{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T01:39:56Z","timestamp":1726364396216},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2014,10,7]],"date-time":"2014-10-07T00:00:00Z","timestamp":1412640000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/2.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1186\/1687-1499-2014-163","type":"journal-article","created":{"date-parts":[[2014,10,7]],"date-time":"2014-10-07T23:01:11Z","timestamp":1412722871000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["An energy-efficient random verification protocol for the detection of node clone attacks in wireless sensor networks"],"prefix":"10.1186","volume":"2014","author":[{"given":"Yuping","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Zhenjie","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Juan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Rufeng","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Dongmei","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,10,7]]},"reference":[{"key":"986_CR1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2013\/469076","volume":"2013","author":"W Khan","year":"2013","unstructured":"Khan W, Aalsalem M: Detection and mitigation of node replication attacks in wireless sensor networks: a survey. Int. J. Distribute Sens. Netw. 2013, 2013: 1-22.","journal-title":"Int. J. Distribute Sens. Netw"},{"issue":"5","key":"986_CR2","first-page":"759","volume":"14","author":"DQ Zhang","year":"2013","unstructured":"Zhang DQ, Zhu RB, Men SQ, Raychoudhury V: Query representation with global consistency on user click graph. J. Internet Technol. 2013, 14(5):759-769.","journal-title":"J. Internet Technol"},{"key":"986_CR3","first-page":"49","volume-title":"Proceedings of IEEE Symposium on Security and Privacy (S & P)","author":"B Parno","year":"2005","unstructured":"Parno B, Perrig A, Gligpr V: Distributed detection of node replication attacks sensor networks. In Proceedings of IEEE Symposium on Security and Privacy (S & P). Washington D.C; 2005:49-63."},{"key":"986_CR4","first-page":"341","volume-title":"Proceedings of the Third International Conference on Security and Privacy in Communication Networks","author":"H Choi","year":"2007","unstructured":"Choi H, Zhu S, LA TF: SET Porta, Detecting node clones in sensor networks. In Proceedings of the Third International Conference on Security and Privacy in Communication Networks. Nice; 2007:341-350."},{"key":"986_CR5","first-page":"290","volume-title":"Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops","author":"CM Yu","year":"2012","unstructured":"Yu CM, Lu CS, Kuo SY: CSI: compressed sensing-based clone identification in sensor networks. In Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops. Lugano; 2012:290-295."},{"key":"986_CR6","doi-asserted-by":"publisher","first-page":"1468","DOI":"10.1109\/ICSMC.2006.384924","volume-title":"Proceedings of the 2006 IEEE International Conference on Systems (Man and Cybernetics SMC 2006)","author":"M Conti","year":"2006","unstructured":"Conti M, Pietro RD, Mancini LV, Mei A: Requirements and open issues in distributed detection of node identity replicas in WSN. In Proceedings of the 2006 IEEE International Conference on Systems (Man and Cybernetics SMC 2006). Taipei Taiwan; 2006:1468-1473."},{"key":"986_CR7","first-page":"3","volume-title":"Real-time detection of clone attacks in wireless sensor networks. Paper presented at the 28th international conference on distributed computing systems","author":"K Xing","year":"2008","unstructured":"Xing K, Cheng X, Liu F, Du DH: Real-time detection of clone attacks in wireless sensor networks. Paper presented at the 28th international conference on distributed computing systems. Beijing; 2008:3-10."},{"key":"986_CR8","first-page":"82","volume-title":"Proceedings of the 20th IEEE international symposium on personal, indoor and mobile radio communications","author":"W Znaidi","year":"2009","unstructured":"Znaidi W, Minier M, Ubeda S: Hierarchical node replication attacks detection in wireless sensors networks. In Proceedings of the 20th IEEE international symposium on personal, indoor and mobile radio communications. PIMRC\u201909, Tokyo Japan; 2009:82-86."},{"key":"986_CR9","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1109\/ICNP.2009.5339674","volume-title":"Proceedings of the 17th IEEE International Conference on Network Protocols ICNP 2009","author":"M Zhang","year":"2009","unstructured":"Zhang M, Khanapure V, Chen S, Xiao X: Memory efficient protocols for detecting node replication attacks in wireless sensor networks. In Proceedings of the 17th IEEE International Conference on Network Protocols ICNP 2009. Princeton; 2009:284-293."},{"issue":"10","key":"986_CR10","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/MWC.2010.5601959","volume":"17","author":"K Zeng","year":"2010","unstructured":"Zeng K, Govindan K, Mohapatra P: Non-cryptographic authentication and identification in wireless networks. IEEE Wirel. Commun. 2010, 17(10):56-62.","journal-title":"IEEE Wirel. Commun"},{"key":"986_CR11","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1145\/1288107.1288119","volume-title":"Proceedings of the 8th ACM International Symposium on Mobile (Ad Hoc Networking and Computing MobiHoc 2007)","author":"M Conti","year":"2007","unstructured":"Conti M, Di Pietro R, Mancini LV, Mei A: A randomized, efficient, distributed protocol for the detection of node replication attacks in wireless sensor network. In Proceedings of the 8th ACM International Symposium on Mobile (Ad Hoc Networking and Computing MobiHoc 2007). Montr\u00e9al; 2007:80-89."},{"key":"986_CR12","first-page":"257","volume-title":"Proceedings of the 23rd Annual Computer Security Applications Conference ACSAC 2007","author":"B Zhu","year":"2007","unstructured":"Zhu B, Addada VGK, Setia S, Jajodia S, Roy S: Efficient distributed detection of node replication attacks in sensor networks. In Proceedings of the 23rd Annual Computer Security Applications Conference ACSAC 2007. Miami; 2007:257-266."},{"issue":"21","key":"986_CR13","doi-asserted-by":"publisher","first-page":"189","DOI":"10.4156\/jcit.vol7.issue21.24","volume":"7","author":"WN Shu","year":"2012","unstructured":"Shu WN, Cheng L: A novel load balancing optimization algorithm based on peer-to-peer technology in streaming media. J. Convergence Inform. Technol. 2012, 7(21):189-196. 10.4156\/jcit.vol7.issue21.24","journal-title":"J. Convergence Inform. Technol"},{"issue":"11","key":"986_CR14","doi-asserted-by":"publisher","first-page":"1246","DOI":"10.1109\/TSMCC.2007.905824","volume":"37","author":"R Brooks","year":"2007","unstructured":"Brooks R, Govindaraju PY, Pirretti M, Vijaykrishnan N, Kandemir MT: On the detection of clones in sensor networks using random key predistribution. IEEE Trans. Syst. Man Cybern. Part C Appl. Rev. 2007, 37(11):1246-1258.","journal-title":"IEEE Trans. Syst. Man Cybern. Part C Appl. Rev"},{"issue":"7","key":"986_CR15","doi-asserted-by":"publisher","first-page":"913","DOI":"10.1109\/TMC.2010.40","volume":"9","author":"B Zhu","year":"2010","unstructured":"Zhu B, Setia S, Jajodia S, Roy S, Wang L: Localized multicast: efficient and distributed replica detection in large-scale sensor networks. IEEE Trans. Mob. Comput. 2010, 9(7):913-926.","journal-title":"IEEE Trans. Mob. Comput"},{"issue":"6","key":"986_CR16","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1109\/TMC.2010.213","volume":"10","author":"JW Ho","year":"2011","unstructured":"Ho JW, Wright M, Das SK: Fast detection of mobile replica node attacks in wireless sensor networks using sequential hypothesis testing. IEEE Trans. Mob. Comput. 2011, 10(6):767-782.","journal-title":"IEEE Trans. Mob. Comput"},{"key":"986_CR17","first-page":"1773","volume-title":"Proceedings of the IEEE INFOCOM","author":"JW Ho","year":"2009","unstructured":"Ho JW, Wright M, Das SK: Fast detection of replica node attacks in mobile sensor networks using sequential analysis. In Proceedings of the IEEE INFOCOM. Rio de Janeiro; 2009:1773-1781."},{"issue":"4","key":"986_CR18","doi-asserted-by":"publisher","first-page":"732","DOI":"10.1007\/s11390-011-1172-1","volume":"26","author":"XM Deng","year":"2011","unstructured":"Deng XM, Xiong Y: A new protocol for the detection of node replication attacks in mobile wireless sensor networks. J. Comput. Sci. Technol. 2011, 26(4):732-743. 10.1007\/s11390-011-1172-1","journal-title":"J. Comput. Sci. Technol"},{"key":"986_CR19","doi-asserted-by":"publisher","first-page":"597","DOI":"10.1109\/SAHCN.2008.82","volume-title":"Proceedings of the 5th Annual IEEE Communications Society Conference on Sensor (Mesh and Ad Hoc Communications and Networks SECON 2008","author":"CM Yu","year":"2008","unstructured":"Yu CM, Lu CS, Kuo SY: Mobile sensor network resilient against node replication attacks. In Proceedings of the 5th Annual IEEE Communications Society Conference on Sensor (Mesh and Ad Hoc Communications and Networks SECON 2008. California; 2008:597-599."},{"key":"986_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1471-2164-13-1","volume":"13","author":"YJ Wang","year":"2012","unstructured":"Wang YJ, Yang TY, Ma YG, Halade GV, Zhang JQ, Lindsey ML, Jin YF: Mathematical modeling and stability analysis of macrophage activation in left ventricular remodeling post-myocardial infarction. BMC Genomics 2012, 13: 1-8. 10.1186\/1471-2164-13-1","journal-title":"BMC Genomics"},{"issue":"3","key":"986_CR21","doi-asserted-by":"publisher","first-page":"2496","DOI":"10.3390\/s110302496","volume":"11","author":"LM Wang","year":"2011","unstructured":"Wang LM, Shi Y: Patrol detection for replica attacks on wireless sensor networks. Sensors 2011, 11(3):2496-2504.","journal-title":"Sensors"},{"key":"986_CR22","first-page":"2798","volume-title":"Proceedings of the International Workshop on Information and Electronics Engineering (IWIEE)","author":"Y Lou","year":"2012","unstructured":"Lou Y, Zhang Y, Liu S: Single hop detection of node clone attacks in mobile wireless sensor networks. In Proceedings of the International Workshop on Information and Electronics Engineering (IWIEE). Harbin; 2012:2798-2803."},{"issue":"5","key":"986_CR23","doi-asserted-by":"publisher","first-page":"496","DOI":"10.1002\/sec.338","volume":"5","author":"WT Zhu","year":"2012","unstructured":"Zhu WT, Zhou J, Deng R, Bao F: Detecting node replication attacks in mobile sensor networks: theory and approaches. Secur. Commun. Netw. 2012, 5(5):496-507. 10.1002\/sec.338","journal-title":"Secur. Commun. Netw"},{"issue":"9","key":"986_CR24","first-page":"1492","volume":"5","author":"RB Zhu","year":"2011","unstructured":"Zhu RB, Qin YY, Lai CF: Adaptive packet scheduling scheme to support real-time traffic in WLAN mesh networks. KSII Transac. Internet Inform. Syst. 2011, 5(9):1492-1512.","journal-title":"KSII Transac. Internet Inform. Syst"},{"key":"986_CR25","first-page":"310","volume-title":"Proceedings of the Ninth Annual International Workshop on Selected Areas in Cryptography, SAC 2002","author":"F Hess","year":"2002","unstructured":"Hess F: Efficient identity based signature schemes based on pairings. In Proceedings of the Ninth Annual International Workshop on Selected Areas in Cryptography, SAC 2002. Newfoundland; 2002:310-324."},{"key":"986_CR26","first-page":"197","volume-title":"Proceedings of IEEE Symposium on Security and Privacy","author":"H Chan","year":"2003","unstructured":"Chan H, Perrig A, Song D: Random key predistribution schemes for sensor networks. In Proceedings of IEEE Symposium on Security and Privacy. Berkeley; 2003:197-213."},{"key":"986_CR27","first-page":"1","volume-title":"Energy-efficient communication protocol for wireless microsensor networks. Paper presented at the 33rd Hawaii international conference on system sciences","author":"WR Heinzelman","year":"2000","unstructured":"Heinzelman WR, Chandrakasan A: Energy-efficient communication protocol for wireless microsensor networks. Paper presented at the 33rd Hawaii international conference on system sciences. Hawaii; 2000:1-10."},{"key":"986_CR28","first-page":"4341","volume-title":"Proceedings of IEEE International Conference on Systems (Man and Cybernetics)","author":"YJ Wang","year":"2009","unstructured":"Wang YJ, Chen P, Jin YF: Trajectory planning for an unmanned ground vehicle group using augmented particle swarm optimization in a dynamic environment. In Proceedings of IEEE International Conference on Systems (Man and Cybernetics). San Antonio; 2009:4341-4346."}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1186\/1687-1499-2014-163\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-1499-2014-163.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-1499-2014-163.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,21]],"date-time":"2019-01-21T21:30:32Z","timestamp":1548106232000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/1687-1499-2014-163"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10,7]]},"references-count":28,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,12]]}},"alternative-id":["986"],"URL":"https:\/\/doi.org\/10.1186\/1687-1499-2014-163","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,10,7]]},"assertion":[{"value":"23 December 2013","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 September 2014","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 October 2014","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"163"}}