{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T00:45:26Z","timestamp":1775609126343,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2004,11,3]],"date-time":"2004-11-03T00:00:00Z","timestamp":1099440000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2004,11,3]]},"DOI":"10.1145\/1031495.1031515","type":"proceedings-article","created":{"date-parts":[[2005,1,30]],"date-time":"2005-01-30T17:58:48Z","timestamp":1107107928000},"page":"162-175","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":997,"title":["TinySec"],"prefix":"10.1145","author":[{"given":"Chris","family":"Karlof","sequence":"first","affiliation":[{"name":"University of California at Berkeley"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Naveen","family":"Sastry","sequence":"additional","affiliation":[{"name":"University of California at Berkeley"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"David","family":"Wagner","sequence":"additional","affiliation":[{"name":"University of California at Berkeley"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2004,11,3]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Crossbow technology inc. http:\/\/www.xbow.com.]]  Crossbow technology inc. http:\/\/www.xbow.com.]]"},{"key":"e_1_3_2_1_2_1","unstructured":"Moteiv. http:\/\/www.moteiv.com\/.]]  Moteiv. http:\/\/www.moteiv.com\/.]]"},{"key":"e_1_3_2_1_3_1","unstructured":"OpenSSL. http:\/\/www.openssl.org.]]  OpenSSL. http:\/\/www.openssl.org.]]"},{"key":"e_1_3_2_1_4_1","unstructured":"Security architecture for the Internet Protocol. RFC 2401 November 1998.]]  Security architecture for the Internet Protocol. RFC 2401 November 1998.]]"},{"key":"e_1_3_2_1_5_1","unstructured":"Smart buildings admit their faults. Lab Notes: Research from the College of Engineering UC Berkeley http:\/\/www.coe.berkeley.edu\/labnotes\/1101smartbuildings.html November 2001.]]  Smart buildings admit their faults. Lab Notes: Research from the College of Engineering UC Berkeley http:\/\/www.coe.berkeley.edu\/labnotes\/1101smartbuildings.html November 2001.]]"},{"key":"e_1_3_2_1_6_1","first-page":"0","article-title":"medium access control and physical layer specifications for low-rate wireless personal area networks","volume":"4","author":"Wireless","year":"2003","unstructured":"Wireless medium access control and physical layer specifications for low-rate wireless personal area networks . IEEE Standard, 802.15. 4-2003 , May 2003 . ISBN 0 - 7381 -3677-5.]] Wireless medium access control and physical layer specifications for low-rate wireless personal area networks. IEEE Standard, 802.15.4-2003, May 2003. ISBN 0-7381-3677-5.]]","journal-title":"IEEE Standard, 802.15."},{"key":"e_1_3_2_1_7_1","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Cryptology -- CRYPTO","author":"Barkan Elad","year":"2003","unstructured":"Elad Barkan , Eli Biham , and Nathan Keller . Instant ciphertext-only cryptanalysis of GSMencrypted communication . In Advances in Cryptology -- CRYPTO 2003 , volume 2729 of Lecture Notes in Computer Science , 2003.]] Elad Barkan, Eli Biham, and Nathan Keller. Instant ciphertext-only cryptanalysis of GSMencrypted communication. In Advances in Cryptology -- CRYPTO 2003, volume 2729 of Lecture Notes in Computer Science, 2003.]]"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/795663.796360"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1006\/jcss.1999.1694"},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the Sixth USENIX Security Symposium","author":"Bellovin Steven M.","year":"1996","unstructured":"Steven M. Bellovin . Problem areas for the IP security protocols . In Proceedings of the Sixth USENIX Security Symposium , 1996 .]] Steven M. Bellovin. Problem areas for the IP security protocols. In Proceedings of the Sixth USENIX Security Symposium, 1996.]]"},{"key":"e_1_3_2_1_11_1","volume-title":"Second NIST Workshop on Modes of Operation","author":"Steven","year":"2001","unstructured":"Steven M. Bellovin and Matt Blaze. Cryptographic modes of operation for the internet . In Second NIST Workshop on Modes of Operation , August 2001 .]] Steven M. Bellovin and Matt Blaze. Cryptographic modes of operation for the internet. In Second NIST Workshop on Modes of Operation, August 2001.]]"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/381677.381695"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/769800.769823"},{"key":"e_1_3_2_1_14_1","volume-title":"IEEE Symposium on Security and Privacy","author":"Chan Haowen","year":"2003","unstructured":"Haowen Chan , Adrian Perrig , and Dawn Song . Random key predistribution schemes for sensor networks . In IEEE Symposium on Security and Privacy , May 2003 .]] Haowen Chan, Adrian Perrig, and Dawn Song. Random key predistribution schemes for sensor networks. In IEEE Symposium on Security and Privacy, May 2003.]]"},{"key":"e_1_3_2_1_15_1","volume-title":"April","author":"Dawson E.","year":"1996","unstructured":"E. Dawson and L. Nielsen . Automated cryptanalysis of XOR plaintext strings. Cryptologia, (2):165--181 , April 1996 .]] E. Dawson and L. Nielsen. Automated cryptanalysis of XOR plaintext strings. Cryptologia, (2):165--181, April 1996.]]"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948118"},{"key":"e_1_3_2_1_17_1","volume-title":"SPIE International Symposium on Enabling Technologies for Law Enforcement and Security","author":"Duckworth G.L.","year":"1996","unstructured":"G.L. Duckworth , D.C. Gilbert , and J.E. Barger . Acoustic counter-sniper system . In SPIE International Symposium on Enabling Technologies for Law Enforcement and Security , 1996 .]] G.L. Duckworth, D.C. Gilbert, and J.E. Barger. Acoustic counter-sniper system. In SPIE International Symposium on Enabling Technologies for Law Enforcement and Security, 1996.]]"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586117"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/646557.694759"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/781131.781133"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2002.1012363"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/378993.379006"},{"key":"e_1_3_2_1_24_1","volume-title":"Defcon","author":"Hurley Chris","year":"2003","unstructured":"Chris Hurley . The worldwide wardrive: The myths, the misconceptions, the truth, the future . In Defcon 11, August 2003 .]] Chris Hurley. The worldwide wardrive: The myths, the misconceptions, the truth, the future. In Defcon 11, August 2003.]]"},{"key":"e_1_3_2_1_25_1","first-page":"176","volume-title":"CT-RSA","author":"Jakobsson Markus","year":"2001","unstructured":"Markus Jakobsson and Susanne Wetzel . Security weaknesses in Bluetooth . In CT-RSA 2001 , pages 176 -- 191 . Springer-Verlag , 2001. LNCS 2020.]] Markus Jakobsson and Susanne Wetzel. Security weaknesses in Bluetooth. In CT-RSA 2001, pages 176--191. Springer-Verlag, 2001. LNCS 2020.]]"},{"key":"e_1_3_2_1_27_1","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Cryptology -- CRYPTO","author":"Krawczyk Hugo","year":"2001","unstructured":"Hugo Krawczyk . The order of encryption and authentication for protecting communications (or: How secure is SSL?) . In Advances in Cryptology -- CRYPTO 2001 , volume 2139 of Lecture Notes in Computer Science . Springer-Verlag Heidelberg , January 2001.]] Hugo Krawczyk. The order of encryption and authentication for protecting communications (or: How secure is SSL?). In Advances in Cryptology -- CRYPTO 2001, volume 2139 of Lecture Notes in Computer Science. Springer-Verlag Heidelberg, January 2001.]]"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948119"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/1060289.1060303"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/832315.837554"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/570738.570751"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2004.1381904"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/381677.381696"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1023646.1023654"},{"key":"e_1_3_2_1_35_1","volume-title":"Applied Cryptography","author":"Schneier Bruce","year":"1996","unstructured":"Bruce Schneier . Applied Cryptography , Second Edition. John Wiley & Sons , 1996 .]] Bruce Schneier. Applied Cryptography, Second Edition. John Wiley & Sons, 1996.]]"},{"key":"e_1_3_2_1_36_1","volume-title":"Open WLANs: the early results of wardriving","author":"Shipley Peter","year":"2001","unstructured":"Peter Shipley . Open WLANs: the early results of wardriving , 2001 .]] Peter Shipley. Open WLANs: the early results of wardriving, 2001.]]"},{"key":"e_1_3_2_1_37_1","unstructured":"Peter Shipley 2003. personal communication.]]  Peter Shipley 2003. personal communication.]]"},{"key":"e_1_3_2_1_38_1","volume-title":"Network and Distributed Systems Security Symposium (NDSS)","author":"Stubblefield Adam","year":"2002","unstructured":"Adam Stubblefield , John Ioannidis , and Aviel D. Rubin . Using the fluhrer, mantin, and shamir attack to break WEP . In Network and Distributed Systems Security Symposium (NDSS) , 2002 .]] Adam Stubblefield, John Ioannidis, and Aviel D. Rubin. Using the fluhrer, mantin, and shamir attack to break WEP. In Network and Distributed Systems Security Symposium (NDSS), 2002.]]"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24606-0_21"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/52325.52329"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/951710.951737"},{"key":"e_1_3_2_1_42_1","volume-title":"Unsafe at any key size","author":"Walker Jessie","unstructured":"Jessie Walker . Unsafe at any key size ; an analysis of the WEP encapsulation. http:\/\/grouper.ieee.org\/groups\/802\/11\/Documents\/DocumentHolder\/0-362.zip.]] Jessie Walker. Unsafe at any key size; an analysis of the WEP encapsulation. http:\/\/grouper.ieee.org\/groups\/802\/11\/Documents\/DocumentHolder\/0-362.zip.]]"},{"key":"e_1_3_2_1_43_1","unstructured":"Ron Watro Derrick Kong Sue fen Cuti Jen Mulligan Charlie Gardiner and Dan Coffin. TinyPK. http:\/\/www.is.bbn.com\/projects\/lws-nest\/.]]  Ron Watro Derrick Kong Sue fen Cuti Jen Mulligan Charlie Gardiner and Dan Coffin. TinyPK. http:\/\/www.is.bbn.com\/projects\/lws-nest\/.]]"},{"key":"e_1_3_2_1_44_1","article-title":"Resuscitation monitoring with a wireless sensor network. Supplement to Circulation","author":"Welsh Matt","year":"2003","unstructured":"Matt Welsh , Dan Myung , Mark Gaynor , and Steve Moulton . Resuscitation monitoring with a wireless sensor network. Supplement to Circulation : Journal of the American Heart Association , October 2003 .]] Matt Welsh, Dan Myung, Mark Gaynor, and Steve Moulton. Resuscitation monitoring with a wireless sensor network. Supplement to Circulation: Journal of the American Heart Association, October 2003.]]","journal-title":"Journal of the American Heart Association"},{"key":"e_1_3_2_1_45_1","volume-title":"December","author":"GLE.","year":"2003","unstructured":"Wi GLE. Wireless geographic logging engine---general stats , December 2003 .]] WiGLE. Wireless geographic logging engine---general stats, December 2003.]]"},{"key":"e_1_3_2_1_46_1","volume-title":"IEEE Vehicular Technology Conference (VTC","author":"Xue Qi","year":"2003","unstructured":"Qi Xue and Aura Ganz . Runtime security composition for sensor networks (SecureSense) . In IEEE Vehicular Technology Conference (VTC Fall 2003 ), October 2003.]] Qi Xue and Aura Ganz. Runtime security composition for sensor networks (SecureSense). In IEEE Vehicular Technology Conference (VTC Fall 2003), October 2003.]]"},{"key":"e_1_3_2_1_47_1","volume-title":"Proceedings of the Sixth USENIX Security Symposium","author":"Ylonen T.","year":"1996","unstructured":"T. Ylonen . SSH - secure login connections over the Internet . In Proceedings of the Sixth USENIX Security Symposium , 1996 .]] T. Ylonen. SSH - secure login connections over the Internet. In Proceedings of the Sixth USENIX Security Symposium, 1996.]]"}],"event":{"name":"SenSys04: ACM Conference on Embedded Network Sensor Systems","location":"Baltimore MD USA","acronym":"SenSys04","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGCOMM ACM Special Interest Group on Data Communication","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGOPS ACM Special Interest Group on Operating Systems","ACM Association for Computing Machinery","SIGBED ACM Special Interest Group on Embedded Systems","SIGARCH ACM Special Interest Group on Computer Architecture"]},"container-title":["Proceedings of the 2nd international conference on Embedded networked sensor systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1031495.1031515","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1031495.1031515","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:23:47Z","timestamp":1750267427000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1031495.1031515"}},"subtitle":["a link layer security architecture for wireless sensor networks"],"short-title":[],"issued":{"date-parts":[[2004,11,3]]},"references-count":45,"alternative-id":["10.1145\/1031495.1031515","10.1145\/1031495"],"URL":"https:\/\/doi.org\/10.1145\/1031495.1031515","relation":{},"subject":[],"published":{"date-parts":[[2004,11,3]]},"assertion":[{"value":"2004-11-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}