{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T15:45:18Z","timestamp":1730216718762,"version":"3.28.0"},"reference-count":40,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,5]]},"DOI":"10.1109\/edcc.2012.23","type":"proceedings-article","created":{"date-parts":[[2012,6,20]],"date-time":"2012-06-20T13:35:15Z","timestamp":1340199315000},"page":"102-113","source":"Crossref","is-referenced-by-count":2,"title":["Security of Electrostatic Field Persistent Routing: Attacks and Defense Mechanisms"],"prefix":"10.1109","author":[{"given":"O. C.","family":"Ghica","sequence":"first","affiliation":[]},{"given":"C.","family":"Nita-Rotaru","sequence":"additional","affiliation":[]},{"given":"G.","family":"Trajcevski","sequence":"additional","affiliation":[]},{"given":"P.","family":"Scheuermann","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1109\/ICESS.2008.14"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1109\/VETECS.2008.36"},{"key":"ref33","article-title":"Security of field based routing","author":"sharma","year":"2008","journal-title":"Student Thesis SA-2008&#x2013;08"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1145\/1161064.1161075"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1145\/1089761.1089774"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1109\/SP.2005.8"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1093\/comjnl\/bxq034"},{"key":"ref36","first-page":"1","article-title":"Polar cooordinate routing for multiple paths in wireless sensor networks","author":"desai","year":"2010","journal-title":"WOWCOM"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1145\/1860093.1860116"},{"key":"ref34","article-title":"Theory and practice of geographic routing","author":"ruehrup","year":"2009","journal-title":"Ad Hoc and Sensor Wireless Networks Architectures Algorithms and Protocols"},{"key":"ref10","article-title":"On the security of distributed position services","author":"wu","year":"2005","journal-title":"SECURECOMM"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1109\/TNET.2009.2022084"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1016\/j.adhoc.2006.05.010"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1145\/1380564.1380571"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/ICUMT.2009.5345607"},{"key":"ref14","first-page":"1","article-title":"Hmac: keyed-hashing for message authentication","volume":"2104","author":"krawczyk","year":"1997","journal-title":"RFC"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1090\/S0025-5718-1987-0866109-5"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1007\/s102070100002"},{"key":"ref17","article-title":"Extending lifetime in large scale wireless sensor networks: Secure multipath routing and load-aware tracking","author":"ghica","year":"2011","journal-title":"PhD Thesis UMI 3456555"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1145\/509506.509514"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1145\/1460412.1460464"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1145\/1053283.1053287"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1145\/997122.997129"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1145\/1065545.1065548"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1145\/938985.939012"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/SECPRI.2000.848446"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1145\/984622.984660"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/GLOCOM.2010.5684279"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1145\/938985.938995"},{"key":"ref7","article-title":"Beacon vector routing: Scalable point-to-point routing in wireless sensornets","author":"fonseca","year":"2005","journal-title":"NSDI"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/NCM.2009.80"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1145\/1352533.1352548"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1002\/9780470515181"},{"year":"0","key":"ref20"},{"year":"0","key":"ref22"},{"year":"0","key":"ref21"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1145\/586115.586117"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1016\/S1570-8705(03)00008-8"},{"key":"ref26","article-title":"PIKE: Peer intermediaries for key establishment in sensor networks","author":"chan","year":"2005","journal-title":"INFOCOM"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1023\/A:1026039503225"}],"event":{"name":"2012 Ninth European Dependable Computing Conference (EDCC)","start":{"date-parts":[[2012,5,8]]},"location":"Sibiu","end":{"date-parts":[[2012,5,11]]}},"container-title":["2012 Ninth European Dependable Computing Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6214741\/6214743\/06214765.pdf?arnumber=6214765","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T17:45:19Z","timestamp":1490118319000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6214765\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,5]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/edcc.2012.23","relation":{},"subject":[],"published":{"date-parts":[[2012,5]]}}}