{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,22]],"date-time":"2025-03-22T09:31:24Z","timestamp":1742635884990,"version":"3.40.1"},"publisher-location":"Berlin, Heidelberg","reference-count":31,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642259586"},{"type":"electronic","value":"9783642259593"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-25959-3_19","type":"book-chapter","created":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T19:50:29Z","timestamp":1325447429000},"page":"249-264","source":"Crossref","is-referenced-by-count":4,"title":["Wireless Sensor Replica Detection in Mobile Environments"],"prefix":"10.1007","author":[{"given":"Mauro","family":"Conti","sequence":"first","affiliation":[]},{"given":"Roberto","family":"Di Pietro","sequence":"additional","affiliation":[]},{"given":"Angelo","family":"Spognardi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"19_CR1","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1016\/S1389-1286(01)00302-4","volume":"38","author":"I.F. Akyildiz","year":"2002","unstructured":"Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. International Journal of Computer and Telecommunications Networking - Elsevier\u00a038(4), 393\u2013422 (2002)","journal-title":"International Journal of Computer and Telecommunications Networking - Elsevier"},{"key":"19_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/11734666_9","volume-title":"Security in Pervasive Computing","author":"A. Becher","year":"2006","unstructured":"Becher, A., Benenson, Z., Dornseif, M.: Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks. In: Clark, J.A., Paige, R.F., Polack, F.A.C., Brooke, P.J. (eds.) SPC 2006. LNCS, vol.\u00a03934, pp. 104\u2013118. Springer, Heidelberg (2006)"},{"issue":"6","key":"19_CR3","first-page":"1246","volume":"37","author":"R. Brooks","year":"2007","unstructured":"Brooks, R., Govindaraju, P.Y., Pirretti, M., Vijaykrishnan, N., Kandemir, M.T.: On the detection of clones in sensor networks using random key predistribution. IEEE TSMC, Part C: Applications and Reviews\u00a037(6), 1246\u20131258 (2007)","journal-title":"IEEE TSMC, Part C: Applications and Reviews"},{"key":"19_CR4","doi-asserted-by":"crossref","unstructured":"Capkun, S., Hubaux, J.P.: Secure positioning of wireless devices with application to sensor networks. In: INFOCOM 2005, pp. 1917\u20131928 (2005)","DOI":"10.1109\/INFCOM.2005.1498470"},{"key":"19_CR5","doi-asserted-by":"crossref","unstructured":"Caruso, A., Urpi, A., Chessa, S., De., S.: Gps-free coordinate assignment and routing in wireless sensor networks. In: INFOCOM 2005, pp. 150\u2013160 (2005)","DOI":"10.1109\/INFCOM.2005.1497887"},{"key":"19_CR6","unstructured":"Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: S&P 2003. pp. 197\u2013213 (2003)"},{"key":"19_CR7","doi-asserted-by":"crossref","unstructured":"Choi, H., Zhu, S., La Porta, T.F.: SET: Detecting Node Clones in Sensor Networks. In: SecureComm 2007, pp. 341\u2013350 (2007)","DOI":"10.1109\/SECCOM.2007.4550353"},{"key":"19_CR8","first-page":"685","volume":"8","author":"M. Conti","year":"2011","unstructured":"Conti, M., Di Pietro, R., Mancini, L., Mei, A.: Distributed detection of clone attacks in wireless sensor networks. IEEE TDSC\u00a08, 685\u2013698 (2011)","journal-title":"IEEE TDSC"},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"Conti, M., Di Pietro, R., Mancini, L.V., Mei, A.: Requirements and open issues in distributed detection of node identity replicas in WSN. In: SMC 2006, pp. 1468\u20131473 (2006)","DOI":"10.1109\/ICSMC.2006.384924"},{"key":"19_CR10","doi-asserted-by":"crossref","unstructured":"Conti, M., Di Pietro, R., Mancini, L.V., Mei, A.: A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks. In: MobiHoc 2007, pp. 80\u201389 (2007)","DOI":"10.1145\/1288107.1288119"},{"key":"19_CR11","doi-asserted-by":"crossref","unstructured":"Conti, M., Di Pietro, R., Mancini, L.V., Mei, A.: Mobility and cooperation to thwart node capture attacks in manets. Journal on Wireless Communications and Networking (EURASIP)\u00a02009(8) (2009)","DOI":"10.1155\/2009\/945943"},{"key":"19_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/3-540-45748-8_24","volume-title":"Peer-to-Peer Systems","author":"J.R. Douceur","year":"2002","unstructured":"Douceur, J.R.: The Sybil Attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol.\u00a02429, pp. 251\u2013260. Springer, Heidelberg (2002)"},{"key":"19_CR13","doi-asserted-by":"crossref","unstructured":"Elson, J., Estrin, D.: Time synchronization for wireless sensor networks. In: IPDPS 2001, pp. 1965\u20131970 (2001)","DOI":"10.1109\/IPDPS.2001.925191"},{"key":"19_CR14","doi-asserted-by":"crossref","unstructured":"Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: CCS 2002, pp. 41\u201347 (2002)","DOI":"10.1145\/586110.586117"},{"key":"19_CR15","doi-asserted-by":"crossref","unstructured":"Fu, F., Liu, J., Yin, X.: Space-time related pairwise key predistribution scheme for wireless sensor networks. In: WiCom 2007, pp. 2692\u20132696 (2007)","DOI":"10.1109\/WICOM.2007.669"},{"key":"19_CR16","doi-asserted-by":"crossref","unstructured":"Fu, L., Qin, Y., Wang, X., Liu, X.: Converge-cast with mimo. In: INFOCOM 2011. IEEE (to appear, 2011)","DOI":"10.1109\/INFCOM.2011.5935244"},{"key":"19_CR17","doi-asserted-by":"crossref","unstructured":"Ho, J.W., Wright, M.K., Das, S.K.: Fast detection of replica node attacks in mobile sensor networks using sequential analysis. In: INFOCOM 2009, pp. 1773\u20131781 (2009)","DOI":"10.1109\/INFCOM.2009.5062097"},{"key":"19_CR18","doi-asserted-by":"crossref","unstructured":"Hu, Y.C., Perrig, A., Johnson, D.B.: Packet leashes: a defense against wormhole attacks in wireless networks. In: INFOCOM 2003, pp. 1976\u20131986 (2003)","DOI":"10.1109\/INFCOM.2003.1209219"},{"key":"19_CR19","unstructured":"Matsumoto, M.: Mersenne Twister, A very fast random number generator, http:\/\/www.math.sci.hiroshima-u.ac.jp\/~m-mat\/MT\/emt.html"},{"issue":"1","key":"19_CR20","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/272991.272995","volume":"8","author":"M. Matsumoto","year":"1998","unstructured":"Matsumoto, M., Nishimura, T.: Mersenne twister: a 623-dimensionally equidistributed uniform pseudo-random number generator. ACM TOMACS\u00a08(1), 3\u201330 (1998)","journal-title":"ACM TOMACS"},{"key":"19_CR21","doi-asserted-by":"crossref","unstructured":"Newsome, J., Shi, E., Song, D., Perrig, A.: The sybil attack in sensor networks: analysis & defenses. In: IPSN 2004, pp. 259\u2013268 (2004)","DOI":"10.1145\/984622.984660"},{"key":"19_CR22","doi-asserted-by":"crossref","unstructured":"Parno, B., Perrig, A., Gligor, V.D.: Distributed detection of node replication attacks in sensor networks. In: S&P 2005, pp. 49\u201363 (2005)","DOI":"10.1109\/SP.2005.8"},{"key":"19_CR23","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1145\/322186.322188","volume":"27","author":"M. Pease","year":"1980","unstructured":"Pease, M., Shostak, R., Lamport, L.: Reaching agreement in the presence of faults. J. ACM\u00a027, 228\u2013234 (1980)","journal-title":"J. ACM"},{"key":"19_CR24","unstructured":"Spognardi, A.: Mobile Clone detection simulator, http:\/\/tinyurl.com\/mobilewsn-clone-detection-tar"},{"issue":"3","key":"19_CR25","first-page":"177","volume":"2","author":"K. Sun","year":"2005","unstructured":"Sun, K., Ning, P., Wang, C.: Fault-tolerant cluster-wise clock synchronization for wireless sensor networks. IEEE TDSC\u00a02(3), 177\u2013189 (2005)","journal-title":"IEEE TDSC"},{"key":"19_CR26","doi-asserted-by":"crossref","unstructured":"Wang, Y., Chu, X., Wang, X., Cheng, Y.: Optimal multicast capacity and delay tradeoffs in manets: a global perspective. In: INFOCOM 2011. IEEE (to appear, 2011)","DOI":"10.1109\/INFCOM.2011.5935243"},{"key":"19_CR27","doi-asserted-by":"crossref","unstructured":"Xing, K., Cheng, X.: From time domain to space domain: Detecting replica attacks in mobile ad hoc networks. In: INFOCOM 2010, pp. 1595\u20131603 (2010)","DOI":"10.1109\/INFCOM.2010.5461977"},{"key":"19_CR28","doi-asserted-by":"crossref","unstructured":"Yang, Y., Wang, X., Zhu, S., Cao, G.: SDAP: a secure hop-by-hop data aggregation protocol for sensor networks. In: MobiHoc 2006, pp. 356\u2013367 (2006)","DOI":"10.1145\/1132905.1132944"},{"key":"19_CR29","doi-asserted-by":"crossref","unstructured":"Yu, C.M., Lu, C.S., Kuo, S.Y.: Mobile sensor network resilient against node replication attacks (poster). In: SECON 2008, pp. 597\u2013599 (2008)","DOI":"10.1109\/SAHCN.2008.82"},{"key":"19_CR30","doi-asserted-by":"crossref","unstructured":"Zhu, B., Addada, V.G.K., Setia, S., Jajodia, S., Roy, S.: Efficient distributed detection of node replication attacks in sensor networks. In: ACSAC 2007. pp. 257\u2013266 (2007)","DOI":"10.1109\/ACSAC.2007.4412994"},{"key":"19_CR31","doi-asserted-by":"crossref","unstructured":"Zhu, S., Setia, S., Jajodia, S.: LEAP: efficient security mechanisms for large-scale distributed sensor networks. In: CCS 2003, pp. 62\u201372 (2003)","DOI":"10.1145\/948109.948120"}],"container-title":["Lecture Notes in Computer Science","Distributed Computing and Networking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-25959-3_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,17]],"date-time":"2025-03-17T09:53:38Z","timestamp":1742205218000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-25959-3_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642259586","9783642259593"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-25959-3_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}