{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:40:24Z","timestamp":1738777224571,"version":"3.37.0"},"reference-count":58,"publisher":"Academy Publisher","issue":"5","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JNW"],"DOI":"10.4304\/jnw.9.5.1103-1113","type":"journal-article","created":{"date-parts":[[2014,5,9]],"date-time":"2014-05-09T01:14:02Z","timestamp":1399598042000},"source":"Crossref","is-referenced-by-count":7,"title":["A Review of Attacks and Security Protocols for Wireless Sensor Networks"],"prefix":"10.4304","volume":"9","author":[{"given":"Fangmin","family":"Sun","sequence":"first","affiliation":[]},{"given":"Zhan","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Zhen","family":"Fang","sequence":"additional","affiliation":[]},{"given":"Lidong","family":"Du","sequence":"additional","affiliation":[]},{"given":"Zhihong","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Diliang","family":"Chen","sequence":"additional","affiliation":[]}],"member":"2838","published-online":{"date-parts":[[2014,5,8]]},"reference":[{"key":"ref1","volume-title":"A review of wireless body area networks for medical applications","author":"Ullah","year":"2009","unstructured":"[1] Sana Ullah, Pervez Khan, Niamat Ullah, Shahnaz Saleem, Henry Higgins, Kyung Sup Kwak. A review of wireless body area networks for medical applications. Network and System Sciences, 2009."},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/1-84628-484-8"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-010-0260-8"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1002\/9780470516782.ch1"},{"key":"ref5","first-page":"8","article-title":"Using wireless sensor networks to support intelligent transportation systems. pp. 462-473","author":"Tacconi","year":"2010","unstructured":"[6] David Tacconi, Daniele Miorandi, Iacopo Carreras, Francesco Chiti, Romano Fantacci. Using wireless sensor networks to support intelligent transportation systems. pp. 462-473, Ad Hoc Networks 8, 2010.","journal-title":"Ad Hoc Netw","ISSN":"https:\/\/id.crossref.org\/issn\/1570-8705","issn-type":"print"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.proeng.2012.09.311"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3390\/s120810381"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-012-9836-0"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.trac.2012.07.013"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2009.06.002"},{"key":"ref11","first-page":"479","volume-title":"Algorithms and protocols for wireless sensor networks","author":"Boukerche","year":"2009","unstructured":"[14] Azzedine Boukerche. Algorithms and protocols for wireless sensor networks. John Wiley & Sons Ltd, 2009, pp. 479-502."},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1002\/9780470666388"},{"issue":"October","key":"ref13","first-page":"7347","article-title":"Manju. V. C. Study of security issues in wireless sensor network.","volume":"3","year":"2011","unstructured":"[16] Manju. V. C. Study of security issues in wireless sensor network. International Journal of Engineering Science and Technology (IJEST), Vol. 3 October 2011, pp. 7347-7352.","journal-title":"Int J Eng Sci Technol","ISSN":"https:\/\/id.crossref.org\/issn\/0975-5462","issn-type":"print"},{"issue":"April","key":"ref14","first-page":"25","article-title":"MiniSec: A secure sensor network communication architecture.","volume":"07","author":"Luk","year":"2007","unstructured":"[17] Mark Luk, Ghita Mezzour, Adrian Perrig, Virgil Gligor. MiniSec: A secure sensor network communication architecture. IPSN'07, April pp. 25-27, 2007.","journal-title":"IPSN"},{"key":"ref15","first-page":"1005","volume-title":"A per-hop security scheme for highly dynamic wireless sensor networks","author":"Ali","year":"2009","unstructured":"[18] Syed Taha Ali, Vijay Sivaraman, Ashay Dhamdhere. A per-hop security scheme for highly dynamic wireless sensor networks. IEEE 2009, pp. 1005-1011."},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2011.01.016"},{"issue":"June","key":"ref17","first-page":"41","article-title":"Jamming sensor networks: attack and defense strategies.","author":"Xu","year":"2006","unstructured":"[21] Wenyuan Xu, Ke Ma, Yanyong Zhang. Jamming sensor networks: attack and defense strategies. IEEE Network, pp. 41-47, June 2006.","journal-title":"IEEE Netw","ISSN":"https:\/\/id.crossref.org\/issn\/0890-8044","issn-type":"print"},{"key":"ref18","first-page":"313","article-title":"Wireless sensor network attacks and security mechanisms: A short survey.","volume-title":"13th International Conference on Network-Based Information Systems","author":"Martins","year":"2010","unstructured":"[22] David Martins, Herv\u00e9 Guyennet. Wireless sensor network attacks and security mechanisms: A short survey. 13th International Conference on Network-Based Information Systems, 2010, pp. 313-320."},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/S1570-8705(03)00008-8"},{"key":"ref20","article-title":"Security solution for data integrity in wireless bioSensor networks.","volume-title":"27th International Conference on Distributed Computing Systems Workshops","author":"Balasubramanyn","year":"2007","unstructured":"[25] Vidya Bharrgavi Balasubramanyn, Geethapriya Thamilarasu, Ramalingam Sridhar. Security solution for data integrity in wireless bioSensor networks. 27th International Conference on Distributed Computing Systems Workshops, 2007."},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICPPW.2003.1240399"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2006.1632652"},{"key":"ref23","doi-asserted-by":"crossref","DOI":"10.1109\/INFOCOM.2008.4544608","volume-title":"EKG-based key agreement in body sensor networks","author":"Venkatasubramanian","year":"2008","unstructured":"[34] Krishna Kumar Venkatasubramanian, Ayan Banerjee, Sandeep K. S. Gupta. EKG-based key agreement in body sensor networks. IEEE, 2008."},{"issue":"No. 7","key":"ref24","first-page":"302","article-title":"Approaches to wireless sensor network: security protocols.","volume":"1","author":"Singh","year":"2011","unstructured":"[36] Harmandeep Singh, Garima Malik. Approaches to wireless sensor network: security protocols. World of Computer Science and Information Technology Journal (WCSIT), pp. 302-306 Vol. 1, No. 7, 2011.","journal-title":"World of Computer Science and Information Technology Journal"},{"key":"ref25","first-page":"1","article-title":"Wireless sensor network design for tactical military applications: Remote large-scale environments.","volume-title":"Military Communications Conference","author":"Sang Hyuk","year":"2009","unstructured":"[37] L. Sang Hyuk, L. Soobin, S. Heecheol et al. . Wireless sensor network design for tactical military applications: Remote large-scale environments. Military Communications Conference, 2009 (MILCOM 2009). IEEE, pp. 1-7."},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.apenergy.2012.05.020"},{"key":"ref27","first-page":"153","article-title":"Applications of wireless sensor networks and RFID in a Smart home environment.","volume-title":"Communication Networks and Services Research Conference","author":"Hussain","year":"2009","unstructured":"[39] S. Hussain, S. Schaffner, D. Moseychuck. Applications of wireless sensor networks and RFID in a Smart home environment. Communication Networks and Services Research Conference, 2009, CNSR '09. Seventh Annual, 2009, pp. 153-157."},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2011.09.005"},{"key":"ref29","first-page":"455","volume-title":"Md Abdul Hamid A M Jehad Sarkar A group-based security scheme for wireless sensor networks Ann Telecommun","year":"2012","unstructured":"[42] Md. Abdul Hamid, A. M. Jehad Sarkar. A group-based security scheme for wireless sensor networks. Ann. Telecommun, Springer, pp. 455\u2013469, 2012."},{"key":"ref30","volume-title":"Wireless sensor network security","author":"Lopez","year":"2008","unstructured":"[44] Javier Lopez, Jianying Zhou. Wireless sensor network security. IOS Press, 2008."},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s10776-011-0169-6"},{"key":"ref32","first-page":"783","volume-title":"RiSeG","author":"Cheikhrouhou","year":"2011","unstructured":"[46] Omar Cheikhrouhou, Anis Kouba^a, Gianluca Dini, Mohamed Abid. RiSeG: a ring based secure group communication protocol for resource-constrained wireless sensor networks. Pers Ubiquit Comput, pp. 783\u2013797, 2011."},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2012.03.006"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2009.07.016"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.5121\/ijcnc.2011.3517"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2011.03.005"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.proeng.2012.07.215"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.01.002"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2012.06.140"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.04.008"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.proeng.2012.01.393"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2011.09.006"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/S1005-8885(11)60444-5"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.03.027"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2012.03.010"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(11)70107-6"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2011.07.028"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/IADCC.2009.4809123"},{"key":"ref49","first-page":"173","volume-title":"Detection and handling of mac layer misbehavior in wireless networks","author":"Kyasanur","year":"2003","unstructured":"[66] P. Kyasanur, N. H. Vaidya. Detection and handling of mac layer misbehavior in wireless networks. DSN, 2003, pp. 173\u2013182."},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2011.09.005"},{"key":"ref51","first-page":"12","article-title":"Security and privacy issues in wireless sensor networks for healthcare applications.","author":"Al Ameen","year":"2010","unstructured":"[72] Moshaddique Al Ameen, Jingwei Liu, Kyungsup Kwak. Security and privacy issues in wireless sensor networks for healthcare applications. J Med Syst, 12 March 2010.","journal-title":"J Med Syst","ISSN":"https:\/\/id.crossref.org\/issn\/0148-5598","issn-type":"print"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/S1005-8885(11)60478-0"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2011.03.022"},{"key":"ref54","first-page":"65","article-title":"TARF: A trust-aware routing framework for wireless sensor networks. EWSN 2010","volume":"5970","author":"Zhan","year":"2010","unstructured":"[75] Guoxing Zhan, Weisong Shi, Julia Deng. TARF: A trust-aware routing framework for wireless sensor networks. EWSN 2010, LNCS 5970, pp. 65-80, 2010.","journal-title":"LNCS"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2011.07.028"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2012.03.010"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2012.03.019"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2011.12.008"}],"container-title":["Journal of Networks"],"original-title":[],"deposited":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:05:51Z","timestamp":1738775151000},"score":1,"resource":{"primary":{"URL":"https:\/\/dblp.org\/db\/journals\/jnw\/index.html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5,8]]},"references-count":58,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2014,5,8]]}},"URL":"https:\/\/doi.org\/10.4304\/jnw.9.5.1103-1113","relation":{},"ISSN":["1796-2056"],"issn-type":[{"type":"print","value":"1796-2056"}],"subject":[],"published":{"date-parts":[[2014,5,8]]}}}