{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,10]],"date-time":"2025-04-10T04:25:19Z","timestamp":1744259119380,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642305665"},{"type":"electronic","value":"9783642305672"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-30567-2_24","type":"book-chapter","created":{"date-parts":[[2012,10,1]],"date-time":"2012-10-01T07:10:40Z","timestamp":1349075440000},"page":"289-301","source":"Crossref","is-referenced-by-count":2,"title":["Toward a Threat Model for Energy-Harvesting Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Alessio","family":"Di Mauro","sequence":"first","affiliation":[]},{"given":"Davide","family":"Papini","sequence":"additional","affiliation":[]},{"given":"Roberto","family":"Vigo","sequence":"additional","affiliation":[]},{"given":"Nicola","family":"Dragoni","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"24_CR1","doi-asserted-by":"crossref","unstructured":"Blanchet, B.: Computationally Sound Mechanized Proofs of Correspondence Assertions. In: 20th IEEE Computer Security Foundations Symposium (CSF 2007), Venice, Italy, pp. 97\u2013111 (2007)","DOI":"10.1109\/CSF.2007.16"},{"issue":"4","key":"24_CR2","doi-asserted-by":"crossref","first-page":"363","DOI":"10.3233\/JCS-2009-0339","volume":"17","author":"B. Blanchet","year":"2009","unstructured":"Blanchet, B.: Automatic Verification of Correspondences for Security Protocols. Journal of Computer Security\u00a017(4), 363\u2013434 (2009)","journal-title":"Journal of Computer Security"},{"issue":"3-4","key":"24_CR3","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/s10207-004-0036-x","volume":"2","author":"M. Buchholtz","year":"2004","unstructured":"Buchholtz, M., Nielson, H.R., Nielson, F.: A Calculus for Control Flow Analysis of Security Protocols. International Journal of Information Security\u00a02(3-4), 145\u2013167 (2004)","journal-title":"International Journal of Information Security"},{"issue":"2","key":"24_CR4","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D. Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.: On the Security of Public Key Protocols. IEEE Transactions on Information Theory\u00a029(2), 198\u2013208 (1983)","journal-title":"IEEE Transactions on Information Theory"},{"key":"24_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-15205-4_1","volume-title":"Computer Science Logic","author":"D. Basin","year":"2010","unstructured":"Basin, D., Cremers, C.: Degrees of Security: Protocol Guarantees in the Face of Compromising Adversaries. In: Dawar, A., Veith, H. (eds.) CSL 2010. LNCS, vol.\u00a06247, pp. 1\u201318. Springer, Heidelberg (2010)"},{"issue":"2","key":"24_CR6","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1145\/2019599.2019601","volume":"14","author":"D.A. Basin","year":"2011","unstructured":"Basin, D.A., Capkun, S., Schaller, P., Schmidt, B.: Formal Reasoning about Physical Properties of Security Protocols. ACM Trans. Inf. Syst. Secur.\u00a014(2), 16 (2011)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"24_CR7","unstructured":"Benenson, Z., Cholewinski, P., Freiling, F.: Vulnerabilities and attacks in wireless sensor networks. Wireless Sensors Networks Security, 22\u201343 (2008)"},{"key":"24_CR8","unstructured":"Benenson, Z., Dewald, A., Freiling, F.: Presence, Intervention, Insertion: Unifying Attack and Failure Models in Wireless Sensor Networks. University of Mannheim, Technical Report (2009)"},{"key":"24_CR9","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1145\/800105.803400","volume-title":"Proceedings of the Ninth Annual ACM Symposium on Theory of Computing, STOC 1977","author":"J.L. Carter","year":"1977","unstructured":"Carter, J.L., Wegman, M.N.: Universal classes of hash functions (extended abstract). In: Proceedings of the Ninth Annual ACM Symposium on Theory of Computing, STOC 1977, pp. 106\u2013112. ACM, New York (1977)"},{"key":"24_CR10","doi-asserted-by":"crossref","unstructured":"Lu, J., Liu, S., Wu, Q., Qiu, Q.: Accurate modelling and prediction of energy availability in energy harvesting real-time embedded systems. In: 2010 International Green Computing Conference, pp. 469\u2013476 (2010)","DOI":"10.1109\/GREENCOMP.2010.5598280"},{"key":"24_CR11","unstructured":"Lupu, T.-G.: Main types of attacks in wireless sensor networks. In: Proceedings of the 9th WSEAS International Conference on Signal, Speech and Image Processing, and 9th WSEAS International Conference on Multimedia, Internet & Video Technologies, SSIP 2009\/MIV 2009, Stevens Point, Wisconsin, USA, pp. 180\u2013185. World Scientific and Engineering Academy and Society (WSEAS) (2009)"},{"key":"24_CR12","doi-asserted-by":"crossref","unstructured":"Martins, D., Guyennet, H.: Wireless sensor network attacks and security mechanisms: A short survey. In: 2010 13th International Conference on Network-Based Information Systems (NBiS), pp. 313\u2013320 (2010)","DOI":"10.1109\/NBiS.2010.11"},{"key":"24_CR13","doi-asserted-by":"crossref","unstructured":"Pelissier, S., Prabhakar, T., Jamadagni, H., Venkatesha Prasad, R., Niemegeers, I.: Providing security in energy harvesting sensor networks. In: Consumer Communications and Networking Conference (CCNC), pp. 452\u2013456. IEEE (2011)","DOI":"10.1109\/CCNC.2011.5766511"},{"key":"24_CR14","unstructured":"Sen, J.: A survey on wireless sensor network security. CoRR, abs\/1011.1529 (2010)"},{"issue":"3","key":"24_CR15","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1109\/SURV.2011.060710.00094","volume":"13","author":"S. Sudevalayam","year":"2011","unstructured":"Sudevalayam, S., Kulkarni, P.: Energy harvesting sensor nodes: Survey and implications. IEEE Communications Surveys Tutorials\u00a013(3), 443\u2013461 (2011)","journal-title":"IEEE Communications Surveys Tutorials"},{"key":"24_CR16","unstructured":"Taddeo, A.V., Mura, M., Ferrante, A.: Qos and security in energy-harvesting wireless sensor networks. In: Proceedings of the 2010 International Conference on Security and Cryptography (SECRYPT), pp. 1\u201310 (2010)"},{"key":"24_CR17","doi-asserted-by":"crossref","unstructured":"Wander, A., Gura, N., Eberle, H., Gupta, V., Shantz, S.: Energy analysis of public-key cryptography for wireless sensor networks. In: Third IEEE International Conference on Pervasive Computing and Communications (PerCom 2005), pp. 324\u2013328 (2005)","DOI":"10.1109\/PERCOM.2005.18"},{"key":"24_CR18","series-title":"Lecture Notes in Computer Science","volume-title":"Information Security and Cryptology - ICISC 2000","year":"2001","unstructured":"Won, D. (ed.): ICISC 2000. LNCS, vol.\u00a02015. Springer, Heidelberg (2001)"}],"container-title":["Communications in Computer and Information Science","Networked Digital Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-30567-2_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T20:55:34Z","timestamp":1744232134000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-30567-2_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642305665","9783642305672"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-30567-2_24","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2012]]}}}