{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,6]],"date-time":"2025-02-06T05:26:05Z","timestamp":1738819565298,"version":"3.37.0"},"reference-count":16,"publisher":"Academy Publisher","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JNW"],"DOI":"10.4304\/jnw.8.1.221-228","type":"journal-article","created":{"date-parts":[[2013,3,4]],"date-time":"2013-03-04T13:18:03Z","timestamp":1362403083000},"source":"Crossref","is-referenced-by-count":0,"title":["Detection System of Clone Attacks based on RSSI in Wireless Sensor Networks"],"prefix":"10.4304","volume":"8","author":[{"given":"Xiancun","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Yan","family":"Xiong","sequence":"additional","affiliation":[]},{"given":"Mingxi","family":"Li","sequence":"additional","affiliation":[]}],"member":"2838","published-online":{"date-parts":[[2013,1,1]]},"reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/SURV.2009.090205"},{"key":"ref2","first-page":"202","article-title":"A practical traceback mechanism in wireless sensor networks","volume":"37","author":"Yang","year":"2009","unstructured":"[2]F.Yang, X.H.Zhou, and Q.Y.Zhang, J. Xie and S. G. Zhang, \"A practical traceback mechanism in wireless sensor networks\", Acta Electronica Sinica, vol. 37, pp. 202- 206, January 2009 (in Chinese).","journal-title":"Acta Electronica Sinica"},{"key":"ref3","first-page":"49","article-title":"Distributed detection node replication attacks in sensor networks","volume-title":"Proceedings of IEEE Symposium on Security and Privacy","author":"Parno","year":"2005","unstructured":"[3]B. Parno, A. Perrig, V. Gligor, \"Distributed detection node replication attacks in sensor networks\", Proceedings of IEEE Symposium on Security and Privacy, pp. 49-63, 2005."},{"key":"ref4","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1145\/1288107.1288119","article-title":"A randomize, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks","volume-title":"Proceedings of the 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing","author":"Conti","year":"2007","unstructured":"[4]M. Conti, R. D. Pietro, L. V. Mancini, \"A randomize, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks\", Proceedings of the 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 80-89, 2007."},{"key":"ref5","first-page":"113","article-title":"Secure routing in wireless sensor networks: attacks and counter measures","volume-title":"Proceedings of First IEEE International Workshop on Sensor Network Protocols and Applications","author":"Chris","year":"2003","unstructured":"[5]K. Chris, W. David, \"Secure routing in wireless sensor networks: attacks and counter measures\", Proceedings of First IEEE International Workshop on Sensor Network Protocols and Applications, pp. 113-127, 2003."},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/MC.2003.1236475"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/TDSC.2010.25"},{"key":"ref8","first-page":"225","article-title":"Mobility-assisted detection of the replication attacks in mobile wireless sensor networks","volume-title":"Proceedings of the 6th International Conference on Wireless and Mobile Computing","author":"Deng","year":"2010","unstructured":"[8]X. M. Deng, Y. Xiong, and D. P. Chen, \"Mobility-assisted detection of the replication attacks in mobile wireless sensor networks\", In Proceedings of the 6th International Conference on Wireless and Mobile Computing, pp. 225-232, 2010."},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/TMC.2010.20"},{"key":"ref10","first-page":"1054","article-title":"A secure Monte Carlo Localization algorithm for mobile sensor networks","volume-title":"Proceedings of the 6th International Conference on Mobile Ad-hoc and Sensor Systems (MASS 09)","author":"Zeng","year":"2009","unstructured":"[10]Y. P. Zeng, J. N. Cao, J. Hong, and et al, \"A secure Monte Carlo Localization algorithm for mobile sensor networks\", In Proceedings of the 6th International Conference on Mobile Ad-hoc and Sensor Systems (MASS '09), pp. 1054-1059, 12-15, October 2009."},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1023\/A:1016598314198"},{"key":"ref12","first-page":"364","article-title":"A key management scheme supporting node mobility in heterogeneous sensor networks","volume-title":"Proceedings of the 6th International Conference on Emerging Technologies (ICET)","author":"Khan","year":"2010","unstructured":"[12]S. U. Khan, L. Lavagno, and C. Pastrone, \"A key management scheme supporting node mobility in heterogeneous sensor networks\", In Proceedings of the 6th International Conference on Emerging Technologies (ICET), pp. 364-369, 2010."},{"key":"ref13","first-page":"156","article-title":"Node replication attacks in wireless sensor networks: Bypassing the neighbor-based detection scheme","volume-title":"Proceedings of the International Conference on Network Computing and Information Security","author":"Zhu","year":"2011","unstructured":"[15]W. T. Zhu, \"Node replication attacks in wireless sensor networks: Bypassing the neighbor-based detection scheme\", In Proceedings of the International Conference on Network Computing and Information Security, pp. 156-160, 2011."},{"key":"ref14","first-page":"105","article-title":"Wireless sensor network nodes performance measurements and RSSI evaluation","volume-title":"Proceedings of the 15th International Symposium for Design and Technology of Electronics Packages","author":"Coca","year":"2009","unstructured":"[16]E. Coca, V. Popa, G. Buta\", Wireless sensor network nodes performance measurements and RSSI evaluation\", In Proceedings of the 15th International Symposium for Design and Technology of Electronics Packages, pp. 105-112, September 2009."},{"doi-asserted-by":"crossref","unstructured":"[13]C. Bekara, M. Laurent-Maknavicius, \"A new protocol for securing wireless sensor networks against nodes replication attacks\", In Proceedings of the 3rd IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2007), pp. 59-59, 2007.","key":"ref14","DOI":"10.1109\/WIMOB.2007.4390853"},{"doi-asserted-by":"crossref","unstructured":"[14]H. Choi, S. Zhu, T. F. La Porta, \"SET: Detecting node clones in sensor networks\", In Proceedings of the 3rd International Conference on Security and Privacy in Communications Networks and the Workshops (SecureComm 2007), pp. 341-350, 2007.","key":"ref14","DOI":"10.1109\/SECCOM.2007.4550353"}],"container-title":["Journal of Networks"],"original-title":[],"deposited":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:14:26Z","timestamp":1738775666000},"score":1,"resource":{"primary":{"URL":"https:\/\/dblp.org\/db\/journals\/jnw\/index.html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,1,1]]},"references-count":16,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2013,1,1]]}},"URL":"https:\/\/doi.org\/10.4304\/jnw.8.1.221-228","relation":{},"ISSN":["1796-2056"],"issn-type":[{"type":"print","value":"1796-2056"}],"subject":[],"published":{"date-parts":[[2013,1,1]]}}}