{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T15:13:46Z","timestamp":1725808426936},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319120119"},{"type":"electronic","value":"9783319120126"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-12012-6_81","type":"book-chapter","created":{"date-parts":[[2014,10,31]],"date-time":"2014-10-31T15:09:45Z","timestamp":1414768185000},"page":"729-738","source":"Crossref","is-referenced-by-count":2,"title":["A Survey of Security Protocols in WSN and Overhead Evaluation"],"prefix":"10.1007","author":[{"given":"Shiju","family":"Sathyadevan","sequence":"first","affiliation":[]},{"given":"Subi","family":"Prabhakaranl","sequence":"additional","affiliation":[]},{"given":"K.","family":"Bipin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"81_CR1","unstructured":"Deng, Han, R., Mishra, S.: INSENS: Intrusion-tolerant routing in wireless sensor networks, Technical Report CU-CS-939-02, Department of Computer Science, University of Colorado at Boulder (November 2002)"},{"key":"81_CR2","doi-asserted-by":"crossref","unstructured":"Karp, B., Kung, H.T.: GPSR: Greedy perimeter stateless routing for wireless networks. In: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, pp. 243\u2013254. ACM Press (2000)","DOI":"10.1145\/345910.345953"},{"key":"81_CR3","doi-asserted-by":"crossref","unstructured":"Papadimitratos, P., Haas, Z.J.: Secure routing for mobile ad hoc networks. In: Proceedings of the SCS Communication Networks and Distributed System Modeling and Simulation Conference, CNDS 2002 (2002)","DOI":"10.1201\/9781420040401.ch31"},{"key":"81_CR4","unstructured":"Tanachaiwiwat, S., Dave, P., Bhindwale, R., Helmy, A.: Routing on trust and isolating compromised sensors in location-aware sensor networks. In: Poster paper Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, pp. 324\u2013325. ACM Press (2003)"},{"key":"81_CR5","unstructured":"Hu, L., Evans, D.: Secure aggregation for wireless networks. In: Proceedings of the Symposium on Applications and the Internet Workshops, p. 384. IEEE Computer Society (2003)"},{"key":"81_CR6","doi-asserted-by":"crossref","unstructured":"Shrivastava, N., Buragohain, C., Agrawal, D., Suri, S.: Medians and beyond: New aggregation techniques for sensor networks. In: Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, pp. 239\u2013249. ACM Press (2004)","DOI":"10.1145\/1031495.1031524"},{"key":"81_CR7","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1145\/958491.958521","volume-title":"Proceedings of the 1st International Conference on Embedded Networked Systems (SenSys 2003)","author":"B. Przydatek","year":"2003","unstructured":"Przydatek, B., Song, D., Perrig, A.: SIA: secure information aggregation in sensor networks. In: Proceedings of the 1st International Conference on Embedded Networked Systems (SenSys 2003), pp. 255\u2013265. ACM Press, New York (2003)"},{"issue":"5","key":"81_CR8","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1023\/A:1016598314198","volume":"8","author":"A. Perrig","year":"2002","unstructured":"Perrig, A., Szewczyk, R., Wen, V., Culler, D.E., Tygar, J.D.: SPINS: Security protocols for sensor networks. Wireless Networks\u00a08(5), 521\u2013534 (2002)","journal-title":"Wireless Networks"},{"key":"81_CR9","doi-asserted-by":"crossref","unstructured":"Karlof, C., Sastry, N., Wagner, D.: TinySec: a link layer security architecture for wireless sensor networks. In: 2nd ACM Conference on Embedded Networked Sensor Systems (SensSys 2004), Baltimore, MD, pp. 162\u2013175 (November 2004)","DOI":"10.1145\/1031495.1031515"},{"key":"81_CR10","volume-title":"IPSN 2007","author":"M. Luk","year":"2007","unstructured":"Luk, M., Mezzour, G., Perrig, A., Gligor, V.: MiniSec: A Secure Sensor Network Communication Architecture. In: IPSN 2007, April 25-27, ACM, Cambridge (2007)"},{"key":"81_CR11","doi-asserted-by":"crossref","unstructured":"Pathan, A.S.K., Lee, H.-W., Hong, C.S.: Security in wireless sensor networks: issues and challenges. Advanced Communication Technology, ICACT (2006)","DOI":"10.1109\/ICACT.2006.206151"},{"issue":"8","key":"81_CR12","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1109\/MCOM.2002.1024422","volume":"40","author":"I.F. Akyildiz","year":"2002","unstructured":"Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A survey on sensor networks. IEEE Communications Magazine\u00a040(8), 102\u2013114 (2002)","journal-title":"IEEE Communications Magazine"},{"key":"81_CR13","doi-asserted-by":"crossref","unstructured":"Bloom, B.: Space\/time trade-offs in hash coding with allowable errors. Communicationsof the ACM (July 1970)","DOI":"10.1145\/362686.362692"},{"key":"81_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1007\/3-540-60590-8_7","volume-title":"Fast Software Encryption","author":"R. Rivest","year":"1995","unstructured":"Rivest, R.: The RC5 encryption algorithm. In: Preneel, B. (ed.) FSE 1994. LNCS, vol.\u00a01008, pp. 86\u201396. Springer, Heidelberg (1995)"},{"key":"81_CR15","unstructured":"National Institute of Standards and Technology (NIST), Advanced Encryption Standard (AES), Federal Information Processing Standard (FIPS) 197 (November 2001)"},{"key":"81_CR16","unstructured":"\u201cSkipjack and KEA algorithm specifications\u201d National Institute of Standards and Technology (May 1998)"},{"key":"81_CR17","doi-asserted-by":"crossref","unstructured":"Law, Y.W., Doumen, J., Hartel, P.: Survey and Benchmark of Block Ciphers for Wireless Sensor Networks. ACM Transactions on Sensor Networks\u00a02(1) (February 2006)","DOI":"10.1145\/1138127.1138130"},{"key":"81_CR18","unstructured":"Zhang, X., Heys, H.M., Li, C.: Energy Efficiency of Symmetric Key Cryptographic Algorithms in Wireless Sensor Networks"},{"issue":"1","key":"81_CR19","first-page":"82","volume":"9","author":"M.R. Doomun","year":"2009","unstructured":"Doomun, M.R., Soyjaudah, K.: Analytical Comparison of Cryptographic Techniques for Resource-Constrained Wireless Security. International Journal of Network Security\u00a09(1), 82\u201394 (2009)","journal-title":"International Journal of Network Security"},{"key":"81_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1007\/3-540-45473-X_27","volume-title":"Fast Software Encryption","author":"L. Granboulan","year":"2002","unstructured":"Granboulan, L.: Flaws in Differential Cryptanalysis of Skipjack. In: Matsui, M. (ed.) FSE 2001. LNCS, vol.\u00a02355, pp. 328\u2013335. Springer, Heidelberg (2002)"},{"key":"81_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/3-540-48405-1_11","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"L.R. Knudsen","year":"1999","unstructured":"Knudsen, L.R., Robshaw, M., Wagner, D.: Truncated differentials and skipjack. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, p. 165. Springer, Heidelberg (1999)"},{"key":"81_CR22","unstructured":"Xing, K., Sundhar, S., Srinivasan, R., Rivera, M., Li, J., Cheng, X.: Attacks and Countermeasures in Sensor Networks: A Survey. Springer (2005)"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-12012-6_81","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,14]],"date-time":"2023-02-14T23:54:16Z","timestamp":1676418856000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-12012-6_81"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319120119","9783319120126"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-12012-6_81","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2015]]}}}