{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T21:04:11Z","timestamp":1725570251731},"publisher-location":"Berlin, Heidelberg","reference-count":35,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642161605"},{"type":"electronic","value":"9783642161612"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-16161-2_15","type":"book-chapter","created":{"date-parts":[[2010,11,26]],"date-time":"2010-11-26T22:17:14Z","timestamp":1290809834000},"page":"253-271","source":"Crossref","is-referenced-by-count":10,"title":["Attacking Beacon-Enabled 802.15.4 Networks"],"prefix":"10.1007","author":[{"given":"Sang Shin","family":"Jung","sequence":"first","affiliation":[]},{"given":"Marco","family":"Valero","sequence":"additional","affiliation":[]},{"given":"Anu","family":"Bourgeois","sequence":"additional","affiliation":[]},{"given":"Raheem","family":"Beyah","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","unstructured":"Alert Me homepage, http:\/\/www.alertme.com\/products\/home-monitoring"},{"key":"15_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/MILCOM.2007.4455149","volume-title":"Military Communications Conference, MILCOM 2007","author":"A. Mishra","year":"2007","unstructured":"Mishra, A., Na, C., Rosenburgh, D.: On Scheduling Guaranteed Time Slots for Time Sensitive Transactions in IEEE 802.15.4 Networks. In: Military Communications Conference, MILCOM 2007, pp. 1\u20137. IEEE, Los Alamitos (2007)"},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"Koubaa, A., Alves, M., Tovar, E.: i-GAME: an implicit GTS allocation mechanism in IEEE 802.15.4 for time-sensitive wireless sensor networks. In: 18th Euromicro Conference on Real-Time Systems, vol.\u00a010, pp. 183\u2013192 (2006)","DOI":"10.1109\/IPDPS.2006.1639415"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Koubaa, A., Alves, M., Tovar, E.: GTS allocation analysis in IEEE 802.15.4 for real-time wireless sensor networks. In: 20th International Parallel and Distributed Processing Symposium, IPDPS 2006, 8p. (2006)","DOI":"10.1109\/IPDPS.2006.1639415"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Chen, F., Talanis, T., German, R., Dressler, F.: Real-time enabled IEEE 802.15.4 sensor networks in industrial automation. In: IEEE International Symposium on Industrial Embedded Systems, SIES 2009, pp. 136\u2013139 (2009)","DOI":"10.1109\/SIES.2009.5196207"},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Park, P., Fischione, C., Johansson, K.H.: Performance Analysis of GTS Allocation in Beacon Enabled IEEE 802.15.4. In: 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2009, pp. 1\u20139 (2009)","DOI":"10.1109\/SAHCN.2009.5168958"},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Mehta, A., Bhatti, G., Sahinoglu, Z., Viswanathan, R., Zhang, J.: Performance analysis of beacon-enabled IEEE 802.15.4 MAC for emergency response applications. In: 2009 IEEE 3rd International Symposium on Advanced Networks and Telecommunication Systems (ANTS), pp. 1\u20133 (2009)","DOI":"10.1109\/ANTS.2009.5409873"},{"key":"15_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/3-540-45748-8_24","volume-title":"Peer-to-Peer Systems","author":"J.R. Douceur","year":"2002","unstructured":"Douceur, J.R.: The Sybil Attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol.\u00a02429, p. 251. Springer, Heidelberg (2002)"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Yang, J., Chen, Y., Trappe, W.: Detecting sybil attacks in wireless and sensor networks using cluster analysis. In: 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, MASS 2008, 29-October 2, pp. 834\u2013839 (2008)","DOI":"10.1109\/MAHSS.2008.4660139"},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Demirbas, M., Song, Y.: An rssi-based scheme for sybil attack detection in wireless sensor networks. In: International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2006, p. 5, p. 570 (2006)","DOI":"10.1109\/WOWMOM.2006.27"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Amini, F., Misic, J., Pourreza, H.: Detection of sybil attack in beacon enabled IEEE 802.15.4 networks. In: International Conference on Wireless Communications and Mobile Computing, IWCMC 2008, pp. 1058\u20131063 (August 2008)","DOI":"10.1109\/IWCMC.2008.184"},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Zhang, Q., Wang, P., Reeves, D., Ning, P.: Defending against Sybil attacks in sensor networks. In: 25th IEEE International Conference on Distributed Computing Systems Workshops, pp. 185\u2013191 (June 2005)","DOI":"10.1109\/ICDCSW.2005.57"},{"key":"15_CR13","first-page":"42","volume-title":"CCS 2003: Proceedings of the 10th ACM conference on Computer and communications security","author":"W. Du","year":"2003","unstructured":"Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A pairwise key predistribution scheme for wireless sensor networks. In: CCS 2003: Proceedings of the 10th ACM conference on Computer and communications security, pp. 42\u201351. ACM, New York (2003)"},{"key":"15_CR14","first-page":"52","volume-title":"CCS 2003: Proceedings of the 10th ACM conference on Computer and communications security","author":"D. Liu","year":"2003","unstructured":"Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: CCS 2003: Proceedings of the 10th ACM conference on Computer and communications security, pp. 52\u201361. ACM, New York (2003)"},{"key":"15_CR15","unstructured":"Du, W., Deng, J., Han, Y., Chen, S., Varshney, P.: A key management scheme for wireless sensor networks using deployment knowledge. In: INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies, vol.\u00a01, p. 597 (March 2004)"},{"key":"15_CR16","first-page":"41","volume-title":"CCS 2002: Proceedings of the 9th ACM conference on Computer and communications security","author":"L. Eschenauer","year":"2002","unstructured":"Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: CCS 2002: Proceedings of the 9th ACM conference on Computer and communications security, pp. 41\u201347. ACM, New York (2002)"},{"key":"15_CR17","first-page":"189","volume-title":"MobiCom 2001: Proceedings of the 7th annual international conference on Mobile computing and networking","author":"A. Perrig","year":"2001","unstructured":"Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: SPINS: security protocols for sensor networks. In: MobiCom 2001: Proceedings of the 7th annual international conference on Mobile computing and networking, pp. 189\u2013199. ACM, New York (2001)"},{"key":"15_CR18","first-page":"162","volume-title":"SenSys 2004: Proceedings of the 2nd international conference on Embedded networked sensor systems","author":"C. Karlof","year":"2004","unstructured":"Karlof, C., Sastry, N., Wagner, D.: Tinysec: a link layer security architecture for wireless sensor networks. In: SenSys 2004: Proceedings of the 2nd international conference on Embedded networked sensor systems, pp. 162\u2013175. ACM, New York (2004)"},{"key":"15_CR19","first-page":"479","volume-title":"IPSN 2007: Proceedings of the 6th international conference on Information processing in sensor networks","author":"M. Luk","year":"2007","unstructured":"Luk, M., Mezzour, G., Perrig, A., Gligor, V.: MiniSec: a secure sensor network communication architecture. In: IPSN 2007: Proceedings of the 6th international conference on Information processing in sensor networks, pp. 479\u2013488. ACM, New York (2007)"},{"key":"15_CR20","unstructured":"Wireless medium access control and physical layer specications for low-rate wireless personal area networks. IEEE Standard, 802.15.4-2003 (May 2003), ISBN 0-7381-3677-5"},{"key":"15_CR21","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1145\/1023646.1023654","volume-title":"WiSe 2004: Proceedings of the 3rd ACM workshop on Wireless security","author":"N. Sastry","year":"2004","unstructured":"Sastry, N., Wagner, D.: Security considerations for ieee 802.15.4 networks. In: WiSe 2004: Proceedings of the 3rd ACM workshop on Wireless security, pp. 32\u201342. ACM, New York (2004)"},{"key":"15_CR22","doi-asserted-by":"crossref","unstructured":"Alim, M.A., Sarikaya, B.: EAP-Sens: a security architecture for wireless sensor networks. In: WICON 2008: Proceedings of the 4th Annual International Conference on Wireless Internet, Brussels, Belgium, Belgium, pp. 1\u20139. ICST (2008)","DOI":"10.4108\/ICST.WICON2008.4827"},{"key":"15_CR23","doi-asserted-by":"crossref","unstructured":"Aboba, L.B.B., Vollbrecht, J.C.J., Levkowetz, H.: Extensible Authentication Protocol EAP (June 2004), http:\/\/tools.ietf.org\/html\/rfc3748","DOI":"10.17487\/rfc3748"},{"key":"15_CR24","doi-asserted-by":"crossref","unstructured":"Clancy, T., Tschofenig, H.: Extensible Authentication Protocol Generalized Pre-Shared Key EAP-GPSK method (February 2009), http:\/\/tools.ietf.org\/html\/rfc5433","DOI":"10.17487\/rfc5433"},{"key":"15_CR25","doi-asserted-by":"crossref","unstructured":"Sokullu, R., Dagdeviren, O., Korkmaz, I.: On the IEEE 802.15.4 MAC layer attacks: GTS attack. In: Second International Conference on Sensor Technologies and Applications, SENSORCOMM 2008, pp. 673\u2013678 (August 2008)","DOI":"10.1109\/SENSORCOMM.2008.75"},{"key":"15_CR26","unstructured":"Roosta, T., Shieh, S., Sastry, S.: Taxonomy of security attacks in sensor networks and countermeasures. In: The First IEEE International Conference on System Integration and Reliability Improvements, Hanoi, pp. 13\u201315 (2006)"},{"key":"15_CR27","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MC.2002.1039518","volume":"35","author":"A.D. Wood","year":"2002","unstructured":"Wood, A.D., Stankovic, J.A.: Denial of service in sensor networks. Computer\u00a035, 54\u201362 (2002)","journal-title":"Computer"},{"key":"15_CR28","unstructured":"Moteiv Corporation, tmote-sky-datasheet (2006), http:\/\/www.moteiv.com"},{"key":"15_CR29","unstructured":"Chipcon product from Texas Instruments, CC2420, http:\/\/focus.ti.com\/lit\/ds\/symlink\/cc2420.pdf"},{"key":"15_CR30","doi-asserted-by":"crossref","unstructured":"Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: Attacks and Countermeasures. In: Proceedings of the First 2003 IEEE International Workshop on Sensor Network Protocols and Applications, pp. 113\u2013127 (May 2003)","DOI":"10.1109\/SNPA.2003.1203362"},{"key":"15_CR31","unstructured":"Open-zb homepage, http:\/\/www.open-zb.net\/"},{"key":"15_CR32","unstructured":"TinyOS homepage, http:\/\/www.tinyos.net\/"},{"key":"15_CR33","unstructured":"Chipcon Products from Texas Instruments, User Manual Rev. 1.0 CC2420DK Development Kit, http:\/\/focus.ti.com\/lit\/ug\/swru045\/swru045.pdf"},{"key":"15_CR34","unstructured":"Texas Instruments Incorporated, SmartRFPacket Sniffer User Manual Rev. 1.9, http:\/\/focus.ti.com\/docs\/toolsw\/folders\/print\/packetsniffer.html"},{"key":"15_CR35","doi-asserted-by":"crossref","unstructured":"Wood, A.D., Stankovic, J.A.: A Taxonomy for Denial-of-Service Attacks. In: Wireless Sensor Networks. CRC Press, Boca Raton (2004)","DOI":"10.1201\/9780203489635.ch32"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-16161-2_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,6]],"date-time":"2019-06-06T11:45:26Z","timestamp":1559821526000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-16161-2_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642161605","9783642161612"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-16161-2_15","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2010]]}}}