{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,9]],"date-time":"2024-08-09T11:50:39Z","timestamp":1723204239618},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/wf-iot.2016.7845515","type":"proceedings-article","created":{"date-parts":[[2017,2,9]],"date-time":"2017-02-09T21:42:54Z","timestamp":1486676574000},"source":"Crossref","is-referenced-by-count":7,"title":["Traffic forensics for IPv6-based Wireless Sensor Networks and the Internet of Things"],"prefix":"10.1109","author":[{"given":"Vijay","family":"Kumar","sequence":"first","affiliation":[]},{"given":"George","family":"Oikonomou","sequence":"additional","affiliation":[]},{"given":"Theo","family":"Tryfonas","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/794326"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2013.04.014"},{"key":"ref12","article-title":"Some Considerations on Routing in Particular and Lossy Environments","author":"clausen","year":"2011","journal-title":"Interconnecting Smart Objects with the Internet Workshop"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38530-8_3"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2009.10"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/AFRCON.2011.6072117"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICUMT.2009.5345388"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1868630.1868643"},{"key":"ref18","article-title":"Demo Abstract: Foren 6, a RPL\/6LoWPAN Diagnosis Tool","author":"dawans","year":"2014","journal-title":"Proc 5th European Conference on Wireless Sensor Networks (EWSN)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2013.6583469"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6550"},{"key":"ref3","author":"shelby","year":"2012","journal-title":"Neighbor Discovery Optimization for Low-power and Lossy Networks"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.27"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3756"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MASS.2011.76"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2356"},{"key":"ref2","author":"hui","year":"2011","journal-title":"Compression Format for IPv6 Datagrams over IEEE 802 15 4-Based Networks"},{"key":"ref1","author":"montenegro","year":"2007","journal-title":"Transmission of IPv6 Packets over IEEE 802 15 4 Networks"},{"key":"ref9","article-title":"A security threat analysis for routing protocol for low-power and lossy networks (RPL)","author":"tsao","year":"2013","journal-title":"Internet Draft (version 06)"},{"key":"ref20","article-title":"Intrusion detection system for low-power and lossy networks","author":"zhang","year":"2013","journal-title":"Internet Draft (version 00)"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2014.05.005"}],"event":{"name":"2016 IEEE 3rd World Forum on Internet of Things (WF-IoT)","location":"Reston, VA, USA","start":{"date-parts":[[2016,12,12]]},"end":{"date-parts":[[2016,12,14]]}},"container-title":["2016 IEEE 3rd World Forum on Internet of Things (WF-IoT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7831562\/7845389\/07845515.pdf?arnumber=7845515","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,1]],"date-time":"2017-03-01T22:26:12Z","timestamp":1488407172000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7845515\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/wf-iot.2016.7845515","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}