{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T17:08:03Z","timestamp":1776186483824,"version":"3.50.1"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1109\/icsenst.2013.6727623","type":"proceedings-article","created":{"date-parts":[[2014,1,31]],"date-time":"2014-01-31T18:39:06Z","timestamp":1391193546000},"page":"97-102","source":"Crossref","is-referenced-by-count":19,"title":["Wireless Sensor Network attacks: An overview and critical analysis"],"prefix":"10.1109","author":[{"given":"Arash","family":"Tayebi","sequence":"first","affiliation":[]},{"given":"Setevan","family":"Berber","sequence":"additional","affiliation":[]},{"given":"Akshya","family":"Swain","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/WOCC.2010.5510642"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2010.5601959"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2009.04.009"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/984622.984660"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-010-9449-4"},{"key":"24","first-page":"574","article-title":"A hybrid, dynamic traffic-adaptive MAC protocol for Wireless Sensor Networks","author":"qingbo","year":"2013","journal-title":"Advanced Communication Technology (ICACT) 2013 15th International Conference on"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1102219.1102238"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/ICTEL.2010.5478822"},{"key":"13","first-page":"403","article-title":"A synchronization attack and defense in energy-efficient listen-sleep slotted MAC protocols","author":"xiaoming","year":"2008","journal-title":"Emerging Security Information Systems and Technologies 2008 SECURWARE '08 Second International Conference on"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/IAdCC.2013.6514274"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2010.05.090700"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIT.2009.290"},{"key":"21","first-page":"25","article-title":"Transient-based identification of wireless sensor nodes","author":"danev","year":"2009","journal-title":"Proceedings of the 2009 International Conference on Information Processing in Sensor Networks"},{"key":"3","author":"znaidi","year":"2008","journal-title":"An Ontology for Attacks in Wireless Sensor Networks"},{"key":"20","article-title":"Semi-invasive attacks-A new approach to hardware security analysis","author":"skorobogatov","year":"2005","journal-title":"Technical Report"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2006.1637931"},{"key":"1","volume":"1","author":"lo?pez","year":"2008","journal-title":"Wireless Sensor Network Security"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/IAS.2009.78"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861394"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1201\/9781420013399"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1102219.1102234"},{"key":"4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1464420.1464426","article-title":"Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols","volume":"5","author":"yee wei","year":"2009","journal-title":"ACM Trans Sen Netw"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-012-0751-y"},{"key":"8","doi-asserted-by":"crossref","first-page":"526","DOI":"10.1109\/WiMob.2008.83","article-title":"Launching a sinkhole attack in wireless sensor networks; The intruder side","author":"krontiris","year":"2008","journal-title":"Networking and Communications 2008 WIMOB '08 IEEE International Conference on Wireless and Mobile Computing"}],"event":{"name":"2013 Seventh International Conference on Sensing Technology (ICST)","location":"Wellington, New Zealand","start":{"date-parts":[[2013,12,3]]},"end":{"date-parts":[[2013,12,5]]}},"container-title":["2013 Seventh International Conference on Sensing Technology (ICST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6698448\/6727602\/06727623.pdf?arnumber=6727623","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T03:06:12Z","timestamp":1498100772000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6727623\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/icsenst.2013.6727623","relation":{},"subject":[],"published":{"date-parts":[[2013,12]]}}}