{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:40:34Z","timestamp":1738777234505,"version":"3.37.0"},"reference-count":11,"publisher":"Academy Publisher","issue":"6","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JNW"],"DOI":"10.4304\/jnw.9.6.1471-1476","type":"journal-article","created":{"date-parts":[[2014,6,10]],"date-time":"2014-06-10T02:59:48Z","timestamp":1402369188000},"source":"Crossref","is-referenced-by-count":2,"title":["A Bloom Filter and Matrix-based Protocol for Detecting Node Replication Attack"],"prefix":"10.4304","volume":"9","author":[{"given":"Weimin","family":"Xie","sequence":"first","affiliation":[]},{"given":"Liejun","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Mingwei","family":"Wang","sequence":"additional","affiliation":[]}],"member":"2838","published-online":{"date-parts":[[2014,6,9]]},"reference":[{"key":"ref1","first-page":"308","article-title":"Overview of Security Issues in Wireless Sensor Networks","volume-title":"Third International Conference","author":"Modares","year":"2011","unstructured":"[1] H. Modares, R. Salleh, A. Moravejosharieh. \"Overview of Security Issues in Wireless Sensor Networks,\" CIMSiM, 2011 Third International Conference. pp. 308-311"},{"issue":"1-3","key":"ref2","first-page":"45","article-title":"A Public Key Polynomial-based Key Pre-distribution Scheme for Large-Scale Wireless Sensor Networks","volume":"16","author":"Jie","year":"2012","unstructured":"[2] H. Jie, O. Guohua. \"A Public Key Polynomial-based Key Pre-distribution Scheme for Large-Scale Wireless Sensor Networks\". Ad Hoc & Sensor Wireless Networks, vol. 16(1-3) 2012, pp. 45-64.","journal-title":"Ad Hoc & Sensor Wireless Networks"},{"issue":"11","key":"ref3","first-page":"2232","article-title":"Research on Cloud Trust Model for Malicious Node Detection in Wireless Sensor Network","volume":"40","author":"Cai","year":"2012","unstructured":"[3] S. B. Cai, Q. L. Han, Z. G. Gao, et al. \"Research on Cloud Trust Model for Malicious Node Detection in Wireless Sensor Network\". Acta Electronica Sinica, vol. 40(11), 2012, pp. 2232-2238.","journal-title":"Acta Electronica Sinica"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.proeng.2012.01.393"},{"key":"ref5","first-page":"501","article-title":"Dynamic Detection of Clone Attack in Wireless Sensor Networks","volume-title":"International Conference","author":"Sathish","year":"2013","unstructured":"[7] R. Sathish, D. R. Kumar. \"Dynamic Detection of Clone Attack in Wireless Sensor Networks,\" Communication Systems and Network Technologies (CSNT), 2013 International Conference, pp. 501-505."},{"key":"ref6","first-page":"44","article-title":"studying the effects of malicious nodes using geographic routing protocol in the WSN","volume":"12","author":"Abusaimeh","year":"2012","unstructured":"[9] H. Abusaimeh. \"studying the effects of malicious nodes using geographic routing protocol in the WSN\". International Journal, vol. 12, 2012, pp. 44-50.","journal-title":"Int J","ISSN":"https:\/\/id.crossref.org\/issn\/0020-7020","issn-type":"print"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1201\/9781439821916"},{"key":"ref8","first-page":"257","article-title":"Efficient Distributed Detection of Node Replication Attacks in Sensor Networks","volume-title":"Computer Security Applications Conference","author":"Bo","year":"2007","unstructured":"[13] Z. Bo, V. G. K. Addada, S. Setia, et al. \"Efficient Distributed Detection of Node Replication Attacks in Sensor Networks,\" Computer Security Applications Conference, 2007 ACSAC 2007 Twenty-Third Annual. pp. 257-267"},{"issue":"6","key":"ref9","first-page":"36","article-title":"MA Bin. \"QR decomposition and genetic algorithm based optimized layout of sensors for hydraulic structures","volume":"43","year":"2012","unstructured":"[19] L. J. NIU Guochun, MA Bin. \"QR decomposition and genetic algorithm based optimized layout of sensors for hydraulic structures\". Water Resources and Hydropower Engineering, vol. 43(6), 2012, pp. 36-38.","journal-title":"Water Resources and Hydropower Engineering"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/67933.67941"}],"container-title":["Journal of Networks"],"original-title":[],"deposited":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:06:29Z","timestamp":1738775189000},"score":1,"resource":{"primary":{"URL":"https:\/\/dblp.org\/db\/journals\/jnw\/index.html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6,9]]},"references-count":11,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2014,6,9]]}},"URL":"https:\/\/doi.org\/10.4304\/jnw.9.6.1471-1476","relation":{},"ISSN":["1796-2056"],"issn-type":[{"type":"print","value":"1796-2056"}],"subject":[],"published":{"date-parts":[[2014,6,9]]}}}