{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T22:54:55Z","timestamp":1743029695508,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319298139"},{"type":"electronic","value":"9783319298146"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-29814-6_36","type":"book-chapter","created":{"date-parts":[[2016,3,7]],"date-time":"2016-03-07T09:04:46Z","timestamp":1457341486000},"page":"421-435","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Security-Enhanced Reprogramming with XORs Coding in Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Depeng","family":"Chen","sequence":"first","affiliation":[]},{"given":"Daojing","family":"He","sequence":"additional","affiliation":[]},{"given":"Sammy","family":"Chan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,5]]},"reference":[{"key":"36_CR1","doi-asserted-by":"crossref","unstructured":"Khan, P., Ghosh, A., Konar, G., Chakraborty, N.: Temperature and humidity monitoring through wireless sensor network using shortest path algorithm. In: International Conference on Control, Instrumentation, Energy and Communication, CIEC 2014, pp. 199\u2013203. IEEE, Calcutta (2014)","DOI":"10.1109\/CIEC.2014.6959078"},{"key":"36_CR2","doi-asserted-by":"crossref","unstructured":"Stathopoulos, T., Heidemann, J., Estrin, D.: A remote code update mechanism for wireless sensor networks. Technical report, UCLA, Los Angeles, CA, USA (2003)","DOI":"10.21236\/ADA482630"},{"key":"36_CR3","unstructured":"Kulkarni, S., Wang, L.: MNP: multihop network reprogramming service for sensor networks. In: Proceedings of 25th IEEE International Conference on Distributed Computing Systems, ICDCS 2005, pp. 7\u201316. IEEE, Columbus (2005)"},{"key":"36_CR4","doi-asserted-by":"crossref","unstructured":"Hui, J.W., Culler, D.: The dynamic behavior of a data dissemination protocol for network programming at scale. In: Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems. SenSys 2004, pp. 81\u201394. ACM, Baltimore (2004)","DOI":"10.1145\/1031495.1031506"},{"key":"36_CR5","doi-asserted-by":"crossref","unstructured":"Hou, I.H., Tsai, Y.E., Abdelzaher, T.F., Gupta, I.: Adapcode: adaptive network coding for code updates in wireless sensor networks. In: The 27th Conference on Computer Communications, INFOCOM 2008, pp. 2189\u20132197. IEEE, Phoenix (2008)","DOI":"10.1109\/INFOCOM.2008.211"},{"issue":"2","key":"36_CR6","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1109\/JBHI.2013.2293620","volume":"18","author":"D He","year":"2014","unstructured":"He, D., Chan, S., Zhang, Y., Yang, H.: Lightweight and confidential data discovery and dissemination for wireless body area networks. IEEE J. Biomed. Health Inform. 18(2), 440\u2013448 (2014)","journal-title":"IEEE J. Biomed. Health Inform."},{"issue":"4","key":"36_CR7","doi-asserted-by":"publisher","first-page":"636","DOI":"10.1109\/TIFS.2013.2248724","volume":"8","author":"S Wei","year":"2013","unstructured":"Wei, S., Wang, J., Yin, R., Yuan, J.: Trade-off between security and performance in block ciphered systems with erroneous ciphertexts. IEEE Trans. Inf. Forensics Secur. 8(4), 636\u2013645 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"36_CR8","first-page":"36","volume":"32","author":"H Tan","year":"2009","unstructured":"Tan, H., Ostry, D., Zic, J., Jha, S.: A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks. Comput. Secur. 32(1), 36\u201355 (2009)","journal-title":"Comput. Secur."},{"key":"36_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1007\/3-540-44810-1_22","volume-title":"Security Protocols","author":"T Aura","year":"2001","unstructured":"Aura, T., Nikander, P., Leiwo, J.: DOS-resistant authentication with client puzzles. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2000. LNCS, vol. 2133, pp. 170\u2013177. Springer, Heidelberg (2001)"},{"issue":"1","key":"36_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1325651.1325652","volume":"4","author":"P Ning","year":"2008","unstructured":"Ning, P., Liu, A., Du, W.: Mitigating DoS attacks against broadcast authentication in wireless sensor networks. ACM Trans. Sens. Netw. TOSN 4(1), 1\u201335 (2008)","journal-title":"ACM Trans. Sens. Netw. TOSN"},{"key":"36_CR11","doi-asserted-by":"crossref","unstructured":"Hyun, S., Ning, P., Liu, A., Du, W.: Seluge: secure and dos-resistant code dissemination in wireless sensor networks. In: Proceedings of the 7th International Conference on Information Processing in Sensor Networks, IPSN 2008, pp. 445\u2013456. IEEE, St. Louis (2008)","DOI":"10.1109\/IPSN.2008.12"},{"key":"36_CR12","doi-asserted-by":"crossref","unstructured":"Mihaljevi$$\\acute{c}$$, M., Oggier, F.: A wire-tap approach to enhance security in communication systems using the encoding-encryption paradigm. In: IEEE 17th International Conference on Telecommunications, ICT 2010, pp. 83\u201388. IEEE, Doha (2010)","DOI":"10.1109\/ICTEL.2010.5478824"},{"key":"36_CR13","doi-asserted-by":"crossref","unstructured":"Khiabani, Y.S., Wei, S.: Creation of degraded wiretap channel through deliberate noise in block ciphered systems. In: IEEE Workshops on GLOBECOM, GC Wkshps 2011, pp. 893\u2013897. IEEE, Houston (2011)","DOI":"10.1109\/GLOCOMW.2011.6162585"},{"issue":"5","key":"36_CR14","doi-asserted-by":"publisher","first-page":"1604","DOI":"10.1109\/TIFS.2012.2204983","volume":"7","author":"YS Khiabani","year":"2012","unstructured":"Khiabani, Y.S., Wei, S., Yuan, J., Wang, J.: Enhancement of secrecy of block ciphered systems by deliberate noise. IEEE Trans. Inf. Forensics Secur. 7(5), 1604\u20131613 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"36_CR15","unstructured":"Levis, P., Patel, N., Culler, D.E., Shenker, S.: Trickle: a self-regulating algorithm for code propagation and maintenance in wireless sensor networks. In: Proceedings of the First USENIX\/ACM Symposium on Networked Systems Design and Implementation, NSDI 2004, pp. 15\u201328. San Francisco (2004)"},{"key":"36_CR16","unstructured":"Lanigan, P.E., Gandhi, R., Narasimhan, P.: Sluice: secure dissemination of code updates in sensor networks. In: 26th IEEE International Conference on Distributed Computing Systems, ICDCS 2006, pp. 53\u201353. IEEE (2006)"},{"key":"36_CR17","doi-asserted-by":"crossref","unstructured":"Kim, D.H., Gandhi, R., Narasimhan, P.: Exploring symmetric cryptography for secure network reprogramming. In: 27th International Conference on Distributed Computing Systems Workshops, ICDCSW 2007, pp. 17\u201317. IEEE, Toronto (2007)","DOI":"10.1109\/ICDCSW.2007.37"},{"key":"36_CR18","doi-asserted-by":"crossref","unstructured":"Shaheen, J., Ostry, D., Sivaraman, V., Jha, S.: Confidential and secure broadcast in wireless sensor networks. In: IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2007, pp. 1\u20135. IEEE, Athens (2007)","DOI":"10.1109\/PIMRC.2007.4394560"},{"key":"36_CR19","doi-asserted-by":"crossref","unstructured":"Dutta, P.K., Hui, J.W., Chu, D.C., Culler, D.E.: Securing the deluge network programming system. In: Proceedings of the 5th International Conference on Information Processing in Sensor Networks, IPSN2006, pp. 326\u2013333. IEEE, Nashville (2006)","DOI":"10.1109\/IPSN.2006.243821"},{"key":"36_CR20","doi-asserted-by":"crossref","unstructured":"Nilsson, D.K., Roosta, T., Lindqvist, U., Valdes, A.: Key management and secure software updates in wireless process control environments. In: Proceedings of the First ACM Conference on Wireless Network Security, Wisec 2008, pp. 100\u2013108. ACM, New York (2008)","DOI":"10.1145\/1352533.1352550"},{"issue":"12","key":"36_CR21","doi-asserted-by":"publisher","first-page":"1749","DOI":"10.1109\/TMC.2010.109","volume":"9","author":"M Rossi","year":"2010","unstructured":"Rossi, M., Bui, N., Zanca, G., Stabellini, L., Crepaldi, R., Zorzi, M.: SYNAPSE++: code dissemination in wireless sensor networks using fountain codes. IEEE Trans. Mob. Comput. 9(12), 1749\u20131765 (2010)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"36_CR22","unstructured":"TinyOS.: An open-source OS for the networked sensor regime. http:\/\/www.tinyos.net\/"},{"key":"36_CR23","doi-asserted-by":"crossref","unstructured":"Rossi, M., Zanca, G., Stabellini, L., Crepaldi, R., Harris, A.F., Zorzi, M.: Synapse: a network reprogramming protocol for wireless sensor networks using fountain codes. In: 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2008, pp. 188\u2013196. IEEE, San Francisco (2008)","DOI":"10.1109\/SAHCN.2008.32"},{"issue":"3","key":"36_CR24","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1109\/TNET.2008.923722","volume":"16","author":"S Katti","year":"2008","unstructured":"Katti, S., Rahul, H., Hu, W., Katabi, D., Mdard, M., Crowcroft, J.: XORs in the air: practical wireless network coding. IEEE\/ACM Trans. Network. 16(3), 497\u2013510 (2008)","journal-title":"IEEE\/ACM Trans. Network."}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-29814-6_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,16]],"date-time":"2021-06-16T06:18:38Z","timestamp":1623824318000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-29814-6_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319298139","9783319298146"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-29814-6_36","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"5 March 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}