{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T15:56:02Z","timestamp":1773330962249,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2005,9,2]],"date-time":"2005-09-02T00:00:00Z","timestamp":1125619200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2005,9,2]]},"DOI":"10.1145\/1080793.1080808","type":"proceedings-article","created":{"date-parts":[[2005,11,7]],"date-time":"2005-11-07T17:34:39Z","timestamp":1131384879000},"page":"87-96","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":43,"title":["Low-cost attacks against packet delivery, localization and time synchronization services in under-water sensor networks"],"prefix":"10.1145","author":[{"given":"Jiejun","family":"Kong","sequence":"first","affiliation":[{"name":"University of California, Los Angeles, CA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zhengrong","family":"Ji","sequence":"additional","affiliation":[{"name":"University of California, Los Angeles, CA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Weichao","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Kansas, Lawrence, KS"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mario","family":"Gerla","sequence":"additional","affiliation":[{"name":"University of California, Los Angeles, CA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Rajive","family":"Bagrodia","sequence":"additional","affiliation":[{"name":"University of California, Los Angeles, CA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Bharat","family":"Bhargava","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2005,9,2]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2000.832252"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/984622.984630"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"S.\n      Brands\n     and \n      D.\n      Chaum\n  . \n  Distance-Bounding Protocols (Extended Abstract)\n  . In T. Helleseth editor EUROCRYPT\n  '93 Lecture Notes in Computer Science 765 pages \n  344\n  --\n  359 1993\n  .   S. Brands and D. Chaum. Distance-Bounding Protocols (Extended Abstract). In T. Helleseth editor EUROCRYPT'93 Lecture Notes in Computer Science 765 pages 344--359 1993.","DOI":"10.1007\/3-540-48285-7_30"},{"key":"e_1_3_2_1_4_1","first-page":"197","volume-title":"Random Key Predistribution Schemes for Sensor Networks. In IEEE Symposium on Security and Privacy","author":"Chan H.","year":"2003","unstructured":"H. Chan , A. Perrig , and D. Song . Random Key Predistribution Schemes for Sensor Networks. In IEEE Symposium on Security and Privacy , pages 197 -- 215 , 2003 . H. Chan, A. Perrig, and D. Song. Random Key Predistribution Schemes for Sensor Networks. In IEEE Symposium on Security and Privacy, pages 197--215, 2003."},{"key":"e_1_3_2_1_5_1","volume-title":"John Wiley and Sons","author":"Davison M. L.","year":"1983","unstructured":"M. L. Davison . Multi-Dimensional Scaling . John Wiley and Sons , 1983 . M. L. Davison. Multi-Dimensional Scaling. John Wiley and Sons, 1983."},{"key":"e_1_3_2_1_6_1","first-page":"594","volume-title":"Intrusion Tolerance and Anti-Traffic Analysis Strategies for Wireless Sensor Networks. In IEEE International Conference on Dependable Systems and Networks (DSN)","author":"Deng J.","year":"2004","unstructured":"J. Deng , R. Han , and S. Mishra . Intrusion Tolerance and Anti-Traffic Analysis Strategies for Wireless Sensor Networks. In IEEE International Conference on Dependable Systems and Networks (DSN) , pages 594 -- 603 , 2004 . J. Deng, R. Han, and S. Mishra. Intrusion Tolerance and Anti-Traffic Analysis Strategies for Wireless Sensor Networks. In IEEE International Conference on Dependable Systems and Networks (DSN), pages 594--603, 2004."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948118"},{"key":"e_1_3_2_1_8_1","volume-title":"International Parallel and Distributed Processing Symposium (IPDPS), Workshop on Parallel and Distributed Computing Issues in Wireless Networks and Mobile Computing","author":"Elson J.","year":"2001","unstructured":"J. Elson and D. Estrin . Time Synchronization for Wireless Sensor Networks . In International Parallel and Distributed Processing Symposium (IPDPS), Workshop on Parallel and Distributed Computing Issues in Wireless Networks and Mobile Computing , 2001 . J. Elson and D. Estrin. Time Synchronization for Wireless Sensor Networks. In International Parallel and Distributed Processing Symposium (IPDPS), Workshop on Parallel and Distributed Computing Issues in Wireless Networks and Mobile Computing, 2001."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/1060289.1060304"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586117"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/958491.958508"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/938985.938995"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1023720.1023726"},{"key":"e_1_3_2_1_14_1","volume-title":"Network and Distributed System Security Symposium (NDSS)","author":"Hu L.","year":"2004","unstructured":"L. Hu and D. Evans . Using Directional Antennas to Prevent Wormhole Attacks . In Network and Distributed System Security Symposium (NDSS) , 2004 . L. Hu and D. Evans. Using Directional Antennas to Prevent Wormhole Attacks. In Network and Distributed System Security Symposium (NDSS), 2004."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861394"},{"key":"e_1_3_2_1_16_1","volume-title":"IEEE INFOCOM","author":"Ji X.","year":"2004","unstructured":"X. Ji and H. Zha . Sensor Positioning in Wireless Ad-hoc Sensor Networks with Multidimensional Scaling . In IEEE INFOCOM , 2004 . X. Ji and H. Zha. Sensor Positioning in Wireless Ad-hoc Sensor Networks with Multidimensional Scaling. In IEEE INFOCOM, 2004."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/OCEANS.1989.586677"},{"key":"e_1_3_2_1_18_1","volume-title":"The State of the Art in Underwater Acoustic Telemetry","author":"Kilfoyle D. B.","year":"2000","unstructured":"D. B. Kilfoyle and A. B. Baggeroer . The State of the Art in Underwater Acoustic Telemetry . IEEE Journal of Oceanic Engineering , OE-25(1):4--27, January 2000 . D. B. Kilfoyle and A. B. Baggeroer. The State of the Art in Underwater Acoustic Telemetry. IEEE Journal of Oceanic Engineering, OE-25(1):4--27, January 2000."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1023646.1023650"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2006.25"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948119"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029102.1029117"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"C. E. Perkins E. M. Royer and S. Das. Ad-hoc On Demand Distance Vector (AODV) Routing. http:\/\/www.ietf.org\/rfc\/rfc3561.txt July 2003.   C. E. Perkins E. M. Royer and S. Das. Ad-hoc On Demand Distance Vector (AODV) Routing. http:\/\/www.ietf.org\/rfc\/rfc3561.txt July 2003.","DOI":"10.17487\/rfc3561"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/381677.381696"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/35.965368"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/381677.381693"},{"key":"e_1_3_2_1_27_1","unstructured":"Scalable Network Technologies (SNT). QualNet. http:\/\/www.qualnet.com\/.  Scalable Network Technologies (SNT). QualNet. http:\/\/www.qualnet.com\/."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/778415.778439"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/48.820738"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2004.842228"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/941350.941353"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/986858.986862"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1498470"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1023646.1023657"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062689.1062697"}],"event":{"name":"WiSE05: 2005 ACM Workshop on Wireless Security ( co-located with Mobicom 2005 Conference )","location":"Cologne Germany","acronym":"WiSE05","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 4th ACM workshop on Wireless security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1080793.1080808","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1080793.1080808","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:18:42Z","timestamp":1750263522000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1080793.1080808"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,9,2]]},"references-count":35,"alternative-id":["10.1145\/1080793.1080808","10.1145\/1080793"],"URL":"https:\/\/doi.org\/10.1145\/1080793.1080808","relation":{},"subject":[],"published":{"date-parts":[[2005,9,2]]},"assertion":[{"value":"2005-09-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}