{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T06:19:47Z","timestamp":1761977987517,"version":"build-2065373602"},"publisher-location":"Berlin, Heidelberg","reference-count":35,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642414879"},{"type":"electronic","value":"9783642414886"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-41488-6_1","type":"book-chapter","created":{"date-parts":[[2013,10,1]],"date-time":"2013-10-01T06:05:49Z","timestamp":1380607549000},"page":"1-16","source":"Crossref","is-referenced-by-count":7,"title":["Detecting and Preventing Beacon Replay Attacks in Receiver-Initiated MAC Protocols for Energy Efficient WSNs"],"prefix":"10.1007","author":[{"given":"Alessio","family":"Di Mauro","sequence":"first","affiliation":[]},{"given":"Xenofon","family":"Fafoutis","sequence":"additional","affiliation":[]},{"given":"Sebastian","family":"M\u00f6dersheim","sequence":"additional","affiliation":[]},{"given":"Nicola","family":"Dragoni","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","unstructured":"AVISPA: Deliverable 2.3: The Intermediate Format (2003), http:\/\/www.avispa-project.org"},{"issue":"2","key":"1_CR2","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/SURV.2010.020510.00058","volume":"12","author":"A. Bachir","year":"2010","unstructured":"Bachir, A., Dohler, M., Watteyne, T., Leung, K.: MAC Essentials for Wireless Sensor Networks. IEEE Commun. Surveys Tutorials\u00a012(2), 222\u2013248 (2010)","journal-title":"IEEE Commun. Surveys Tutorials"},{"issue":"3","key":"1_CR3","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/s10207-004-0055-7","volume":"4","author":"D. Basin","year":"2005","unstructured":"Basin, D., M\u00f6dersheim, S., Vigan\u00f2, L.: OFMC: A symbolic model checker for security protocols. Int. Journal of Information Security\u00a04(3), 181\u2013208 (2005)","journal-title":"Int. Journal of Information Security"},{"key":"1_CR4","first-page":"82","volume-title":"14th IEEE Computer Security Foundations Workshop (CSFW-14)","author":"B. Blanchet","year":"2001","unstructured":"Blanchet, B.: An Efficient Cryptographic Protocol Verifier Based on Prolog Rules. In: 14th IEEE Computer Security Foundations Workshop (CSFW-14), pp. 82\u201396. IEEE Computer Society, Cape Breton (2001)"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Deng, J., Han, R., Mishra, S.: Limiting dos attacks during multihop data delivery in wireless sensor networks. Int. J. Secur. Netw.\u00a01(3\/4) (2006)","DOI":"10.1504\/IJSN.2006.011776"},{"issue":"8","key":"1_CR6","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1145\/358722.358740","volume":"24","author":"D.E. Denning","year":"1981","unstructured":"Denning, D.E., Sacco, G.M.: Timestamps in key distribution protocols. Commun. ACM\u00a024(8), 533\u2013536 (1981)","journal-title":"Commun. ACM"},{"issue":"2","key":"1_CR7","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D. Dolev","year":"2006","unstructured":"Dolev, D., Yao, A.: On the security of public key protocols. IEEE Trans. Inf. Theor.\u00a029(2), 198\u2013208 (2006)","journal-title":"IEEE Trans. Inf. Theor."},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Dong, J., Ackermann, K.E., Bavar, B., Nita-Rotaru, C.: Mitigating attacks against virtual coordinate based routing in wireless sensor networks. In: Proc. of the First ACM Conf. on Wireless Network Security, pp. 89\u201399. ACM (2008)","DOI":"10.1145\/1352533.1352548"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"Fafoutis, X., Dragoni, N.: ODMAC: An On-Demand MAC Protocol for Energy Harvesting-Wireless Sensor Networks. In: Proc. 8th ACM Symp. on Performance Evaluation of Wireless Ad-Hoc, Sensor, and Ubiquitous Networks (PE-WASUN), pp. 49\u201356. ACM (2011)","DOI":"10.1145\/2069063.2069072"},{"key":"1_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1007\/978-3-642-12179-1_28","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2010","author":"A. Ghosal","year":"2010","unstructured":"Ghosal, A., Halder, S., Sur, S., Dan, A., DasBit, S.: Ensuring basic security and preventing replay attack in a query processing application domain in WSN. In: Taniar, D., Gervasi, O., Murgante, B., Pardede, E., Apduhan, B.O. (eds.) ICCSA 2010, Part III. LNCS, vol.\u00a06018, pp. 321\u2013335. Springer, Heidelberg (2010)"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Heinzelman, W., Chandrakasan, A., Balakrishnan, H.: Energy-efficient communication protocol for wireless microsensor networks. In: Proc. of the 33rd Annual Hawaii Int. Conf. on System Sciences, vol.\u00a02, p. 10 (2000)","DOI":"10.1109\/HICSS.2000.926982"},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"Horn, A.: On sentences which are true of direct unions of algebras. J. Symb. Log., 14\u201321 (1951)","DOI":"10.2307\/2268661"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. In: Proc. of the First IEEE Int. Workshop on Sensor Network Protocols and Applications, pp. 113\u2013127 (2003)","DOI":"10.1109\/SNPA.2003.1203362"},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Karlof, C., Sastry, N., Wagner, D.: Tinysec: a link layer security architecture for wireless sensor networks. In: Proc. 2nd ACM Int. Conf. on Embedded Networked Sensor Syst. (SenSys), pp. 162\u2013175. ACM (2004)","DOI":"10.1145\/1031495.1031515"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Levis, P., Madden, S., Polastre, J., Szewczyk, R., Whitehouse, K., Woo, A., Gay, D., Hill, J., Welsh, M., Brewer, E., Culler, D.: TinyOS: An Operating System for Sensor Networks. In: Ambient Intelligence, pp. 115\u2013148. Springer (2005)","DOI":"10.1007\/3-540-27139-2_7"},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Li, J., Zhang, D., Guo, L.: DCM: A Duty Cycle Based Multi-channel MAC Protocol for Wireless Sensor Networks. In: IET Int. Conf. on Wireless Sensor Network (IET-WSN), pp. 233\u2013238 (2010)","DOI":"10.1049\/cp.2010.1059"},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"Lin, E.Y.A., Rabaey, J.M., Wolisz, A.: Power-efficient rendez-vous schemes for dense wireless sensor networks. In: Proc. IEEE Int. Conf. on Communn. (ICC), vol.\u00a07, pp. 3769\u20133776. IEEE (2004)","DOI":"10.1109\/ICC.2004.1313259"},{"key":"1_CR18","unstructured":"Liu, D., Ning, P.: Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks. Tech. rep. (2002)"},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"Lowe, G.: A hierarchy of authentication specifications. In: CSFW 1997, pp. 31\u201343. IEEE Computer Society Press (1997)","DOI":"10.1109\/CSFW.1997.596782"},{"issue":"1","key":"1_CR20","first-page":"55","volume":"4","author":"U.M. Maurer","year":"1996","unstructured":"Maurer, U.M., Schmid, P.E.: A calculus for security bootstrapping in distributed systems. J.\u00a0Comp.\u00a0Sec.\u00a04(1), 55\u201380 (1996)","journal-title":"J.\u00a0Comp.\u00a0Sec."},{"key":"1_CR21","doi-asserted-by":"crossref","unstructured":"M\u00f6dersheim, S.: Algebraic properties in alice and bob notation. In: Int. Conf. on Availability, Reliability and Security (ARES), pp. 433\u2013440 (2009)","DOI":"10.1109\/ARES.2009.95"},{"key":"1_CR22","doi-asserted-by":"crossref","unstructured":"M\u00f6dersheim, S.: Abstraction by set-membership: verifying security protocols and web services with databases. In: ACM Conf. on Computer and Communications Security, pp. 351\u2013360 (2010)","DOI":"10.1145\/1866307.1866348"},{"key":"1_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/978-3-642-04444-1_21","volume-title":"Computer Security \u2013 ESORICS 2009","author":"S. M\u00f6dersheim","year":"2009","unstructured":"M\u00f6dersheim, S., Vigan\u00f2, L.: Secure Pseudonymous Channels. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol.\u00a05789, pp. 337\u2013354. Springer, Heidelberg (2009)"},{"key":"1_CR24","doi-asserted-by":"crossref","unstructured":"Peng, Y., Li, Z., Qiao, D., Zhang, W.: Delay-Bounded MAC with Minimal Idle Listening for Sensor Networks. In: Proc. 30th Ann. Joint Conf. IEEE Comput. and Communn. Soc (INFOCOM), pp. 1314\u20131322. IEEE (2011)","DOI":"10.1109\/INFCOM.2011.5934914"},{"issue":"5","key":"1_CR25","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1023\/A:1016598314198","volume":"8","author":"A. Perrig","year":"2002","unstructured":"Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: Spins: security protocols for sensor networks. Wirel. Netw.\u00a08(5), 521\u2013534 (2002)","journal-title":"Wirel. Netw."},{"key":"1_CR26","unstructured":"Song, H., Zhu, S., Cao, G.: Attack-resilient time synchronization for wireless sensor networks. In: Int. Conf. on Mobile Adhoc and Sensor Systems, pp. 765\u2013772 (2005)"},{"key":"1_CR27","unstructured":"Stallings, W.: Cryptography and Network Security. Prentice Hall (2005)"},{"key":"1_CR28","doi-asserted-by":"crossref","unstructured":"Sun, Y., Gurewitz, O., Du, S., Tang, L., Johnson, D.B.: ADB: An Efficient Multihop Broadcast Protocol based on Asynchronous Duty-cycling in Wireless Sensor Networks. In: Proc. 7th ACM Int. Conf. on Embedded Networked Sensor Syst. (SenSys), pp. 43\u201356. ACM (2009)","DOI":"10.1145\/1644038.1644044"},{"key":"1_CR29","doi-asserted-by":"crossref","unstructured":"Sun, Y., Gurewitz, O., Johnson, D.B.: RI-MAC: A Receiver-Initiated Asynchronous Duty Cycle MAC Protocol for Dynamic Traffic Loads in Wireless Sensor Networks. In: Proc. 6th ACM Int. Conf. on Embedded Networked Sensor Syst. (SenSys), pp. 1\u201314. ACM (2008)","DOI":"10.1145\/1460412.1460414"},{"key":"1_CR30","doi-asserted-by":"crossref","unstructured":"Tang, L., Sun, Y., Gurewitz, O., Johnson, D.B.: EM-MAC: A Dynamic Multichannel Energy-Efficient MAC Protocol for Wireless Sensor Networks. In: Proc. of ACM MobiHoc 2011, p. 23 (2011)","DOI":"10.1109\/INFCOM.2011.5934913"},{"key":"1_CR31","doi-asserted-by":"crossref","unstructured":"Tang, L., Sun, Y., Gurewitz, O., Johnson, D.B.: PW-MAC: An Energy-Efficient Predictive-Wakeup MAC Protocol for Wireless Sensor Networks. In: Proc. of INFOCOM 2011, pp. 1305\u20131313. IEEE (2011)","DOI":"10.1109\/INFCOM.2011.5934913"},{"key":"1_CR32","unstructured":"Texas Instruments: CC250: Low-cost low-power 2.4 ghz rf transceiver (2011), http:\/\/www.ti.com\/lit\/ds\/symlink\/cc2500.pdf"},{"key":"1_CR33","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1007\/978-3-540-73595-3_38","volume-title":"Automated Deduction \u2013 CADE-21","author":"C. Weidenbach","year":"2007","unstructured":"Weidenbach, C., Schmidt, R.A., Hillenbrand, T., Rusev, R., Topic, D.: System description: spass version 3.0. In: Pfenning, F. (ed.) CADE 2007. LNCS (LNAI), vol.\u00a04603, pp. 514\u2013520. Springer, Heidelberg (2007)"},{"key":"1_CR34","doi-asserted-by":"crossref","unstructured":"Yadav, P., McCann, J.A.: YA-MAC: Handling Unified Unicast and Broadcast Traffic in Multi-hop Wireless Sensor Networks. In: Proc. 7th IEEE Int. Conf. on Distributed Computing in Sensor Systems (DCOSS), pp. 1\u20139. IEEE (2011)","DOI":"10.1109\/DCOSS.2011.5982142"},{"issue":"11","key":"1_CR35","first-page":"2633","volume":"6","author":"Y.T. Yong","year":"2011","unstructured":"Yong, Y.T., Chow, C.O., Kanesan, J., Ishii, H.: EE-RI-MAC: An energy-efficient receiver-initiated asynchronous duty cycle MAC protocol for dynamic traffic loads in wireless sensor networks. Journal of Physical Sciences\u00a06(11), 2633\u20132643 (2011)","journal-title":"Journal of Physical Sciences"}],"container-title":["Lecture Notes in Computer Science","Secure IT Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-41488-6_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T15:04:29Z","timestamp":1746025469000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-41488-6_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642414879","9783642414886"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-41488-6_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}