{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:44:09Z","timestamp":1740141849512,"version":"3.37.3"},"reference-count":25,"publisher":"SAGE Publications","issue":"9","license":[{"start":{"date-parts":[[2013,9,1]],"date-time":"2013-09-01T00:00:00Z","timestamp":1377993600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2013,9,1]]},"abstract":"<jats:p> Wireless sensor networks (WSNs) are becoming bigger, and with this growth comes the need for new automatic mechanisms for initializations done by hand. One of those mechanisms is the assignment of addresses to nodes. Several solutions were already proposed for mobile ad hoc networks but they either (i) do not scale well for WSN; (ii) have no energy constraints; (iii) have no security considerations; (iv) or have no mechanisms to handle fusion of network partitions. We proposed an address self-assignment protocol which uses negative acknowledgements and an improved version of a flood control mechanism to minimize the energy spent; uses a technique named whispering to achieve robustness against malicious nodes; is able to detect dynamic network re-joint and dynamic node addition without exchanging specific messages; and handles both dynamic events without compromising routing tables. <\/jats:p>","DOI":"10.1155\/2013\/693519","type":"journal-article","created":{"date-parts":[[2013,9,25]],"date-time":"2013-09-25T22:36:31Z","timestamp":1380148591000},"page":"693519","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":1,"title":["A Framework for Robust Address Assignment in WSNs Whispering to Avoid Intruders"],"prefix":"10.1177","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6080-0996","authenticated-orcid":false,"given":"Carlos","family":"Ribeiro","sequence":"first","affiliation":[{"name":"INESC-ID, Instituto Superior T\u00e9cnico, Universidade de Lisboa, R. Alves Redol 9, 1000 Lisboa, Portugal"}]},{"given":"Ivo","family":"Anast\u00e1cio","sequence":"additional","affiliation":[{"name":"INESC-ID, Instituto Superior T\u00e9cnico, Universidade de Lisboa, R. Alves Redol 9, 1000 Lisboa, Portugal"}]},{"given":"Andr\u00e9","family":"Costa","sequence":"additional","affiliation":[{"name":"INESC-ID, Instituto Superior T\u00e9cnico, Universidade de Lisboa, R. Alves Redol 9, 1000 Lisboa, Portugal"}]},{"given":"Marcia","family":"Baptista","sequence":"additional","affiliation":[{"name":"INESC-ID, Instituto Superior T\u00e9cnico, Universidade de Lisboa, R. Alves Redol 9, 1000 Lisboa, Portugal"}]}],"member":"179","published-online":{"date-parts":[[2013,9,25]]},"reference":[{"key":"B16-2013-693519","doi-asserted-by":"publisher","DOI":"10.1007\/11669463_17"},{"key":"B5-2013-693519","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2004.38"},{"key":"B21-2013-693519","doi-asserted-by":"publisher","DOI":"10.1109\/71.877833"},{"first-page":"147","volume-title":"Proceedings of the International Parallel Distributed Processing Symposium (IPDPS \u203202)","author":"Micic A.","key":"B18-2013-693519"},{"key":"B17-2013-693519","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2000.904966"},{"key":"B27-2013-693519","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2006.346"},{"key":"B22-2013-693519","doi-asserted-by":"publisher","DOI":"10.1109\/VETECS.2008.48"},{"key":"B15-2013-693519","doi-asserted-by":"publisher","DOI":"10.1109\/MOBHOC.2006.278601"},{"key":"B14-2013-693519","doi-asserted-by":"publisher","DOI":"10.1109\/MOBHOC.2007.4428604"},{"first-page":"295","volume-title":"Proceedings of the 2nd ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc \u203201)","author":"Schurgers C.","key":"B24-2013-693519"},{"key":"B23-2013-693519","doi-asserted-by":"publisher","DOI":"10.1109\/SECUREWARE.2007.4385318"},{"key":"B10-2013-693519","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2002.808417"},{"key":"B20-2013-693519","doi-asserted-by":"publisher","DOI":"10.1145\/1278972.1278992"},{"key":"B7-2013-693519","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44681-8_67"},{"key":"B8-2013-693519","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-27820-7_6"},{"key":"B2-2013-693519","doi-asserted-by":"publisher","DOI":"10.1145\/1452001.1452003"},{"key":"B6-2013-693519","doi-asserted-by":"publisher","DOI":"10.1142\/S0129626404001970"},{"key":"B19-2013-693519","doi-asserted-by":"publisher","DOI":"10.1145\/1073970.1073977"},{"key":"B4-2013-693519","doi-asserted-by":"publisher","DOI":"10.1145\/361179.361202"},{"key":"B28-2013-693519","doi-asserted-by":"publisher","DOI":"10.1023\/A:1013763825347"},{"key":"B13-2013-693519","doi-asserted-by":"publisher","DOI":"10.1145\/346855.346865"},{"first-page":"194","volume-title":"Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc \u203202)","author":"Williams B.","key":"B30-2013-693519"},{"key":"B26-2013-693519","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2006.1678171"},{"first-page":"206","volume-title":"Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc \u203202)","author":"Vaidya N. H.","key":"B29-2013-693519"},{"key":"B11-2013-693519","volume-title":"The Art of Computer Programming: Seminumerical Algorithms","volume":"2","author":"Knuth D. E.","year":"1981"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2013\/693519","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1155\/2013\/693519","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2013\/693519","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,16]],"date-time":"2021-05-16T20:29:01Z","timestamp":1621196941000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1155\/2013\/693519"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9,1]]},"references-count":25,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2013,9,1]]}},"alternative-id":["10.1155\/2013\/693519"],"URL":"https:\/\/doi.org\/10.1155\/2013\/693519","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"type":"print","value":"1550-1477"},{"type":"electronic","value":"1550-1477"}],"subject":[],"published":{"date-parts":[[2013,9,1]]}}}