{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T02:03:42Z","timestamp":1747793022410,"version":"3.40.3"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030000592"},{"type":"electronic","value":"9783030000608"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00060-8_9","type":"book-chapter","created":{"date-parts":[[2018,8,25]],"date-time":"2018-08-25T11:44:14Z","timestamp":1535197454000},"page":"114-134","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Proposing a Behavior-Based IDS Model for IoT Environment"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8821-9549","authenticated-orcid":false,"given":"Fadi","family":"Abusafat","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5075-6189","authenticated-orcid":false,"given":"Tiago","family":"Pereira","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5389-3285","authenticated-orcid":false,"given":"Henrique","family":"Santos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,26]]},"reference":[{"key":"9_CR1","unstructured":"Ahmed, M., Huang, X., Sharma, D.: A taxonomy of internal attacks in wireless sensor network. Memory (Kbytes) 6(2), 427\u2013430 (2012). http:\/\/waset.org\/journals\/waset\/v62\/v62-77.pdf"},{"issue":"4","key":"9_CR2","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1016\/S1389-1286(01)00302-4","volume":"38","author":"IF Akyildiz","year":"2002","unstructured":"Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Comput. Netw. 38(4), 393\u2013422 (2002). https:\/\/doi.org\/10.1016\/S1389-1286(01)00302-4","journal-title":"Comput. Netw."},{"key":"9_CR3","unstructured":"Al-Shehri, S.M., Loskot, P., Numanoglu, T., Mert, M.: Common Metrics for Analyzing, Developing and Managing Telecommunication Networks, pp. 1\u201351 (2017). https:\/\/arxiv.org\/abs\/1707.03290"},{"issue":"7","key":"9_CR4","first-page":"37","volume":"12","author":"N Alajmi","year":"2014","unstructured":"Alajmi, N.: Wireless sensor networks attacks and solutions. IJCSIS Int. J. Comput. Sci. Inf. Secur. 12(7), 37\u201340 (2014)","journal-title":"IJCSIS Int. J. Comput. Sci. Inf. Secur."},{"issue":"2","key":"9_CR5","doi-asserted-by":"publisher","first-page":"35","DOI":"10.5121\/ijwmn.2014.6204","volume":"6","author":"S Alam","year":"2014","unstructured":"Alam, S., De, D.: Analysis of security threats in wireless sensor network. Int. J. Wirel. Mob. Netw. (IJWMN) 6(2), 35\u201346 (2014). https:\/\/doi.org\/10.5121\/ijwmn.2014.6204","journal-title":"Int. J. Wirel. Mob. Netw. (IJWMN)"},{"issue":"10","key":"9_CR6","doi-asserted-by":"publisher","first-page":"1224","DOI":"10.5829\/idosi.wasj.2014.30.10.334","volume":"30","author":"RW Anwar","year":"2014","unstructured":"Anwar, R.W., Bakhtiari, M., Zainal, A., Hanan Abdullah, A., Qureshi, K.N.: Security issues and attacks in wireless sensor network. World Appl. Sci. J. 30(10), 1224\u20131227 (2014). https:\/\/doi.org\/10.5829\/idosi.wasj.2014.30.10.334","journal-title":"World Appl. Sci. J."},{"key":"9_CR7","unstructured":"Balen, J., Martinovic, G., Hocenski, Z.: Network performance evaluation of latest windows operating systems. In: 2012 20th International Conference on Software, Telecommunications and Computer Networks (SoftCOM), pp. 1\u20136 (2012). http:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?arnumber=6347604"},{"issue":"3","key":"9_CR8","doi-asserted-by":"publisher","first-page":"188","DOI":"10.2174\/2213275911104030188","volume":"4","author":"J Balen","year":"2011","unstructured":"Balen, J., Zagar, D., Martinovic, G.: Quality of service in wireless sensor networks: a survey and related patents. Recent Patents Comput. Sci. 4(3), 188\u2013202 (2011). https:\/\/doi.org\/10.2174\/2213275911104030188","journal-title":"Recent Patents Comput. Sci."},{"key":"9_CR9","unstructured":"Bokare, M., Ralegaonkar, A.: Wireless sensor network. Int. J. Comput. Eng. Sci. (IJCES) 2(3), 55\u201361 (2012). http:\/\/vixra.org\/pdf\/1208.0129v1.pdf"},{"key":"9_CR10","doi-asserted-by":"publisher","unstructured":"Bonguet, A., Bellaiche, M.: A survey of Denial-of-Service and distributed Denial of Service attacks and defenses in cloud computing. Future Internet 9(3) (2017). https:\/\/doi.org\/10.3390\/fi9030043","DOI":"10.3390\/fi9030043"},{"key":"9_CR11","unstructured":"Chelli, K.: Security issues in wireless sensor networks: attacks and countermeasures. In:  Proceedings of the World Congress on Engineering 2015, WCE 2015, London, U.K., vol. I, 1\u20133 July 2015. http:\/\/www.iaeng.org\/publication\/WCE2015\/WCE2015_pp519-524.pdf"},{"issue":"11","key":"9_CR12","doi-asserted-by":"publisher","first-page":"1932","DOI":"10.3390\/s16111932","volume":"16","author":"A Diaz","year":"2016","unstructured":"Diaz, A., Sanchez, P.: Simulation of attacks for security in wireless sensor network. Sensors 16(11), 1932 (2016). https:\/\/doi.org\/10.3390\/s16111932","journal-title":"Sensors"},{"key":"9_CR13","doi-asserted-by":"publisher","unstructured":"Garcia-Font, V., Garrigues, C., Rif\u00e0-Pous, H.: Attack classification schema for smart city WSNs. Sensors (Switzerland) 17(4) (2017). https:\/\/doi.org\/10.3390\/s17040771","DOI":"10.3390\/s17040771"},{"key":"9_CR14","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1007\/978-981-10-6005-2_40","volume":"638","author":"RK Gill","year":"2018","unstructured":"Gill, R.K., Sachdeva, M.: Detection of hello flood attack on LEACH in wireless sensor networks. Adv. Intell. Syst. Comput. 638, 377\u2013387 (2018). https:\/\/doi.org\/10.1007\/978-981-10-6005-2_40","journal-title":"Adv. Intell. Syst. Comput."},{"key":"9_CR15","unstructured":"Habibi, A.: Candadian Institute for Cybersecurity (CIC), University of New Brunswick (UNB), Frederication, Canada (2018). http:\/\/www.unb.ca\/cic\/about\/index.html"},{"key":"9_CR16","unstructured":"Kaur, D., Singh, P.: Various OSI layer attacks and countermeasure to enhance the performance of WSNs during wormhole attack. ACEEE Int. J. Netw. Secur. 5(1) (2014). http:\/\/searchdl.org\/public\/journals\/2014\/IJNS\/5\/1\/11.pdf"},{"issue":"2010","key":"9_CR17","first-page":"31","volume":"5","author":"T Kavitha","year":"2010","unstructured":"Kavitha, T., Sridharan, D.: Security vulnerabilities in wireless sensor networks: a survey. J. Inf. Assur. Secur. 5(2010), 31\u201344 (2010)","journal-title":"J. Inf. Assur. Secur."},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"Khatri, S.: A taxonomy of physical layer attacks in MANET 117(22), 6\u201311 (2015)","DOI":"10.5120\/20684-3517"},{"key":"9_CR19","doi-asserted-by":"publisher","unstructured":"Liu, Y.M., Wu, S.C., Nian, X.H.: The architecture and characteristics of wireless sensor network. In: 2009 International Conference on Computer Technology and Development, ICCTD 2009, vol. 1, no. 561, pp. 561\u2013565 (2009). https:\/\/doi.org\/10.1109\/ICCTD.2009.44","DOI":"10.1109\/ICCTD.2009.44"},{"key":"9_CR20","unstructured":"Lupu, T., Parvan, V.: Main types of attacks in wireless sensor networks. In: Proceedings of WSEAS International Conference. Recent Advances in Computer Engineering, pp. 180\u2013185 (2009)"},{"issue":"7","key":"9_CR21","doi-asserted-by":"publisher","first-page":"1497","DOI":"10.1016\/j.adhoc.2012.02.016","volume":"10","author":"D Miorandi","year":"2012","unstructured":"Miorandi, D., Sicari, S., De Pellegrini, F., Chlamtac, I.: Internet of things: vision, applications and research challenges. Ad Hoc Netw. 10(7), 1497\u20131516 (2012). https:\/\/doi.org\/10.1016\/j.adhoc.2012.02.016","journal-title":"Ad Hoc Netw."},{"issue":"02","key":"9_CR22","doi-asserted-by":"publisher","first-page":"69","DOI":"10.4236\/jis.2011.22007","volume":"02","author":"S Mohammadi","year":"2011","unstructured":"Mohammadi, S.: A comparison of link layer attacks on wireless sensor networks. J. Inf. Secur. 02(02), 69\u201384 (2011). https:\/\/doi.org\/10.4236\/jis.2011.22007","journal-title":"J. Inf. Secur."},{"issue":"2","key":"9_CR23","doi-asserted-by":"publisher","first-page":"24","DOI":"10.5121\/ijp2p.2011.2203","volume":"2","author":"S Mohammadi","year":"2011","unstructured":"Mohammadi, S., Jadidoleslamy, H.: A comparison of physical attacks on wireless sensor networks. Int. J. Peer to Peer Netw. 2(2), 24\u201342 (2011). https:\/\/doi.org\/10.5121\/ijp2p.2011.2203","journal-title":"Int. J. Peer to Peer Netw."},{"key":"9_CR24","doi-asserted-by":"publisher","unstructured":"Y\u0131lmaz, M.H., Arslan, H.: A survey: spoofing attacks in physical layer security. In: Proceedings - Conference on Local Computer Networks, LCN, December 2015, pp. 812\u2013817 (2015). https:\/\/doi.org\/10.1109\/LCNW.2015.7365932","DOI":"10.1109\/LCNW.2015.7365932"},{"key":"9_CR25","unstructured":"Nandal, V.: Comparison of attacks on wireless sensor networks 3(7), 208\u2013213 (2014)"},{"key":"9_CR26","doi-asserted-by":"publisher","unstructured":"Patel, M., Aggarwal, A., Chaubey, N.: Wormhole attacks and countermeasures in wireless sensor networks\u202f: a survey. Int. J. Eng. Technol. 9(2), 1049\u20131060 (2017). https:\/\/doi.org\/10.21817\/ijet\/2017\/v9i2\/170902126","DOI":"10.21817\/ijet\/2017\/v9i2\/170902126"},{"key":"9_CR27","unstructured":"Pereira, V.N.S.S.: Performance measurement in wireless sensor networks, p. 213 (2016)"},{"issue":"9","key":"9_CR28","doi-asserted-by":"publisher","first-page":"975","DOI":"10.5120\/21565-4589","volume":"121","author":"P Pongle","year":"2015","unstructured":"Pongle, P., Chavan, G.: Real time intrusion and wormhole attack detection in internet of things. Int. J. Comput. Appl. 121(9), 975\u20138887 (2015). https:\/\/doi.org\/10.5120\/21565-4589","journal-title":"Int. J. Comput. Appl."},{"key":"9_CR29","unstructured":"Kirar, V.P.S.: A survey of attacks and security requirements in wireless sensor networks. World Acad. Sci. Eng. Technol. Int. J. Electron. Commun. Eng. 8(12) (2014). https:\/\/waset.org\/publications\/10000089\/a-survey-of-attacks-and-security-requirements-in-wireless-sensor-networks"},{"issue":"3","key":"9_CR30","doi-asserted-by":"publisher","first-page":"143","DOI":"10.5121\/ijcses.2011.2311","volume":"2","author":"NS Raote","year":"2011","unstructured":"Raote, N.S.: Defending wormhole attack in wireless ad-hoc network. Int. J. Comput. Sci. Eng. Surv. 2(3), 143\u2013148 (2011). https:\/\/doi.org\/10.5121\/ijcses.2011.2311","journal-title":"Int. J. Comput. Sci. Eng. Surv."},{"key":"9_CR31","doi-asserted-by":"publisher","unstructured":"Rghioui, A., Bouhorma, M.: 6lo technology for smart cities development\u202f: security case study 92(15), 54\u201359 (2014). https:\/\/doi.org\/10.5120\/16089-5402","DOI":"10.5120\/16089-5402"},{"key":"9_CR32","unstructured":"Shahzad, F., Pasha, M., Ahmad, A.: A Survey of Active Attacks on Wireless Sensor Networks and their Countermeasures, vol. 14, no. 12, pp. 54\u201365 (2017). http:\/\/arxiv.org\/abs\/1702.07136"},{"key":"9_CR33","unstructured":"Subramanian, V.: Proximity-based attacks in wireless sensor networks. Int. J. Sci. Eng. Res. 3(May 2013), 2\u20135 (2013)"},{"key":"9_CR34","doi-asserted-by":"publisher","unstructured":"Tellez, M., El-Tawab, S., Heydari, M.H.: IoT security attacks using reverse engineering methods on WSN applications. In: 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), pp. 182\u2013187 (2016). https:\/\/doi.org\/10.1109\/WF-IoT.2016.7845429","DOI":"10.1109\/WF-IoT.2016.7845429"},{"key":"9_CR35","doi-asserted-by":"publisher","unstructured":"Zarpel\u00e3o, B.B., Miani, R.S., Kawakani, C.T., de Alvarenga, S.C.: A survey of intrusion detection in internet of things. J. Netw. Comput. Appl. (2017). https:\/\/doi.org\/10.1016\/j.jnca.2017.02.009","DOI":"10.1016\/j.jnca.2017.02.009"}],"container-title":["Lecture Notes in Business Information Processing","Information Systems: Research, Development, Applications, Education"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00060-8_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T13:59:36Z","timestamp":1710338376000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-00060-8_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030000592","9783030000608"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00060-8_9","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"26 August 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SIGSAND\/PLAIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"EuroSymposium on Systems Analysis and Design","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Gdansk","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sigsand2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/eurosymposium.eu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}