{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:11:20Z","timestamp":1771697480048,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,4,17]],"date-time":"2013-04-17T00:00:00Z","timestamp":1366156800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,4,17]]},"DOI":"10.1145\/2462096.2462107","type":"proceedings-article","created":{"date-parts":[[2013,4,16]],"date-time":"2013-04-16T13:51:28Z","timestamp":1366120288000},"page":"55-66","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":107,"title":["6LoWPAN fragmentation attacks and mitigation mechanisms"],"prefix":"10.1145","author":[{"given":"Ren\u00e9","family":"Hummen","sequence":"first","affiliation":[{"name":"RWTH Aachen University, Aachen, Germany"}]},{"given":"Jens","family":"Hiller","sequence":"additional","affiliation":[{"name":"RWTH Aachen University, Aachen, Germany"}]},{"given":"Hanno","family":"Wirtz","sequence":"additional","affiliation":[{"name":"RWTH Aachen University, Aachen, Germany"}]},{"given":"Martin","family":"Henze","sequence":"additional","affiliation":[{"name":"RWTH Aachen University, Aachen, Germany"}]},{"given":"Hossein","family":"Shafagh","sequence":"additional","affiliation":[{"name":"RWTH Aachen University, Aachen, Germany"}]},{"given":"Klaus","family":"Wehrle","sequence":"additional","affiliation":[{"name":"RWTH Aachen University, Aachen, Germany"}]}],"member":"320","published-online":{"date-parts":[[2013,4,17]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/11734666_9"},{"key":"e_1_3_2_1_2_1","volume-title":"Guidance for Light-Weight Implementations of the Internet Protocol Suite. draft-ietf-lwig-guidance-02 (WiP)","author":"Bormann C.","year":"2012","unstructured":"C. Bormann . Guidance for Light-Weight Implementations of the Internet Protocol Suite. draft-ietf-lwig-guidance-02 (WiP) , 2012 . C. Bormann. Guidance for Light-Weight Implementations of the Internet Protocol Suite. draft-ietf-lwig-guidance-02 (WiP), 2012."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/2044928.2044972"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICWMC.2007.80"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJHPCN.2006.010201"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.892879"},{"key":"e_1_3_2_1_7_1","volume-title":"online @ http:\/\/www.cert.org\/advisories\/CA-1996-26.html","author":"Service CERT.","year":"1996","unstructured":"CERT. Advisory CA-1996-26 Denial-of- Service Attack via ping. online @ http:\/\/www.cert.org\/advisories\/CA-1996-26.html , 1996 . CERT. Advisory CA-1996-26 Denial-of-Service Attack via ping. online @ http:\/\/www.cert.org\/advisories\/CA-1996-26.html, 1996."},{"key":"e_1_3_2_1_8_1","volume-title":"online @ http:\/\/www.cert.org\/advisories\/CA-1997-28.html","author":"Service Attacks CERT.","year":"1997","unstructured":"CERT. Advisory CA-1997-28 IP Denial-of- Service Attacks . online @ http:\/\/www.cert.org\/advisories\/CA-1997-28.html , 1997 . CERT. Advisory CA-1997-28 IP Denial-of-Service Attacks. online @ http:\/\/www.cert.org\/advisories\/CA-1997-28.html, 1997."},{"key":"e_1_3_2_1_9_1","author":"Chan S.","year":"1997","unstructured":"S. Chan , E. Wong , and K. Ko . Fair packet discarding for controlling ABR traffic in ATM networks . IEEE Transactions on Communications , 1997 . S. Chan, E. Wong, and K. Ko. Fair packet discarding for controlling ABR traffic in ATM networks . IEEE Transactions on Communications, 1997.","journal-title":"IEEE Transactions on Communications"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/646754.705032"},{"key":"e_1_3_2_1_11_1","volume-title":"Version 6 (IPv6) Specification. RFC 2460","author":"Deering S.","year":"1998","unstructured":"S. Deering and R. Hinden . Internet Protocol , Version 6 (IPv6) Specification. RFC 2460 , 1998 . S. Deering and R. Hinden. Internet Protocol, Version 6 (IPv6) Specification. RFC 2460, 1998."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1127777.1127822"},{"key":"e_1_3_2_1_13_1","volume-title":"Powertrace: Network-level power profiling for low-power wireless networks. Technical report","author":"Dunkels A.","year":"2011","unstructured":"A. Dunkels , J. Eriksson , N. Finne , and N. Tsiftes . Powertrace: Network-level power profiling for low-power wireless networks. Technical report , Swedish Institute of Computer Science , 2011 . A. Dunkels, J. Eriksson, N. Finne, and N. Tsiftes. Powertrace: Network-level power profiling for low-power wireless networks. Technical report, Swedish Institute of Computer Science, 2011."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2004.38"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1127777.1127826"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586117"},{"key":"e_1_3_2_1_17_1","volume-title":"How to Sign Digital Streams","author":"Gennaro R.","year":"1997","unstructured":"R. Gennaro and P. Rohatgi . How to Sign Digital Streams . 1997 . R. Gennaro and P. Rohatgi. How to Sign Digital Streams. 1997."},{"key":"e_1_3_2_1_18_1","volume-title":"Proc. of USENIX Offensive technologies (WOOT)","author":"Gilad Y.","year":"2011","unstructured":"Y. Gilad and A. Herzberg . Fragmentation considered vulnerable: blindly intercepting and discarding fragments . In Proc. of USENIX Offensive technologies (WOOT) , 2011 . Y. Gilad and A. Herzberg. Fragmentation considered vulnerable: blindly intercepting and discarding fragments. In Proc. of USENIX Offensive technologies (WOOT), 2011."},{"key":"e_1_3_2_1_19_1","volume-title":"Datagram Transport Layer Security in Constrained Environments. draft-hartke-core-codtls-02 (WiP)","author":"Hartke K.","year":"2012","unstructured":"K. Hartke and O. Bergmann . Datagram Transport Layer Security in Constrained Environments. draft-hartke-core-codtls-02 (WiP) , 2012 . K. Hartke and O. Bergmann. Datagram Transport Layer Security in Constrained Environments. draft-hartke-core-codtls-02 (WiP), 2012."},{"key":"e_1_3_2_1_20_1","volume-title":"Node compromise in sensor networks: The need for secure systems. Technical report","author":"Hartung C.","year":"2005","unstructured":"C. Hartung , J. Balasalle , R. Han , C. Hartung , J. Balasalle , and R. Han . Node compromise in sensor networks: The need for secure systems. Technical report , University of Colorado at Boulder , 2005 . C. Hartung, J. Balasalle, R. Han, C. Hartung, J. Balasalle, and R. Han. Node compromise in sensor networks: The need for secure systems. Technical report, University of Colorado at Boulder, 2005."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-011-0385-5"},{"key":"e_1_3_2_1_22_1","volume-title":"The Rose Attack. online @ http:\/\/seclists.org\/bugtraq\/2004\/Mar\/351","author":"Hollis K.","year":"2004","unstructured":"K. Hollis . The Rose Attack. online @ http:\/\/seclists.org\/bugtraq\/2004\/Mar\/351 , 2004 . K. Hollis. The Rose Attack. online @ http:\/\/seclists.org\/bugtraq\/2004\/Mar\/351, 2004."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2008.79"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2463183.2463193"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2008.12"},{"key":"e_1_3_2_1_26_1","volume-title":"wireless medium access control (MAC) and physical layer (PHY) specifications for low-rate wireless personal area networks (WPANs)","author":"IEEE.","year":"2006","unstructured":"IEEE. Part 15.4 : wireless medium access control (MAC) and physical layer (PHY) specifications for low-rate wireless personal area networks (WPANs) . IEEE 802.15.4- 2006 , 2006. IEEE. Part 15.4: wireless medium access control (MAC) and physical layer (PHY) specifications for low-rate wireless personal area networks (WPANs). IEEE 802.15.4-2006, 2006."},{"key":"e_1_3_2_1_27_1","first-page":"6568","author":"Kim E.","year":"2012","unstructured":"E. Kim , D. Kaspar , and J. Vasseur . Design and Application Spaces for IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs). RFC 6568 , 2012 . E. Kim, D. Kaspar, and J. Vasseur. Design and Application Spaces for IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs). RFC 6568, 2012.","journal-title":"RFC"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICHIT.2008.261"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2006.77"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2356"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/646754.705044"},{"key":"e_1_3_2_1_32_1","first-page":"4944","volume":"4","author":"Montenegro G.","year":"2007","unstructured":"G. Montenegro , N. Kushalnagar , J. Hui , and D. Culler . Transmission of IPv6 Packets over IEEE 802.15 . 4 Networks. RFC 4944 , 2007 . G. Montenegro, N. Kushalnagar, J. Hui, and D. Culler. Transmission of IPv6 Packets over IEEE 802.15.4 Networks. RFC 4944, 2007.","journal-title":"Transmission of IPv6 Packets over IEEE 802.15"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2009.090404"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1016598314198"},{"key":"e_1_3_2_1_35_1","volume-title":"DTIC Document","author":"Ptacek T.","year":"1998","unstructured":"T. Ptacek and T. Newsham . Insertion, evasion, and denial of service: Eluding network intrusion detection. Technical report , DTIC Document , 1998 . T. Ptacek and T. Newsham. Insertion, evasion, and denial of service: Eluding network intrusion detection. Technical report, DTIC Document, 1998."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/190314.190322"},{"key":"e_1_3_2_1_37_1","volume-title":"Constrained Application Protocol (CoAP). draft-ietf-core-coap-13 (WiP)","author":"Shelby Z.","year":"2012","unstructured":"Z. Shelby , K. Hartke , C. Bormann , and B. Frank . Constrained Application Protocol (CoAP). draft-ietf-core-coap-13 (WiP) , 2012 . Z. Shelby, K. Hartke, C. Bormann, and B. Frank. Constrained Application Protocol (CoAP). draft-ietf-core-coap-13 (WiP), 2012."},{"key":"e_1_3_2_1_38_1","volume-title":"LoWPAN Fragment Forwarding and Recovery. draft-thubert-6lowpan-simple-fragment-recovery-07 (WiP)","author":"Thubert P.","year":"2010","unstructured":"P. Thubert and J. Hui . LoWPAN Fragment Forwarding and Recovery. draft-thubert-6lowpan-simple-fragment-recovery-07 (WiP) , 2010 . P. Thubert and J. Hui. LoWPAN Fragment Forwarding and Recovery. draft-thubert-6lowpan-simple-fragment-recovery-07 (WiP), 2010."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1998412.1998422"},{"key":"e_1_3_2_1_40_1","first-page":"1858","author":"Ziemba G.","year":"1995","unstructured":"G. Ziemba , D. Reed , and P. Traina . Security Considerations for IP Fragment Filtering. RFC 1858 , 1995 . G. Ziemba, D. Reed, and P. Traina. Security Considerations for IP Fragment Filtering. RFC 1858, 1995.","journal-title":"Security Considerations for IP Fragment Filtering. RFC"}],"event":{"name":"WISEC'13: Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks","location":"Budapest Hungary","acronym":"WISEC'13","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"]},"container-title":["Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2462096.2462107","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2462096.2462107","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:48:39Z","timestamp":1750236519000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2462096.2462107"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,4,17]]},"references-count":40,"alternative-id":["10.1145\/2462096.2462107","10.1145\/2462096"],"URL":"https:\/\/doi.org\/10.1145\/2462096.2462107","relation":{},"subject":[],"published":{"date-parts":[[2013,4,17]]},"assertion":[{"value":"2013-04-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}