{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T14:14:41Z","timestamp":1742393681475},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2009,9,13]],"date-time":"2009-09-13T00:00:00Z","timestamp":1252800000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/2.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2009,12]]},"DOI":"10.1155\/2009\/945943","type":"journal-article","created":{"date-parts":[[2009,10,15]],"date-time":"2009-10-15T14:30:14Z","timestamp":1255617014000},"source":"Crossref","is-referenced-by-count":24,"title":["Mobility and Cooperation to Thwart Node Capture Attacks in MANETs"],"prefix":"10.1186","volume":"2009","author":[{"given":"Mauro","family":"Conti","sequence":"first","affiliation":[]},{"given":"Roberto","family":"Di Pietro","sequence":"additional","affiliation":[]},{"given":"Luigi V.","family":"Mancini","sequence":"additional","affiliation":[]},{"given":"Alessandro","family":"Mei","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,9,13]]},"reference":[{"key":"1776_CR1","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy (S&P '03)","author":"H Chan","year":"2003","unstructured":"Chan H, Perrig A, Song D: Random key predistribution schemes for sensor networks. Proceedings of the IEEE Symposium on Security and Privacy (S&P '03), September 2003"},{"key":"1776_CR2","volume-title":"Proceedings of the 3rd International Conference on Information Processing in Sensor Networks (IPSN '04)","author":"J Newsome","year":"2004","unstructured":"Newsome J, Shi E, Song D, Perrig A: The sybil attack in sensor networks: analysis & defenses. Proceedings of the 3rd International Conference on Information Processing in Sensor Networks (IPSN '04), April 2004"},{"key":"1776_CR3","first-page":"564","volume-title":"Proceedings of the International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM '06)","author":"M Demirbas","year":"2006","unstructured":"Demirbas M, Song Y: An RSSI-based scheme for sybil attack detection in wireless sensor networks. Proceedings of the International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM '06), June 2006, New York, NY, USA 564-568."},{"issue":"6","key":"1776_CR4","doi-asserted-by":"publisher","first-page":"709","DOI":"10.1007\/s11276-006-6530-5","volume":"12","author":"R Di Pietro","year":"2006","unstructured":"Di Pietro R, Mancini LV, Mei A: Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks. Wireless Networks 2006, 12(6):709-721. 10.1007\/s11276-006-6530-5","journal-title":"Wireless Networks"},{"key":"1776_CR5","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1145\/1288107.1288119","volume-title":"Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc '07)","author":"M Conti","year":"2007","unstructured":"Conti M, Di Pietro R, Mancini LV, Mei A: A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks. Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc '07), 2007 80-89."},{"key":"1776_CR6","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy (S&P '05)","author":"B Parno","year":"2005","unstructured":"Parno B, Perrig A, Gligor VD: Distributed detection of node replication attacks in sensor networks. Proceedings of the IEEE Symposium on Security and Privacy (S&P '05), 2005"},{"key":"1776_CR7","unstructured":"Information Processing Technology Office (IPTO) Defense Advanced Research Projects Agency (DARPA) BAA 07-46 LANdroids Broad Agency Announcement, 2007, http:\/\/www.darpa.mil\/index.html"},{"issue":"6","key":"1776_CR8","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1145\/990680.990707","volume":"47","author":"A Perrig","year":"2004","unstructured":"Perrig A, Stankovic J, Wagner D: Security in wireless sensor networks. Commununications of ACM 2004, 47(6):53-57. 10.1145\/990680.990707","journal-title":"Commununications of ACM"},{"key":"1776_CR9","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1145\/778415.778422","volume-title":"Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc '03)","author":"S Capkun","year":"2003","unstructured":"Capkun S, Hubaux J-P, Butty\u00e1n L: Mobility helps security in ad hoc networks. Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc '03), 2003 46-56."},{"key":"1776_CR10","volume-title":"Proceedings of the 2nd International Conference on Security and Privacy in Communication Networks (SecureComm '06)","author":"C Piro","year":"2006","unstructured":"Piro C, Shields C, Levine BN: Detecting the sybil attack in mobile ad hoc networks. Proceedings of the 2nd International Conference on Security and Privacy in Communication Networks (SecureComm '06), 2006, Baltimore, Md, USA"},{"key":"1776_CR11","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1145\/288235.288256","volume-title":"Proceedings of the 4th Annual ACM\/IEEE International Conference on Mobile Computing and Networking (MobiCom '98)","author":"J Broch","year":"1998","unstructured":"Broch J, Maltz DA, Johnson DB, Hu Y-C, Jetcheva J: A performance comparison of multi-hop wireless ad hoc network routing protocols. Proceedings of the 4th Annual ACM\/IEEE International Conference on Mobile Computing and Networking (MobiCom '98), 1998 85-79."},{"key":"1776_CR12","volume-title":"Proceedings of the 25th Conference on Computer Communications (INFOCOM '06)","author":"G Sharma","year":"2006","unstructured":"Sharma G, Mazumdar R, Shroff NB: Delay and capacity trade-offs in mobile ad hoc networks: a global perspective. Proceedings of the 25th Conference on Computer Communications (INFOCOM '06), 2006"},{"key":"1776_CR13","first-page":"104","volume-title":"Proceeding of the 3rd International Conference on Security in Pervasive Computing (SPC '06)","author":"A Becher","year":"2006","unstructured":"Becher A, Becher E, Benenson Z, Dornseif M: Tampering with motes: real-world physical attacks on wireless sensor networks. Proceeding of the 3rd International Conference on Security in Pervasive Computing (SPC '06), 2006 104-118."},{"key":"1776_CR14","volume-title":"Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '03)","author":"M Grossglauser","year":"2003","unstructured":"Grossglauser M, Vetterli M: Locating nodes with EASE: last encounter routing in ad hoc networks through mobility diffusion. Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '03), 2003, San Francisco, Calif, USA"},{"key":"1776_CR15","volume-title":"Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '05)","author":"J Luo","year":"2005","unstructured":"Luo J, Hubaux J-P: Joint mobility and routing for lifetime elongation in wireless sensor networks. Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '05), March 2005, Miami, Fla, USA"},{"key":"1776_CR16","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1145\/570681.570688","volume-title":"Proceedings of the Workshop on Wireless Security (WiSe '02)","author":"C fan Hsin","year":"2002","unstructured":"fan Hsin C, Liu M: A distributed monitoring mechanism for wireless sensor networks. Proceedings of the Workshop on Wireless Security (WiSe '02), 2002 57-66."},{"issue":"4","key":"1776_CR17","doi-asserted-by":"publisher","first-page":"462","DOI":"10.1016\/j.comcom.2004.12.031","volume":"29","author":"C fan Hsin","year":"2006","unstructured":"fan Hsin C, Liu M: Self-monitoring of wireless sensor networks. Computer Communications 2006, 29(4):462-476. 10.1016\/j.comcom.2004.12.031","journal-title":"Computer Communications"},{"key":"1776_CR18","volume-title":"Proceedings of the 21st IEEE Symposium on Reliable Distributed Systems (SRDS '02)","author":"N Hayashibara","year":"2002","unstructured":"Hayashibara N, Cherif A, Katayama T: Failure detectors for large-scale distributed systems. Proceedings of the 21st IEEE Symposium on Reliable Distributed Systems (SRDS '02), October 2002, Suita, Japan"},{"issue":"3","key":"1776_CR19","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1023\/A:1011494323443","volume":"4","author":"S Ranganathan","year":"2001","unstructured":"Ranganathan S, George AD, Todd RW, Chidester MC: Gossip-style failure detection and distributed consensus for scalable heterogeneous clusters. Cluster Computing 2001, 4(3):197-209. 10.1023\/A:1011494323443","journal-title":"Cluster Computing"},{"issue":"1","key":"1776_CR20","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.entcs.2006.11.009","volume":"171","author":"R Curtmola","year":"2007","unstructured":"Curtmola R, Kamara S: A mechanism for communication-efficient broadcast encryption over wireless ad hoc networks. Electronic Notes in Theoretical Computer Science 2007, 171(1):57-69. 10.1016\/j.entcs.2006.11.009","journal-title":"Electronic Notes in Theoretical Computer Science"},{"key":"1776_CR21","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1145\/1029102.1029110","volume-title":"Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '04)","author":"D Huang","year":"2004","unstructured":"Huang D, Mehta M, Medhi D, Harn L: Location-aware key management scheme for wireless sensor networks. Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '04), November 2004, Washington, DC, USA 29-42."},{"issue":"6","key":"1776_CR22","doi-asserted-by":"publisher","first-page":"801","DOI":"10.1016\/j.adhoc.2007.01.002","volume":"5","author":"P Tague","year":"2007","unstructured":"Tague P, Poovendran R: Modeling adaptive node capture attacks in multi-hop wireless networks. Ad Hoc Network 2007, 5(6):801-814. 10.1016\/j.adhoc.2007.01.002","journal-title":"Ad Hoc Network"},{"key":"1776_CR23","first-page":"161","volume-title":"Proceedings of the 27th IEEE International Conference on Computer Communications (INFOCOM '08)","author":"P Tague","year":"2008","unstructured":"Tague P, Slater D, Rogers J, Poovendran R: Vulnerability of network traffic under node capture attacks using circuit theoretic analysis. Proceedings of the 27th IEEE International Conference on Computer Communications (INFOCOM '08), 2008 161-165."},{"key":"1776_CR24","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1007\/978-3-642-02118-3_8","volume-title":"Proceedings of the 7th International Conference on Wired\/Wireless Internet Communications (WWIC '09)","author":"M Conti","year":"2009","unstructured":"Conti M, Di Pietro R, Gabrielli A, Mancini LV, Mei A: The quest for mobility models to analyse security in mobile ad hoc networks. Proceedings of the 7th International Conference on Wired\/Wireless Internet Communications (WWIC '09), May 2009 85-96."},{"key":"1776_CR25","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1145\/1352533.1352568","volume-title":"Proceedings of the 1st ACM Conference on Wireless Network Security (WiSec '08)","author":"M Conti","year":"2008","unstructured":"Conti M, Di Pietro R, Mancini LV, Mei A: Emergent properties: detection of the node-capture attack in mobile wireless sensor networks. Proceedings of the 1st ACM Conference on Wireless Network Security (WiSec '08), 2008 214-219."},{"key":"1776_CR26","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1145\/1288107.1288113","volume-title":"Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc '07)","author":"EM Daly","year":"2007","unstructured":"Daly EM, Haahr M: Social network analysis for routing in disconnected delay-tolerant MANETs. Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc '07), September 2007 32-40."},{"key":"1776_CR27","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1145\/570681.570685","volume-title":"Proceedings of the 1st ACM Workshop on Wireless Security (WiSe '02)","author":"JPG Sterbenz","year":"2002","unstructured":"Sterbenz JPG, Krishnan R, Hain RR, et al.: Survivable mobile wireless networks: issues, challenges, and research directions. Proceedings of the 1st ACM Workshop on Wireless Security (WiSe '02), 2002, Atlanta, Ga, USA 31-40."},{"issue":"11","key":"1776_CR28","doi-asserted-by":"publisher","first-page":"1500","DOI":"10.1109\/TC.2009.109","volume":"58","author":"R Di Pietro","year":"2009","unstructured":"Di Pietro R, Mancini L, Soriente C, Spognardi A, Tsudik G: Data security in unattended sensor networks. IEEE Transactions on Computers 2009, 58(11):1500-1511.","journal-title":"IEEE Transactions on Computers"},{"issue":"8","key":"1776_CR29","doi-asserted-by":"publisher","first-page":"1463","DOI":"10.1016\/j.adhoc.2009.04.002","volume":"7","author":"R Di Pietro","year":"2009","unstructured":"Di Pietro R, Mancini L, Soriente C, Spognardi A, Tsudik G: Playing hide-and-seek with a focused mobile adversary in unattended wireless sensor networks. Ad Hoc Networks 2009, 7(8):1463-1475. 10.1016\/j.adhoc.2009.04.002","journal-title":"Ad Hoc Networks"},{"key":"1776_CR30","first-page":"1312","volume":"2","author":"J Yoon","year":"2003","unstructured":"Yoon J, Liu M, Noble B: Random waypoint considered harmful. Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, March 2003, San Franciso, Calif, USA 2: 1312-1321.","journal-title":"Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications Societies"},{"issue":"6","key":"1776_CR31","doi-asserted-by":"publisher","first-page":"680","DOI":"10.1109\/TMC.2006.86","volume":"5","author":"E Hyyti\u00e4","year":"2006","unstructured":"Hyyti\u00e4 E, Lassila P, Virtamo J: Spatial node distribution of the random waypoint mobility model with applications. IEEE Transactions on Mobile Computing 2006, 5(6):680-694.","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"3","key":"1776_CR32","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1109\/TDSC.2005.36","volume":"2","author":"K Sun","year":"2005","unstructured":"Sun K, Ning P, Wang C: Fault-tolerant cluster-wise clock synchronization for wireless sensor networks. IEEE Transactions on Dependable and Secure Computing 2005, 2(3):177-189. 10.1109\/TDSC.2005.36","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"1776_CR33","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1145\/513800.513825","volume-title":"Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc '02)","author":"B Williams","year":"2002","unstructured":"Williams B, Camp T: Comparison of broadcasting techniques for mobile ad hoc networks. Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc '02), 2002 194-205."},{"key":"1776_CR34","volume-title":"Proceedings of the Joint Workshop on Foundations of Mobile Computing (DIALM-POMC '04)","author":"L Orecchia","year":"2004","unstructured":"Orecchia L, Panconesi A, Petrioli C, Vitaletti A: Localized techniques for broadcasting in wireless sensor networks. Proceedings of the Joint Workshop on Foundations of Mobile Computing (DIALM-POMC '04), October 2004, Philadelphia, Pa, USA"},{"issue":"4","key":"1776_CR35","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1016\/j.adhoc.2007.05.002","volume":"6","author":"B Burns","year":"2008","unstructured":"Burns B, Brock O, Levine BN: MORA routing and capacity building in disruption-tolerant networks. Ad Hoc Networks 2008, 6(4):600-620. 10.1016\/j.adhoc.2007.05.002","journal-title":"Ad Hoc Networks"},{"issue":"5","key":"1776_CR36","doi-asserted-by":"publisher","first-page":"658","DOI":"10.1109\/TPDS.2007.1023","volume":"18","author":"H Liu","year":"2007","unstructured":"Liu H, Wan P-J, Liu X, Yao F: A distributed and efficient flooding scheme using 1-hop information in mobile ad hoc networks. IEEE Transactions on Parallel and Distributed Systems 2007, 18(5):658-671.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"issue":"2","key":"1776_CR37","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1002\/sec.4","volume":"1","author":"SMM Rahman","year":"2008","unstructured":"Rahman SMM, Nasser N, Inomata A, Okamoto T, Mambo M, Okamoto E: Anonymous authentication and secure communication protocol for wireless mobile ad hoc networks. Security and Communication Networks 2008, 1(2):179-189. 10.1002\/sec.4","journal-title":"Security and Communication Networks"},{"key":"1776_CR38","volume-title":"Proceedings of the IEEE International Conference on Communications (ICC '04)","author":"M Striki","year":"2004","unstructured":"Striki M, Baras J, Manousakis K: A robust, distributed TGDH-based scheme for secure group communications in MANET. Proceedings of the IEEE International Conference on Communications (ICC '04), May 2004"},{"key":"1776_CR39","first-page":"2991","volume-title":"Proceedings of the IEEE International Parallel and Distributed Processing Symposium (IPDPS '04)","author":"R Di Pietro","year":"2004","unstructured":"Di Pietro R, Mancini LV, Mei A: Efficient and resilient key discovery based on pseudo-random key pre-deployment. Proceedings of the IEEE International Parallel and Distributed Processing Symposium (IPDPS '04), 2004 2991-2998."},{"key":"1776_CR40","volume-title":"Proceedings of the 3rd IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW '05)","author":"A Wander","year":"2005","unstructured":"Wander A, Gura N, Eberle H, Gupta V, Shantz SC: Energy analysis of public-key cryptography for wireless sensor networks. Proceedings of the 3rd IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW '05), 2005"},{"issue":"11","key":"1776_CR41","doi-asserted-by":"publisher","first-page":"1218","DOI":"10.1109\/TMC.2007.1014","volume":"6","author":"S Bandyopadhyay","year":"2007","unstructured":"Bandyopadhyay S, Coyle EJ, Falck T: Stochastic properties of mobility models in mobile ad hoc networks. IEEE Transactions on Mobile Computing 2007, 6(11):1218-1229.","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"6","key":"1776_CR42","doi-asserted-by":"publisher","first-page":"606","DOI":"10.1109\/TMC.2007.1060","volume":"6","author":"A Chaintreau","year":"2007","unstructured":"Chaintreau A, Hui P, Diot C, Gass R, Scott J: Impact of human mobility on opportunistic forwarding algorithms. IEEE Transactions on Mobile Computing 2007, 6(6):606-620.","journal-title":"IEEE Transactions on Mobile Computing"}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1155\/2009\/945943.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1155\/2009\/945943\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1155\/2009\/945943.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,7]],"date-time":"2019-08-07T19:12:25Z","timestamp":1565205145000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1155\/2009\/945943"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,9,13]]},"references-count":42,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2009,12]]}},"alternative-id":["1776"],"URL":"https:\/\/doi.org\/10.1155\/2009\/945943","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,9,13]]},"article-number":"945943"}}