{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T20:57:42Z","timestamp":1773521862437,"version":"3.50.1"},"reference-count":50,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100004663","name":"Ministry of Science and Technology, Taiwan","doi-asserted-by":"publisher","award":["MOST 110- 2634-F-002-037"],"award-info":[{"award-number":["MOST 110- 2634-F-002-037"]}],"id":[{"id":"10.13039\/501100004663","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2021,6]]},"DOI":"10.1109\/tnsm.2021.3075496","type":"journal-article","created":{"date-parts":[[2021,4,26]],"date-time":"2021-04-26T21:03:05Z","timestamp":1619470985000},"page":"1178-1190","source":"Crossref","is-referenced-by-count":89,"title":["DETONAR: Detection of Routing Attacks in RPL-Based IoT"],"prefix":"10.1109","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0531-1978","authenticated-orcid":false,"given":"Andrea","family":"Agiollo","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3612-1934","authenticated-orcid":false,"given":"Mauro","family":"Conti","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4192-6251","authenticated-orcid":false,"given":"Pallavi","family":"Kaliyar","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5659-1194","authenticated-orcid":false,"given":"Tsung-Nan","family":"Lin","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6749-6608","authenticated-orcid":false,"given":"Luca","family":"Pajola","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.09.004"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2019.02.001"},{"key":"ref33","first-page":"1","article-title":"RPL: IPv6 routing protocol for low-power and lossy networks","author":"winter","year":"6550"},{"key":"ref32","year":"2021","journal-title":"NetSim by Tetcos"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2016.12.001"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.2991\/ijcis.2018.25905181"},{"key":"ref37","first-page":"459","article-title":"A taxonomy of attacks in RPL-based Internet of Things","volume":"18","author":"mayzaud","year":"2016","journal-title":"Int J Netw Security"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2009.47"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/DCOSS.2011.5982177"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2751617"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101849"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.03.021"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2018.8589115"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/DSDIS.2015.11"},{"key":"ref1","first-page":"1","article-title":"Evolution of wireless sensor networks towards the Internet of Things: A survey","author":"mainetti","year":"2011","journal-title":"Proc 19th Int Conf Softw Telecommun Comput Netw (SoftCOM)"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/PERVASIVE.2015.7087034"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102675"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2885894"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/WiSPNET.2016.7566473"},{"key":"ref23","first-page":"1","article-title":"Real time intrusion and wormhole attack detection in Internet of Things","volume":"121","author":"pongle","year":"2015","journal-title":"Int J Comput Appl"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2701551"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2017.7986299"},{"key":"ref50","doi-asserted-by":"crossref","first-page":"1","DOI":"10.18637\/jss.v027.i03","article-title":"Automatic time series forecasting: The forecast package for R","volume":"27","author":"hyndman","year":"2008","journal-title":"J Stat Softw"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.201"},{"key":"ref11","author":"larson","year":"2017","journal-title":"FDA Confirms That St Jude&#x2019;s Cardiac Devices can be Hacked"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ISNCC.2016.7746067"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICIEA.2011.5975693"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2747900"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CECNet.2012.6201508"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700053"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2019.2910881"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2015.7289167"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2015.7338325"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/794326"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPEIC.2015.7259486"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"2233","DOI":"10.1109\/TII.2014.2300753","article-title":"Internet of Things in industries: A survey","volume":"10","author":"da xu","year":"2014","journal-title":"IEEE Trans Ind Informat"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2437951"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclepro.2016.10.006"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2019.08.013"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2306328"},{"key":"ref49","author":"box","year":"2015","journal-title":"Time Series Analysis Forecasting and Control"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-020-03058-6"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2007.4317828"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/CISE.2010.5676940"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/948143.948144"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/COLCOM.2005.1651223"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2015.7140344"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2013.04.014"},{"key":"ref44","first-page":"887","article-title":"Understanding and securing device vulnerabilities through automated bug report analysis","author":"feng","year":"2019","journal-title":"Proc 28th USENIX Conf Security Symp (SEC)"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2017.2705290"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4275028\/9450206\/09415869.pdf?arnumber=9415869","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:52:40Z","timestamp":1652194360000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9415869\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6]]},"references-count":50,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2021.3075496","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"value":"1932-4537","type":"electronic"},{"value":"2373-7379","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,6]]}}}