{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T14:00:35Z","timestamp":1760709635330},"publisher-location":"Cham","reference-count":9,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319942674"},{"type":"electronic","value":"9783319942681"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-94268-1_60","type":"book-chapter","created":{"date-parts":[[2018,6,12]],"date-time":"2018-06-12T12:49:21Z","timestamp":1528807761000},"page":"733-739","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["KrackCover: A Wireless Security Framework for Covering KRACK Attacks"],"prefix":"10.1007","author":[{"given":"Tommy","family":"Chin","sequence":"first","affiliation":[]},{"given":"Kaiqi","family":"Xiong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,13]]},"reference":[{"key":"60_CR1","doi-asserted-by":"crossref","unstructured":"Vanhoef, M., Piessens, F.: Key reinstallation attacks: forcing nonce reuse in WPA2. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, pp. 1313\u20131328. ACM, New York (2017)","DOI":"10.1145\/3133956.3134027"},{"issue":"9","key":"60_CR2","doi-asserted-by":"publisher","first-page":"1727","DOI":"10.1109\/JPROC.2016.2558521","volume":"104","author":"Y Zou","year":"2016","unstructured":"Zou, Y., Zhu, J., Wang, X., Hanzo, L.: A survey on wireless security: technical challenges, recent advances, and future trends. Proc. IEEE 104(9), 1727\u20131765 (2016)","journal-title":"Proc. IEEE"},{"key":"60_CR3","unstructured":"Lashkari, A.H., Danesh, M.M.S., Samadi, B.: A survey on wireless security protocols (WEP, WPA and WPA2\/802.11i). In: Proceedings of the 2nd IEEE International Conference on Computer Science and Information Technology. IEEE (2009)"},{"key":"60_CR4","doi-asserted-by":"publisher","first-page":"487","DOI":"10.1007\/978-3-319-42836-9_43","volume-title":"Wireless Algorithms, Systems, and Applications","author":"Tommy Chin","year":"2016","unstructured":"Chin, T., Xiong, K.: MPBSD: a moving target defense approach for base station security in wireless sensor networks. In: Proceedings of the IEEE International Conference on Wireless Algorithms, Systems, and Applications. IEEE (2016)"},{"key":"60_CR5","doi-asserted-by":"crossref","unstructured":"Pisa, C., Caponi, A., Dargahi, T., Bianchi, G., Blefari-Melazzi, N.: WI-FAB: attribute-based WLAN access control, without pre-shared keys and backend infrastructures, pp. 31\u201336 (2016)","DOI":"10.1145\/2944789.2949546"},{"key":"60_CR6","doi-asserted-by":"crossref","unstructured":"Cheng, L., Wang, J.: How can I guard my AP?: non-intrusive user identification for mobile devices using WiFi signals. In: Proceedings of the 17th ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 91\u2013100. ACM (2016)","DOI":"10.1145\/2942358.2942373"},{"issue":"5","key":"60_CR7","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/MNET.2016.7579020","volume":"30","author":"W Shen","year":"2016","unstructured":"Shen, W., Yin, B., Cao, X., Cai, L.X., Cheng, Y.: Secure device-to-device communications over WiFi direct. IEEE Netw. Mag. 30(5), 4\u20139 (2016)","journal-title":"IEEE Netw. Mag."},{"key":"60_CR8","unstructured":"Gallagher, S.: How the KRACK attack destroys nearly all Wi-Fi security. In: Arts Technica (2017)"},{"key":"60_CR9","unstructured":"TP-Link: WPA2 security (KRACKs) vulnerability statement (2018). https:\/\/www.tp-link.com\/us\/faq-1970.html . Accessed 18 Feb 2018"}],"container-title":["Lecture Notes in Computer Science","Wireless Algorithms, Systems, and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-94268-1_60","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,19]],"date-time":"2019-10-19T10:18:05Z","timestamp":1571480285000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-94268-1_60"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319942674","9783319942681"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-94268-1_60","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}