{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,14]],"date-time":"2024-08-14T05:59:54Z","timestamp":1723615194248},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1109\/glocom.2008.ecp.363","type":"proceedings-article","created":{"date-parts":[[2010,12,8]],"date-time":"2010-12-08T14:51:12Z","timestamp":1291819872000},"source":"Crossref","is-referenced-by-count":25,"title":["Clock Skew Based Node Identification in Wireless Sensor Networks"],"prefix":"10.1109","author":[{"given":"Ding-Jie","family":"Huang","sequence":"first","affiliation":[]},{"given":"Wei-Chung","family":"Teng","sequence":"additional","affiliation":[]},{"given":"Chih-Yuan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Hsuan-Yu","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Joseph M.","family":"Hellerstein","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","article-title":"a survey of solutions to the sybil attack","author":"levine","year":"2006","journal-title":"University of Massachusetts Amherst Tech report 2006-052"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2006.37"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/SNPA.2003.1203362"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/984622.984660"},{"key":"13","article-title":"securing flooding time synchronization protocol in sensor networks","author":"roosta","year":"2006","journal-title":"First International Workshop on Embedded Systems Security"},{"key":"14","year":"0"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1060289.1060304"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/958491.958508"},{"key":"3","first-page":"134","article-title":"replication attack on random key pre-distribution schemes for wireless sensor networks","author":"fu","year":"2005","journal-title":"Information Assurance Workshop 2005 IAW '05 Proceedings from the Sixth Annual IEEE SMC"},{"key":"2","first-page":"251","article-title":"the sybil attack","author":"douceur","year":"2002","journal-title":"IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems"},{"key":"1","article-title":"taxonomy of security attacks in sensor networks and countermeasures","author":"roosta","year":"2006","journal-title":"The First IEEE International Conference on System Integration and Reliability Improvements"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1080793.1080809"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.18"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1029102.1029113"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/381677.381696"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1065545.1065548"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1031495.1031501"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180410"}],"event":{"name":"IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference","location":"New Orleans, LA, USA","start":{"date-parts":[[2008,11,30]]},"end":{"date-parts":[[2008,12,4]]}},"container-title":["IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4697774\/4697775\/04698138.pdf?arnumber=4698138","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T17:28:01Z","timestamp":1489771681000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4698138\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/glocom.2008.ecp.363","relation":{},"subject":[],"published":{"date-parts":[[2008]]}}}