{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:43:15Z","timestamp":1740141795247,"version":"3.37.3"},"reference-count":20,"publisher":"SAGE Publications","issue":"12","license":[{"start":{"date-parts":[[2012,12,24]],"date-time":"2012-12-24T00:00:00Z","timestamp":1356307200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2012,12,24]]},"DOI":"10.1155\/2012\/145702","type":"journal-article","created":{"date-parts":[[2012,12,24]],"date-time":"2012-12-24T16:00:31Z","timestamp":1356364831000},"page":"145702","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":8,"title":["MDS-Based Wormhole Detection Using Local Topology in Wireless Sensor Networks"],"prefix":"10.1177","volume":"8","author":[{"given":"Xiaopei","family":"Lu","sequence":"first","affiliation":[{"name":"College of Computer Science, National University of Defense Technology, Hunan 410073, China"}]},{"given":"Dezun","family":"Dong","sequence":"additional","affiliation":[{"name":"College of Computer Science, National University of Defense Technology, Hunan 410073, China"}]},{"given":"Xiangke","family":"Liao","sequence":"additional","affiliation":[{"name":"College of Computer Science, National University of Defense Technology, Hunan 410073, China"}]}],"member":"179","published-online":{"date-parts":[[2012,12,24]]},"reference":[{"volume-title":"Proceedings of the IEEE International Conference on Network Protocols (IEEE ICNP '02)","author":"Sanzgiri K.","key":"B1-2012-145702"},{"volume-title":"Proceedings of the 32nd IEEE International Conference on Computer Communications (IEEE INFOCOM '12)","author":"Mao X.","key":"B2-2012-145702"},{"key":"B6-2012-145702","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.292"},{"volume-title":"Proceedings of the ACM Workshop on Security in Ad Hoc and Sensor Networks (ACM SASN '03)","author":"Capkun S.","key":"B4-2012-145702"},{"volume-title":"Proceedings of the Network and Distributed System Security Symposium Conference (NDSS '04)","author":"Hu L.","key":"B5-2012-145702"},{"first-page":"1976","volume-title":"Proceedings of the 22nd Annual Joint Conference on the IEEE Computer and Communications Societies (IEEE INFOCOM '03)","author":"Hu Y. C.","key":"B3-2012-145702"},{"key":"B7-2012-145702","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2005.58"},{"key":"B8-2012-145702","doi-asserted-by":"publisher","DOI":"10.1109\/SECCOMW.2006.359564"},{"key":"B9-2012-145702","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1007\/11601494_11","volume-title":"Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks (IEEE ESAS '05)","volume":"3813","author":"Buttyan L."},{"key":"B10-2012-145702","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2005.471"},{"first-page":"1193","volume-title":"Proceedings of the IEEE Wireless Communications and Networking Conference, Broadband Wirelss for the Masses\u2014Ready for Take-off (WCNC '05)","author":"Lazos L.","key":"B11-2012-145702"},{"first-page":"51","volume-title":"Proceedings of the ACM Workshop on Wireless Security (WiSe '04)","author":"Wang W.","key":"B12-2012-145702"},{"key":"B13-2012-145702","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.21"},{"key":"B14-2012-145702","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS.2009.97"},{"key":"B15-2012-145702","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2009.5339673"},{"key":"B16-2012-145702","doi-asserted-by":"crossref","unstructured":"Ban X., Sarkar R., Gao J.Local connectivity tests to identify wormholes in wireless networks2011Proceedings of the 12th ACM International Symposium on Mobile Ad Hoc Networking and Computing (ACM MobiHoc '11)","DOI":"10.1145\/2107502.2107519"},{"first-page":"201","volume-title":"Proceedings of the PROCEEDINGS OF The Fourth ACM International Symposium on Mobile Ad Hoc Networking and Computing (MOBIHOC '03)","author":"Shang Y.","key":"B17-2012-145702"},{"first-page":"2652","volume-title":"Proceedings of the IEEE Computer and Communications Societies (IEEE INFOCOM '04)","author":"Ji X.","key":"B18-2012-145702"},{"key":"B23-2012-145702","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(94)90121-X"},{"key":"B24-2012-145702","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861382"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2012\/145702","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1155\/2012\/145702","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2012\/145702","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,7]],"date-time":"2019-07-07T11:19:23Z","timestamp":1562498363000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1155\/2012\/145702"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,12,24]]},"references-count":20,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2012,12,24]]},"published-print":{"date-parts":[[2012,12,24]]}},"alternative-id":["10.1155\/2012\/145702"],"URL":"https:\/\/doi.org\/10.1155\/2012\/145702","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"type":"print","value":"1550-1477"},{"type":"electronic","value":"1550-1477"}],"subject":[],"published":{"date-parts":[[2012,12,24]]}}}