{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T04:42:35Z","timestamp":1725684155576},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,6]]},"DOI":"10.1109\/sahcn.2016.7732971","type":"proceedings-article","created":{"date-parts":[[2016,11,3]],"date-time":"2016-11-03T20:39:00Z","timestamp":1478205540000},"page":"1-9","source":"Crossref","is-referenced-by-count":5,"title":["Arpeggio: A Penetration Attack on Glossy Networks"],"prefix":"10.1109","author":[{"given":"Zhitao","family":"He","sequence":"first","affiliation":[]},{"given":"Kasun","family":"Hewage","sequence":"additional","affiliation":[]},{"given":"Thiemo","family":"Voigt","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2461381.2461402"},{"key":"ref11","article-title":"A Taxonomy for Denial-of-Service Attacks in Wireless Sensor Networks","author":"wood","year":"2004","journal-title":"Handbook of Sensor Networks Compact Wireless and Wired Sensing Systems"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1062689.1062697"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MASS.2014.17"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2467391"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.155"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1102219.1102234"},{"key":"ref17","first-page":"47","article-title":"Short paper: Reactive jamming in wireless networks How realistic is the threat?","author":"matthias","year":"2011","journal-title":"Proceedings of the Fourth ACM Conference on Wireless Network Security"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2011.5962527"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MASS.2013.18"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2014.10.004"},{"key":"ref6","first-page":"269","article-title":"Splash: Fast data dissemination with constructive interference in wireless sensor networks","author":"doddavenkatappa","year":"2013","journal-title":"NSDI"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2013.2238951"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2809695.2809721"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2013.142"},{"key":"ref2","article-title":"Efficient network flooding and time synchronization with Glossy","author":"ferrari","year":"2011","journal-title":"Information Processing in Sensor Networks (IPSN)"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1976.1093327"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2426656.2426658"}],"event":{"name":"2016 13th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)","start":{"date-parts":[[2016,6,27]]},"location":"London, United Kingdom","end":{"date-parts":[[2016,6,30]]}},"container-title":["2016 13th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7731571\/7732953\/07732971.pdf?arnumber=7732971","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,11,23]],"date-time":"2016-11-23T07:20:22Z","timestamp":1479885622000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7732971\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/sahcn.2016.7732971","relation":{},"subject":[],"published":{"date-parts":[[2016,6]]}}}