{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T05:21:15Z","timestamp":1739337675986,"version":"3.37.0"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642033537"},{"type":"electronic","value":"9783642033544"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-03354-4_52","type":"book-chapter","created":{"date-parts":[[2009,7,23]],"date-time":"2009-07-23T06:46:56Z","timestamp":1248331616000},"page":"715-731","source":"Crossref","is-referenced-by-count":0,"title":["A Hybrid Key Predistribution Scheme for Sensor Networks Employing Spatial Retreats to Cope with Jamming Attacks"],"prefix":"10.1007","author":[{"given":"Korporn","family":"Panyim","sequence":"first","affiliation":[]},{"given":"Prashant","family":"Krishnamurthy","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"52_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1007\/3-540-39757-4_22","volume-title":"Advances in Cryptology","author":"R. Blom","year":"1985","unstructured":"Blom, R.: An optimal class of symmetric key generation systems. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol.\u00a0209, pp. 335\u2013338. Springer, Heidelberg (1985)"},{"key":"52_CR2","doi-asserted-by":"crossref","unstructured":"Du, W., Deng, J., Han, Y.S., Chen, S., Varshney, P.K.: A key management scheme for wireless sensor networks using deployment knowledge. In: IEEE INFOCOM, vol.\u00a01, pp. 586\u2013597 (2004)","DOI":"10.1109\/INFCOM.2004.1354530"},{"key":"52_CR3","doi-asserted-by":"crossref","unstructured":"Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A pairwise key pre-distribution scheme for wireless sensor networks. In: Proceedings of the 10th ACM conference on Computer and Communications Security CCS 2003 (2003)","DOI":"10.1145\/948109.948118"},{"issue":"1","key":"52_CR4","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/TDSC.2006.2","volume":"3","author":"W. Du","year":"2006","unstructured":"Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A key predistribution scheme for sensor networks using deployment knowledge. IEEE Transactions on Dependable and Secure Computing\u00a03(1), 62\u201377 (2006)","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"52_CR5","doi-asserted-by":"crossref","unstructured":"Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: 9th ACM Conference on Computer and Communication Security, pp. 41\u201347 (November 2002)","DOI":"10.1145\/586110.586117"},{"key":"52_CR6","unstructured":"Ma, K., Zhang, Y., Trappe, W.: Mobile network management and robust spatial retreats via network dynamics. In: 1st International Workshop on Resource Provisioning and Management in Sensor Networks (RPMSN 2005) (November 2005)"},{"key":"52_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1007\/978-3-540-24643-5_17","volume-title":"Wired\/Wireless Internet Communications","author":"G. Noubir","year":"2004","unstructured":"Noubir, G.: On Connectivity in Ac Hoc Networks under Jamming Using Directional Antennas and Mobility. In: Langendoerfer, P., Liu, M., Matta, I., Tsaoussidis, V. (eds.) WWIC 2004. LNCS, vol.\u00a02957, pp. 186\u2013200. Springer, Heidelberg (2004)"},{"key":"52_CR8","unstructured":"Pelechrinis, K., Iliofotou, M.: Denial of service attacks in wireless networks: The case of jammers, http:\/\/www.cs.ucr.edu\/~kpele\/Jamming.pdf"},{"key":"52_CR9","doi-asserted-by":"crossref","unstructured":"Wood, A., Stankovic, J., Son, S.: Jam: A jammed-area mapping service for sensor networks. In: 24th IEEE Real-Time Systems Symposium, pp. 286\u2013297 (2003)","DOI":"10.1109\/REAL.2003.1253275"},{"key":"52_CR10","doi-asserted-by":"crossref","unstructured":"Xu, W.: On adjusting power to defend wireless networks from jamming. In: MobiQuitous: Mobile and Ubiquitous Systems: Networking and Services, pp. 1\u20136 (August 2007)","DOI":"10.1109\/MOBIQ.2007.4451072"},{"issue":"3","key":"52_CR11","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/MNET.2006.1637931","volume":"20","author":"W. Xu","year":"2006","unstructured":"Xu, W., Ma, K., Trappe, W., Zhang, Y.: Jamming sensor networks: Attack and defense strategies. IEEE Network\u00a020(3), 41\u201347 (2006)","journal-title":"IEEE Network"},{"key":"52_CR12","first-page":"46","volume-title":"MobiHoc 2005: Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing","author":"W. Xu","year":"2005","unstructured":"Xu, W., et al.: The feasibility of launching and detecting jamming attacks in wireless networks. In: MobiHoc 2005: Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing, pp. 46\u201357. ACM, New York (2005)"},{"key":"52_CR13","doi-asserted-by":"crossref","unstructured":"Xu, W., Wood, T., Trappe, W., Zhang, Y.: Channel surfing and spatial retreats: Defense against wireless dinal of service. In: ACM workshop on wireless security, pp. 80\u201389 (2004)","DOI":"10.1145\/1023646.1023661"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Collaborative Computing: Networking, Applications and Worksharing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-03354-4_52","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,11]],"date-time":"2025-02-11T09:47:18Z","timestamp":1739267238000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-03354-4_52"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642033537","9783642033544"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-03354-4_52","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2009]]}}}