{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T06:51:30Z","timestamp":1763535090576},"reference-count":30,"publisher":"Engineering and Technology Publishing","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JCM"],"DOI":"10.4304\/jcm.6.2.128-142","type":"journal-article","created":{"date-parts":[[2011,4,12]],"date-time":"2011-04-12T07:31:28Z","timestamp":1302593488000},"source":"Crossref","is-referenced-by-count":19,"title":["Security in Mobile Wireless Sensor Networks \u2013 A Survey"],"prefix":"10.12720","volume":"6","author":[{"given":"Yi","family":"Ren","sequence":"first","affiliation":[]},{"given":"Vladimir","family":"Oleshchuk","sequence":"additional","affiliation":[]},{"given":"Frank Y.","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xiaohu","family":"Ge","sequence":"additional","affiliation":[]}],"member":"4977","published-online":{"date-parts":[[2011,4,1]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(01)00302-4"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/990680.990707"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.422"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2010.100505"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2010.5416348"},{"key":"ref6","first-page":"404","article-title":"Robomote: enabling mobility in sensor networks","volume-title":"Proc. 4th IEEE Int. Symp. on Information Processing in Sensor Networks (IPSN \u201905)","author":"Dantu","year":"2005"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03829-7_10"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1145\/1161039.1161058","article-title":"Sensor networks of freely drifting autonomous underwater explorers","volume-title":"Proc. 1st ACM Int. Workshop on Underwater Networks (WUWNet \u201906)","author":"Jaffe","year":"2006"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2008.4625802"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2009.4804335"},{"key":"ref11","volume-title":"Computer security: principles and practice.","author":"Stallings","year":"2008"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1007\/978-3-540-89335-6_7","article-title":"DISH: Distributed Self-Healing","volume-title":"Proc. 10th Int. Symp. on Stabilization, Safety, and Security of Distributed Systems (SSS \u201908)","author":"Ma","year":"2008"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1109\/SRDS.2008.23","article-title":"POSH: Proactive co-Operative Self-Healing in unattended wireless sensor networks","volume-title":"Proc. IEEE Symp. on Reliable Distributed Systems (SRDS \u201908)","author":"Di Pietro","year":"2008"},{"key":"ref14","first-page":"1","article-title":"A scheme for secure and reliable distributed data storage in unattended WSNs","volume-title":"Proc. IEEE GLOBECOM","author":"Ren","year":"2010"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2009.109"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2009.04.002"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"599","DOI":"10.1109\/ICDCS.2005.31","article-title":"Enhancing source-location privacy in sensor network routing","volume-title":"Proc. 25th IEEE Int. Conf. on Distributed Computing Systems (ICDCS \u201905)","author":"Kamat","year":"2005"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"314","DOI":"10.1109\/ICNP.2007.4375862","article-title":"Location privacy in sensor networks against a global eavesdropper","volume-title":"Proc. IEEE Int. Conf. on Network Protocols (ICNP \u201907)","author":"Mehta","year":"2007"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2005.12.003"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1387663.1387669"},{"key":"ref21","first-page":"11","article-title":"Securing mobile unattended WSNs against a mobile adversary","volume-title":"Proc. 29th IEEE Int. Symp. on Reliable Distributed Systems (SRDS\u201910)","year":"2010"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1023\/A:1016598314198"},{"key":"ref23","article-title":"Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks","volume-title":"Proc. 10th Annual Network and Distributed System Security Symp. (NDSS \u201903)","volume":"276","author":"Liu","year":"2003"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1218556.1218559"},{"key":"ref25","first-page":"62","article-title":"LEAP: efficient security mechanisms for large-scale distributed sensor networks","volume-title":"Proc. 10th ACM Conf. on Computer and Communications Security (CCS \u201903)","year":"2003"},{"key":"ref26","volume-title":"\u201cTime-lock puzzles and timed-release crypto,\u201d Massachusetts Institute of Technology (MIT)","author":"Rivest","year":"1996"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/35.312842"},{"issue":"no. 2","key":"ref28","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","article-title":"Rolebased access control models","volume":"29","author":"Sandhu","year":"1996","journal-title":"IEEE Computer"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1653662.1653664","article-title":"Attacking cryptographic schemes based on \u201dperturbation polynomials","volume-title":"Proc. 16th ACM Conf. on Computer and Communications Security (CCS \u201909)","author":"Albrecht","year":"2009"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1145\/984622.984660","article-title":"The sybil attack in sensor networks: analysis & defenses","volume-title":"Proc. 3rd IEEE Int. Symp. on Information Processing in Sensor Networks (IPSN \u201904)","author":"Newsome","year":"2004"}],"container-title":["Journal of Communications"],"original-title":[],"deposited":{"date-parts":[[2019,6,9]],"date-time":"2019-06-09T23:22:24Z","timestamp":1560122544000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.jocm.us\/index.php?m=content&c=index&a=show&catid=54&id=201"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,4,1]]},"references-count":30,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2011,4,1]]}},"URL":"https:\/\/doi.org\/10.4304\/jcm.6.2.128-142","relation":{},"ISSN":["1796-2021"],"issn-type":[{"value":"1796-2021","type":"print"}],"subject":[],"published":{"date-parts":[[2011,4,1]]}}}