{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T15:06:00Z","timestamp":1762009560449,"version":"build-2065373602"},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,1,8]],"date-time":"2019-01-08T00:00:00Z","timestamp":1546905600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1186\/s13638-018-1337-5","type":"journal-article","created":{"date-parts":[[2019,1,8]],"date-time":"2019-01-08T11:56:12Z","timestamp":1546948572000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":31,"title":["Security to wireless sensor networks against malicious attacks using Hamming residue method"],"prefix":"10.1186","volume":"2019","author":[{"given":"Majid","family":"Alotaibi","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,8]]},"reference":[{"key":"1337_CR1","series-title":"Proc. 1st IEEE Int\u2019l. Wksp. Sensor Network Protocols and Apps","volume-title":"Secure Routing in Sensor Networks: Attacks and Countermeasures","author":"C Karlof","year":"2003","unstructured":"C. Karlof D. Wagner Secure Routing in Sensor Networks: Attacks and Countermeasures Proc. 1st IEEE Int\u2019l. Wksp. Sensor Network Protocols and Apps.2003"},{"key":"1337_CR2","doi-asserted-by":"crossref","unstructured":"Y. Zhou, Y. Fang, Y. Zhang, Securing wireless sensor networks: a survey. IEEE Commun. Surv. Tutorials. 10(3) 6\u201328 (2008)","DOI":"10.1109\/COMST.2008.4625802"},{"issue":"11","key":"1337_CR3","doi-asserted-by":"publisher","first-page":"1500","DOI":"10.1109\/TC.2009.109","volume":"58","author":"R Pietro Di","year":"2009","unstructured":"R. Di Pietro, L.V. Mancini, C. Soriente, A. Spognardi, G. Tsudik, Data security in unattended wireless sensor networks. IEEE Trans. Comput. 58(11), 1500\u20131511 (2009)","journal-title":"IEEE Trans. Comput."},{"key":"1337_CR4","series-title":"Proc. 9th ACM Conf. Comp. and Commun","first-page":"41","volume-title":"A Key Management Scheme for Distributed Sensor Networks","author":"L Eschenauer","year":"2002","unstructured":"L. Eschenauer, V.D. Gligor, A Key Management Scheme for Distributed Sensor Networks, Proc. 9th ACM Conf. Comp. and Commun (2002), pp. 41\u201347"},{"key":"1337_CR5","series-title":"Proc. 2nd IEEE Int\u2019l. Conf. Mobile Ad Hoc and Sensor Sys","volume-title":"Attack-Resilient Time Synchronization for Wireless Sensor Networks","author":"H Song","year":"2005","unstructured":"H. Song S. Zhu G. Cao Attack-Resilient Time Synchronization for Wireless Sensor Networks Proc. 2nd IEEE Int\u2019l. Conf. Mobile Ad Hoc and Sensor Sys. 2005"},{"issue":"7","key":"1337_CR6","doi-asserted-by":"publisher","first-page":"941","DOI":"10.1109\/TMC.2010.36","volume":"9","author":"T Shu","year":"2010","unstructured":"T. Shu, M. Krunz, S. Liu, Secure data collection in wireless sensor networks using randomized dispersive routes. IEEE Trans. Mob. Comput. 9(7), 941\u2013954 (2010)","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"4","key":"1337_CR7","doi-asserted-by":"publisher","first-page":"2387","DOI":"10.1109\/TVT.2007.912327","volume":"57","author":"X Du","year":"2008","unstructured":"X. Du, Secure and efficient time synchronization in heterogeneous sensor networks. IEEE Trans. Vehic. Tech. 57(4), 2387\u20132394 (2008)","journal-title":"IEEE Trans. Vehic. Tech."},{"issue":"6","key":"1337_CR8","doi-asserted-by":"publisher","first-page":"1229","DOI":"10.1016\/j.adhoc.2008.11.004","volume":"7","author":"W Zhang","year":"2009","unstructured":"W. Zhang, S. Zhu, G. Cao, Pre-distribution and local collaboration-based group rekeying for wireless sensor networks. Ad Hoc Netw. 7(6), 1229\u20131242 (2009)","journal-title":"Ad Hoc Netw."},{"issue":"6","key":"1337_CR9","first-page":"397","volume":"25","author":"S Guo","year":"2010","unstructured":"S. Guo, Z. Qian, A compromise-resilient pair-wise rekeying protocol in hierarchical wireless sensor networks. Comput. Syst. Sci. Eng. 25(6), 397\u2013405 (2010)","journal-title":"Comput. Syst. Sci. Eng."},{"issue":"Article ID 4060","key":"1337_CR10","first-page":"7","volume":"2013","author":"Y Zhang","year":"2013","unstructured":"Y. Zhang, C. Wu, J. Cao, X. Li, A secret sharing-based key management in a hierarchical wireless sensor network. Int. J. Distrib. Sens. Netw. 2013(Article ID 406061), 7 (2013)","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"1337_CR11","first-page":"4","volume":"5","author":"P Sengar","year":"2017","unstructured":"P. Sengar, N. Bhardwaj, A survey on security and various attacks in wireless sensor network. Int. J. Comput. Sci. Eng. 5, 4 (2017)","journal-title":"Int. J. Comput. Sci. Eng."},{"issue":"4","key":"1337_CR12","doi-asserted-by":"publisher","first-page":"960","DOI":"10.1109\/TPDS.2014.2318296","volume":"26","author":"D Tang","year":"2015","unstructured":"D. Tang, T. Li, J. Ren, J. Wu, Cost-Aware SEcure Routing (CASER) protocol design for wireless sensor networks. IEEE Trans. Parallel. Distributed Syst. 26(4), 960\u2013973 (2015)","journal-title":"IEEE Trans. Parallel. Distributed Syst."},{"key":"1337_CR13","first-page":"756","volume":"78","author":"R Mahidhar","year":"2016","unstructured":"R. Mahidhar, A. Raut, A survey on scheduling schemes with security in wireless sensor networks. Int. Conf. Inf. Secur. Privacy 78, 756\u2013762 (2016)","journal-title":"Int. Conf. Inf. Secur. Privacy"},{"key":"1337_CR14","doi-asserted-by":"publisher","unstructured":"J. Kim, J. Moon, J. Jung, D. Won, Security analysis and improvements of session key establishment for clustered sensor networks. Hindawi Publishing Corp J Sens 2016, Article ID 4393721, 17 \n                    https:\/\/doi.org\/10.1155\/2016\/4393721\n                    \n                  . Accessed 10 Apr 2016","DOI":"10.1155\/2016\/4393721"},{"key":"1337_CR15","unstructured":"P. Porambage, C. Schmitt, P. Kumar, A. Gurtov, M. Ylianttila, PAuthkey: a pervasive authentication protocol and key establishment scheme for wireless sensor networks in distributed IoT applications. Int. J. Distrib. Sens. Netw. 2014, Article ID 357430, 14 (2014). \n                    https:\/\/sourceforge.net\/projects\/nsnam\/"},{"key":"1337_CR16","doi-asserted-by":"crossref","unstructured":"Syed Jalal Ahmad and P. Radha Krishna, Security on MANETs using Block Coding. International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp 2054\u20132060, 2015.","DOI":"10.1109\/ICACCI.2015.7275919"},{"key":"1337_CR17","unstructured":"NS2 Download link: \n                    https:\/\/sourceforge.net\/projects\/nsnam\/"},{"key":"1337_CR18","doi-asserted-by":"crossref","unstructured":"S.J. Ahmad, V.S.K. Reddy, A. Damodaram, P. Radha Krishna, A dynamic priority based scheduling scheme for multimedia streaming over MANETs to improve QoS. Int. Conf. Distrib. Comput. Internet Tech., 122\u2013126 (2016)","DOI":"10.1007\/978-3-319-28034-9_15"}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-018-1337-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13638-018-1337-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-018-1337-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,7]],"date-time":"2020-01-07T19:07:45Z","timestamp":1578424065000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-018-1337-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,8]]},"references-count":18,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["1337"],"URL":"https:\/\/doi.org\/10.1186\/s13638-018-1337-5","relation":{},"ISSN":["1687-1499"],"issn-type":[{"type":"electronic","value":"1687-1499"}],"subject":[],"published":{"date-parts":[[2019,1,8]]},"assertion":[{"value":"26 April 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 December 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 January 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Majid Alotaibi received Ph.D., from The University of Queensland, Brisbane, Australia, in 2011. Currently, he is an assistant professor with the Department of Computer Engineering, Umm Al Qura University, Makkah, Kingdom of Saudi Arabia. His current research interests include mobile computing, mobile and sensor networks, wireless technologies, ad hoc networks, computer networks (wired\/wireless), RFID, antennas and propagation, radar, and nano electronics.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Author\u2019s information"}},{"value":"The author declares that there are no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Publisher\u2019s Note"}}],"article-number":"8"}}