{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,7]],"date-time":"2025-01-07T05:27:24Z","timestamp":1736227644242,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540311584"},{"type":"electronic","value":"9783540324355"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11610496_27","type":"book-chapter","created":{"date-parts":[[2005,12,21]],"date-time":"2005-12-21T12:10:24Z","timestamp":1135167024000},"page":"214-223","source":"Crossref","is-referenced-by-count":12,"title":["Behavior-Based Trust in Wireless Sensor Network"],"prefix":"10.1007","author":[{"given":"Lei","family":"Huang","sequence":"first","affiliation":[]},{"given":"Lei","family":"Li","sequence":"additional","affiliation":[]},{"given":"Qiang","family":"Tan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"27_CR1","doi-asserted-by":"crossref","unstructured":"Grandison, T., Sloman, M.: Imperial Colege, A Survey of Trust in INTERNET Applications. IEEE Communications Surveys Fourth Quarter (2000), http:\/\/www.comsoc.org\/pubs\/surveys","DOI":"10.1109\/COMST.2000.5340804"},{"key":"27_CR2","unstructured":"Li, X., Liu, L.: A Reputation-Based Trust Model for Peer-to-Peer eCommerce Communities. In: Proceedings of the ACM Conference on Electronic Commerce, pp. 228\u2013229 (2003)"},{"key":"27_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/978-3-540-30496-8_2","volume-title":"Security in Ad-hoc and Sensor Networks","author":"G. Gaubatz","year":"2005","unstructured":"Gaubatz, G., Kaps, J.-P., Sunar, B.: Public key cryptography in sensor networks-revisited. In: Castelluccia, C., Hartenstein, H., Paar, C., Westhoff, D. (eds.) ESAS 2004. LNCS, vol.\u00a03313, pp. 2\u201318. Springer, Heidelberg (2005)"},{"key":"27_CR4","doi-asserted-by":"crossref","unstructured":"Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM conference on Computer and communications security (2002)","DOI":"10.1145\/586110.586117"},{"key":"27_CR5","doi-asserted-by":"crossref","unstructured":"Du, W., Deng, J., Han, Y.S., Varshney, P., Katz, J., Khalili, A.: A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks. The ACM Transactions on Information and System Security, TISSEC (2005)","DOI":"10.1145\/1065545.1065548"},{"key":"27_CR6","unstructured":"Kalidindi, R., Paruchuri, V.: Sub-grid based key vector assignment: A key pre-distribution scheme for distributed sensor networks. In: Proceedings of the International Conference on Wireless networks (ICWN 2004), pp. 440\u2013446 (2004)"},{"key":"27_CR7","unstructured":"Anderson, R., Chan, H., Perrig, A.: Key Infection: Smart Trust for Smart Dust. In: IEEE International Conference on Network Protocols, ICNP (2004)"},{"key":"27_CR8","doi-asserted-by":"crossref","unstructured":"Vijay, B., Ajay, G., Pidva, R.: A distributed approach to security in sensornets. In: IEEE 58th Vehicular Technology Conference, pp. 3010\u20133014 (2003)","DOI":"10.1109\/VETECF.2003.1286176"},{"key":"27_CR9","unstructured":"Eltoweissy, M., Younis, M., Ghumman, K.: Lightweight Key Management for Secure Wireless Sensor Networks. In: IEEE Workshop on Multi-hop Wireless Networks (2004)"},{"issue":"5","key":"27_CR10","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1023\/A:1016598314198","volume":"8","author":"A. Perrig","year":"2002","unstructured":"Perrig, A., Szewczyk, R., Tygar, D., Wen, V., Culler, D.: Culler: SPINS: security protocols for sensor networks. Wireless Networks\u00a08(5), 521\u2013534 (2002)","journal-title":"Wireless Networks"},{"key":"27_CR11","unstructured":"Zhu, S., Setia, S., Jajodia, S., Ning, P.: An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks. In: Proceedings of IEEE Symposium on Security and Privacy (2004)"},{"key":"27_CR12","doi-asserted-by":"crossref","unstructured":"Zhu, S., Setia, S., Jajodia, S.: LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. In: 10th ACM Conference on Computer and Communications Security, CCS 2003 (2003)","DOI":"10.1145\/948109.948120"},{"key":"27_CR13","doi-asserted-by":"crossref","unstructured":"Bohge, M., Trappe, W.: An Authentication Framework for Hierarchical Ad Hoc Sensor Networks. In: International Conferecnce on Web Information System Engineering (WiSe 2003) (2003)","DOI":"10.1145\/941311.941324"},{"key":"27_CR14","doi-asserted-by":"crossref","unstructured":"Huang, Q., Cukier, J., Kobayashi, H., Liu, B., Zhang, J.: Fast Authenticated Key Establishment Protocols for Self-Organizing Sensor Networks. In: Proceedings of the 2nd ACM international conference on Wireless sensor networks and applications (WSNA 2003), pp. 141\u2013150 (2003)","DOI":"10.1145\/941350.941371"},{"key":"27_CR15","doi-asserted-by":"crossref","unstructured":"Deng, J., Han, R., Mishra, S.: Security Support for In-Network Processing in Wireless Sensor Networks. In: 2003 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2003) (2003)","DOI":"10.1145\/986858.986870"},{"key":"27_CR16","doi-asserted-by":"crossref","unstructured":"Tanachaiwiwat, S., Dave, P., Bhindwale, R.: Location-centric Isolation of Misbehavior and Trust Routing in Energy-constrained sensor networks. In: IEEE Workshop on Energy-Efficient Wireless Communications and Networks, EWCN 2004 (2004)","DOI":"10.1109\/PCCC.2004.1395061"},{"key":"27_CR17","doi-asserted-by":"crossref","unstructured":"Awerbuch, B., Holmer, D., Nita-Rotaru, C., Rubens, H.: An on-demand secure routing protocol resilient to byzantine failures. In: Proceedings of the ACM workshop on Wireless security, pp. 21\u201330 (2002)","DOI":"10.1145\/570681.570684"},{"key":"27_CR18","doi-asserted-by":"crossref","unstructured":"Marti, S., Iuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM, pp. 255\u2013265 (2000)","DOI":"10.1145\/345910.345955"},{"key":"27_CR19","unstructured":"Ren, Q., Liang, Q.: Secure media access control (MAC) in Wireless Sensor Networks: Intrusion detections and countermeasures. In: IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC, pp. 3025\u20133029 (2004)"},{"key":"27_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-3-540-24606-0_6","volume-title":"Wireless Sensor Networks","author":"E. Elnahrawy","year":"2004","unstructured":"Elnahrawy, E., Nath, B.: Context_Aware Sensors. In: Karl, H., Wolisz, A., Willig, A. (eds.) EWSN 2004. LNCS, vol.\u00a02920, pp. 77\u201393. Springer, Heidelberg (2004)"},{"key":"27_CR21","doi-asserted-by":"crossref","unstructured":"Awerbuch, B., Holmer, D., Nita-Rotaru, C., Rubens, H.: An on-demand secure routing protocol resilient to byzantine failures. In: Proceedings of the ACM workshop on Wireless security, pp. 21\u201330 (2002)","DOI":"10.1145\/570681.570684"},{"key":"27_CR22","unstructured":"Ye, F., Luo, H., Lu, S., Zhang, L.: Statistical En-route Detection and Filtering of Injected False Data in Sensor Networks. In: Proc. of IEEE INFOCOM 2004 (2004)"},{"key":"27_CR23","unstructured":"Bartosz, P., Dawn, S., Adrian, P.: SIA: Secure information aggregation in sensor networks. In: Proceedings of the First International Conference on Embedded Networked Sensor Systems, pp. 255\u2013265 (2003)"},{"key":"27_CR24","unstructured":"Du, W., Deng, J., Han, Y.S., Varshney, P.: A Witness-Based approach For Data Fusion Assuranc. In: Wireless Sensor Networks. Global Communications Conference, GLOBECOM (2003)"},{"key":"27_CR25","doi-asserted-by":"crossref","DOI":"10.1515\/9780691214696","volume-title":"A mathematical theory of evidence","author":"G. Shafer","year":"1976","unstructured":"Shafer, G.: A mathematical theory of evidence. Princeton University, Princeton (1976)"},{"key":"27_CR26","doi-asserted-by":"crossref","unstructured":"Ganeriwal, S., Srivastava, M.B.: Reputation-based Framework for High Integrity Sensor Networks. In: 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN 2004 (2004)","DOI":"10.1145\/1029102.1029115"},{"key":"27_CR27","doi-asserted-by":"crossref","unstructured":"Siaterlis, C., Maglaris, B.: Towards Multisensor Data Fusion for DoS detection. In: International Workshop on Selected Areas in Cryptography, SAC 2004 (2004)","DOI":"10.1145\/967900.967992"}],"container-title":["Lecture Notes in Computer Science","Advanced Web and Network Technologies, and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11610496_27.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,6]],"date-time":"2025-01-06T17:46:44Z","timestamp":1736185604000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11610496_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540311584","9783540324355"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/11610496_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}