{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T03:07:22Z","timestamp":1773457642564,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":33,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540333760","type":"print"},{"value":"9783540333777","type":"electronic"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11734666_9","type":"book-chapter","created":{"date-parts":[[2006,3,9]],"date-time":"2006-03-09T12:10:32Z","timestamp":1141906232000},"page":"104-118","source":"Crossref","is-referenced-by-count":105,"title":["Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Alexander","family":"Becher","sequence":"first","affiliation":[]},{"given":"Zinaida","family":"Benenson","sequence":"additional","affiliation":[]},{"given":"Maximillian","family":"Dornseif","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","volume-title":"Security Engineering: A Guide to Building Dependable Distributed Systems","author":"R.J. Anderson","year":"2001","unstructured":"Anderson, R.J.: Security Engineering: A Guide to Building Dependable Distributed Systems. John Wiley & Sons, Inc., Chichester (2001)"},{"key":"9_CR2","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/BFb0028165","volume-title":"Proceedings of the 5th International Workshop on Security Protocols","author":"R.J. Anderson","year":"1998","unstructured":"Anderson, R.J., Kuhn, M.G.: Low cost attacks on tamper resistant devices. In: Proceedings of the 5th International Workshop on Security Protocols, pp. 125\u2013136. Springer, London (1998)"},{"key":"9_CR3","unstructured":"Atmel Corp. AT45DB041B datasheet. Atmel document no. 3443, available at: http:\/\/www.atmel.com\/dyn\/resources\/prod_documents\/doc3443.pdf"},{"key":"9_CR4","unstructured":"Atmel Corp. ATmega128 datasheet. Atmel document no. 2467, available at: http:\/\/www.atmel.com\/dyn\/resources\/prod_documents\/doc2467.pdf"},{"key":"9_CR5","unstructured":"FU Berlin. ScatterWeb Embedded Sensor Board, Online at: http:\/\/www.inf.fu-berlin.de\/inst\/ag-tech\/scatterweb_net\/esb\/"},{"key":"9_CR6","unstructured":"Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: IEEE Symposium on Security and Privacy, May 2003, pp. 197\u2013213 (2003)"},{"key":"9_CR7","unstructured":"Chipcon AS. CC1000 datasheet, Available at: http:\/\/www.chipcon.com\/files\/CC1000_Data_Sheet_2_3.pdf"},{"key":"9_CR8","unstructured":"Chipcon AS. CC2420 datasheet, Available at: http:\/\/www.chipcon.com\/files\/CC2420_Data_Sheet_1_2.pdf"},{"key":"9_CR9","unstructured":"Crossbow, Inc. MICA2 data sheet, Available at: http:\/\/www.xbow.com\/Products\/Product_pdf_files\/Wireless_pdf\/MICA2_Datasheet.pdf"},{"key":"9_CR10","unstructured":"Crossbow, Inc. MPR, MIB user\u2019s manual, Available at: http:\/\/www.xbow.com\/Support\/Support_pdf_files\/MPR-MIB_Series_Users_Manual.pdf"},{"key":"9_CR11","volume-title":"Secure Coding: Principles and Practices","author":"M.G. Graff","year":"2003","unstructured":"Graff, M.G., van Wyk, K.R.: Secure Coding: Principles and Practices. O\u2019Reilly & Associates, Inc., Sebastopol (2003)"},{"key":"9_CR12","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1145\/1029102.1029111","volume-title":"SASN 2004: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks","author":"J. Hwang","year":"2004","unstructured":"Hwang, J., Kim, Y.: Revisiting random key pre-distribution schemes for wireless sensor networks. In: SASN 2004: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, pp. 43\u201352. ACM Press, New York (2004)"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Karlof, C., Sastry, N., Wagner, D.: TinySec: A link layer security architecture for wireless sensor networks. In: Second ACM Conference on Embedded Networked Sensor Systems (SensSys 2004) (November 2004)","DOI":"10.1145\/1031495.1031515"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: Attacks and countermeasures. Elsevier\u2019s Ad Hoc Network Journal, Special Issue on Sensor Network Applications and Protocols (September 2003)","DOI":"10.1016\/S1570-8705(03)00008-8"},{"key":"9_CR15","unstructured":"Martin, G.: An evaluation of ad-hoc routing protocols for wireless sensor networks. Master\u2019s thesis, University of Newcastle upon Tyne (May 2004)"},{"key":"9_CR16","volume-title":"Building Secure Software: How to Avoid Security Problems the Right Way","author":"G. McGraw","year":"2001","unstructured":"McGraw, G., Viega, J.: Building Secure Software: How to Avoid Security Problems the Right Way. Addison-Wesley, Reading (2001)"},{"key":"9_CR17","unstructured":"Microchip Technology. 24AA64\/24LC64 datasheet, Available at: http:\/\/ww1.microchip.com\/downloads\/en\/DeviceDoc\/21189K.pdf"},{"key":"9_CR18","unstructured":"RF Monolithics. TR1001 datasheet, Available at: http:\/\/www.rfm.com\/products\/data\/tr1001.pdf"},{"key":"9_CR19","unstructured":"moteiv Corp. Telos revision B datasheet, Available at: http:\/\/www.moteiv.com\/products\/docs\/telos-revb-datasheet.pdf"},{"key":"9_CR20","unstructured":"moteiv Corp. Tmote Sky datasheet, Available at: http:\/\/www.moteiv.com\/products\/docs\/tmote-sky-datasheet.pdf"},{"key":"9_CR21","unstructured":"http:\/\/mspgcc.sourceforge.net\/"},{"key":"9_CR22","doi-asserted-by":"crossref","first-page":"702","DOI":"10.1145\/1062455.1062626","volume-title":"ICSE 2005: Proceedings of the 27th international conference on Software engineering","author":"H. Peine","year":"2005","unstructured":"Peine, H.: Rules of thumb for secure software engineering. In: ICSE 2005: Proceedings of the 27th international conference on Software engineering, pp. 702\u2013703. ACM Press, New York (2005)"},{"issue":"6","key":"9_CR23","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1145\/990680.990707","volume":"47","author":"A. Perrig","year":"2004","unstructured":"Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Commun. ACM\u00a047(6), 53\u201357 (2004)","journal-title":"Commun. ACM"},{"key":"9_CR24","doi-asserted-by":"crossref","unstructured":"Shi, E., Perrig, A.: Designing secure sensor networks. IEEE Wireless Communications\u00a011(6) (December 2004)","DOI":"10.1109\/MWC.2004.1368895"},{"key":"9_CR25","unstructured":"Skorobogatov, S.P.: Semi-invasive attacks - a new approach to hardware security analysis. Technical report, University of Cambridge, Computer Laboratory, April, Technical Report UCAM-CL-TR-630 (2005)"},{"key":"9_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/3-540-36400-5_2","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"S.P. Skorobogatov","year":"2003","unstructured":"Skorobogatov, S.P., Anderson, R.J.: Optical fault induction attacks. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 2\u201312. Springer, Heidelberg (2003)"},{"key":"9_CR27","unstructured":"STMicroelectronics. M25P80 datasheet, Available at: http:\/\/www.st.com\/stonline\/products\/literature\/ds\/8495.pdf"},{"key":"9_CR28","unstructured":"Texas Instruments. Features of the MSP430 bootstrap loader (rev. B). TI Application note SLAA089B, available at: http:\/\/www-s.ti.com\/sc\/psheets\/slaa089b\/slaa089b.pdf"},{"key":"9_CR29","unstructured":"Texas Instruments. MSP430 F149 datasheet, Available at: http:\/\/www-s.ti.com\/sc\/ds\/msp430f149.pdf"},{"key":"9_CR30","unstructured":"Texas Instruments. MSP430 F1611 datasheet, Available at: http:\/\/www-s.ti.com\/sc\/ds\/msp430f1611.pdf"},{"key":"9_CR31","unstructured":"Texas Instruments. MSP430x1xx family: User\u2019s guide. TI Application note SLAU049E, available at: http:\/\/www-s.ti.com\/sc\/psheets\/slau049e\/slau049e.pdf"},{"key":"9_CR32","volume-title":"Secure Programming Cookbook for C and C++","author":"J. Viega","year":"2003","unstructured":"Viega, J., Messier, M., Spafford, G.: Secure Programming Cookbook for C and C++. O\u2019Reilly & Associates, Inc., Sebastopol (2003)"},{"key":"9_CR33","series-title":"Lecture Notes in Computer Science","volume-title":"Tagungsband INFORMATIK 2005, Workshop Proceedings","author":"H. Vogt","year":"2005","unstructured":"Vogt, H., Ringwald, M., Strasser, M.: Intrusion detection and failure recovery in sensor nodes. In: Tagungsband INFORMATIK 2005, Workshop Proceedings. LNCS, Springer, Heidelberg, Germany (2005)"}],"container-title":["Lecture Notes in Computer Science","Security in Pervasive Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11734666_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,7]],"date-time":"2025-01-07T23:40:19Z","timestamp":1736293219000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11734666_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540333760","9783540333777"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/11734666_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006]]}}}