{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T02:35:03Z","timestamp":1725849303952},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2020,4,9]],"date-time":"2020-04-09T00:00:00Z","timestamp":1586390400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,4,9]],"date-time":"2020-04-09T00:00:00Z","timestamp":1586390400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2020,8]]},"DOI":"10.1007\/s11277-020-07291-5","type":"journal-article","created":{"date-parts":[[2020,4,9]],"date-time":"2020-04-09T10:03:39Z","timestamp":1586426619000},"page":"1775-1790","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["Malicious Node Detection in Wireless Sensor Networks Using an Efficient Secure Data Aggregation Protocol"],"prefix":"10.1007","volume":"113","author":[{"given":"S.","family":"Gomathi","sequence":"first","affiliation":[]},{"given":"C.","family":"Gopala Krishnan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,4,9]]},"reference":[{"key":"7291_CR1","unstructured":"Hu, L., & Evans, D. (2003 Jan 23). Secure aggregation for wireless networks. Proceedings of Workshop on Security and Assurance in Ad hoc Networks, Orlando, FL."},{"key":"7291_CR2","doi-asserted-by":"crossref","unstructured":"Przydatek, B., Song, D. & Perrig, A. (2003). SIA: Secure information aggregation in sensor networks. Proceedings of SenSys\u2019 03, Nov 5\u20137, Los Angeles, CA.","DOI":"10.1145\/958491.958521"},{"key":"7291_CR3","first-page":"732","volume":"2","author":"H Cam","year":"2003","unstructured":"Cam, H., Ozdemir, S., Nair, P., & Muthuavinashiappan, D. (2003). ESPDA: Energy-efficient and secure pattern based data aggregation for wireless sensor networks. Proceedings of IEEE sensors,2, 732\u2013736.","journal-title":"Proceedings of IEEE sensors"},{"key":"7291_CR4","unstructured":"Ozdemir, S., Ozgur Sanli, H., & Cam, H. (2004 Sep). SRDA: Secure reference-based data aggregation protocol for wireless sensor networks. In IEEE 60th conference on vehicular technology, VTC2004-Fall, Vol. 7, pp. 26\u201329, pp. 4650\u20134654."},{"key":"7291_CR5","doi-asserted-by":"crossref","unstructured":"Yang, Y., Wang, X., Zhu, S., & Cao, G. (2006). SDAP: A secure hop-by-hop data aggregation protocol for sensor networks. In Proceedings of the 7th ACM international symposium on mobile ad hoc networking and computing (MobiHoc \u201906), pp. 356\u2013367.","DOI":"10.1145\/1132905.1132944"},{"key":"7291_CR6","doi-asserted-by":"crossref","unstructured":"Othman, S. B., Trad, A., Youssef, H. & Alzaid, H. (2013). Secure data aggregation with MAC authentication in wireless sensor networks. 12th IEEE international conference on trust, security and privacy in computing and communications, ISSN: 2324\u2013898X, pp 188\u2013195.","DOI":"10.1109\/TrustCom.2013.252"},{"key":"7291_CR7","first-page":"169","volume":"4","author":"R Rivest","year":"1978","unstructured":"Rivest, R., Adleman, L., & Dertouzos, M. (1978). On data banks and privacy homomorphisms. Foundations of Secure Computation,4, 169\u2013179.","journal-title":"Foundations of Secure Computation"},{"key":"7291_CR8","first-page":"3044","volume":"5","author":"J Girao","year":"2005","unstructured":"Girao, J., Schneider, M., & Westhoff, D. (2005). CDA: Concealed data aggregation in wireless sensor networks. IEEE International Conference on Communications,5, 3044\u20133049.","journal-title":"IEEE International Conference on Communications"},{"key":"7291_CR9","doi-asserted-by":"crossref","unstructured":"Wagner, D. (2004). Resilient aggregation in sensor networks. In Proceedings of the 2nd ACM Workshop on Security of Ad-hoc and Sensor Networks.","DOI":"10.1145\/1029102.1029116"},{"issue":"5","key":"7291_CR10","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1023\/A:1016598314198","volume":"8","author":"RS Perrig","year":"2002","unstructured":"Perrig, R. S., Tygar, J. D., Wen, V., & Culler, D. E. (2002). SPINS: Security protocols for sensor networks. Wireless Networks,8(5), 521\u2013534.","journal-title":"Wireless Networks"},{"key":"7291_CR11","unstructured":"Junior, W., Figueriredo, T., Wong, H.-C. & Loureiro, A. Malicious node detection in wireless sensor networks. The 18th International parallel and distributed processing symposium (IPDPS\u201904), April 26\u201330, 2004, Santa Fe, Nex Mexico, USA"},{"key":"7291_CR12","doi-asserted-by":"crossref","unstructured":"Curiac, D.-I., Banias, O., Dragan, F., Volosencu, C. & Dranga, O. (2007). Malicious node detection in wireless sensor networks using an autoregression technique. The 3rd International conference on networking and services (ICNS\u201907), June 19\u201325, 2007, Athens, Greece.","DOI":"10.1109\/ICNS.2007.79"},{"key":"7291_CR13","doi-asserted-by":"publisher","first-page":"219","DOI":"10.4236\/wsn.2012.49032","volume":"4","author":"S-J Yim","year":"2012","unstructured":"Yim, S.-J., & Choi, Y.-H. (2012). Neighbor-based malicious node detection in wireless sensor networks. Wireless Sensor Network,4, 219\u2013225. https:\/\/doi.org\/10.4236\/wsn.2012.49032.","journal-title":"Wireless Sensor Network"},{"issue":"9","key":"7291_CR14","first-page":"229","volume":"1","author":"G Gomathi","year":"2014","unstructured":"Gomathi, G., Yalini, C., & Revathi, T. K. (2014). Secure data aggregation technique for wireless sensor networks in the presence of security threats. International Journal of Emerging Technologies and Engineering (IJETE), 1(9), 229\u2013234.","journal-title":"International Journal of Emerging Technologies and Engineering (IJETE)"},{"key":"7291_CR15","doi-asserted-by":"crossref","unstructured":"Ayday, E., Lee, H., & Fekri, F. (2009). An iterative algorithm for trust and reputation management. In Proceedings of the IEEE international conference on symposium on information, pp. 2051\u20132055.","DOI":"10.1109\/ISIT.2009.5205441"},{"key":"7291_CR16","doi-asserted-by":"crossref","unstructured":"Jiang, J., Han, G., Wang, F., Member, S. L. (2015). An efficient distributed trust model for wireless sensor networks. IEEE, and Mohsen Guizani, Fellow, IEEE Transactions On Parallel And Distributed Systems, Vol. 26, No. 5, May 2015.","DOI":"10.1109\/TPDS.2014.2320505"},{"issue":"1","key":"7291_CR17","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1109\/JSYST.2013.2296197","volume":"9","author":"JM Chang","year":"2015","unstructured":"Chang, J. M., Tsou, P. C., Woungang, I., Chao, H. C., & Lai, C. F. (2015). Defending against collaborative attacks by malicious nodes in MANETs: Cooperative bait detection approach. IEEE Systems Journal,9(1), 65\u201375.","journal-title":"IEEE Systems Journal"},{"key":"7291_CR18","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/6206353","author":"K Grgic","year":"2016","unstructured":"Grgic, K., Zagar, D., & Cik, V. K. (2016). System for malicious node detection in IPv6-based wireless sensor networks. Journal of Sensors. https:\/\/doi.org\/10.1155\/2016\/6206353.","journal-title":"Journal of Sensors"},{"key":"7291_CR19","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-017-0743-2","author":"K Nirmal Raja","year":"2017","unstructured":"Nirmal Raja, K., & Maraline Beno, M. (2017). Secure data aggregation in wireless sensor Network-Fujisaki Okamoto (FO) authentication scheme against Sybil attack. Journal of Medwell Systems. https:\/\/doi.org\/10.1007\/s10916-017-0743-2.","journal-title":"Journal of Medwell Systems"},{"issue":"8","key":"7291_CR20","doi-asserted-by":"publisher","first-page":"2128","DOI":"10.1109\/TPDS.2014.2346764","volume":"26","author":"KA Shim","year":"2015","unstructured":"Shim, K. A., & Park, C. M. (2015). A secure data aggregation scheme based on appropriate cryptographic primitives in heterogeneous wireless sensor networks. IEEE Trans. Parallel and Distributed Systems (TPDS),26(8), 2128\u20132139.","journal-title":"IEEE Trans. Parallel and Distributed Systems (TPDS)"},{"key":"7291_CR21","doi-asserted-by":"crossref","unstructured":"X. Jinhui, T. Yang, Y. Feiyue, P. Leina, X. Juan., H. Yao. (2018). Intrusion detection system for hybrid DoS attacks using energy trust in wireless sensor networks. Scicedirect, Procedia, Computer Science 131, 8th International Congress of Information and Communication Technology (ICICT-2018), pp. 1188\u20131195.","DOI":"10.1016\/j.procs.2018.04.297"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07291-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-020-07291-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07291-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,8]],"date-time":"2021-04-08T23:26:26Z","timestamp":1617924386000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-020-07291-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,9]]},"references-count":21,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2020,8]]}},"alternative-id":["7291"],"URL":"https:\/\/doi.org\/10.1007\/s11277-020-07291-5","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,4,9]]},"assertion":[{"value":"9 April 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}