{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T21:10:02Z","timestamp":1744233002016,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642305665"},{"type":"electronic","value":"9783642305672"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-30567-2_13","type":"book-chapter","created":{"date-parts":[[2012,10,1]],"date-time":"2012-10-01T07:10:40Z","timestamp":1349075440000},"page":"151-164","source":"Crossref","is-referenced-by-count":1,"title":["A Cross Layer Energy Efficient Security Mechanism for Denial of Sleep Attacks on Wireless Sensor Network"],"prefix":"10.1007","author":[{"given":"Djallel Eddine","family":"Boubiche","sequence":"first","affiliation":[]},{"given":"Azeddine","family":"Bilami","sequence":"additional","affiliation":[]},{"given":"Samir","family":"Athmani","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","doi-asserted-by":"crossref","unstructured":"Stajano, F., Anderson, R.: The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks. In: ICISC. Springer (2000)","DOI":"10.1007\/10720107_24"},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"Wei, Y., Heidemann, J., Estrin, D.: An Energy- Efficient MAC Protocol for Wireless Sensor Networks. In: IEEE INFOCOM, New York, vol.\u00a02, pp. 1567\u20131576 (2002)","DOI":"10.1109\/INFCOM.2002.1019408"},{"key":"13_CR3","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1080\/15501320600642718","volume":"2","author":"M. Pirretti","year":"2006","unstructured":"Pirretti, M., Zhu, S., Vijaykrishnan, N., Mcdaniel, P.: Kandemir. M.: The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense. International Journal of Distributed Sensor Networks\u00a02, 267\u2013287 (2006)","journal-title":"International Journal of Distributed Sensor Networks"},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Xiaoming, L., Spear, M., Levitt, K., Matloff, N.S., Wu, S.F.: A Synchronization Attack and Defense in Energy-Efficient Listen-Sleep Slotted MAC Protocols. In: SECURWARE 2008, Second International Conference on Emerging Security Information, Systems and Technologies, pp. 403\u2013411 (2008)","DOI":"10.1109\/SECURWARE.2008.45"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Brownfield, M., Gupta, Y., Davis, N.: Wireless sensor network denial of sleep attack. In: Proc. 6th Annual IEEE SMC Inf. Assurance Workshop, pp. 356\u2013364 (2005)","DOI":"10.1109\/IAW.2005.1495974"},{"key":"13_CR6","unstructured":"Law, Y.l.: Link-layer Jamming Attacks on SMAC. Technical Paper, Univ. of Twente, NL (2005)"},{"key":"13_CR7","unstructured":"Stahlberg, M.: Radio Jamming attacks against two popular mobile networks. In: Seminar on Network Security, Helsinki University of Tech (2000)"},{"key":"13_CR8","unstructured":"3Com IEEE802.11b Wireless LANs Technical Paper (2000)"},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Chen, C., Hui, L., Pei, Q., Ning, L., Peng, Q.: An Effective Scheme for Defending Denial-of-Sleep Attack in Wireless Sensor Networks. In: Fifth International Conference on Information Assurance and Security, pp. 446\u2013449 (2009)","DOI":"10.1109\/IAS.2009.33"},{"issue":"1","key":"13_CR10","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1109\/TVT.2008.921621","volume":"58","author":"D.R. Raymond","year":"2009","unstructured":"Raymond, D.R., Marchany, R.C., Brownfield, M.I., Midkiff, S.F.: Effects of Denial-of-Sleep Attacks on Wireless Sensor Network MAC Protocols. IEEE Transactions on Vehicular Technology\u00a058(1), 367\u2013380 (2009)","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Rainer, F., Hans-Joachim, H.: Fighting Insomnia: A Secure Wake-Up Scheme for Wireless Sensor Networks. In: Third International Conference on Emerging Security Information, Systems and Technologies, pp. 191\u2013196 (2009)","DOI":"10.1109\/SECURWARE.2009.36"},{"key":"13_CR12","unstructured":"Zhao, J., Nygard, K.E.: A Two-Phase Security Algorithm for Hierarchical Sensor Networks. In: The Third International Conference on Future Computational Technologies and Applications, pp. 144\u2013120 (2011)"},{"key":"13_CR13","doi-asserted-by":"crossref","unstructured":"Gabrielli, A., Mancini, L.V., Setia, S., Jajodia, S.: Securing Topology Maintenance Protocols for Sensor Networks: Attacks and Countermeasures. IEEE Transactions on Dependable and Secure Computing, 450\u2013465 (2011)","DOI":"10.1109\/TDSC.2009.46"},{"issue":"1","key":"13_CR14","doi-asserted-by":"crossref","first-page":"33","DOI":"10.3233\/HSN-2006-276","volume":"15","author":"V. Bhuse","year":"2006","unstructured":"Bhuse, V., Gupta, A.: Anomaly intrusion detection in wireless sensor networks. Journal of High Speed Networks\u00a015(1), 33\u201351 (2006)","journal-title":"Journal of High Speed Networks"},{"issue":"1\/2","key":"13_CR15","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1504\/IJSNET.2011.040901","volume":"10","author":"D. Boubiche","year":"2011","unstructured":"Boubiche, D., Bilami, A.: HEEP (Hybrid Energy Efficiency Protocol) Based on Chain Clustering. Int. J. Sensor Networks\u00a010(1\/2), 25\u201335 (2011)","journal-title":"Int. J. Sensor Networks"},{"issue":"4","key":"13_CR16","doi-asserted-by":"publisher","first-page":"660","DOI":"10.1109\/TWC.2002.804190","volume":"1","author":"W.R. Heinzelman","year":"2002","unstructured":"Heinzelman, W.R., Chandrakasan, A., Balakrishnan, H.: An Application-Specific Protocol Architecture for Wireless Micro sensor Networks. IEEE Transactions on the Wireless Communications\u00a01(4), 660\u2013670 (2002)","journal-title":"IEEE Transactions on the Wireless Communications"}],"container-title":["Communications in Computer and Information Science","Networked Digital Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-30567-2_13.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T20:55:18Z","timestamp":1744232118000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-30567-2_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642305665","9783642305672"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-30567-2_13","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2012]]}}}