{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T06:56:30Z","timestamp":1760597790355,"version":"3.37.3"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2017,11,7]],"date-time":"2017-11-07T00:00:00Z","timestamp":1510012800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100003816","name":"Huawei Technologies","doi-asserted-by":"publisher","award":["OTABRA09160202003286840274"],"award-info":[{"award-number":["OTABRA09160202003286840274"]}],"id":[{"id":"10.13039\/501100003816","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2019,5]]},"DOI":"10.1007\/s11276-017-1610-2","type":"journal-article","created":{"date-parts":[[2017,11,7]],"date-time":"2017-11-07T02:18:23Z","timestamp":1510021103000},"page":"1533-1556","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["IoT6Sec: reliability model for Internet of Things security focused on anomalous measurements identification with energy analysis"],"prefix":"10.1007","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4239-512X","authenticated-orcid":false,"given":"Norisvaldo","family":"Ferraz Junior","sequence":"first","affiliation":[]},{"given":"Anderson","family":"Silva","sequence":"additional","affiliation":[]},{"given":"Adilson","family":"Guelfi","sequence":"additional","affiliation":[]},{"given":"Sergio Takeo","family":"Kofuji","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,7]]},"reference":[{"issue":"15","key":"1610_CR1","doi-asserted-by":"publisher","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L Atzori","year":"2010","unstructured":"Atzori, L., Iera, A., & Morabito, G. (2010). The Internet of Things: A survey. Computer Networks, 54(15), 2787\u20132805. https:\/\/doi.org\/10.1016\/j.comnet.2010.05.010 .","journal-title":"Computer Networks"},{"issue":"4","key":"1610_CR2","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1007\/s11633-014-0847-9","volume":"12","author":"ZG Ding","year":"2015","unstructured":"Ding, Z. G., Du, D. J., & Fei, M. R. (2015). An isolation principle based distributed anomaly detection method in wireless sensor networks. International Journal of Automation and Computing, 12(4), 402\u2013412. https:\/\/doi.org\/10.1007\/s11633-014-0847-9 .","journal-title":"International Journal of Automation and Computing"},{"key":"1610_CR3","doi-asserted-by":"publisher","unstructured":"Dunkels, A., Osterlind, F., Tsiftes, N., & He, Z. (2007). Software-based on-line energy estimation for sensor nodes. In Proceedings of the 4th workshop on embedded networked sensors\u2014EmNets \u201907. New York, NY: ACM Press, p.\u00a028. https:\/\/doi.org\/10.1145\/1278972.1278979","DOI":"10.1145\/1278972.1278979"},{"key":"1610_CR4","doi-asserted-by":"publisher","DOI":"10.3390\/s16060868","author":"V Garcia-Font","year":"2016","unstructured":"Garcia-Font, V., Carrigues, C., & Rif\u00e0-Pous, H. (2016). A comparative study of anomaly detection techniques for smart city wireless sensor networks. Sensors,. https:\/\/doi.org\/10.3390\/s16060868 .","journal-title":"Sensors"},{"issue":"PA","key":"1610_CR5","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1016\/j.adhoc.2014.08.001","volume":"24","author":"J Granjal","year":"2015","unstructured":"Granjal, J., Monteiro, E., & Silva, J. S. (2015). Security in the integration of low-power Wireless Sensor Networks with the Internet: A survey. Ad Hoc Networks, 24(PA), 264\u2013287. https:\/\/doi.org\/10.1016\/j.adhoc.2014.08.001 .","journal-title":"Ad Hoc Networks"},{"key":"1610_CR6","doi-asserted-by":"publisher","unstructured":"Granjal, J., Silva, R., Monteiro, E., Sa Silva, J., & Boavida, F. (2008). Why is IPSec a viable option for wireless sensor networks. In 2008 5th IEEE international conference on mobile ad hoc and sensor systems. IEEE, pp. 802\u2013807. https:\/\/doi.org\/10.1109\/MAHSS.2008.4660130 .","DOI":"10.1109\/MAHSS.2008.4660130"},{"issue":"8","key":"1610_CR7","doi-asserted-by":"publisher","first-page":"2165","DOI":"10.1007\/s11276-014-0736-8","volume":"20","author":"T Hayajneh","year":"2014","unstructured":"Hayajneh, T., Almashaqbeh, G., Ullah, S., & Vasilakos, A. V. (2014). A survey of wireless technologies coexistence in WBAN: Analysis and open research issues. Wireless Networks, 20(8), 2165\u20132199. https:\/\/doi.org\/10.1007\/s11276-014-0736-8 .","journal-title":"Wireless Networks"},{"issue":"5","key":"1610_CR8","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1109\/JIOT.2014.2359538","volume":"1","author":"C Hennebert","year":"2014","unstructured":"Hennebert, C., & Santos, J. D. (2014). Security protocols and privacy issues into 6LoWPAN stack: A synthesis. IEEE Internet of Things Journal, 1(5), 384\u2013398. https:\/\/doi.org\/10.1109\/JIOT.2014.2359538 .","journal-title":"IEEE Internet of Things Journal"},{"key":"1610_CR9","unstructured":"Hui, J., & Thubert, P. (2011). Compression format for IPv6 datagrams over IEEE 802.15.4-based networks. https:\/\/tools.ietf.org\/html\/rfc6282 . Accessed Feb 2015."},{"key":"1610_CR10","unstructured":"IBRL: Intel Lab Data (2004). http:\/\/db.csail.mit.edu\/labdata\/labdata.html ."},{"key":"1610_CR11","doi-asserted-by":"crossref","unstructured":"IEEE: IEEE 802.15.4, vol. 2011. IEEE WPAN TG4 (2011).","DOI":"10.1109\/MIC.2011.10"},{"issue":"8","key":"1610_CR12","doi-asserted-by":"publisher","first-page":"2481","DOI":"10.1007\/s11276-014-0761-7","volume":"20","author":"Q Jing","year":"2014","unstructured":"Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., & Qiu, D. (2014). Security of the Internet of Things: Perspectives and challenges. Wireless Networks, 20(8), 2481\u20132501. https:\/\/doi.org\/10.1007\/s11276-014-0761-7 .","journal-title":"Wireless Networks"},{"key":"1610_CR13","volume-title":"Applied multivariate statistical analysis","author":"RA Johnson","year":"2007","unstructured":"Johnson, R. A., & Wichern, D. W. (2007). Applied multivariate statistical analysis (6th ed.). Upper Saddle River: Pearson Prentice Hall.","edition":"6"},{"key":"1610_CR14","doi-asserted-by":"publisher","unstructured":"Kasinathan, P., Pastrone, C., Spirito, M.A., & Vinkovits, M. (2013). Denial-of-Service detection in 6LoWPAN based Internet of Things. In 2013 IEEE 9th international conference on wireless and mobile computing, networking and communications (WiMob). IEEE, pp. 600\u2013607. https:\/\/doi.org\/10.1109\/WiMOB.2013.6673419 .","DOI":"10.1109\/WiMOB.2013.6673419"},{"key":"1610_CR15","unstructured":"Kushalnagar, N., Montenegro, G., & Schumacher, C. (2007). IPv6 over low power wireless personal area networks (6LoWPANs): Overview, assumptions, problem statement, and goals. https:\/\/tools.ietf.org\/html\/rfc4919 . Accessed Feb 2015."},{"key":"1610_CR16","unstructured":"Loureiro, A. A., Nogueira, J. M. S., Ruiz, L. B., Mini, R. A. D. F., Nakamura, E. F., & Figueiredo, C. M. S. (2003). Redes de Sensores Sem Fio. In: XXI Simp\u00f3sio Brasileiro de Redes de Computadores, pp. 179\u2013226."},{"issue":"3","key":"1610_CR17","first-page":"459","volume":"18","author":"A Mayzaud","year":"2016","unstructured":"Mayzaud, A., Badonnel, R., & Chrisment, I. (2016). A taxonomy of attacks in RPL-based internet of things. International Journal of Network Security, 18(3), 459\u2013473.","journal-title":"International Journal of Network Security"},{"key":"1610_CR18","volume-title":"An\u00e1lise de dados atrav\u00e9s de m\u00e9todos de estat\u00edstica multivariada: uma abordagem aplicada","author":"SA Mingoti","year":"2013","unstructured":"Mingoti, S. A. (2013). An\u00e1lise de dados atrav\u00e9s de m\u00e9todos de estat\u00edstica multivariada: uma abordagem aplicada. Belo Horizonte: Editora UFMG."},{"issue":"7","key":"1610_CR19","doi-asserted-by":"publisher","first-page":"1497","DOI":"10.1016\/j.adhoc.2012.02.016","volume":"10","author":"D Miorandi","year":"2012","unstructured":"Miorandi, D., Sicari, S., De Pellegrini, F., & Chlamtac, I. (2012). Internet of things: Vision, applications and research challenges. Ad Hoc Networks, 10(7), 1497\u20131516. https:\/\/doi.org\/10.1016\/j.adhoc.2012.02.016 .","journal-title":"Ad Hoc Networks"},{"key":"1610_CR20","volume-title":"Estat\u00edstica B\u00e1sica","author":"PA Morettin","year":"2004","unstructured":"Morettin, P. A., & Bussab, W. O. (2004). Estat\u00edstica B\u00e1sica. S\u00e3o Paulo: Editora Saraiva."},{"key":"1610_CR21","doi-asserted-by":"publisher","unstructured":"Moshtaghi, M., Leckie, C., Karunasekera, S., Bezdek, J. C., Rajasegarar, S., & Palaniswami, M. (2011). Incremental elliptical boundary estimation for anomaly detection in wireless sensor networks. In: 2011 IEEE 11th international conference on data mining, 1, pp. 467\u2013476. IEEE. https:\/\/doi.org\/10.1109\/ICDM.2011.80 .","DOI":"10.1109\/ICDM.2011.80"},{"key":"1610_CR22","doi-asserted-by":"publisher","unstructured":"Rajasegarar, S., Bezdek, J. C., Leckie, C., & Palaniswami, M. (2007). Analysis of anomalies in IBRL data from a wireless sensor network deployment. In 2007 international conference on sensor technologies and applications (SENSORCOMM 2007). IEEE, pp. 158\u2013163. https:\/\/doi.org\/10.1109\/SENSORCOMM.2007.4394914 .","DOI":"10.1109\/SENSORCOMM.2007.4394914"},{"key":"1610_CR23","doi-asserted-by":"publisher","unstructured":"Rantos, K., Papanikolaou, A., Manifavas, C., & Papaefstathiou, I. (2013). IPv6 security for low power and lossy networks. In 2013 IFIP wireless days (WD). IEEE, pp. 1\u20138. https:\/\/doi.org\/10.1109\/WD.2013.6686510 .","DOI":"10.1109\/WD.2013.6686510"},{"issue":"8","key":"1610_CR24","doi-asserted-by":"publisher","first-page":"10087","DOI":"10.3390\/s130810087","volume":"13","author":"M Rassam","year":"2013","unstructured":"Rassam, M., Zainal, A., & Maarof, M. (2013). Advancements of data anomaly detection research in wireless sensor networks: A survey and open issues. Sensors, 13(8), 10087\u201310122. https:\/\/doi.org\/10.3390\/s130810087 .","journal-title":"Sensors"},{"key":"1610_CR25","doi-asserted-by":"publisher","unstructured":"Raza, S., Duquennoy, S., Chung, T., Yazar, D., Voigt, T., & Roedig, U. (2011). Securing communication in 6LoWPAN with compressed IPsec. In 2011 international conference on distributed computing in sensor systems and workshops (DCOSS). IEEE, pp. 1\u20138. https:\/\/doi.org\/10.1109\/DCOSS.2011.5982177 .","DOI":"10.1109\/DCOSS.2011.5982177"},{"key":"1610_CR26","unstructured":"Raza, S., Duquennoy, S., & Selander, G. (2016). Work-in-progress\u2014Internet draft. Compression of IPsec AH and ESP headers for 6LoWPAN networks."},{"issue":"10","key":"1610_CR27","doi-asserted-by":"publisher","first-page":"3711","DOI":"10.1109\/JSEN.2013.2277656","volume":"13","author":"S Raza","year":"2013","unstructured":"Raza, S., Shafagh, H., Hewage, K., Hummen, R., & Voigt, T. (2013). Lithe: Lightweight secure CoAP for the internet of things. IEEE Sensors Journal, 13(10), 3711\u20133720. https:\/\/doi.org\/10.1109\/JSEN.2013.2277656 .","journal-title":"IEEE Sensors Journal"},{"issue":"8","key":"1610_CR28","doi-asserted-by":"publisher","first-page":"2661","DOI":"10.1016\/j.adhoc.2013.04.014","volume":"11","author":"S Raza","year":"2013","unstructured":"Raza, S., Wallgren, L., & Voigt, T. (2013). SVELTE: Real-time intrusion detection in the Internet of Things. Ad Hoc Networks, 11(8), 2661\u20132674. https:\/\/doi.org\/10.1016\/j.adhoc.2013.04.014 .","journal-title":"Ad Hoc Networks"},{"key":"1610_CR29","volume-title":"6LoWPAN: The wireless embedded internet","author":"Z Shelby","year":"2011","unstructured":"Shelby, Z., & Bormann, C. (2011). 6LoWPAN: The wireless embedded internet. New York: Wiley."},{"key":"1610_CR30","doi-asserted-by":"publisher","unstructured":"Silva, A. A. A., Pontes, E., Zhou, F., & Kofuji, S. T. (2014). Grey model and polynomial regression for identifying malicious nodes in MANETs. In 2014 IEEE global communications conference. IEEE, pp. 162\u2013168. https:\/\/doi.org\/10.1109\/GLOCOM.2014.7036801 .","DOI":"10.1109\/GLOCOM.2014.7036801"},{"key":"1610_CR31","doi-asserted-by":"publisher","unstructured":"Suthaharan, S., Alzahrani, M., Rajasegarar, S., Leckie, C., & Palaniswami, M. (2010). Labelled data collection for anomaly detection in wireless sensor networks. In 2010 sixth international conference on intelligent sensors, sensor networks and information processing. IEEE, pp. 269\u2013274. https:\/\/doi.org\/10.1109\/ISSNIP.2010.5706782 .","DOI":"10.1109\/ISSNIP.2010.5706782"},{"key":"1610_CR32","volume-title":"Interconnecting smart objects with IP: The next internet","author":"JP Vasseur","year":"2010","unstructured":"Vasseur, J. P., & Dunkels, A. (2010). Interconnecting smart objects with IP: The next internet. New York: Elsevier."},{"key":"1610_CR33","doi-asserted-by":"publisher","unstructured":"Vu\u010dini\u0107, M., Tourancheau, B., Rousseau, F., Duda, A., Damon, L., & Guizzetti, R. (2015). Oscar: Object security architecture for the internet of things. Ad Hoc Networks, 32, 3\u201316. https:\/\/doi.org\/10.1016\/j.adhoc.2014.12.005 . Internet of Things security and privacy: Design methods and optimization.","DOI":"10.1016\/j.adhoc.2014.12.005"},{"issue":"2","key":"1610_CR34","doi-asserted-by":"publisher","first-page":"574","DOI":"10.1109\/TPDS.2014.2308198","volume":"26","author":"M Xie","year":"2015","unstructured":"Xie, M., Hu, J., & Guo, S. (2015). Segment-based anomaly detection with approximated sample covariance matrix in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 26(2), 574\u2013583. https:\/\/doi.org\/10.1109\/TPDS.2014.2308198 .","journal-title":"IEEE Transactions on Parallel and Distributed Systems"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-017-1610-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11276-017-1610-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-017-1610-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,5]],"date-time":"2019-10-05T14:41:56Z","timestamp":1570286516000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11276-017-1610-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,7]]},"references-count":34,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2019,5]]}},"alternative-id":["1610"],"URL":"https:\/\/doi.org\/10.1007\/s11276-017-1610-2","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"type":"print","value":"1022-0038"},{"type":"electronic","value":"1572-8196"}],"subject":[],"published":{"date-parts":[[2017,11,7]]},"assertion":[{"value":"7 November 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}