{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T01:52:40Z","timestamp":1768441960877,"version":"3.49.0"},"reference-count":53,"publisher":"Elsevier BV","issue":"2","license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[2012,1]]},"DOI":"10.1016\/j.comcom.2011.09.005","type":"journal-article","created":{"date-parts":[[2011,9,17]],"date-time":"2011-09-17T23:50:28Z","timestamp":1316303428000},"page":"234-248","source":"Crossref","is-referenced-by-count":17,"title":["A sinkhole resilient protocol for wireless sensor networks: Performance and security analysis"],"prefix":"10.1016","volume":"35","author":[{"given":"Fabrice","family":"Le Fessant","sequence":"first","affiliation":[]},{"given":"Antonis","family":"Papadimitriou","sequence":"additional","affiliation":[]},{"given":"Aline Carneiro","family":"Viana","sequence":"additional","affiliation":[]},{"given":"Cigdem","family":"Sengul","sequence":"additional","affiliation":[]},{"given":"Esther","family":"Palomar","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.comcom.2011.09.005_b0005","doi-asserted-by":"crossref","unstructured":"C. Intanagonwiwat, R. Govindan, D. Estrin, Directed diffusion: a scalable and robust communication paradigm for sensor networks, in: ACM MOBICOM, Boston, MA, 2000, pp. 56\u201367.","DOI":"10.1145\/345910.345920"},{"key":"10.1016\/j.comcom.2011.09.005_b0010","unstructured":"F. Ye, A. Chen, S. Lu, L. Zhang, Gradient broadcast: a robust, long-live large sensor network, Technical report, UCLA, 2001."},{"key":"10.1016\/j.comcom.2011.09.005_b0015","unstructured":"F. Ye, A. Chen, S. Lu, L. Zhang, A scalable solution to minimum cost forwarding in large sensor networks, in: Conference on Computer Communications and Networks, Arizona, USA, 2001."},{"key":"10.1016\/j.comcom.2011.09.005_b0020","doi-asserted-by":"crossref","unstructured":"U. Cetintemel, A. Flinders, Y. Sun, Power-efficient data dissemination in wireless sensor networks, in: ACM MobiDE, San Diego, CA, USA, 2003.","DOI":"10.1145\/940923.940925"},{"key":"10.1016\/j.comcom.2011.09.005_b0025","doi-asserted-by":"crossref","unstructured":"B. Krishnamachari, D. Estrin, S. Wicker, The impact of data aggregation in wireless sensor networks, in: IEEE ICDCS, Washington, DC, USA, 2002, pp. 575\u2013578.","DOI":"10.1109\/ICDCSW.2002.1030829"},{"key":"10.1016\/j.comcom.2011.09.005_b0030","unstructured":"Y.J. Zhao, R. Govindan, D. Estrin, Residual energy scans for monitoring wireless sensor networks, in: IEEE WCNC, 2002."},{"key":"10.1016\/j.comcom.2011.09.005_b0035","first-page":"131","article-title":"TAG: a tiny aggregation service for ad-hoc sensor networks","author":"Madden","year":"2002","journal-title":"ACM OSR"},{"key":"10.1016\/j.comcom.2011.09.005_b0040","doi-asserted-by":"crossref","unstructured":"C. Karlof, D. Wagner, Secure routing in wireless sensor networks: attacks and countermeasures, in: IEEE Workshop on Sensor Network Protocols and Applications (SNPA), Anchorage, Alaska, USA, 2003.","DOI":"10.1016\/S1570-8705(03)00008-8"},{"key":"10.1016\/j.comcom.2011.09.005_b0045","unstructured":"W.R.P. Junior, T.H. de P. Figueiredo, H.C. Wong, Malicious node detection in wireless sensor networks, in: IEEE IPDPS, Miami, Florida, USA, 2004."},{"key":"10.1016\/j.comcom.2011.09.005_b0050","unstructured":"P. Mukherjee, S. Sen, Detecting malicious sensor nodes from learned data patterns, in: Agent Technology for Sensor Networks, Honolulu, Hawaii, 2007."},{"key":"10.1016\/j.comcom.2011.09.005_b0055","unstructured":"P. Mukherjee, S. Sen, Using learned data patterns to detect malicious nodes in sensor networks, in: ICDCN, Kolkata, India, 2008."},{"key":"10.1016\/j.comcom.2011.09.005_b0060","doi-asserted-by":"crossref","unstructured":"B. Yu, B. Xao, Detecting selective forwarding attacks in wireless sensor networks, in: IEEE IPDPS, Rhodes Island, Greece, 2006.","DOI":"10.1109\/IPDPS.2006.1639675"},{"key":"10.1016\/j.comcom.2011.09.005_b0065","doi-asserted-by":"crossref","unstructured":"L.B. Oliveira, D. Aranha, E. Morais, F. Daguano, J. Lpez, R. Dahab, Identity-based encryption for sensor networks, in: IEEE PERCOM, 2007.","DOI":"10.1109\/PERCOMW.2007.56"},{"key":"10.1016\/j.comcom.2011.09.005_b0070","unstructured":"Y.-C. Hu, A. Perrig, D.B. Johnson, Packet leashes: a defense against wormhole attacks in wireless networks, in: Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications, 2003, pp. 1976\u20131986."},{"key":"10.1016\/j.comcom.2011.09.005_b0075","first-page":"153","article-title":"A secure alternate path routing in sensor networks","volume":"vol. 30","author":"Lee","year":"2006"},{"key":"10.1016\/j.comcom.2011.09.005_b0080","series-title":"Stochastic Analysis, Control, Optimization and Applications","first-page":"547","article-title":"Critical power for asymptotic connectivity in wireless networks","author":"Gupta","year":"1998"},{"issue":"2","key":"10.1016\/j.comcom.2011.09.005_b0085","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1365815.1365817","article-title":"RaWMS \u2013 Random walk based lightweight membership service for wireless ad hoc networks","volume":"26","author":"Bar-Yossef","year":"2008","journal-title":"ACM Transactions on Computer Systems (TOCS)"},{"key":"10.1016\/j.comcom.2011.09.005_b0090","unstructured":"F. Le Fessant, C. Sengul, A.-M. Kermarrec, Pace-maker: tracking peer availability in large networks, Technical Report RR-6594, INRIA, 2008."},{"key":"10.1016\/j.comcom.2011.09.005_b0095","series-title":"Proceedings of the Cryptographic Hardware and Embedded Systems","first-page":"119","article-title":"Comparing elliptic curve cryptography and rsa on 8-bit cpus","author":"Gura","year":"2004"},{"key":"10.1016\/j.comcom.2011.09.005_b0100","doi-asserted-by":"crossref","unstructured":"A.S. Wander, N. Gura, H. Eberle, V. Gupta, S.C. Shantz, Energy analysis of public-key cryptography for wireless sensor networks, in: IEEE International Conference on Pervasive Computing and Communications, 2005, pp. 324\u2013328.","DOI":"10.1109\/PERCOM.2005.18"},{"key":"10.1016\/j.comcom.2011.09.005_b0105","doi-asserted-by":"crossref","unstructured":"K. Piotrowski, P. Langendoerfer, S. Peter, How public key cryptography influences wireless sensor node lifetime, in: Proceedings of the 4th ACM workshop on Security of ad hoc and sensor networks, 2006, pp. 169\u2013176.","DOI":"10.1145\/1180345.1180366"},{"key":"10.1016\/j.comcom.2011.09.005_b0110","doi-asserted-by":"crossref","unstructured":"H. Wang, Q. Li, Efficient implementation of public key cryptosystems on mote sensors, in: Proceedings of the 8th International Conference on Information and Communications Security, 2006, pp. 519\u2013528.","DOI":"10.1007\/11935308_37"},{"key":"10.1016\/j.comcom.2011.09.005_b0115","doi-asserted-by":"crossref","unstructured":"L. Batina, N. Mentens, K. Sakiyama, B. Preneel, I. Verbauwhede, Low-cost elliptic curve cryptography for wireless sensor networks, in: Proceedings of the 3rd European Workshop on Security and Privacy in Ad Hoc and Sensor Networks (ESAS), 2006, pp. 6\u201317.","DOI":"10.1007\/11964254_3"},{"key":"10.1016\/j.comcom.2011.09.005_b0120","doi-asserted-by":"crossref","unstructured":"G. de Meulenaer, F. Gosset, F.-X. Standaert, O. Pereira, On the energy cost of communication and cryptography in wireless sensor networks, in: IEEE International Conference on Wireless and Mobile Computing, Networking and Communication, 2008, pp. 580\u2013585.","DOI":"10.1109\/WiMob.2008.16"},{"key":"10.1016\/j.comcom.2011.09.005_b0125","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1145\/581291.581312","article-title":"Secure ad hoc on-demand distance vector routing","volume":"6","author":"Zapata","year":"2002","journal-title":"ACM Mobile Computing and Communications Review"},{"key":"10.1016\/j.comcom.2011.09.005_b0130","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1002\/wcm.397","article-title":"A new approach for random key predistribution in large scale wireless sensor networks","volume":"6","author":"Ren","year":"2006","journal-title":"Journal of Wireless Communication and Mobile Computing"},{"key":"10.1016\/j.comcom.2011.09.005_b0135","unstructured":"W. Du, J. Deng, Y. Han, S. Chen, P. Varshney, A key management scheme for wireless sensor networks using deployment knowledge, in: IEEE Infocom, 2004."},{"key":"10.1016\/j.comcom.2011.09.005_b0140","unstructured":"S. Zhu, S. Xu, S. Setia, S. Jajodia, Establishing pair-wise keys for secure communication in ad hoc networks: A probabilistic approach, in: IEEE ICNP, 2003."},{"issue":"5","key":"10.1016\/j.comcom.2011.09.005_b0145","doi-asserted-by":"crossref","first-page":"585","DOI":"10.1109\/TMC.2007.70753","article-title":"Leds: providing location-aware end-to-end data security in wireless sensor networks","volume":"7","author":"Ren","year":"2008","journal-title":"IEEE Transactions on Mobile Computing (TMC)"},{"issue":"2","key":"10.1016\/j.comcom.2011.09.005_b0150","first-page":"247","article-title":"Location based compromise-tolerant security mechanisms in wireless sensor networks","volume":"24","author":"Zhang","year":"2006","journal-title":"IEEE JSAC, Special Issue on Security in Wireless Ad Hoc Networks"},{"key":"10.1016\/j.comcom.2011.09.005_b0155","doi-asserted-by":"crossref","unstructured":"H. Yang, F. Ye, Y. Yuan, S. Lu, W. Arbaugh, Toward resilient security in wireless sensor networks, in: ACM MOBIHOC, 2005.","DOI":"10.1145\/1062689.1062696"},{"issue":"4","key":"10.1016\/j.comcom.2011.09.005_b0160","doi-asserted-by":"crossref","first-page":"791","DOI":"10.1109\/TNET.2007.904002","article-title":"Impact of denial of service attacks on ad hoc networks","volume":"16","author":"Aad","year":"2008","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"10.1016\/j.comcom.2011.09.005_b0165","unstructured":"S.M. Jing Deng, Richard Han, Insens: intrusion-tolerant routing in wireless sensor networks, in: IEEE ICDCS, Providence, Rhodes Island, USA, 2003."},{"key":"10.1016\/j.comcom.2011.09.005_b0170","unstructured":"D.H. McKnight, A.E. Kamal, The meanings of trust, Technical report, University Minnesota, 1996."},{"key":"10.1016\/j.comcom.2011.09.005_b0175","doi-asserted-by":"crossref","unstructured":"S. Marti, T. Giuli, K. Lai, M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, in: ACM MOBICOM, Boston, MA, 2000, pp. 255\u2013265.","DOI":"10.1145\/345910.345955"},{"key":"10.1016\/j.comcom.2011.09.005_b0180","doi-asserted-by":"crossref","unstructured":"Y. Sun, Z. Han, W. Yu, K.J.R. Liu, A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks, in: IEEE INFOCOM, Barcelona, Spain, 2007.","DOI":"10.1109\/INFOCOM.2006.154"},{"key":"10.1016\/j.comcom.2011.09.005_b0185","unstructured":"Z. Liu, A. Joy, R. Thompson, A dynamic trust model for mobile ad hoc networks, in: Future Trends of Dist. Computing Systems, Suzhou, China, 2004."},{"key":"10.1016\/j.comcom.2011.09.005_b0190","unstructured":"I. Khalil, S. Bagchi, N.B. Shroff, LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks, in: Multihop Wireless Network in the International Conference on Dependable Systems and Networks (DSN)."},{"key":"10.1016\/j.comcom.2011.09.005_b0195","article-title":"A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks","volume":"vol. 13","author":"Poovendran","year":"2007"},{"key":"10.1016\/j.comcom.2011.09.005_b0200","unstructured":"A. Pirzada, C. McDonald, Circumventing sinkholes and wormholes in wireless sensor networks, in: Proceedings of the International Conference on Wireless Ad Hoc Networks, 2005."},{"key":"10.1016\/j.comcom.2011.09.005_b0205","doi-asserted-by":"crossref","first-page":"1051","DOI":"10.1016\/j.adhoc.2008.09.005","article-title":"Serwa: a secure routing protocol against wormhole attacks in sensor networks","volume":"7","author":"Madria","year":"2009","journal-title":"Ad Hoc Network"},{"key":"10.1016\/j.comcom.2011.09.005_b0210","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1007\/s11276-006-3723-x","article-title":"A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks","volume":"13","author":"Poovendran","year":"2007","journal-title":"Wireless Network"},{"key":"10.1016\/j.comcom.2011.09.005_b0215","doi-asserted-by":"crossref","unstructured":"S. \u010capkun, L. Butty\u00e1n, J.-P. Hubaux, Sector: secure tracking of node encounters in multi-hop wireless networks, in: ACM workshop on Security of ad hoc and sensor networks, 2003, pp. 21\u201332.","DOI":"10.1145\/986858.986862"},{"key":"10.1016\/j.comcom.2011.09.005_b0220","series-title":"Proceedings of the 4th EuroPKI Workshop","first-page":"313","article-title":"Applicability of public key infrastructures in wireless sensor networks","author":"Roman","year":"2007"},{"issue":"4","key":"10.1016\/j.comcom.2011.09.005_b0225","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1387663.1387668","article-title":"Implementing public-key infrastructure for sensor networks","volume":"4","author":"Malan","year":"2008","journal-title":"ACM Transactions on Sensor Networks"},{"key":"10.1016\/j.comcom.2011.09.005_b0230","doi-asserted-by":"crossref","unstructured":"L. Batina, J. Guajardo, T. Kerins, N. Mentens, P. Tuyls, I. Verbauwhede, Public-key cryptography for rfid-tags, in: Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops, 2007, pp. 217\u2013222.","DOI":"10.1109\/PERCOMW.2007.98"},{"key":"10.1016\/j.comcom.2011.09.005_b0235","series-title":"PKC","first-page":"446","article-title":"Selecting cryptographic key sizes","author":"Lenstra","year":"2000"},{"key":"10.1016\/j.comcom.2011.09.005_b0240","series-title":"Wireless Sensor Network Security","author":"Lopez","year":"2008"},{"issue":"4","key":"10.1016\/j.comcom.2011.09.005_b0245","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1007\/s11036-007-0024-2","article-title":"A survey of cryptographic primitives and implementations for hardware-constrained sensor network nodes","volume":"12","author":"Roman","year":"2007","journal-title":"Mobile Networks Application"},{"issue":"1","key":"10.1016\/j.comcom.2011.09.005_b0250","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1145\/1138127.1138130","article-title":"Survey and benchmark of block ciphers for wireless sensor networks","volume":"2","author":"Law","year":"2006","journal-title":"ACM Transactions on Sensor Networks."},{"key":"10.1016\/j.comcom.2011.09.005_b0255","series-title":"Proceedings of the Workshop on Information Security Theory and Practice Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems","first-page":"202","article-title":"Survey and benchmark of stream ciphers for wireless sensor networks","volume":"vol. 4462","author":"Fournel","year":"2007"},{"key":"10.1016\/j.comcom.2011.09.005_b0260","doi-asserted-by":"crossref","unstructured":"A. Francillon, C. Castelluccia, Tinyrng: a cryptographic random number generator for wireless sensors network nodes, in: Proceedings of the 5th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks and Workshops, 2007, pp. 1\u20137.","DOI":"10.1109\/WIOPT.2007.4480051"},{"key":"10.1016\/j.comcom.2011.09.005_b0265","doi-asserted-by":"crossref","first-page":"521","DOI":"10.1023\/A:1016598314198","article-title":"Spins: security protocols for sensor networks","volume":"8","author":"Perrig","year":"2001","journal-title":"Wireless Networks"}],"container-title":["Computer Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366411002751?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366411002751?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,3,11]],"date-time":"2025-03-11T15:01:08Z","timestamp":1741705268000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0140366411002751"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,1]]},"references-count":53,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2012,1]]}},"alternative-id":["S0140366411002751"],"URL":"https:\/\/doi.org\/10.1016\/j.comcom.2011.09.005","relation":{},"ISSN":["0140-3664"],"issn-type":[{"value":"0140-3664","type":"print"}],"subject":[],"published":{"date-parts":[[2012,1]]}}}