{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,5,29]],"date-time":"2024-05-29T00:54:32Z","timestamp":1716944072460},"reference-count":18,"publisher":"Elsevier BV","issue":"6","license":[{"start":{"date-parts":[[2007,12,1]],"date-time":"2007-12-01T00:00:00Z","timestamp":1196467200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Pervasive and Mobile Computing"],"published-print":{"date-parts":[[2007,12]]},"DOI":"10.1016\/j.pmcj.2007.06.002","type":"journal-article","created":{"date-parts":[[2007,6,26]],"date-time":"2007-06-26T11:18:30Z","timestamp":1182856710000},"page":"659-676","source":"Crossref","is-referenced-by-count":20,"title":["Securing distributed data storage and retrieval in sensor networks"],"prefix":"10.1016","volume":"3","author":[{"given":"Nalin","family":"Subramanian","sequence":"first","affiliation":[]},{"given":"Chanjun","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Wensheng","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"4","key":"10.1016\/j.pmcj.2007.06.002_b1","doi-asserted-by":"crossref","DOI":"10.1016\/S1389-1286(01)00302-4","article-title":"Wireless sensor networks: A survey","volume":"38","author":"Akyildiz","year":"2002","journal-title":"Computer Networks"},{"key":"10.1016\/j.pmcj.2007.06.002_b2","unstructured":"G. Wang, G. Cao, T. La Porta, A bidding protocol for deploying mobile sensors, in: IEEE International Conference on Network Protocols, ICNP, November 2003"},{"key":"10.1016\/j.pmcj.2007.06.002_b3","doi-asserted-by":"crossref","unstructured":"F. Ye, H. Luo, J. Cheng, S. Lu, L. Zhang, A two-tier data dissemination model for large-scale wireless sensor networks, in: ACM International Conference on Mobile Computing and Networking, MOBICOM\u201902, September 2002, pp. 148\u2013159","DOI":"10.1145\/570645.570664"},{"key":"10.1016\/j.pmcj.2007.06.002_b4","unstructured":"G. Wang, G. Cao, T. La Porta, W. Zhang, Sensor relocation in mobile sensor networks, in: IEEE INFOCOM, March 2005"},{"key":"10.1016\/j.pmcj.2007.06.002_b5","doi-asserted-by":"crossref","unstructured":"A. Perrig, R. Szewczyk, V. Wen, D. Culler, J. Tygar, Spins: Security protocols for sensor networks, in: Proceedings of ACM Mobile Computing and Networking, Mobicom\u201901, 2001, pp. 189\u2013199","DOI":"10.1145\/381677.381696"},{"key":"10.1016\/j.pmcj.2007.06.002_b6","doi-asserted-by":"crossref","unstructured":"L. Eschenauer, V. Gligor, A key-management scheme for distributed sensor networks, in: The 9th ACM Conference on Computer and Communications Security, November 2002, pp. 41\u201347","DOI":"10.1145\/586110.586117"},{"key":"10.1016\/j.pmcj.2007.06.002_b7","doi-asserted-by":"crossref","unstructured":"D. Liu, P. Ning, Establishing pairwise keys in distributed sensor networks, in: The 10th ACM Conference on Computer and Communications Security, 2003","DOI":"10.1145\/948117.948119"},{"key":"10.1016\/j.pmcj.2007.06.002_b8","unstructured":"F. Ye, H. Luo, S. Lu, L. Zhang, Statistical en-route filtering of injected false data in sensor networks, in: IEEE Infocom\u201904, March 2004"},{"key":"10.1016\/j.pmcj.2007.06.002_b9","doi-asserted-by":"crossref","unstructured":"H. Yang, F. Ye, Y. Yuan, S. Lu, W. Arbaugh, Toward resilient security in wireless sensor networks, in: ACM MOBIHOC, May 2005","DOI":"10.1145\/1062689.1062696"},{"key":"10.1016\/j.pmcj.2007.06.002_b10","unstructured":"G. Wang, W. Zhang, G. Cao, T. La Porta, On supporting distributed collaboration in sensor networks, in: IEEE Military Communications Conference, MILCOM, October 2003"},{"key":"10.1016\/j.pmcj.2007.06.002_b11","doi-asserted-by":"crossref","unstructured":"S. Ratnasamy, B. Karp, L. Yin, F. Yu, D. Estrin, R. Govindan, S. Shenker, GHT: A geographic hash table for data-centric storage, in: WSNA\u201902, September 2002","DOI":"10.1145\/570738.570750"},{"key":"10.1016\/j.pmcj.2007.06.002_b12","unstructured":"W. Zhang, G. Cao, T. La Porta, Data dissemination with ring-based index for sensor networks, in: IEEE International Conference on Network Protocol, ICNP, November 2003"},{"key":"10.1016\/j.pmcj.2007.06.002_b13","doi-asserted-by":"crossref","unstructured":"J. Newsome, D. Song, GEM: Graph EMbedding for routing and data-centric storage in sensor networks without geographic information, in: Proc. SenSys\u201903, Los Angeles, California, USA, November 2003","DOI":"10.1145\/958499.958501"},{"issue":"2\u20133","key":"10.1016\/j.pmcj.2007.06.002_b14","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1016\/S1570-8705(03)00010-6","article-title":"DIFS: A distributed index for features in sensor networks","volume":"1","author":"Greenstein","year":"2003","journal-title":"Ad Hoc Networks"},{"key":"10.1016\/j.pmcj.2007.06.002_b15","doi-asserted-by":"crossref","unstructured":"X. Li, Y. Kim, R. Govindan, W. Hong, Multi-dimensional range queries in sensor networks, in: Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, SenSys, 2003, pp. 63\u201375","DOI":"10.1145\/958491.958500"},{"key":"10.1016\/j.pmcj.2007.06.002_b16","doi-asserted-by":"crossref","unstructured":"A. Ghose, J. Grobklags, J. Chuang, Resilient data-centric storage in wireless ad-hoc sensor networks, in: Proceedings the 4th International Conference on Mobile Data Management, MDM\u201903, 2003, pp. 45\u201362","DOI":"10.1007\/3-540-36389-0_4"},{"key":"10.1016\/j.pmcj.2007.06.002_b17","doi-asserted-by":"crossref","unstructured":"P. Desnoyers, D. Ganesan, P. Shenoy, TSAR: A two tier sensor storage architecture using interval skip graphs, in: Proc. SenSys\u201905, San Diego, California, USA, 2\u20134 November 2005","DOI":"10.1145\/1098918.1098923"},{"key":"10.1016\/j.pmcj.2007.06.002_b18","doi-asserted-by":"crossref","unstructured":"Q. Fang, J. Gao, L. Guibas, Landmark-based information storage and retrieval in sensor networks, April 2006","DOI":"10.1109\/INFOCOM.2006.115"}],"container-title":["Pervasive and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1574119207000454?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1574119207000454?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,29]],"date-time":"2019-04-29T20:28:26Z","timestamp":1556569706000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1574119207000454"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,12]]},"references-count":18,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2007,12]]}},"alternative-id":["S1574119207000454"],"URL":"https:\/\/doi.org\/10.1016\/j.pmcj.2007.06.002","relation":{},"ISSN":["1574-1192"],"issn-type":[{"value":"1574-1192","type":"print"}],"subject":[],"published":{"date-parts":[[2007,12]]}}}