{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,18]],"date-time":"2024-06-18T12:10:23Z","timestamp":1718712623741},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2016,7,23]],"date-time":"2016-07-23T00:00:00Z","timestamp":1469232000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2018,1]]},"DOI":"10.1007\/s11276-016-1332-x","type":"journal-article","created":{"date-parts":[[2016,7,23]],"date-time":"2016-07-23T13:48:32Z","timestamp":1469281712000},"page":"309-328","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["$$\\hbox {S}^2$$ S 2 DCC: secure selective dropping congestion control in hybrid wireless multimedia sensor networks"],"prefix":"10.1007","volume":"24","author":[{"given":"Michele","family":"Tortelli","sequence":"first","affiliation":[]},{"given":"Alessandra","family":"Rizzardi","sequence":"additional","affiliation":[]},{"given":"Sabrina","family":"Sicari","sequence":"additional","affiliation":[]},{"given":"Luigi Alfredo","family":"Grieco","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-0883-3045","authenticated-orcid":false,"given":"Gennaro","family":"Boggia","sequence":"additional","affiliation":[]},{"given":"Alberto","family":"Coen-Porisini","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,7,23]]},"reference":[{"issue":"4","key":"1332_CR1","doi-asserted-by":"crossref","first-page":"921","DOI":"10.1016\/j.comnet.2006.10.002","volume":"51","author":"I Akyildiz","year":"2007","unstructured":"Akyildiz, I., Melodia, T., & Chowdhury, K. (2007). A survey on wireless multimedia sensor networks. Computer Networks, 51(4), 921\u2013960.","journal-title":"Computer Networks"},{"key":"1332_CR2","doi-asserted-by":"crossref","unstructured":"Wan, C., Eisenman, S., & Campbell, A. (2003). CODA: Congestion detection and avoidance in sensor networks. In Proceedings of ACM SenSys, Los Angeles, California, USA.","DOI":"10.1145\/958491.958523"},{"key":"1332_CR3","doi-asserted-by":"crossref","unstructured":"Patil, D., & Dhage, S. (2012). Priority-based congestion control protocol (PCCP) for controlling upstream congestion in wireless sensor network. In Proceedings of IEEE ICCICT, Mumbai, India.","DOI":"10.1109\/ICCICT.2012.6398232"},{"key":"1332_CR4","doi-asserted-by":"crossref","unstructured":"Sonmez, C., Isik, S., Donmez, M., Incel, O., & Ersoy, C. (2012). SUIT: A cross layer image transport protocol with fuzzy logic based congestion control for wireless multimedia sensor networks. In Proceedings of NTMS, Istanbul, Turkey.","DOI":"10.1109\/NTMS.2012.6208750"},{"issue":"3\u20134","key":"1332_CR5","first-page":"274","volume":"13","author":"I Politis","year":"2008","unstructured":"Politis, I., Tsagkaropoulos, M., Dagiuklas, T., & Kotsopoulos, S. (2008). A survey on wireless multimedia sensor networks. Mobile Network Applications, 13(3\u20134), 274\u2013284.","journal-title":"Mobile Network Applications"},{"key":"1332_CR6","doi-asserted-by":"crossref","first-page":"92","DOI":"10.26636\/jtit.2003.2.165","volume":"2","author":"H Danyali","year":"2003","unstructured":"Danyali, H., & Mertins, A. (2003). Fully spatial and SNR scalable. SPIHT-based image coding for transmission over heterogenous networks. Journal of Telecommunications and Information Technology, 2, 92\u201398.","journal-title":"Journal of Telecommunications and Information Technology"},{"key":"1332_CR7","doi-asserted-by":"crossref","unstructured":"Martelli, A., Grieco, L.\u00a0A., Bacco, M., Boggia, G., & Camarda, P. (2011). Selective dropping congestion control for wireless multimedia sensor networks, In: Proceedings of IEEE Symposium on Computers and Communications, ISCC, Kerkira, Corfu, Greece.","DOI":"10.1109\/ISCC.2011.5983923"},{"issue":"4","key":"1332_CR8","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1109\/SURV.2008.080404","volume":"10","author":"S Misra","year":"2008","unstructured":"Misra, S., Reisslein, M., & Guoliang, X. (2008). A survey of multimedia streaming in wireless sensor networks. IEEE Communications Surveys Tutorials, 10(4), 18\u201339.","journal-title":"IEEE Communications Surveys Tutorials"},{"key":"1332_CR9","unstructured":"Castalia simulator\u2014official website. (2013). Accessed: 2013-04-14. URL http:\/\/castalia.research.nicta.com.au\/index.php\/en\/"},{"issue":"1","key":"1332_CR10","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1016\/j.jss.2011.07.043","volume":"88","author":"S Sicari","year":"2012","unstructured":"Sicari, S., Grieco, L. A., Boggia, G., & Coen-Porsini, A. (2012). Dydap: A dynamic data aggregation scheme for privacy aware wireless sensor networks. Elsevier Journal of Systems and Software, 88(1), 152\u2013166.","journal-title":"Elsevier Journal of Systems and Software"},{"issue":"3","key":"1332_CR11","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1109\/76.499834","volume":"6","author":"A Said","year":"1996","unstructured":"Said, A., & Pearlman, W\u00a0. A. (1996). A new, fast, and efficient image codec based on set partitioning in hierarchical trees. IEEE Transactions on Circuits and Systems for Video Technology, 6(3), 243\u2013250.","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"4","key":"1332_CR12","doi-asserted-by":"crossref","first-page":"803","DOI":"10.1109\/TPDS.2012.170","volume":"24","author":"A Selcuk\u00a0Uluagac","year":"2013","unstructured":"Selcuk\u00a0Uluagac, A., Beyah, R., & Copeland, J. (2013). Secure source-based loose synchronization (sobas) for wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 24(4), 803\u2013813.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"1332_CR13","unstructured":"Sicari, S., Rizzardi, A., Grieco, L.\u00a0A., & Coen-Porisini, A. (2015). Gone: Dealing with node behavior. In: 5th IEEE international conference on consumer electronics, IEEE 2015 ICCE-Berlin."},{"issue":"3","key":"1332_CR14","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1007\/BF02476026","volume":"4","author":"I Daubechies","year":"1998","unstructured":"Daubechies, I., & Sweldens, W. (1998). Factoring wavelet transforms into lifting steps. Journal of Fourier Analysis and Applications, 4(3), 247\u2013269.","journal-title":"Journal of Fourier Analysis and Applications"},{"issue":"2","key":"1332_CR15","doi-asserted-by":"crossref","first-page":"7:1","DOI":"10.1145\/1340771.1340773","volume":"4","author":"S Nath","year":"2008","unstructured":"Nath, S., Gibbons, P., Seshan, S., & Anderson, Z. (2008). Synopsis diffusion for robust aggregation in sensor networks. ACM Transactions on Sensor Networks, 4(2), 7:1\u20137:40.","journal-title":"ACM Transactions on Sensor Networks"},{"key":"1332_CR16","doi-asserted-by":"crossref","unstructured":"Passing, M., & Dressler, F. (2006). Experimental performance evaluation of cryptographic algorithms on sensor nodes. In: IEEE international conference on mobile adhoc and sensor systems (MASS), 2006, IEEE, pp. 882\u2013887.","DOI":"10.1109\/MOBHOC.2006.278669"},{"key":"1332_CR17","doi-asserted-by":"crossref","unstructured":"Castelluccia, C., Mykletun, E., & Tsudik, G. (2005). Efficient aggregation of encrypted data in wireless sensor networks, In: The second annual international conference on mobile and ubiquitous systems: networking and services, 2005. MobiQuitous 2005, pp. 109\u2013117.","DOI":"10.1109\/MOBIQUITOUS.2005.25"},{"issue":"10","key":"1332_CR18","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1109\/MC.2003.1236475","volume":"36","author":"H Chan","year":"2003","unstructured":"Chan, H., & Perrig, A. (2003). Security and privacy in sensor networks. IEEE Computer Magazine, 36(10), 103\u2013105.","journal-title":"IEEE Computer Magazine"},{"issue":"12","key":"1332_CR19","doi-asserted-by":"crossref","first-page":"2022","DOI":"10.1016\/j.comnet.2009.02.023","volume":"53","author":"S Ozdemir","year":"2009","unstructured":"Ozdemir, S., & Xiao, Y. (2009). Secure data aggregation in wireless sensor networks: A comprehensive overview. Computer Networks, 53(12), 2022\u20132037.","journal-title":"Computer Networks"},{"key":"1332_CR20","doi-asserted-by":"crossref","unstructured":"Grieco, L.\u00a0A., Boggia, G., Sicari, S., & Colombo, P. (2009). Secure wireless multimedia sensor networks: A survey. In: Proceedings of UBICOMM, Sliema, Malta.","DOI":"10.1109\/UBICOMM.2009.27"},{"key":"1332_CR21","doi-asserted-by":"crossref","unstructured":"Wang, W., Peng, D., Wang, H., & Sharif, H. (2007). A cross layer resource allocation scheme for secure image delivery in wireless sensor networks. In: Proceedings of ACM IWCMC, Honolulu, Hawaii, USA.","DOI":"10.1145\/1280940.1280973"},{"issue":"5","key":"1332_CR22","doi-asserted-by":"crossref","first-page":"805","DOI":"10.1016\/j.jvcir.2014.01.005","volume":"25","author":"Y Xu","year":"2014","unstructured":"Xu, Y., Xiong, L., Xu, Z., & Pan, S. (2014). A content security protection scheme in JPEG compressed domain. Journal of Visual Communication and Image Representation, 25(5), 805\u2013813.","journal-title":"Journal of Visual Communication and Image Representation"},{"issue":"7","key":"1332_CR23","doi-asserted-by":"crossref","first-page":"929","DOI":"10.1016\/j.optlaseng.2012.02.012","volume":"50","author":"J Lang","year":"2012","unstructured":"Lang, J. (2012). Image encryption based on the reality preserving multiple parameter fractional fourier transform and chaos permutation. Optics and Lasers in Engineering, 50(7), 929\u2013937.","journal-title":"Optics and Lasers in Engineering"},{"key":"1332_CR24","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1016\/j.jss.2014.07.026","volume":"97","author":"EA Naeem","year":"2014","unstructured":"Naeem, E. A., Elnaby, M. M. A., Soliman, N. F., Abbas, A. M., Faragallah, O. S., Semary, N., et al. (2014). Efficient implementation of chaotic image encryption in transform domains. Journal of Systems and Software, 97, 118\u2013127.","journal-title":"Journal of Systems and Software"},{"issue":"2","key":"1332_CR25","doi-asserted-by":"crossref","first-page":"165","DOI":"10.4103\/0377-2063.81745","volume":"57","author":"K Rao","year":"2011","unstructured":"Rao, K., Kumar, K., & Krishna, P. M. (2011). A new and secure cryptosystem for image encryption and decryption. IETE Journal of Research, 57(2), 165\u2013171.","journal-title":"IETE Journal of Research"},{"issue":"7","key":"1332_CR26","doi-asserted-by":"crossref","first-page":"2270","DOI":"10.1016\/j.optlastec.2012.02.027","volume":"44","author":"N Zhoua","year":"2012","unstructured":"Zhoua, N., Wang, Y., Gong, L., Chen, X., & Yang, Y. (2012). Novel color image encryption algorithm based on the reality preserving fractional mellin transform. Optics & Laser Technology, 44(7), 2270\u20132281.","journal-title":"Optics & Laser Technology"},{"key":"1332_CR27","doi-asserted-by":"crossref","unstructured":"Telagarapu, P., Biswal, B., & Guntuku, V. (2011). Security of image in multimedia applications. In: Proceedings of international conference on energy, automation, and signal (ICEAS), Bhubaneswar, Odisha.","DOI":"10.1109\/ICEAS.2011.6147095"},{"issue":"9","key":"1332_CR28","doi-asserted-by":"crossref","first-page":"2422","DOI":"10.1016\/j.sigpro.2013.03.017","volume":"93","author":"X Zhang","year":"2013","unstructured":"Zhang, X., & Wang, X. (2013). Chaos-based partial encryption of SPIHT coded color images. Signal Processing, 93(9), 2422\u20132431.","journal-title":"Signal Processing"},{"key":"1332_CR29","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1016\/j.ins.2014.02.004","volume":"269","author":"S Tedmori","year":"2014","unstructured":"Tedmori, S., & Al-Najdawi, N. (2014). Image cryptographic algorithm based on the Haar wavelet transform. Information Sciences, 269, 21\u201334.","journal-title":"Information Sciences"},{"key":"1332_CR30","doi-asserted-by":"crossref","unstructured":"Riaz, F., Hameed, S., Shafi, I., Kausar, R., & Ahmed, A. (2012). Enhanced image encryption techniques using modified advanced encryption standard. In: Proceedings of 2nd international multi topic conference, IMTIC, Jamshoro, Pakistan.","DOI":"10.1007\/978-3-642-28962-0_37"},{"key":"1332_CR31","doi-asserted-by":"crossref","first-page":"472","DOI":"10.1016\/j.procs.2015.06.054","volume":"54","author":"LD Singh","year":"2015","unstructured":"Singh, L. D., & Singh, K. M. (2015). Image encryption using elliptic curve cryptography. Procedia Computer Science, 54, 472\u2013481.","journal-title":"Procedia Computer Science"},{"key":"1332_CR32","doi-asserted-by":"crossref","unstructured":"Sicari, S., Grieco, L., Rizzardi, A., Boggia, G., & Coen-Porisini, A. (2013). Seta: A secure sharing of tasks in clustered wireless sensor networks. In: Proceedings of IEEE WiMob, Lyon, France.","DOI":"10.1109\/WiMOB.2013.6673367"},{"key":"1332_CR33","doi-asserted-by":"crossref","unstructured":"Saghaiannejadesfahani, S., Luo, Y., & Cheung, S.-C. (2012). Privacy protected image denoising with secret shares. In: Proceedings of IEEE ICIP, Lake Buena Vista, FL, United States.","DOI":"10.1109\/ICIP.2012.6466843"},{"key":"1332_CR34","doi-asserted-by":"crossref","unstructured":"Fidaleo, D.\u00a0A., Nguyen, H., & Trivedi, M. (2004). The networked sensor tapestry (NeST): A privacy enhanced software architecture for interactive analysis of data in video-sensor networks. In: Proceedings of 2nd ACM international workshop on video surveillaince and sensor network, New York, USA.","DOI":"10.1145\/1026799.1026809"},{"issue":"5","key":"1332_CR35","first-page":"711","volume":"12","author":"K Yi","year":"2011","unstructured":"Yi, K., Han, M., & Park, J. (2011). Privacy protection and access control of image information processing devices. Journal of Internet Technology, 12(5), 711\u2013716.","journal-title":"Journal of Internet Technology"},{"key":"1332_CR36","doi-asserted-by":"crossref","first-page":"516","DOI":"10.1016\/j.adhoc.2013.10.006","volume":"Part B","author":"S\u00a0M Aghdam","year":"2014","unstructured":"Aghdam, S\u00a0. M., Khansari, M., Rabiee, H\u00a0. R., & Salehi, M. (2014). WCCP: A congestion control protocol for wireless multimedia communication in sensor networks. Ad Hoc Networks 13, Part B, 516\u2013534.","journal-title":"Ad Hoc Networks 13"},{"key":"1332_CR37","unstructured":"Sahinoglu, W.\u00a0Y., Vetro, Z., & Sahinoglu, A. (2004). Energy efficient jpeg 2000 image transmission over wireless sensor networks. In: Proceedings of IEEE GLOBECOM, Dallas, Texas, USA."},{"key":"1332_CR38","doi-asserted-by":"crossref","unstructured":"Kandris, D., Tsagkaropoulos, M., Politis, I., Tzes, A., & Kotsopoulos, S. (2009). A hybrid scheme for video transmission over wireless multimedia sensor networks. In: Proceedings of 17th Mediterranean conference on control and automation, Thessaloniki, Grece.","DOI":"10.1109\/MED.2009.5164670"},{"key":"1332_CR39","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1016\/j.comnet.2014.11.008","volume":"76","author":"S Sicari","year":"2015","unstructured":"Sicari, S., Rizzardi, A., Grieco, L., & Coen-Porisini, A. (2015). Security, privacy and trust in internet of things: The road ahead. Computer Networks, 76, 146\u2013164.","journal-title":"Computer Networks"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11276-016-1332-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-016-1332-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-016-1332-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-016-1332-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,18]],"date-time":"2024-06-18T11:50:02Z","timestamp":1718711402000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11276-016-1332-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7,23]]},"references-count":39,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,1]]}},"alternative-id":["1332"],"URL":"https:\/\/doi.org\/10.1007\/s11276-016-1332-x","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"value":"1022-0038","type":"print"},{"value":"1572-8196","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,7,23]]}}}