{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T16:21:29Z","timestamp":1729614089599,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/icccn.2015.7288392","type":"proceedings-article","created":{"date-parts":[[2015,10,5]],"date-time":"2015-10-05T22:06:14Z","timestamp":1444082774000},"page":"1-8","source":"Crossref","is-referenced-by-count":6,"title":["Demonstrating the Threat of Hardware Trojans in Wireless Sensor Networks"],"prefix":"10.1109","author":[{"given":"Maryam","family":"Jalalitabar","sequence":"first","affiliation":[]},{"given":"Marco","family":"Valero","sequence":"additional","affiliation":[]},{"given":"Anu G.","family":"Bourgeois","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195801"},{"year":"0","key":"ref31"},{"article-title":"8-bit avr&#x00AE; microcontroller with 4\/8\/16\/32k bytes in-system programmable flash","year":"2010","author":"datasheet","key":"ref30"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/760834"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"367","DOI":"10.1201\/9780849379253-20","article-title":"Wireless sensor network security: A survey","volume":"1","author":"walters","year":"2007","journal-title":"Security in Distributed Grid Mobile and Pervasive Computing"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1024422"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/HLDVT.2009.5340158"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1629911.1630091"},{"key":"ref15","article-title":"Demonstration of hardware trojans","volume":"16","author":"kiamilev","year":"2008","journal-title":"DefCon"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2010.2093547"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2009.5224971"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2002.1039518"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2006.255595"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2009.5224968"},{"key":"ref4","first-page":"102","article-title":"Vital signs monitoring and patient tracking over a wireless network","author":"gao","year":"2006","journal-title":"Engineering in Medicine and Biology Society 2005 IEEE-EMBS 2005 27th Annual International Conference of the"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"396","DOI":"10.1007\/978-3-642-04138-9_28","article-title":"Mero: A statistical approach for hardware trojan detection","author":"chakraborty","year":"2009","journal-title":"Cryptographic Hardware and Embedded Systems- CHES 2009"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICCDCS.2004.1393370"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2006.26"},{"journal-title":"Mtm-cm5000-msp","year":"0","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2004.18"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1614320.1614337"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICBN.2005.1589681"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2004.1368895"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1031495.1031497"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/984622.984660"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2005.1523922"},{"key":"ref21","first-page":"2008","article-title":"Wormhole attack detection in wireless sensor networks","volume":"46","author":"tun","year":"2008","journal-title":"World Academy of Science Engineering and Technology"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2008.4559039"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2005.1495032"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/DFT.2008.61"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"382","DOI":"10.1007\/978-3-642-04138-9_27","article-title":"Trojan side-channels: Lightweight hardware trojans through side-channel engineering","author":"lin","year":"2009","journal-title":"Cryptographic Hardware and Embedded Systems- CHES 2009"}],"event":{"name":"2015 24th International Conference on Computer Communication and Networks (ICCCN)","start":{"date-parts":[[2015,8,3]]},"location":"Las Vegas, NV, USA","end":{"date-parts":[[2015,8,6]]}},"container-title":["2015 24th International Conference on Computer Communication and Networks (ICCCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7287473\/7288342\/07288392.pdf?arnumber=7288392","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,9]],"date-time":"2020-09-09T06:25:49Z","timestamp":1599632749000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7288392\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/icccn.2015.7288392","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}