{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T02:28:57Z","timestamp":1725848937242},"publisher-location":"Singapore","reference-count":13,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789812879899"},{"type":"electronic","value":"9789812879905"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-981-287-990-5_27","type":"book-chapter","created":{"date-parts":[[2016,2,1]],"date-time":"2016-02-01T08:25:13Z","timestamp":1454315113000},"page":"339-352","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["An Efficient Key Establishment Protocol for Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Yassin","family":"Maleh","sequence":"first","affiliation":[]},{"given":"Abdellah","family":"Ezzati","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,2,2]]},"reference":[{"key":"27_CR1","unstructured":"Huang, A.: Security Primitives for Ultra-Low Power Sensor Nodes in Wireless Sensor Networks, Faculty of Engineering, the Built Environment and Information Technology University of Pretoria (2005)"},{"key":"27_CR2","unstructured":"Gaubatz, G., Kaps, J., Sunar, B.: Public Key Cryptography in Sensor Networks\u2014Revisited, Department of Electrical & Computer Engineering Worcester Polytechnic Institute, 100 Institute Road, Worcester, MA 01609, USA"},{"key":"27_CR3","doi-asserted-by":"crossref","unstructured":"Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: SPINS: security protocols for sensor networks 8(5), 521\u2013534, September 2002","DOI":"10.1023\/A:1016598314198"},{"issue":"2","key":"27_CR4","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1016\/j.comcom.2005.05.018","volume":"29","author":"J Deng","year":"2006","unstructured":"Deng, J., Han, R., Mishra, S.: INSENS: intrusion-tolerant routing for wireless sensor networks. Computer Communications 29(2), 216\u2013230 (2006)","journal-title":"Computer Communications"},{"issue":"4","key":"27_CR5","doi-asserted-by":"publisher","first-page":"500","DOI":"10.1145\/1218556.1218559","volume":"2","author":"S Zhu","year":"2006","unstructured":"Zhu, S., Setia, S., Jajodia, S.: LEAP+: efficient security mechanisms for large-scale distributed sensor networks. ACM Trans. Sen. Netw. 2(4), 500\u2013528 (2006)","journal-title":"ACM Trans. Sen. Netw."},{"key":"27_CR6","doi-asserted-by":"publisher","unstructured":"Lim, C.H.: LEAP++: a robust key establishment scheme for wireless sensor networks. IEEE (2008). doi:10.1109\/ICDCS.Workshops.2008.93","DOI":"10.1109\/ICDCS.Workshops.2008.93"},{"key":"27_CR7","doi-asserted-by":"publisher","unstructured":"Wen, H., Luo, J., Zhou, L.: Lightweight and effective detection scheme for node clone attack in wireless sensor networks. IET Wirel. Sens. Syst. 1(3), 137\u2013143 (2011). doi:10.1049\/iet-wss.2010","DOI":"10.1049\/iet-wss.2010"},{"key":"27_CR8","unstructured":"Choi, H., Zhu, S., La Porta, T.F.: SET: detecting node clones in Sensor Networks, Department of Computer Science and Engineering, Pennsylvania State University"},{"key":"27_CR9","unstructured":"Zhang, Q., Yu, T., Ning, P.: A Framework for Identifying Compromised Nodes in Sensor Networks, North Carolina State University"},{"key":"27_CR10","unstructured":"Wang, Y.-T., Bagrodia, R.: ComSen: a detection system for identifying compromised nodes in wireless sensor networks. In: SECURWARE 2012: The Sixth International Conference on Emerging Security Information, Systems and Technologies"},{"key":"27_CR11","unstructured":"Atakli, I.M., Hu, H., Chen, Y., Ku, W.-S., Su, Z.: Malicious node detection in wireless sensor networks using weighted trust evaluation. In: Simulation of Systems Security (SSSS 2008), Ottawa, Canada, April 14\u201317, 2008"},{"key":"27_CR12","doi-asserted-by":"crossref","unstructured":"Levis, P., Lee, N., Welsh, M., Culler, D.: TOSSIM: accurate and scalable simulation of entire tinyos applications. In: SenSys 2003, Los Angeles, California, USA, November 5\u20137, 2003","DOI":"10.1145\/958491.958506"},{"key":"27_CR13","doi-asserted-by":"crossref","unstructured":"Levis, P., Lee, N.: TOSSIM: a simulator for TinyOS networks, September 17, 2003","DOI":"10.1145\/958491.958506"}],"container-title":["Lecture Notes in Electrical Engineering","Advances in Ubiquitous Networking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-287-990-5_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,17]],"date-time":"2023-11-17T01:12:04Z","timestamp":1700183524000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-287-990-5_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9789812879899","9789812879905"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-981-287-990-5_27","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"2 February 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}