{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:08:31Z","timestamp":1761401311515,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/icccn.2005.1523922","type":"proceedings-article","created":{"date-parts":[[2006,10,11]],"date-time":"2006-10-11T15:51:59Z","timestamp":1160581919000},"page":"489-496","source":"Crossref","is-referenced-by-count":9,"title":["Search-based physical attacks in sensor networks"],"prefix":"10.1109","author":[{"family":"Xun Wang","sequence":"first","affiliation":[]},{"given":"S.","family":"Chellappan","sequence":"additional","affiliation":[]},{"family":"Wenjun Gu","sequence":"additional","affiliation":[]},{"family":"Wei Yu","sequence":"additional","affiliation":[]},{"family":"Dong Xuan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"Performacne measurement of ad-hoc sensor networks under threat(s)","author":"patil","year":"2004","journal-title":"Proc IEEE Wireless Commun Netw Conf (WCNC)"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/HOTOS.2001.990058"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2004.1311934"},{"key":"18","article-title":"Enhancing base station security in wireless sensor networks","author":"deng","year":"2002","journal-title":"Technical Report CU-CS 951-03 Department of Computer Science University of Colorado"},{"key":"15","article-title":"A key management scheme for wireless sensor networks using deployment knowledge","author":"du","year":"2004","journal-title":"Proc of INFOCOM"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/948117.948120"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209196"},{"key":"14","article-title":"Insens: Intrusion-tolerant routing in wireless sensor networks","volume":"cu cs 9393 2","author":"deng","year":"2002","journal-title":"University of Colorado Department of Computer Science Technical Report"},{"journal-title":"Security Engineering A Guide to Building Dependable Distributed Systems","year":"2001","author":"anderson","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/381677.381679"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/98163.98167"},{"key":"3","article-title":"Wormhole detection in wireless ad hoc networks","author":"hu","year":"2002","journal-title":"Department of Computer Science Rice University Tech Rep TR01-384"},{"key":"20","article-title":"Low cost attacks on tamper resistant devices","author":"anderson","year":"1997","journal-title":"Proc Int Workshop on Security Protocols"},{"key":"2","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45748-8_24","article-title":"The sybil attack","author":"douceur","year":"2002","journal-title":"Proc of the 1st Int Workshop on Peer-to-Peer Syst"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/990680.990707"},{"key":"10","first-page":"53","article-title":"Jam: A jammed-area mapping service for sensor networks","volume":"47","author":"wood","year":"2004","journal-title":"Communications of the ACM Vol 47"},{"key":"7","doi-asserted-by":"crossref","DOI":"10.1145\/381677.381696","article-title":"Spins: Security protocols for sensor networks","author":"perrig","year":"2001","journal-title":"Proc 10th Annu Int Conf Mobile Computing and Networking (MOBICOM)"},{"key":"6","article-title":"Packet leashes: A defense against wormhole attacks in wireless ad hod networks","author":"hu","year":"2003","journal-title":"Proc of 21st Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM)"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/984622.984660"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/SNPA.2003.1203362"},{"key":"9","article-title":"Lifetime optimization of sensor networks under physical attacks","author":"wang","year":"2005","journal-title":"Proc IEEE Internation Conference on Communications (ICC)"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2002.1039518"}],"event":{"name":"14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005.","location":"San Diego, CA, USA"},"container-title":["Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10216\/32582\/01523922.pdf?arnumber=1523922","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,21]],"date-time":"2019-04-21T16:44:07Z","timestamp":1555865047000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1523922\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/icccn.2005.1523922","relation":{},"subject":[]}}