{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T09:31:35Z","timestamp":1762507895383},"reference-count":0,"publisher":"National Library of Serbia","issue":"3","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["ComSIS","COMPUT SCI INF SYST","COMPUT SCI INFORM SY","COMPUTER SCI INFORM","COMSIS J"],"published-print":{"date-parts":[[2019]]},"abstract":"<jats:p>In Industrial Internet of Things (IIoT) device and network, wireless sensor network (WSN) is an important component. Routing protocol is the critical component of WSN. As the WSN may be attacked by all kinds of intruders, the survivability of WSN is important to IIoT security. To precisely evaluate the systematic survivability ability under external attack and internal security mechanism, a novel survivability entropy-based quantitative evaluation metric is proposed to calculate the systematic survivability ability of WSN routing protocol. Numerical analysis and simulation experiments are combined to precisely calculate the survivability entropy metric. To validate the evaluation approach, NS2 (Network simulator) is used to simulate the DoS attack and security mechanism in WSN. Experimental results show that the novel survivability evaluation metric and method can precisely evaluate the systematic survivability ability of WSN.<\/jats:p>","DOI":"10.2298\/csis180918024c","type":"journal-article","created":{"date-parts":[[2019,10,10]],"date-time":"2019-10-10T10:44:51Z","timestamp":1570704291000},"page":"733-751","source":"Crossref","is-referenced-by-count":2,"title":["A novel SMP-based survivability evaluation metric and approach in wireless sensor network"],"prefix":"10.2298","volume":"16","author":[{"given":"Hongsong","family":"Chen","sequence":"first","affiliation":[{"name":"School of Computer & Communication Engineering, University of Science and Technology Beijing, Beijing, China"}]},{"given":"Haiyan","family":"Zhuang","sequence":"additional","affiliation":[{"name":"Railway Police College Zhengzhou, Henan, China"}]},{"given":"Zhiguang","family":"Shan","sequence":"additional","affiliation":[{"name":"State Information Center of China Beijing, China"}]},{"given":"Chao-Hsien","family":"Lee","sequence":"additional","affiliation":[{"name":"Department of Electronic Engineering,National Taipei University of Technology Taipei City, China"}]},{"given":"Zhongchuan","family":"Fu","sequence":"additional","affiliation":[{"name":"Department of computer science, Harbin Institute of Technology Harbin, China"}]}],"member":"1078","container-title":["Computer Science and Information Systems"],"original-title":[],"language":"en","deposited":{"date-parts":[[2023,5,29]],"date-time":"2023-05-29T08:04:51Z","timestamp":1685347491000},"score":1,"resource":{"primary":{"URL":"https:\/\/doiserbia.nb.rs\/Article.aspx?ID=1820-02141900024C"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":0,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019]]}},"URL":"https:\/\/doi.org\/10.2298\/csis180918024c","relation":{},"ISSN":["1820-0214","2406-1018"],"issn-type":[{"value":"1820-0214","type":"print"},{"value":"2406-1018","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]}}}