{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T00:00:16Z","timestamp":1772064016734,"version":"3.50.1"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/wf-iot.2016.7845429","type":"proceedings-article","created":{"date-parts":[[2017,2,9]],"date-time":"2017-02-09T21:42:54Z","timestamp":1486676574000},"page":"182-187","source":"Crossref","is-referenced-by-count":19,"title":["IoT security attacks using reverse engineering methods on WSN applications"],"prefix":"10.1109","author":[{"given":"Mauricio","family":"Tellez","sequence":"first","affiliation":[]},{"given":"Samy","family":"El-Tawab","sequence":"additional","affiliation":[]},{"given":"M. Hossain","family":"Heydari","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1109\/2.895117","article-title":"smart dust: communicating with a cubic-millimeter computer","volume":"34","author":"warneke","year":"2001","journal-title":"Computer"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/332833.332838"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1095242.1095261"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/5289.887458"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/98.878541"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"477","DOI":"10.1117\/12.605655","article-title":"Wireless sensors for wildfire monitoring","author":"doolin","year":"2005","journal-title":"Smart Materials and Structures"},{"key":"ref16","article-title":"Xbee wireless sensor networks for temperature monitoring","author":"boonsawat","year":"2010","journal-title":"the second conference on application researchand development (ECTI-CARD 2010)"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"17","DOI":"10.12700\/APH.9.6.2012.6.2","article-title":"Wireless sensor network (wsn) control for indoor temperature monitoring","volume":"9","author":"mon","year":"2012","journal-title":"Acta Polytechnica Hungarica"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/502419"},{"key":"ref19","article-title":"Zigbee open source stack","year":"2013","journal-title":"Tech Rep"},{"key":"ref4","first-page":"197","article-title":"Random key predistribution schemes for sensor networks","author":"chan","year":"2003","journal-title":"IEEE Symposium on Security and Privacy"},{"key":"ref3","article-title":"Who's in charge here? securing the internet of things","author":"mcgillicuddy","year":"2014","journal-title":"Information Security Insider Edition"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(01)00302-4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2007.04.009"},{"key":"ref8","article-title":"Wireless sensor networks in precision agriculture","author":"baggio","year":"2005","journal-title":"Proc of the ACM Workshop on Real-world Wireless Sensor Networks (REALWSN)"},{"key":"ref7","first-page":"124","article-title":"A design and implementation of forest-fires surveillance system based on wireless sensor networks for south korea mountains","volume":"6","author":"son","year":"2006","journal-title":"International Journal of Computer Science and Network Security (IJCSNS)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1138127.1138130"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MOBHOC.2009.5336947"},{"key":"ref1","author":"o'flaherty","year":"2015","journal-title":"Securing the Internet of Things"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SIEDS.2016.7489330"},{"key":"ref22","article-title":"Msp430 programming with the bootloader (bsl)","author":"instruments","year":"2015","journal-title":"TI Application Report SLAU319K"},{"key":"ref21","year":"2006","journal-title":"MSP430x1xx Family"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SENSORCOMM.2009.29"},{"key":"ref23","year":"2015","journal-title":"Flash memory controller"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-007-0024-2"},{"key":"ref25","author":"becher","year":"2006","journal-title":"Tampering with Motes Real-World Physical Attacks on Wireless Sensor Networks"}],"event":{"name":"2016 IEEE 3rd World Forum on Internet of Things (WF-IoT)","location":"Reston, VA, USA","start":{"date-parts":[[2016,12,12]]},"end":{"date-parts":[[2016,12,14]]}},"container-title":["2016 IEEE 3rd World Forum on Internet of Things (WF-IoT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7831562\/7845389\/07845429.pdf?arnumber=7845429","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,15]],"date-time":"2025-06-15T05:29:59Z","timestamp":1749965399000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7845429\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/wf-iot.2016.7845429","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}