{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,7]],"date-time":"2025-04-07T00:10:09Z","timestamp":1743984609825,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":31,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642331664"},{"type":"electronic","value":"9783642331671"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33167-1_17","type":"book-chapter","created":{"date-parts":[[2012,8,18]],"date-time":"2012-08-18T10:07:05Z","timestamp":1345284425000},"page":"289-306","source":"Crossref","is-referenced-by-count":0,"title":["Revealing Abuses of Channel Assignment Protocols in Multi-channel Wireless Networks: An Investigation Logic Approach"],"prefix":"10.1007","author":[{"given":"Qijun","family":"Gu","sequence":"first","affiliation":[]},{"given":"Kyle","family":"Jones","sequence":"additional","affiliation":[]},{"given":"Wanyu","family":"Zang","sequence":"additional","affiliation":[]},{"given":"Meng","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Peng","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"INET, http:\/\/inet.omnetpp.org\/","key":"17_CR1"},{"doi-asserted-by":"crossref","unstructured":"Alicherry, M., Bhatia, R., Li, L.E.: Joint channel assignment and routing for throughput optimization in multi-radio wireless mesh networks. In: Proc. of ACM MobiCom, pp. 58\u201372 (2005)","key":"17_CR2","DOI":"10.1145\/1080829.1080836"},{"doi-asserted-by":"crossref","unstructured":"Bicket, J., Aguayo, D., Biswas, S., Morris, R.: Architecture and evaluation of an unplanned 802.11b mesh network. In: Proc. of ACM Mobicom, pp. 31\u201342 (2005)","key":"17_CR3","DOI":"10.1145\/1080829.1080833"},{"issue":"1-3","key":"17_CR4","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1016\/j.tcs.2005.03.044","volume":"338","author":"M. Boreale","year":"2005","unstructured":"Boreale, M., Buscemi, M.G.: A method for symbolic analysis of security protocols. Theor. Comput. Sci.\u00a0338(1-3), 393\u2013425 (2005)","journal-title":"Theor. Comput. Sci."},{"doi-asserted-by":"crossref","unstructured":"Chereddi, C., Kyasanur, P., Vaidya, N.H.: Design and implementation of a multi-channel multi-interface network. In: Proc. of International Workshop on Multi-Hop Ad Hoc Networks: from Theory to Reality, pp. 23\u201330 (2006)","key":"17_CR5","DOI":"10.1145\/1132983.1132988"},{"unstructured":"Clark, S., Goodspeed, T., Metzger, P., Wasserman, Z., Xu, K., BBlaze, M.: Why (special agent) Johnny (still) can\u2019t encrypt: a security analysis of the APCO project 25 two-way radio system. In: Proc. of USENIX Security (2011)","key":"17_CR6"},{"key":"17_CR7","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1016\/j.entcs.2007.02.012","volume":"172","author":"A. Datta","year":"2007","unstructured":"Datta, A., Derek, A., Mitchell, J.C., Roy, A.: Protocol composition logic (pcl). Electr. Notes Theor. Comput. Sci.\u00a0172, 311\u2013358 (2007)","journal-title":"Electr. Notes Theor. Comput. Sci."},{"doi-asserted-by":"crossref","unstructured":"Dhananjay, A., Zhang, H., Li, J., Subramanian, L.: Practical, distributed channel assignment and routing in dual-radio mesh networks. In: Proc. of ACM SIGCOMM, vol.\u00a039, pp. 99\u2013110 (2009)","key":"17_CR8","DOI":"10.1145\/1594977.1592581"},{"doi-asserted-by":"crossref","unstructured":"Ferreira, E.W.T., de Oliveira, R., Carrijo, G.A., Bhargava, B.: Intrusion Detection in Wireless Mesh Networks Using a Hybrid Approach. In: Proc. of IEEE International Conference on Distributed Computing Systems Workshops, pp. 451\u2013454 (2009)","key":"17_CR9","DOI":"10.1109\/ICDCSW.2009.69"},{"doi-asserted-by":"crossref","unstructured":"Ganeriwal, S., Srivastava, M.B.: Reputation-based framework for high integrity sensor networks. In: SASN, pp. 66\u201377 (2004)","key":"17_CR10","DOI":"10.1145\/1029102.1029115"},{"doi-asserted-by":"crossref","unstructured":"Gu, Q., Yu, M., Zang, W., Liu, P.: Lightweight Attacks against Channel Assignment Protocols in MIMC Wireless Networks. In: Proc. of IEEE ICC (2011)","key":"17_CR11","DOI":"10.1109\/icc.2011.5962522"},{"issue":"9","key":"17_CR12","doi-asserted-by":"publisher","first-page":"886","DOI":"10.1109\/32.241771","volume":"19","author":"P. Helman","year":"1993","unstructured":"Helman, P., Liepins, G.: Statistical Foundations of Audit Trail Analysis for the Detection of Computer Misuse. IEEE Transaction on Software Engeering\u00a019(9), 886\u2013901 (1993)","journal-title":"IEEE Transaction on Software Engeering"},{"key":"17_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1007\/978-3-642-04444-1_10","volume-title":"Computer Security \u2013 ESORICS 2009","author":"R. Jagadeesan","year":"2009","unstructured":"Jagadeesan, R., Jeffrey, A., Pitcher, C., Riely, J.: Towards a Theory of Accountability and Audit. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol.\u00a05789, pp. 152\u2013167. Springer, Heidelberg (2009)"},{"doi-asserted-by":"crossref","unstructured":"Kim, H., Gu, Q., Yu, M., Zang, W., Liu, P.: A Simulation Framework for Performance Analysis of Multi-Interface and Multi-Channel Wireless Networks in INET\/OMNET++. In: Proc. of Communications and Networking Simulation Symposium (2010)","key":"17_CR14","DOI":"10.1145\/1878537.1878643"},{"issue":"1","key":"17_CR15","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1145\/1119759.1119762","volume":"10","author":"P. Kyasanur","year":"2006","unstructured":"Kyasanur, P., Vaidya, N.H.: Routing and link-layer protocols for multi-channel multi-interface ad hoc wireless networks. SIGMOBILE Mob. Comput. Commun. Rev.\u00a010(1), 31\u201343 (2006)","journal-title":"SIGMOBILE Mob. Comput. Commun. Rev."},{"doi-asserted-by":"crossref","unstructured":"Lin, X., Rasool, S.: A Distributed Joint Channel-Assignment, Scheduling and Routing Algorithm for Multi-Channel Ad Hoc Wireless Networks. In: Proc. of IEEE INFOCOM, pp. 1118\u20131126 (2007)","key":"17_CR16","DOI":"10.1109\/INFCOM.2007.134"},{"doi-asserted-by":"crossref","unstructured":"Lincoln, P., Mitchell, J.C., Mitchell, M., Scedrov, A.: A probabilistic poly-time framework for protocol analysis. In: ACM Conference on Computer and Communications Security, pp. 112\u2013121 (1998)","key":"17_CR17","DOI":"10.1145\/288090.288117"},{"issue":"12","key":"17_CR18","doi-asserted-by":"publisher","first-page":"2192","DOI":"10.1016\/j.comnet.2009.04.002","volume":"53","author":"F. Martignon","year":"2009","unstructured":"Martignon, F., Paris, S., Capone, A.: Design and implementation of MobiSEC: A complete security architecture for wireless mesh networks. Computer Networks\u00a053(12), 2192\u20132207 (2009)","journal-title":"Computer Networks"},{"key":"17_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/BFb0028734","volume-title":"Computer Aided Verification","author":"J.C. Mitchell","year":"1998","unstructured":"Mitchell, J.C.: Finite-State Analysis of Security Protocols. In: Vardi, M.Y. (ed.) CAV 1998. LNCS, vol.\u00a01427, pp. 71\u201376. Springer, Heidelberg (1998)"},{"doi-asserted-by":"crossref","unstructured":"Mitchell, J.C.: Security analysis of network protocols: logical and computational methods. In: PPDP, pp. 151\u2013152 (2005)","key":"17_CR20","DOI":"10.1145\/1069774.1069788"},{"doi-asserted-by":"crossref","unstructured":"Naveed, A., Kanhere, S.S.: Security Vulnerabilities in Channel Assignment of Multi-Radio Multi-Channel Wireless Mesh Networks. In: Proc. of IEEE GLOBECOM, pp. 1\u20135 (2006)","key":"17_CR21","DOI":"10.1109\/GLOCOM.2006.300"},{"doi-asserted-by":"crossref","unstructured":"Ou, X., Boyer, W.F., McQueen, M.A.: A scalable approach to attack graph generation. In: ACM Conference on Computer and Communications Security, pp. 336\u2013345 (2006)","key":"17_CR22","DOI":"10.1145\/1180405.1180446"},{"unstructured":"Ou, X., Govindavajhala, S., Appel, A.W.: Mulval: A logic-based network security analyzer. In: 14th USENIX Security Symposium (2005)","key":"17_CR23"},{"doi-asserted-by":"crossref","unstructured":"Seshadri, A., Perrig, A., van Doorn, L., Khosla, P.: SWATT: SoftWare-based ATTestation for Embedded Devices. In: Proc. of IEEE Symposium on Security and Privacy, pp. 272\u2013284 (2004)","key":"17_CR24","DOI":"10.1109\/SECPRI.2004.1301329"},{"doi-asserted-by":"crossref","unstructured":"Shin, D.-H., Bagchi, S.: Optimal monitoring in multi-channel multi-radio wireless mesh networks. In: Proc. of ACM MobiHoc, pp. 229\u2013238 (2009)","key":"17_CR25","DOI":"10.1145\/1530748.1530780"},{"doi-asserted-by":"crossref","unstructured":"Song, H., Xie, L., Zhu, S., Cao, G.: Sensor node compromise detection: the location perspective. In: IWCMC, pp. 242\u2013247 (2007)","key":"17_CR26","DOI":"10.1145\/1280940.1280993"},{"doi-asserted-by":"crossref","unstructured":"Sun, Y.L., Han, Z., Yu, W., Liu, K.J.R.: A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks. In: INFOCOM (2006)","key":"17_CR27","DOI":"10.1109\/INFOCOM.2006.154"},{"doi-asserted-by":"crossref","unstructured":"Xing, K., Cheng, X., Ma, L., Liang, Q.: Superimposed code based channel assignment in multi-radio multi-channel wireless mesh networks. In: Proc. of ACM MobiCom, pp. 15\u201326 (2007)","key":"17_CR28","DOI":"10.1145\/1287853.1287857"},{"doi-asserted-by":"crossref","unstructured":"Yang, Y., Wang, X., Zhu, S., Cao, G.: Distributed software-based attestation for node compromise detection in sensor networks. In: SRDS, pp. 219\u2013230 (2007)","key":"17_CR29","DOI":"10.1109\/SRDS.2007.31"},{"doi-asserted-by":"crossref","unstructured":"Zang, W., Gu, Q., Yu, M., Liu, P.: An attack-resilient channel assignment mac protocol. In: NBiS, pp. 246\u2013253 (2009)","key":"17_CR30","DOI":"10.1109\/NBiS.2009.42"},{"issue":"10","key":"17_CR31","doi-asserted-by":"publisher","first-page":"3858","DOI":"10.1109\/T-WC.2008.07418","volume":"7","author":"H. Zhu","year":"2008","unstructured":"Zhu, H., Lin, X., Lu, R., Ho, P.-H., Shen, X.: SLAB: A secure localized authentication and billing scheme for wireless mesh networks. IEEE Transactions on Wireless Communications\u00a07(10), 3858\u20133868 (2008)","journal-title":"IEEE Transactions on Wireless Communications"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2012"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33167-1_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,6]],"date-time":"2025-04-06T23:42:56Z","timestamp":1743982976000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33167-1_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642331664","9783642331671"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33167-1_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}