006,10,30]]},"reference":[{"key":"e_1_3_2_1_2_1","first-page":"197","volume-title":"IEEE Symposium on Research in Security and Privacy","author":"Chan H.","year":"2003","unstructured":"H. Chan , A. Perrig , and D. Song . Random key predistribution schemes for sensor networks . In IEEE Symposium on Research in Security and Privacy , pages 197 -- 213 , May 2003 . H. Chan, A. Perrig, and D. Song. Random key predistribution schemes for sensor networks. In IEEE Symposium on Research in Security and Privacy, pages 197--213, May 2003."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/1765991.1766015"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586117"},{"key":"e_1_3_2_1_6_1","volume-title":"IETF MANET Internet Draft","author":"Haas Z. J.","year":"2002","unstructured":"Z. J. Haas , M. R. Pearlm , and P. Samar . The Zone Routing Protocol (ZRP) for ad hoc networks . IETF MANET Internet Draft , July 2002 . Z. J. Haas, M. R. Pearlm, and P. Samar. The Zone Routing Protocol (ZRP) for ad hoc networks. IETF MANET Internet Draft, July 2002."},{"key":"e_1_3_2_1_7_1","first-page":"3","volume-title":"Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA)","author":"Hu Y.-C.","year":"2002","unstructured":"Y.-C. Hu , D. B. Johnson , and A. Perrig . Secure efficient distance vector routing in mobile wireless ad hoc networks . In Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA) , pages 3 -- 13 , June 2002 . Y.-C. Hu, D. B. Johnson, and A. Perrig. Secure efficient distance vector routing in mobile wireless ad hoc networks. In Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA), pages 3--13, June 2002."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/570645.570648"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/941311.941317"},{"key":"e_1_3_2_1_10_1","volume-title":"Aug.","author":"IEEE Computer Society LAN MAN Standards Committee. IEEE Std 802.11","year":"1999","unstructured":"IEEE Computer Society LAN MAN Standards Committee. IEEE Std 802.11 : Wireless LAN Medium Access Control and Physical Layer Specifications , Aug. 1999 . IEEE Computer Society LAN MAN Standards Committee. IEEE Std 802.11: Wireless LAN Medium Access Control and Physical Layer Specifications, Aug. 1999."},{"key":"e_1_3_2_1_11_1","series-title":"The Kluwer International Series in Engineering and Computer Science","volume-title":"Mobile Computing","author":"Johnson D. B.","year":"1996","unstructured":"D. B. Johnson and D. A. Maltz . Dynamic source routing in ad hoc wireless networks . In Imielinski and Korth, editors, Mobile Computing , volume 353 of The Kluwer International Series in Engineering and Computer Science . Kluwer Academic Publishers , Mar. 1996 . D. B. Johnson and D. A. Maltz. Dynamic source routing in ad hoc wireless networks. In Imielinski and Korth, editors, Mobile Computing, volume 353 of The Kluwer International Series in Engineering and Computer Science. Kluwer Academic Publishers, Mar. 1996."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1031495.1031515"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SNPA.2003.1203362"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345953"},{"key":"e_1_3_2_1_15_1","volume-title":"Proc. of the USENIX Symposium on Networked Systems Design and Implementation","author":"Kim Y.-J.","year":"2005","unstructured":"Y.-J. Kim , R. Govindan , B. Karp , and S. Shenker . Geographic routing made practical . In Proc. of the USENIX Symposium on Networked Systems Design and Implementation , May 2005 . Y.-J. Kim, R. Govindan, B. Karp, and S. Shenker. Geographic routing made practical. In Proc. of the USENIX Symposium on Networked Systems Design and Implementation, May 2005."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1019106118419"},{"key":"e_1_3_2_1_17_1","volume-title":"9th International Conference on Network Protocols (ICNP'01)","author":"Kong J.","year":"2001","unstructured":"J. Kong , P. Zerfos , H. Luo , S. Lu , and L. Zhang . Providing robust and ubiquitous security support for mobile ad-hoc networks . In 9th International Conference on Network Protocols (ICNP'01) , 2001 . J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang. Providing robust and ubiquitous security support for mobile ad-hoc networks. In 9th International Conference on Network Protocols (ICNP'01), 2001."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2004.1381904"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345955"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/984622.984660"},{"key":"e_1_3_2_1_21_1","volume-title":"SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002)","author":"Papadimitratos P.","year":"2002","unstructured":"P. Papadimitratos and Z. Haas . Secure routing for mobile ad hoc networks . In SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002) , Jan. 2002 . P. Papadimitratos and Z. Haas. Secure routing for mobile ad hoc networks. In SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), Jan. 2002."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/381677.381696"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/645532.656326"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2002.1039518"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/570681.570682"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/65.806983"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948120"}],"event":{"name":"CCS06: 13th ACM Conference on Computer and Communications Security 2006","location":"Alexandria Virginia USA","acronym":"CCS06","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1180345.1180351","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,5]],"date-time":"2023-01-05T09:27:45Z","timestamp":1672910865000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1180345.1180351"}},"subtitle":["a family of configurable, secure routing protocols for wireless sensor networks"],"short-title":[],"issued":{"date-parts":[[2006,10,30]]},"references-count":25,"alternative-id":["10.1145\/1180345.1180351","10.1145\/1180345"],"URL":"https:\/\/doi.org\/10.1145\/1180345.1180351","relation":{},"subject":[],"published":{"date-parts":[[2006,10,30]]},"assertion":[{"value":"2006-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}