{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T01:37:47Z","timestamp":1755999467923,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,11,3]],"date-time":"2014-11-03T00:00:00Z","timestamp":1414972800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Grant","award":["16KIS0005K"],"award-info":[{"award-number":["16KIS0005K"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,11,3]]},"DOI":"10.1145\/2666141.2666143","type":"proceedings-article","created":{"date-parts":[[2014,11,7]],"date-time":"2014-11-07T17:10:54Z","timestamp":1415380254000},"page":"13-22","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["6LoWPAN Security"],"prefix":"10.1145","author":[{"given":"Konrad-Felix","family":"Krentz","sequence":"first","affiliation":[{"name":"Fraunhofer Heinrich Hertz Institute, Berlin, Germany"}]},{"given":"Gerhard","family":"Wunder","sequence":"additional","affiliation":[{"name":"Fraunhofer Heinrich Hertz Institute, Berlin, Germany"}]}],"member":"320","published-online":{"date-parts":[[2014,11,3]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2\n   .4 GHz IEEE 802.15.4 \/ ZigBee-Ready RF Transceiver (Rev. B). http: \/\/www.ti.com\/lit\/ds\/symlink\/cc2420.pdf.  2.4 GHz IEEE 802.15.4 \/ ZigBee-Ready RF Transceiver (Rev. B). http: \/\/www.ti.com\/lit\/ds\/symlink\/cc2420.pdf."},{"key":"e_1_3_2_1_2_1","unstructured":"IEEE Standard 802.15.4 2006. http:\/\/standards.ieee.org\/getieee802\/ download\/802.15.4-2006.pdf.  IEEE Standard 802.15.4 2006. http:\/\/standards.ieee.org\/getieee802\/ download\/802.15.4-2006.pdf."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315295"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECCOM.2007.4550352"},{"key":"e_1_3_2_1_5_1","first-page":"2014","article-title":"Mobile beacon based wormhole attackers detection and positioning in wireless sensor networks","author":"Chen H.","year":"2014","journal-title":"Distributed Sensor Networks"},{"volume-title":"Wireless Communications and Mobile Computing","year":"2014","author":"Chen H.","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","first-page":"6","volume-title":"Proceedings of the 1st International Symposium on Wireless Pervasive Computing","author":"Chiu H. S.","year":"2006"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517351.2517369"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2006.320200"},{"key":"e_1_3_2_1_11_1","first-page":"6719","author":"Gnawali O.","year":"2012","journal-title":"The Minimum Rank with Hysteresis Objective Function. RFC"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-011-0334-2"},{"volume-title":"Proeedings of the Network and Distributed System Security Symposium (NDSS 2004)","year":"2004","author":"Hu L.","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209219"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/941311.941317"},{"key":"e_1_3_2_1_16_1","first-page":"6282","article-title":"Compression Format for IPv6 Datagrams over IEEE 802.15.4-Based Networks","author":"Hui J.","year":"2011","journal-title":"RFC"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462096.2462107"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2012.6214260"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6364768"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1614320.1614356"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2005.58"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2007.02.001"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICUFN.2013.6614801"},{"key":"e_1_3_2_1_24_1","first-page":"6568","article-title":"Design and Application Spaces for IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs)","author":"Kim E.","year":"2012","journal-title":"RFC"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2523501.2523502"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409960"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-60566-396-8.ch005"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2009.88"},{"key":"e_1_3_2_1_29_1","unstructured":"A. Perrig R. Canetti J. D. Tygar and D. Song. The TESLA broadcast authentication protocol. RSA CryptoBytes 5(2) 2002.  A. Perrig R. Canetti J. D. Tygar and D. Song. The TESLA broadcast authentication protocol. RSA CryptoBytes 5(2) 2002."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/1147685.1147744"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCS.2012.4"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/1929820.1929854"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2013.04.014"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1023646.1023654"},{"key":"e_1_3_2_1_35_1","first-page":"7252","article-title":"The Constrained Application Protocol (CoAP)","author":"Shelby Z.","year":"2014","journal-title":"RFC"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICUFN.2012.6261721"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2007.122"},{"volume-title":"Internet-Draft","year":"2014","author":"Tsao T.","key":"e_1_3_2_1_38_1"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/986858.986862"},{"key":"e_1_3_2_1_40_1","first-page":"2013","article-title":"Routing attacks and countermeasures in the RPL-based Internet of things","author":"Wallgren L.","year":"2013","journal-title":"Distributed Sensor Networks"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2007.63"},{"key":"e_1_3_2_1_42_1","first-page":"3610","article-title":"Counter with CBC-MAC (CCM)","author":"Whiting D.","year":"2003","journal-title":"RFC"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.130911"},{"key":"e_1_3_2_1_44_1","first-page":"6550","article-title":"RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks","author":"Winter T.","year":"2012","journal-title":"RFC"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2012.6362577"}],"event":{"name":"CCS'14: 2014 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Scottsdale Arizona USA","acronym":"CCS'14"},"container-title":["Proceedings of the 4th International Workshop on Trustworthy Embedded Devices"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2666141.2666143","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2666141.2666143","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:19:24Z","timestamp":1750231164000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2666141.2666143"}},"subtitle":["Avoiding Hidden Wormholes using Channel Reciprocity"],"short-title":[],"issued":{"date-parts":[[2014,11,3]]},"references-count":44,"alternative-id":["10.1145\/2666141.2666143","10.1145\/2666141"],"URL":"https:\/\/doi.org\/10.1145\/2666141.2666143","relation":{},"subject":[],"published":{"date-parts":[[2014,11,3]]},"assertion":[{"value":"2014-11-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}