{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T16:52:49Z","timestamp":1743007969792,"version":"3.40.3"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031541285"},{"type":"electronic","value":"9783031541292"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-54129-2_12","type":"book-chapter","created":{"date-parts":[[2024,3,11]],"date-time":"2024-03-11T22:03:15Z","timestamp":1710194595000},"page":"198-213","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["DETONAR-Light: An IoT Network Intrusion Detection Using DETONAR without a\u00a0Sniffer Network"],"prefix":"10.1007","author":[{"given":"Victoria","family":"Bull","sequence":"first","affiliation":[]},{"given":"Niclas","family":"Finne","sequence":"additional","affiliation":[]},{"given":"Andrea","family":"Agiollo","sequence":"additional","affiliation":[]},{"given":"Pallavi","family":"Kaliyar","sequence":"additional","affiliation":[]},{"given":"Luca","family":"Pajola","sequence":"additional","affiliation":[]},{"given":"Thiemo","family":"Voigt","sequence":"additional","affiliation":[]},{"given":"Mauro","family":"Conti","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,12]]},"reference":[{"key":"12_CR1","unstructured":"Tetcos netsim iot\/wsn library documentation. https:\/\/tetcos.com\/help\/v13.2\/Technology-Libraries\/IoT-WSN.html. Accessed 02 Dec 2022"},{"key":"12_CR2","doi-asserted-by":"publisher","first-page":"1178","DOI":"10.1109\/TNSM.2021.3075496","volume":"18","author":"A Agiollo","year":"2021","unstructured":"Agiollo, A., Conti, M., Kaliyar, P., Lin, T., Pajola, L.: Detonar: detection of routing attacks in RPL-based IoT. IEEE Trans. Network Serv. Manage. 18, 1178\u20131190 (2021)","journal-title":"IEEE Trans. Network Serv. Manage."},{"key":"12_CR3","doi-asserted-by":"publisher","first-page":"860","DOI":"10.1016\/j.future.2018.03.021","volume":"93","author":"D Airehrour","year":"2019","unstructured":"Airehrour, D., Gutierrez, J.A., Ray, S.K.: Sectrust-RPL: a secure trust-aware RPL routing protocol for internet of things. Futur. Gener. Comput. Syst. 93, 860\u2013876 (2019)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"12","key":"12_CR4","first-page":"12481","volume":"119","author":"BA Alabsi","year":"2018","unstructured":"Alabsi, B.A., Anbar, M., Anickam, S.: A comprehensive review on security attacks in dynamic wireless sensor networks based on RPL protocol. Int. J. Pure Appl. Math. 119(12), 12481\u201312495 (2018)","journal-title":"Int. J. Pure Appl. Math."},{"key":"12_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/978-3-319-90415-3_13","volume-title":"Autonomous Control for a Reliable Internet of Services","author":"A Ar\u0131\u015f","year":"2018","unstructured":"Ar\u0131\u015f, A., Oktu\u011f, S.F., Voigt, T.: Security of Internet of Things for a reliable internet of services. In: Ganchev, I., van der Mei, R.D., van den Berg, H. (eds.) Autonomous Control for a Reliable Internet of Services. LNCS, vol. 10768, pp. 337\u2013370. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-90415-3_13"},{"issue":"2","key":"12_CR6","doi-asserted-by":"publisher","first-page":"44:1","DOI":"10.1145\/3494524","volume":"55","author":"AO Bang","year":"2023","unstructured":"Bang, A.O., Rao, U.P., Kaliyar, P., Conti, M.: Assessment of routing attacks and mitigation techniques with RPL control messages: a survey. ACM Comput. Surv. 55(2), 44:1-44:36 (2023)","journal-title":"ACM Comput. Surv."},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Boo, E., Raza, S., Hoglund, J., Ko, J.: FDTLS: supporting DTLS-based combined storage and communication security for IoT devices. In: 2019 IEEE 16th International Conference on Mobile Ad Hoc and Sensor Systems (MASS), pp. 127\u2013135 (2019)","DOI":"10.1109\/MASS.2019.00024"},{"key":"12_CR8","volume-title":"Time Series Analysis: Forecasting and Control","author":"GE Box","year":"2015","unstructured":"Box, G.E., Jenkins, G.M., Reinsel, G.C., Ljung, G.M.: Time Series Analysis: Forecasting and Control. Wiley, Hoboken (2015)"},{"key":"12_CR9","unstructured":"Dunkels, A., Gr\u00f6nvall, B., Voigt, T.: Contiki - a lightweight and flexible operating system for tiny networked sensors. In: Proceedings of the IEEE Workshop on Embedded Networked Sensor Systems (IEEE Emnets), Tampa, Florida, USA (2004)"},{"issue":"4","key":"12_CR10","doi-asserted-by":"publisher","first-page":"1528","DOI":"10.3390\/s21041528","volume":"21","author":"I Essop","year":"2021","unstructured":"Essop, I., Ribeiro, J.C., Papaioannou, M., Zachos, G., Mantas, G., Rodriguez, J.: Generating datasets for anomaly-based intrusion detection systems in IoT and industrial IoT networks. Sensors 21(4), 1528 (2021)","journal-title":"Sensors"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"Finne, N., et al.: Multi-trace: multi-level data trace generation with the COOJA simulator. In: DCOSS (2021)","DOI":"10.1109\/DCOSS52077.2021.00068"},{"issue":"1","key":"12_CR12","doi-asserted-by":"publisher","first-page":"124","DOI":"10.3390\/jcp2010009","volume":"2","author":"PP Ioulianou","year":"2022","unstructured":"Ioulianou, P.P., Vassilakis, V.G., Shahandashti, S.F.: A trust-based intrusion detection system for RPL networks: detecting a combination of rank and blackhole attacks. J. Cybersecur. Privacy 2(1), 124\u2013153 (2022)","journal-title":"J. Cybersecur. Privacy"},{"key":"12_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/978-3-319-15582-1_3","volume-title":"Wireless Sensor Networks","author":"V Iyer","year":"2015","unstructured":"Iyer, V., Hermans, F., Voigt, T.: Detecting and avoiding multiple sources of interference in the 2.4 GHz spectrum. In: Abdelzaher, T., Pereira, N., Tovar, E. (eds.) EWSN 2015. LNCS, vol. 8965, pp. 35\u201351. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-15582-1_3"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Kanwar, J., et al.: Jamsense: interference and jamming classification for low-power wireless networks. In: 13th IFIP Wireless and Mobile Networking Conference (WMNC) (2021)","DOI":"10.23919\/WMNC53478.2021.9619007"},{"key":"12_CR15","series-title":"LNCS","first-page":"214","volume-title":"UbiSec 2021","author":"H Keipour","year":"2022","unstructured":"Keipour, H., Hazra, S., Finne, N., Voigt, T.: Generalizing supervised learning for intrusion detection in IoT mesh networks. In: Wang, G., Choo, K.K.R., Ko, R.K.L., Xu, Y., Crispo, B. (eds.) UbiSec 2021. LNCS, vol. 1557, pp. 214\u2013228. Springer, Cham (2022)"},{"issue":"10","key":"12_CR16","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3740","volume":"30","author":"H Kwon","year":"2019","unstructured":"Kwon, H., Ahn, J., Ko, J.: Lightcert: on designing a lighter certificate for resource-limited internet-of-things devices. Trans. Emerg. Telecommun. Technol. 30(10), e3740 (2019)","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"12_CR17","doi-asserted-by":"crossref","unstructured":"Nadeem, A., et al.: SOK: explainable machine learning for computer security applications. In: 2023 IEEE 8th European Symposium on Security and Privacy (EuroS &P), pp. 221\u2013240. IEEE (2023)","DOI":"10.1109\/EuroSP57164.2023.00022"},{"key":"12_CR18","doi-asserted-by":"publisher","first-page":"16623","DOI":"10.1109\/ACCESS.2018.2798626","volume":"6","author":"MN Napiah","year":"2018","unstructured":"Napiah, M.N., Idris, M.Y.I.B., Ramli, R., Ahmedy, I.: Compression header analyzer intrusion detection system (cha-ids) for 6lowpan communication protocol. IEEE Access 6, 16623\u201316638 (2018)","journal-title":"IEEE Access"},{"key":"12_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.softx.2022.101089","volume":"18","author":"G Oikonomou","year":"2022","unstructured":"Oikonomou, G., Duquennoy, S., Elsts, A., Eriksson, J., Tanaka, Y., Tsiftes, N.: The Contiki-NG open source operating system for next generation IoT devices. SoftwareX 18, 101089 (2022)","journal-title":"SoftwareX"},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Osterlind, F., Dunkels, A., Eriksson, J., Finne, N., Voigt, T.: Cross-level sensor network simulation with COOJA. In: IEEE Conference on Local Computer Networks (2006)","DOI":"10.1109\/LCN.2006.322172"},{"issue":"11","key":"12_CR21","doi-asserted-by":"publisher","first-page":"12940","DOI":"10.1109\/JSEN.2021.3068240","volume":"21","author":"AM Pasikhani","year":"2021","unstructured":"Pasikhani, A.M., Clark, J.A., Gope, P., Alshahrani, A.: Intrusion detection systems in RPL-based 6LoWPAN: a systematic literature review. IEEE Sens. J. 21(11), 12940\u201312968 (2021)","journal-title":"IEEE Sens. J."},{"issue":"9","key":"12_CR22","first-page":"1","volume":"121","author":"P Pongle","year":"2015","unstructured":"Pongle, P., Chavan, G.: Real time intrusion and wormhole attack detection in internet of things. Int. J. Comput. Appl. 121(9), 1\u20139 (2015)","journal-title":"Int. J. Comput. Appl."},{"issue":"2","key":"12_CR23","doi-asserted-by":"publisher","first-page":"1582","DOI":"10.1109\/COMST.2018.2885894","volume":"21","author":"A Raoof","year":"2019","unstructured":"Raoof, A., Matrawy, A., Lung, C.: Routing attacks and mitigation methods for RPL-based internet of things. IEEE Commun. Surv. Tutorials 21(2), 1582\u20131606 (2019)","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"8","key":"12_CR24","doi-asserted-by":"publisher","first-page":"2661","DOI":"10.1016\/j.adhoc.2013.04.014","volume":"11","author":"S Raza","year":"2013","unstructured":"Raza, S., Wallgren, L., Voigt, T.: Svelte: real-time intrusion detection in the internet of things. Ad Hoc Netw. 11(8), 2661\u20132674 (2013)","journal-title":"Ad Hoc Netw."},{"key":"12_CR25","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1109\/ICJECE.2021.3053231","volume":"44","author":"M Sharma","year":"2021","unstructured":"Sharma, M., Elmiligi, H., Gebali, F.: A novel intrusion detection system for RPL-based cyber-physical systems. IEEE Can. J. Electrical Comput. Eng. 44, 246\u2013252 (2021)","journal-title":"IEEE Can. J. Electrical Comput. Eng."},{"key":"12_CR26","doi-asserted-by":"crossref","unstructured":"Wang, L., Wyglinski, A.M.: A combined approach for distinguishing different types of jamming attacks against wireless networks. In: Proceedings of 2011 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, pp. 809\u2013814. IEEE (2011)","DOI":"10.1109\/PACRIM.2011.6032998"},{"key":"12_CR27","unstructured":"Winter, T., et al.: RPL: Ipv6 routing protocol for low-power and lossy networks. Technical report (2012)"},{"key":"12_CR28","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"574","DOI":"10.1007\/978-3-031-17143-7_28","volume-title":"Computer Security-ESORICS 2022, Part III","author":"K Wolsing","year":"2022","unstructured":"Wolsing, K., Thiemt, L., Sloun, C.V., Wagner, E., Wehrle, K., Henze, M.: Can industrial intrusion detection be simple? In: Atluri, V., Di Pietro, R., Jensen, C.D., Meng, W. (eds.) Computer Security-ESORICS 2022, Part III. LNCS, vol. 13556, pp. 574\u2013594. Springer, Cham (2022)"}],"container-title":["Lecture Notes in Computer Science","Computer Security. ESORICS 2023 International Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-54129-2_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,11]],"date-time":"2024-03-11T22:04:45Z","timestamp":1710194685000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-54129-2_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031541285","9783031541292"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-54129-2_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"12 March 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Hague","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Netherlands","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 September 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 September 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/esorics2023.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"478","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"93","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3-4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}