{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,4]],"date-time":"2025-10-04T08:14:32Z","timestamp":1759565672221,"version":"3.28.0"},"reference-count":48,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1109\/ict-dm.2017.8275691","type":"proceedings-article","created":{"date-parts":[[2018,2,1]],"date-time":"2018-02-01T16:48:19Z","timestamp":1517503699000},"page":"1-8","source":"Crossref","is-referenced-by-count":13,"title":["A survey of wireless sensor network security in the context of Internet of Things"],"prefix":"10.1109","author":[{"given":"Benfilali","family":"Mostefa","sequence":"first","affiliation":[]},{"given":"Gafour","family":"Abdelkader","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2003","author":"bankoff","journal-title":"Mapping Vulnerability Disasters Development And People","key":"ref39"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1016\/S1389-1286(01)00302-4"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1109\/SP.2011.16"},{"key":"ref32","first-page":"107","article-title":"Detecting wormhole attacks in wireless networks using connectivity information","author":"gao","year":"0","journal-title":"IEEE INFOCOM 2007&#x2013;26th IEEE International Conference on Computer Communications"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1002\/sec.81"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1109\/ISIT.2007.4557594"},{"year":"2001","journal-title":"&#x2018;Summary for Policymakers&#x2019; Climate Change 2001 Synthesis Report Contribution of Working Groups 1 11 and 111 to the Third Assessment Report of the Intergovernmental Panel on Climate Change","first-page":"1","key":"ref37"},{"key":"ref36","article-title":"Sensor Networks","author":"wu","year":"2006","journal-title":"Handbook on Theoretical & Algorithmic Aspects of Sensor Ad Hoc Wireless and Peer-to-Peer Networks"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1109\/MWC.2004.1368897"},{"year":"2010","author":"tangpong","journal-title":"Managing Sybil Identities in Distributed Networks","key":"ref34"},{"year":"2017","author":"garcia-morchon","journal-title":"State of the Art and Challenges for the Internet of Things","key":"ref10"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1109\/WAINA.2014.99"},{"key":"ref11","article-title":"Internet of Things Security, Device Authentication and Access Control: A Review","volume":"14","author":"ali","year":"2016","journal-title":"International Journal of Information and Computer Security"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.5120\/19855-1795"},{"year":"2017","author":"erdelj","journal-title":"Help from the Sky Leveraging UAVs for Disaster Management","key":"ref13"},{"key":"ref14","article-title":"Disaster Management In Wireless Sensor Networks: A Survey Report nternational","volume":"6","author":"chen","year":"2016","journal-title":"Journal of Computing and Corporate Research"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"121","DOI":"10.4236\/jcc.2017.51010","article-title":"A Review of Security Concerns in Internet of Things","volume":"5","author":"mangla","year":"2017","journal-title":"Journal of Computer and Communications"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/ICACCA.2016.7578876"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/WIRELESSVITAE.2011.5940923"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1016\/S1570-8705(03)00008-8"},{"key":"ref19","first-page":"2319-1163","article-title":"Analysis of Denial of Service (DoS) Attacks in Wireless Sensor Networks","author":"ghildiyal","year":"2014","journal-title":"IJRET International Journal of Research in Engineering and Technology"},{"key":"ref28","first-page":"2016","article-title":"Internet of Things Security: Layered classification of attacks and possible Countermeasures","author":"el mouaatamid","year":"2016","journal-title":"e-TI"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.7717\/peerj-cs.114"},{"key":"ref27","article-title":"Security Attacks and Solutions On Ubiquitous Computing Networks","volume":"3","author":"sharifi","year":"2013","journal-title":"International Journal of Engineering and Innovative Technology (IJEIT)"},{"key":"ref3","article-title":"The internet of things","author":"evans","year":"2011","journal-title":"How the Next Evolution of the Internet is Changing Everything"},{"year":"0","journal-title":"CVE-2014-9222","article-title":"National Vulnerability Database","key":"ref6"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1016\/S1389-1286(00)00169-9"},{"year":"2016","author":"wei","journal-title":"DDoS on internet of things_a big alarm for the future","key":"ref5"},{"key":"ref8","first-page":"5","author":"karen rose","year":"2015","journal-title":"Overview of the Internet of Things (IoT)"},{"year":"0","author":"yinbiao","journal-title":"Internet of Things Wireless Sensor Networks White Paper","key":"ref7"},{"year":"0","author":"fremantle","journal-title":"A survey of secure middleware for the Internet of Things","key":"ref2"},{"key":"ref9","first-page":"5","author":"rose","year":"2015","journal-title":"Overview of the Internet of Things (IoT)"},{"key":"ref1","first-page":"97","article-title":"internet of things","volume":"22","author":"ashton","year":"2009","journal-title":"RFID Journal"},{"doi-asserted-by":"publisher","key":"ref46","DOI":"10.1109\/SSRR.2005.1501242"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/MNET.2006.1637931","article-title":"Jamming sensor networks: attack and defense strategies","volume":"20","author":"xu","year":"2006","journal-title":"IEEE Network"},{"doi-asserted-by":"publisher","key":"ref45","DOI":"10.1109\/ICCDCS.2004.1393370"},{"key":"ref48","first-page":"2112016470","article-title":"Hello Flood Counter Measure for Wireless Sensor Network","volume":"2","author":"khozium","year":"2008","journal-title":"IJCSS International Journal of Computer Science and Security"},{"key":"ref22","first-page":"2319","article-title":"Analysis of Denial of Service (DoS) Attacks in Wireless Sensor Networks","author":"ghildiyal","year":"2014","journal-title":"IJRET International Journal of Research in Engineering and Technology"},{"key":"ref47","first-page":"206","article-title":"Design and Implementation of an Emergency Search and Rescue System Based on Mobile Robot and WSN","author":"wang","year":"2010","journal-title":"2nd International Asia Conference on Informatics in Control Automation and Robotics"},{"key":"ref21","first-page":"217","article-title":"Link-layer jamming attacks on S-MAC. In Wireless Sensor Networks","author":"law","year":"2005","journal-title":"Proceeedings of the Second European Workshop"},{"key":"ref42","article-title":"Managing Disaster with Wireless Sensor Networks","author":"aziz","year":"2011","journal-title":"ICACT2011"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/SECURWARE.2008.45"},{"doi-asserted-by":"publisher","key":"ref41","DOI":"10.1002\/wcm.877"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/ICSensT.2013.6727623"},{"key":"ref44","first-page":"108","author":"werner-allen","year":"2005","journal-title":"Monitoring Volcanic Eruptions with a Wireless Sensor Network"},{"key":"ref26","first-page":"4","article-title":"Security Attacks and its Countermeasures in Wireless Sensor Networks","volume":"4","author":"rajkumar","year":"2014","journal-title":"Journal of Engineering Research and Applications"},{"key":"ref43","article-title":"Design of Low Cost Wireless Sensor Networks-Based Environmental Monitoring System for Developing Country","author":"wirawan","year":"0","journal-title":"Proc APCCAS 2008"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1016\/j.adhoc.2009.04.009"}],"event":{"name":"2017 International Conference on Information and Communication Technologies for Disaster Management (ICT-DM)","start":{"date-parts":[[2017,12,11]]},"location":"Mu\u0308nster","end":{"date-parts":[[2017,12,13]]}},"container-title":["2017 4th International Conference on Information and Communication Technologies for Disaster Management (ICT-DM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8267169\/8275658\/08275691.pdf?arnumber=8275691","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,10]],"date-time":"2019-10-10T00:48:34Z","timestamp":1570668514000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8275691\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":48,"URL":"https:\/\/doi.org\/10.1109\/ict-dm.2017.8275691","relation":{},"subject":[],"published":{"date-parts":[[2017,12]]}}}