{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T15:13:50Z","timestamp":1743002030261,"version":"3.40.3"},"publisher-location":"New York, NY","reference-count":68,"publisher":"Springer New York","isbn-type":[{"type":"print","value":"9781461479147"},{"type":"electronic","value":"9781461479154"}],"license":[{"start":{"date-parts":[[2013,9,13]],"date-time":"2013-09-13T00:00:00Z","timestamp":1379030400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,9,13]],"date-time":"2013-09-13T00:00:00Z","timestamp":1379030400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-1-4614-7915-4_14","type":"book-chapter","created":{"date-parts":[[2013,9,12]],"date-time":"2013-09-12T08:10:18Z","timestamp":1378973418000},"page":"335-350","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Wireless Sensor Nodes"],"prefix":"10.1007","author":[{"given":"Serge","family":"Chaumette","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Damien","family":"Sauveron","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2013,9,13]]},"reference":[{"key":"14_CR1","unstructured":"3eti: Company overview http:\/\/www.ultra-3eti.com\/assets\/1\/7\/3eTI_-_Company_Overview_(07--26-2011).pdf"},{"key":"14_CR2","unstructured":"Datasheet of energyguard appliance 3e\u2013723 http:\/\/www.ultra-3eti.com\/assets\/1\/7\/3e-723_EnergyGuard.pdf"},{"key":"14_CR3","unstructured":"Energyguard appliance 3e\u2013723 webpage product http:\/\/www.ultra-3eti.com\/products\/sensor_networks\/energyguard_appliance\/"},{"key":"14_CR4","unstructured":"Globalsecurity.org. sound surveillance system (sosus). http:\/\/www.globalsecurity.org\/intell\/systems\/sosus.htm"},{"key":"14_CR5","unstructured":"Largest tiny network yet (2001). http:\/\/webs.cs.berkeley.edu\/800demo\/"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Secure routing in wireless sensor networks: attacks and countermeasures (2003). doi: 10.1109\/SNPA.2003.1203362. http:\/\/dx.doi.org\/10.1109\/SNPA.2003.1203362","DOI":"10.1109\/SNPA.2003.1203362"},{"key":"14_CR7","unstructured":"Integrated smart sensing systems (2007). http:\/\/dpi.projectforum.com\/isss\/11"},{"issue":"4","key":"14_CR8","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1016\/S1389-1286(01)00302-4","volume":"38","author":"I. Akyildiz","year":"2002","unstructured":"Akyildiz, I., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Computer Networks 38(4), 393\u2013422 (2002). doi: 10.1016\/S1389-1286(01)00302-4. http:\/\/www.sciencedirect.com\/science\/article\/pii\/S1389128601003024","journal-title":"Computer Networks"},{"key":"14_CR9","unstructured":"Anjum, F., Sarkar, S.: Security in sensor networks. In: Mobile, Wireless and Sensor Networks: Technology, Applications and Future Directions. John Wiley & Sons."},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Becher, E., Benenson, Z., Dornseif, M.: Tampering with motes: Real-world physical attacks on wireless sensor networks. In: in 3rd International Conference on Security in Pervasive Computing (SPC (2006).","DOI":"10.1007\/11734666_9"},{"key":"14_CR11","unstructured":"Benenson, Z., Cholewinski, P.M., Freiling, F.C.: Vulnerabilities and attacks in wireless sensor networks. Wireless Sensors Networks Security pp. 22\u201343 (2007). http:\/\/www1.informatik.uni-erlangen.de\/filepool\/publications\/zina\/attacker-models-bookchapterIOS_Press.pdf"},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Bialas, A.: Common criteria related security design patterns alidation on the intelligent sensor example designed for mine environment. Sensors 10(5), 4456\u20134496 (2010). doi: 10.3390\/s100504456. http:\/\/www.mdpi.com\/1424-8220\/10\/5\/4456\/","DOI":"10.3390\/s100504456"},{"issue":"1","key":"14_CR13","doi-asserted-by":"crossref","first-page":"822","DOI":"10.3390\/s100100822","volume":"10","author":"A. Bialas","year":"2010","unstructured":"Bialas, A.: Intelligent sensors security. Sensors 10(1), 822\u2013859 (2010). doi: 10.3390\/s100100822. http:\/\/www.mdpi.com\/1424-8220\/10\/1\/822\/","journal-title":"Sensors"},{"key":"14_CR14","unstructured":"Bisscheroux, M.: Largest deployment of myrianed wireless nodes (2010). http:\/\/wsn.chess.nl\/?p=50"},{"issue":"5","key":"14_CR15","first-page":"10","volume":"7","author":"P. Bonnet","year":"2000","unstructured":"Bonnet, P., Gehrke, J.E., Seshadri, P.: Querying the physical world. IEEE Journal of Selected Areas in Communications 7(5),10\u201315 (2000).","journal-title":"IEEE Journal of Selected Areas in Communications"},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"Burrell, J., Brooke, T., Beckwith, R.: Sensor and actuator networks- Vineyard computing: sensor networks in agricultural production. IEEE Pervasive Computing 3(1), 38\u201345 (2004). doi: http:\/\/dx.doi.org\/10.1109\/MPRV.2004.1269130","DOI":"10.1109\/MPRV.2004.1269130"},{"key":"14_CR17","doi-asserted-by":"crossref","unstructured":"Cao, Q., Abdelzaher, T.: liteos: a lightweight operating system for c++ software development in sensor networks. In: Proceedings of the 4th international conference on Embedded networked sensor systems, SenSys \u201906, pp. 361\u2013362. ACM, New York, NY, USA (2006). doi: http:\/\/doi.acm.org\/10.1145\/1182807.1182855.","DOI":"10.1145\/1182807.1182855"},{"key":"14_CR18","unstructured":"Carman, D.W., Kruus, P.S., Matt, B.J.: Constraints and approaches for distributed sensor network security. Tech. Rep. 010, NAI Labs, The Security Research Division Network Associates, Inc. (2000). http:\/\/www.cs.umbc.edu\/courses\/graduate\/CMSC691A\/Spring04\/papers\/nailabs_report_00-010_final.pdf"},{"key":"14_CR19","doi-asserted-by":"crossref","unstructured":"Castelluccia, C., Francillon, A., Perito, D., Soriente, C.: On the difficulty of software-based attestation of embedded devices. In: Proceedings of the 16th ACM conference on Computer and communications security, CCS \u201909, pp. 400\u2013409. ACM, New York, NY, USA (2009). doi: http:\/\/doi.acm.org\/10.1145\/1653662.1653711.","DOI":"10.1145\/1653662.1653711"},{"key":"14_CR20","unstructured":"Chandrakasan, A., Amirtharajah, R., Cho, S., Goodman, J., Konduri, G., Kulik, J., Rabiner, W., Wang, A.: Design considerations for distributed micro-sensor systems. In: Proceedings of the IEEE 1999 Custom Integrated Circuits Conference, pp. 279-286 (1999)."},{"key":"14_CR21","doi-asserted-by":"crossref","unstructured":"Chatzigiannakis, I., Fischer, S., Koninis, C., Mylonas, G., Pfisterer, D.: Wisebed: An open large-scale wireless sensor network testbed (2010). http:\/\/dx.doi.org\/10.1007\/978-3-642-11870-8_6.10.1007\/978-3-642-11870-8_6","DOI":"10.1007\/978-3-642-11870-8_6"},{"issue":"5","key":"14_CR22","doi-asserted-by":"crossref","first-page":"3315","DOI":"10.1121\/1.410808","volume":"96","author":"C.W. Clark","year":"1994","unstructured":"Clark, C.W., Mellinger, D.K.: Application of navy iuss for whale research. The Journal of the Acoustical Society of America 96(5), 3315\u20133315 (1994). doi: 10.1121\/1.410808. http:\/\/link.aip.org\/link\/?JAS\/96\/3315\/1","journal-title":"The Journal of the Acoustical Society of America"},{"key":"14_CR23","doi-asserted-by":"crossref","unstructured":"Crow, B., Widjaja, I., Kim, J., Sakai, P.: IEEE 802.11 Wireless Local Area Networks. IEEE Communications Magazine pp. 116\u2013126 (1997).","DOI":"10.1109\/35.620533"},{"key":"14_CR24","doi-asserted-by":"crossref","unstructured":"Dargie, W., Poellabauer, C.: Fundamentals of Wireless Sensor Networks: Theory and Practice. Wireless Communications and Mobile Computing. Wiley (2010). http:\/\/books.google.fr\/books?id=8c6k0EVr6rMC","DOI":"10.1002\/9780470666388"},{"key":"14_CR25","doi-asserted-by":"crossref","unstructured":"Deng, J., Han, R., Mishra, S.: A performance evaluation of intrusion-tolerant routing in wireless sensor networks. In: Proceedings of the 2nd international conference on Information processing in sensor networks, IPSN\u201903, pp. 349\u2013364. Springer-Verlag, Berlin, Heidelberg (2003). http:\/\/dl.acm.org\/citation.cfm?id=1765991.1766015","DOI":"10.1007\/3-540-36978-3_23"},{"key":"14_CR26","doi-asserted-by":"crossref","unstructured":"Dunkels, A., Gronvall, B., Voigt, T.: Contiki - a lightweight and flexible operating system for tiny networked sensors. In: Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks, LCN \u201904, pp. 455\u2013462. IEEE Computer Society, Washington, DC, USA (2004). doi: http:\/\/dx.doi.org\/10.1109\/LCN.2004.38.","DOI":"10.1109\/LCN.2004.38"},{"key":"14_CR27","doi-asserted-by":"crossref","unstructured":"Eagles, K., Markantonakis, K., Mayes, K.: A comparative analysis of common threats, vulnerabilities, attacks and countermeasures within smart card and wireless sensor network node technologies. In: Proceedings of the 1st IFIP TC6 \/WG8.8 \/WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems, WISTP\u201907, pp. 161\u2013174. Springer-Verlag, Berlin, Heidelberg (2007). http:\/\/dl.acm.org\/citation.cfm?id=1763190.1763209","DOI":"10.1007\/978-3-540-72354-7_14"},{"key":"14_CR28","doi-asserted-by":"crossref","unstructured":"Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: In Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 41\u201347. ACM Press (2002).","DOI":"10.1145\/586110.586117"},{"key":"14_CR29","unstructured":"Farahani, S.: ZigBee Wireless Networks and Transceivers. Newnes, Newton, MA, USA (2008)."},{"key":"14_CR30","doi-asserted-by":"crossref","unstructured":"Francillon, A., Castelluccia, C.: Code injection attacks on harvard-architecture devices. In: Proceedings of the 15th ACM conference on Computer and communications security, CCS \u201908, pp. 15\u201326. ACM, New York, NY, USA (2008). doi: http:\/\/doi.acm.org\/10.1145\/1455770.1455775. http:\/\/doi.acm.org\/10.1145\/1455770.1455775","DOI":"10.1145\/1455770.1455775"},{"key":"14_CR31","doi-asserted-by":"crossref","unstructured":"Francillon, A., Castelluccia, C., Perito, D., Soriente, C.: Comments on efutation of on the difficulty of software-based attestation of embedded devices (2010).","DOI":"10.1145\/1653662.1653711"},{"key":"14_CR32","doi-asserted-by":"crossref","unstructured":"Frank, R.: Understanding Smart Sensors. Measurement Science and Technology 11(12), 1830 (2000). doi: http:\/\/dx.doi.org\/10.1088\/0957-0233\/11\/12\/711","DOI":"10.1088\/0957-0233\/11\/12\/711"},{"key":"14_CR33","doi-asserted-by":"crossref","unstructured":"Gay, D., Levis, P., Culler, D.: Software design patterns for tinyos. ACM Trans. Embed. Comput. Syst. 6 (2007). doi: http:\/\/doi.acm.org\/10.1145\/1274858.1274860.","DOI":"10.1145\/1274858.1274860"},{"key":"14_CR34","unstructured":"Goodspeed, T.: Exploiting wireless sensor networks over 802.15.4. In: ToorCon 9 (2007)."},{"key":"14_CR35","unstructured":"Gu, Q., Noorani, R.: Towards self-propagate mal-packets in sensor networks. In: Proceedings of the first ACM conference on Wireless network security, WiSec \u201908, pp. 172\u2013182. ACM, New York, NY, USA (2008). doi: http:\/\/doi.acm.org\/10.1145\/1352533.1352563. http:\/\/doi.acm.org\/10.1145\/1352533.1352563"},{"key":"14_CR36","doi-asserted-by":"crossref","unstructured":"Han, C.C., Kumar, R., Shea, R., Kohler, E., Srivastava, M.: A dynamic operating system for sensor nodes. In: Proceedings of the 3rd international conference on Mobile systems, applications, and services, MobiSys \u201905, pp. 163\u2013176. ACM, New York, NY, USA (2005). doi: http:\/\/doi.acm.org\/10.1145\/1067170.1067188.","DOI":"10.1145\/1067170.1067188"},{"key":"14_CR37","doi-asserted-by":"crossref","unstructured":"Hefeeda, M., Bagheri, M.: Wireless sensor networks for early detection of forest fires. In: IEEE 4th International Conference on Mobile Adhoc and Sensor Systems, MASS 2007, 8\u201311 October 2007, Pisa, Italy, pp. 1\u20136. IEEE (2007). doi: http:\/\/dx.doi.org\/10.1109\/MOBHOC.2007.4428702","DOI":"10.1109\/MOBHOC.2007.4428702"},{"key":"14_CR38","unstructured":"Heukoop, C.V.: Alwen 1000 node experiment. In: Elektronica (2010). http:\/\/wsn.chess.nl\/wp-content\/uploads\/2010\/02\/AlwEN-1000node-exp-Elektronica-janfeb2010.pdf"},{"key":"14_CR39","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1806895.1806900","volume":"7","author":"W. Hu","year":"2010","unstructured":"Hu, W., Tan, H., Corke, P., Shih, W.C., Jha, S.: Toward trusted wireless sensor networks. ACM Trans. Sen. Netw. 7, 5:1\u20135:25 (2010). doi: http:\/\/doi.acm.org\/10.1145\/1806895.1806900.","journal-title":"ACM Trans. Sen. Netw."},{"key":"14_CR40","doi-asserted-by":"crossref","unstructured":"Hu, Y.C., Perrig, A., Johnson, D.B.: Rushing attacks and defense in wireless ad hoc network routing protocols. In: Proceedings of the 2nd ACM workshop on Wireless security, WiSe \u201903, pp. 30\u201340. ACM, New York, NY, USA (2003). doi: http:\/\/doi.acm.org\/10.1145\/941311.941317. http:\/\/doi.acm.org\/10.1145\/941311.941317","DOI":"10.1145\/941311.941317"},{"issue":"2","key":"14_CR41","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1177\/1357633X9600200207","volume":"2","author":"P. Johnson","year":"1996","unstructured":"Johnson, P., Andrews, D.C.: Remote continuous physiological monitoring in the home. Journal of Telemedicine and Telecare 2(2), 107\u2013113 (1996).","journal-title":"Journal of Telemedicine and Telecare"},{"key":"14_CR42","doi-asserted-by":"crossref","unstructured":"Juang, P., Oki, H., Wang, Y., Martonosi, M., Peh, L.S., Rubenstein, D.: Energy-efficient computing for wildlife tracking: design tradeoffs and early experiences with zebranet. SIGPLAN Not. 37, 96\u2013107 (2002). doi: http:\/\/doi.acm.org\/10.1145\/605432.605408. http:\/\/doi.acm.org\/10.1145\/605432.605408","DOI":"10.1145\/605432.605408"},{"key":"14_CR43","unstructured":"Kumar, S., Shepherd, D.: SensIT: Sensor Information Technology for the warfighter. In: Proceedings of the 4th Conference on Information Fusion, pp. 3\u20139. Montreal, Canada (2001)."},{"key":"14_CR44","doi-asserted-by":"crossref","unstructured":"Larsson, A.: Report on the state of the art of security in sensor, networks (2011).","DOI":"10.1109\/EC2ND.2011.13"},{"key":"14_CR45","unstructured":"Lee, K.: Ieee 1451: A standard in support of smart transducer networking. In: Proceedings of IEEE Instrumentation and Measurement, vol. 2, pp. 525\u2013528. IEEE (2000). http:\/\/ieeexplore.ieee.org\/xpl\/freeabs_all.jsp?arnumber=848791"},{"key":"14_CR46","doi-asserted-by":"crossref","unstructured":"Lennvall, T., Svensson, S., Hekland, F.: A comparison of WirelessHART and ZigBee for industrial applications. In: Factory Communication Systems, 2008. WFCS 2008. IEEE International Workshop on, pp. 85\u201388 (2008). doi: http:\/\/dx.doi.org\/10.1109\/WFCS.2008.4638746","DOI":"10.1109\/WFCS.2008.4638746"},{"key":"14_CR47","doi-asserted-by":"crossref","unstructured":"Li, Y., McCune, J.M., Perrig, A.: Viper: verifying the integrity of peripherals\u2019 firmware. In: Proceedings of the 18th ACM conference on Computer and communications security, CCS \u201911, pp. 3\u201316. ACM, New York, NY, USA (2011). doi: http:\/\/doi.acm.org\/10.1145\/2046707.2046711","DOI":"10.1145\/2046707.2046711"},{"key":"14_CR48","doi-asserted-by":"crossref","unstructured":"Lopez, J., Roman, R., Alcaraz, C.: Analysis of security threats, requirements, technologies and standards in wireless sensor networks. In: A. Aldini, G. Barthe, R. Gorrieri (eds.) Foundations of Security Analysis and Design V, Lecture Notes in Computer Science, vol. 5705, pp. 289\u2013338. Springer Berlin\/Heidelberg (2009). http:\/\/dx.doi.org\/10.1007\/978-3-642-03829-7_10.","DOI":"10.1007\/978-3-642-03829-7_10"},{"key":"14_CR49","doi-asserted-by":"crossref","unstructured":"Mainwaring, A., Culler, D., Polastre, J., Szewczyk, R., Anderson, J.: Wireless sensor networks for habitat monitoring. In: Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications, WSNA \u201902, pp. 88\u201397. ACM, New York, NY, USA (2002). doi: http:\/\/doi.acm.org\/10.1145\/570738.570751.","DOI":"10.1145\/570738.570751"},{"issue":"7","key":"14_CR50","doi-asserted-by":"crossref","first-page":"823","DOI":"10.1002\/wcm.499","volume":"7","author":"K. Mills","year":"2007","unstructured":"Mills, K.: A brief survey of self-organization in wireless sensor networks. Wireless Communications and Mobile Computing 7(7), 823\u2013834 (2007).","journal-title":"Wireless Communications and Mobile Computing"},{"issue":"4","key":"14_CR51","first-page":"13","volume":"27","author":"C.E. Nishimura","year":"1994","unstructured":"Nishimura, C.E., Conlon, D.M.: Iuss dual use: Monitoring whales and earthquakes using sosus. Marine Technology Society Journal 27(4), 13\u201321 (1994).","journal-title":"Marine Technology Society Journal"},{"key":"14_CR52","unstructured":"Perrig, A., van Doorn, L.: Refutation of n the Difficulty of Software-Based Attestation of Embedded Devices (2010). http:\/\/sparrow.ece.cmu.edu\/group\/pub\/perrig-vandoorn-refutation.pdf"},{"key":"14_CR53","doi-asserted-by":"crossref","unstructured":"Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. COMMUNICATIONS OF THE ACM 47(6), 53\u201357 (2004).","DOI":"10.1145\/990680.990707"},{"key":"14_CR54","doi-asserted-by":"crossref","unstructured":"Rabaey, J.M., Ammer, M.J., da Silva, J.L., Patel, D., Roundy, S.: Picoradio supports ad hoc ultra-low power wireless networking. Computer 33, 42\u201348 (2000). doi: 10.1109\/2.869369. http:\/\/dl.acm.org\/citation.cfm?id=619053.621512","DOI":"10.1109\/2.869369"},{"key":"14_CR55","doi-asserted-by":"crossref","unstructured":"Roundy, S., Steingart, D., Frechette, L., Wright, P., Rabaey, J.: Power Sources for Wireless Sensor Networks. pp. 1\u201317 (2004). http:\/\/www.springerlink.com\/content\/b0utgm8ahnphll3l","DOI":"10.1007\/978-3-540-24606-0_1"},{"issue":"11","key":"14_CR56","doi-asserted-by":"crossref","first-page":"1131","DOI":"10.1016\/S0140-3664(02)00248-7","volume":"26","author":"S. Roundy","year":"2003","unstructured":"Roundy, S., Wright, P.K., Rabaey, J.: A study of low level vibrations as a power source for wireless sensor nodes. Computer Communications 26(11), 1131\u20131144 (2003). doi: http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0140366402002487","journal-title":"Computer Communications"},{"key":"14_CR57","doi-asserted-by":"crossref","unstructured":"Seshadri, A., Luk, M., Perrig, A., Doorn, L., Khosla, P.: Scuba: Secure code update by attestation in sensor networks. In: in Proceedings of ACM Workshop on Wireless Security (WiSe6). ACM, pp. 85\u201394. Press (2006).","DOI":"10.1145\/1161289.1161306"},{"key":"14_CR58","unstructured":"Seshadri, A., Perrig, A., Doorn, L.V., Khosla, P.: Swatt: Software-based attestation for embedded devices. In: In Proceedings of the IEEE Symposium on Security and Privacy (2004)."},{"key":"14_CR59","doi-asserted-by":"crossref","unstructured":"Shih, E., Bahl, P., Sinclair, M.J.: Wake on wireless: an event driven energy saving strategy for battery operated devices. In: MobiCom \u201902: Proceedings of the 8th annual international conference on Mobile computing and networking, pp. 160\u2013171. ACM, New York, NY, USA (2002). doi: http:\/\/dx.doi.org\/10.1145\/570645.570666","DOI":"10.1145\/570645.570666"},{"key":"14_CR60","doi-asserted-by":"crossref","unstructured":"Shih, E., Cho, S.H., Ickes, N., Min, R., Sinha, A., Wang, A., Chandrakasan, A.: Physical layer driven protocol and algorithm design for energy-efficient wireless sensor networks. In: Proceedings of the 7th annual international conference on Mobile computing and networking, MobiCom \u201901, pp. 272\u2013287. ACM, New York, NY, USA (2001). doi: http:\/\/doi.acm.org\/10.1145\/381677.381703.","DOI":"10.1145\/381677.381703"},{"key":"14_CR61","doi-asserted-by":"crossref","unstructured":"Simon, G., Mar\u00f3ti, M., L\u00e9deczi, A., Balogh, G., Kusy, B., N\u00e1das, A., Pap, G., Sallai, J., Frampton, K.: Sensor network-based countersniper system. In: Proceedings of the 2nd international conference on Embedded networked sensor systems, SenSys \u201904, pp. 1\u201312. ACM, New York, NY, USA (2004). doi: http:\/\/doi.acm.org\/10.1145\/1031495.1031497.","DOI":"10.1145\/1031495.1031497"},{"key":"14_CR62","doi-asserted-by":"crossref","unstructured":"Song, J., Han, S., Mok, A., Chen, D., Lucas, M., Nixon, M., Pratt, W.: Wirelesshart: Applying wireless technology in real-time industrial process control. In: Proceedings of the 2008 IEEE Real-Time and Embedded Technology and Applications Symposium, pp. 377\u2013386. IEEE Computer Society, Washington, DC, USA (2008). doi: 10.1109\/RTAS.2008.15. http:\/\/dl.acm.org\/citation.cfm?id=1440456.1440604","DOI":"10.1109\/RTAS.2008.15"},{"key":"14_CR63","doi-asserted-by":"crossref","unstructured":"Song, J., Han, S., Mok, A.K., Chen, D., Lucas, M., Nixon, M.: WirelessHART: Applying Wireless Technology in Real-Time Industrial Process Control. In: Real-Time and Embedded Technology and Applications Symposium, 2008. RTAS \u201908. IEEE, vol. 0, pp. 377\u2013386. IEEE, Los Alamitos, CA, USA (2008). doi: http:\/\/dx.doi.org\/10.1109\/RTAS.2008.15","DOI":"10.1109\/RTAS.2008.15"},{"key":"14_CR64","unstructured":"Surhone, L., Tennoe, M., Henssonow, S.: Isa100.11a. VDM Verlag Dr. Mueller AG & Co. Kg (2010). http:\/\/books.google.fr\/books?id=F_BMYgEACAAJ"},{"key":"14_CR65","doi-asserted-by":"crossref","unstructured":"Werner-Allen, G., Johnson, J., Ruiz, M., Lees, J., Welsh, M.: Monitoring volcanic eruptions with a wireless sensor network. In: Wireless Sensor Networks, 2005. Proceeedings of the Second European Workshop on, pp. 108\u2013120. IEEE (2005). doi: http:\/\/dx.doi.org\/10.1109\/EWSN.2005.1462003","DOI":"10.1109\/EWSN.2005.1462003"},{"key":"14_CR66","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1109\/MC.2002.1039518","volume":"35","author":"A.D. Wood","year":"2002","unstructured":"Wood, A.D., Stankovic, J.A.: Denial of service in sensor networks. Computer 35, 54\u201362 (2002). doi: http:\/\/dx.doi.org\/10.1109\/MC.2002.1039518.","journal-title":"Computer"},{"key":"14_CR67","doi-asserted-by":"crossref","unstructured":"Wright, R., Flynn, L., Garbeil, H., Harris, A., Pilger, E.: Automated volcanic eruption detection using MODIS. Remote Sensing of Environment 82(1), 135\u2013155 (2002). doi: http:\/\/dx.doi.org\/10.1016\/S0034-4257(02)00030-5","DOI":"10.1016\/S0034-4257(02)00030-5"},{"key":"14_CR68","doi-asserted-by":"crossref","unstructured":"Ye, W., Heidemann, J., Estrin, D.: Medium access control with coordinated adaptive sleeping for wireless sensor networks. IEEE\/ACM Trans. Netw. 12, 493\u2013506 (2004). doi: http:\/\/dx.doi.org\/10.1109\/TNET.2004.828953.","DOI":"10.1109\/TNET.2004.828953"}],"container-title":["Secure Smart Embedded Devices, Platforms and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4614-7915-4_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,14]],"date-time":"2023-02-14T02:18:02Z","timestamp":1676341082000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-1-4614-7915-4_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9,13]]},"ISBN":["9781461479147","9781461479154"],"references-count":68,"URL":"https:\/\/doi.org\/10.1007\/978-1-4614-7915-4_14","relation":{},"subject":[],"published":{"date-parts":[[2013,9,13]]},"assertion":[{"value":"13 September 2013","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}