{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T11:16:38Z","timestamp":1725880598622},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319527260"},{"type":"electronic","value":"9783319527277"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-52727-7_12","type":"book-chapter","created":{"date-parts":[[2017,2,14]],"date-time":"2017-02-14T13:32:01Z","timestamp":1487079121000},"page":"104-115","source":"Crossref","is-referenced-by-count":0,"title":["UML Modeling of Cross-Layer Attack in Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Jian","family":"Wang","sequence":"first","affiliation":[]},{"given":"Abraham O.","family":"Fapojuwo","sequence":"additional","affiliation":[]},{"given":"Chen","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Huiting","family":"Tan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,2,15]]},"reference":[{"issue":"10","key":"12_CR1","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1109\/MC.2002.1039518","volume":"35","author":"AD Wood","year":"2002","unstructured":"Wood, A.D., Stankvic, J.A.: Denial of service in sensor networks. IEEE Comput. 35(10), 54\u201362 (2002)","journal-title":"IEEE Comput."},{"key":"12_CR2","unstructured":"Wang, X., Gu, W., Schosek, K., Chellappan, S., Xuan, D.: Sensor network configuration under physical attacks. Technical Report:OSU-CISRC-7\/04-TR45, Department of Computer Science and Engineering, Ohio State University (2004)"},{"key":"12_CR3","unstructured":"Katsaiti, M., Rigas, A., Tzemos, I., Sklavos, N.: Real-world attacks toward circuits and systems design, targeting safety invasion. In: Proceedings of the 4th International Conference on Modern Circuits and System Technologies (MOCAST) (2015)"},{"issue":"3","key":"12_CR4","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/MNET.2006.1637931","volume":"20","author":"W Xu","year":"2006","unstructured":"Xu, W., Ma, K., Trappe, W., Zhang, Y.: Jamming sensor networks: attack and defense strategies. IEEE Netw. 20(3), 41\u201347 (2006)","journal-title":"IEEE Netw."},{"issue":"1","key":"12_CR5","doi-asserted-by":"crossref","first-page":"367","DOI":"10.1109\/TVT.2008.921621","volume":"58","author":"DR Raymond","year":"2009","unstructured":"Raymond, D.R., Marchany, R.C., Brownfield, M.I., Midkiff, S.F.: Effects of Denial-of sleep attacks on wireless sensor network MAC protocols. IEEE Trans. Veh. Technol. 58(1), 367\u2013380 (2009)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Sokullu, R., Dagdeviren, O., Korkmaz, I.: On the IEEE 802.15.4 MAC layer attacks: GTS attack. In: Proceedings of the Second International Conference on Sensor Technologies and Applications (SENSORCOMM), pp. 673\u2013678 (2008)","DOI":"10.1109\/SENSORCOMM.2008.75"},{"issue":"1","key":"12_CR7","doi-asserted-by":"crossref","first-page":"103","DOI":"10.3233\/JCS-2007-15105","volume":"15","author":"S Radosavac","year":"2007","unstructured":"Radosavac, S., Crdenas, A.A., Baras, J.S., Moustakides, G.V.: Detecting IEEE 802.11 MAC layer misbehavior in ad hoc networks: robust strategies against individual and colluding attackers. J. Comput. Secur. 15(1), 103\u2013128 (2007). Special Issue on Security of Ad Hoc and SensorNetworks","journal-title":"J. Comput. Secur."},{"issue":"2\u20133","key":"12_CR8","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1016\/S1570-8705(03)00008-8","volume":"1","author":"C Karlof","year":"2003","unstructured":"Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Netw. J. 1(2\u20133), 293\u2013315 (2003)","journal-title":"Ad Hoc Netw. J."},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Hu, Y.C., Perrig, A., Johnson, D.B.: Packet Leashes: a defense against wormhole attacks in wireless networks. In: Proceedings of the Twenty-Second Annual Joint Conference of the IEEE Computer and Communication Societies (INFOCOM), vol. 3, pp. 1976\u20131986 (2003)","DOI":"10.1109\/INFCOM.2003.1209219"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Al-Shurman, M., Yoo, S.M., Park, S.: Black hole attack in mobile Ad hoc networks. In: Proceedings of the 42nd Annual ACM Southeast Regional Conference (ACM-SE\u201942) (2004)","DOI":"10.1145\/986537.986560"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"Newsome, J., Shi, E., Song, D., Perrig, A.: The Sybil attack in sensor networks: analysis & defenses. In: Proceedings of the Third International Symposium on Information Processing in Sensor Networks ACM (IPSN), pp. 259\u2013268 (2004)","DOI":"10.1145\/984622.984660"},{"key":"12_CR12","unstructured":"Radosavac, S., Benammar, N., Baras, J.S.: Cross-layer attacks in wireless ad hoc networks. In: Proceedings of the 38th Annual Conference on Information Science and Systems (CISS). Princeton University (2004)"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Bian, K., Park, J.M., Chen, R.: Stasis Trap: cross-layer stealthy attack in wireless Ad hoc networks. In: Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM) (2006)","DOI":"10.1109\/GLOCOM.2006.266"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Nagireddygari, D., Thomas, J.: MAC-TCP cross-layer attack and its defense in cognitive radio networks. In Proceedings of the 10th ACM International Symposium on QOS and Security for Wireless and Mobile Networks (Q2SWinet) (2014)","DOI":"10.1145\/2642687.2642700"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Le\u1f79n, O., Hern\u00e1ndez-Serrano, J., Soriano, M.: A new cross-layer attack to TCP in cognitive radio network. In: Proceedings of the Second International Workshop on Cross layer Design (IWCLD) (2009)","DOI":"10.1109\/IWCLD.2009.5156526"},{"key":"12_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1007\/11943952_37","volume-title":"Mobile Ad-hoc and Sensor Networks","author":"L Guang","year":"2006","unstructured":"Guang, L., Assi, C., Benslimane, A.: Interlayer attacks in mobile Ad hoc networks. In: Cao, J., Stojmenovic, I., Jia, X., Das, Sajal, K. (eds.) MSN 2006. LNCS, vol. 4325, pp. 436\u2013448. Springer, Heidelberg (2006). doi: 10.1007\/11943952_37"},{"key":"12_CR17","doi-asserted-by":"crossref","unstructured":"Shao, M., Zhu, S., Cao, G., Porta, T.L., Mohapatra, P.: A cross-layer dropping attack in video streaming over Ad hoc networks. In: Proceedings of the 4th International Conference on Security and Privacy in Communication Networks (SECURECOMM) (2008)","DOI":"10.1145\/1460877.1460909"},{"key":"12_CR18","doi-asserted-by":"crossref","unstructured":"Panchenko, A., Pimenidis, L.: Cross-layer attack on anonymizing networks. In: Proceedings of the 15th International Conference on Telecommunication (ICT) (2008)","DOI":"10.1109\/ICTEL.2008.4652665"},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"Wang, W., Sun, Y., Li, H., Han, Z.: Cross-layer attack and defense in cognitive radio networks. In: Proceedings of IEEE Global Telecommunication Conference (GLOBECOM) (2010)","DOI":"10.1109\/GLOCOM.2010.5684069"},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Djahel, S., Abdesselam, F.N., Khokhar, A.: A cross layer framework to mitigate a joint MAC and routing attack in multihop wireless network. In: Proceedings of the 5th IEEE International Workshop on Performance and Management of Wireless and Mobile Networks (P2MNET) (2009)","DOI":"10.1109\/LCN.2009.5355066"},{"issue":"11","key":"12_CR21","first-page":"25","volume":"70","author":"SN Uke","year":"2013","unstructured":"Uke, S.N., Mahajan, A.R., Thool, R.C.: UML modeling of physical and data link layer security attacks in WSN. Int. J. Comput. Appl. 70(11), 25\u201328 (2013)","journal-title":"Int. J. Comput. Appl."},{"issue":"1","key":"12_CR22","first-page":"65","volume":"1","author":"PM Pawar","year":"2012","unstructured":"Pawar, P.M., Nielsen, R.H., Prasad, N.R., Ohmori, S., Prasad, R.: Behavioral modeling of WSN MAC layer security attacks: a sequential UML approach. J. Cyber Secur. Mob. 1(1), 65\u201382 (2012)","journal-title":"J. Cyber Secur. Mob."},{"key":"12_CR23","unstructured":"Hong, S., Lim, S.: Analysis of attack models via unified modeling language in wireless sensor networks: a survey study. In: Proceedings of IEEE International Conference on Wireless Communications, Networking and Information Security (WCINS) (2010)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Interoperability, Safety and Security in IoT"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-52727-7_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T10:30:34Z","timestamp":1498386634000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-52727-7_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319527260","9783319527277"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-52727-7_12","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2017]]}}}