{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T04:49:38Z","timestamp":1764305378316,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,1]],"date-time":"2015-10-01T00:00:00Z","timestamp":1443657600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1145\/2801948.2801949","type":"proceedings-article","created":{"date-parts":[[2015,9,22]],"date-time":"2015-09-22T12:31:10Z","timestamp":1442925070000},"page":"144-149","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["A simulation platform for evaluating DoS attacks in wireless sensor networks"],"prefix":"10.1145","author":[{"given":"Eleni","family":"Darra","sequence":"first","affiliation":[{"name":"University of Piraeus, Piraeus, Greece"}]},{"given":"Christina","family":"Skouloudi","sequence":"additional","affiliation":[{"name":"University of Piraeus, Piraeus, Greece"}]},{"given":"Sokratis K.","family":"Katsikas","sequence":"additional","affiliation":[{"name":"University of Piraeus, Piraeus, Greece"}]}],"member":"320","published-online":{"date-parts":[[2015,10]]},"reference":[{"volume-title":"International Science Index 62","author":"Ahmed Muhammad R","key":"e_1_3_2_1_1_1","unstructured":"Muhammad R Ahmed , Xu Huang , and Dharmendra Sharma , \" A Taxonomy of Internal Attacks in Wireless Sensor Network\" , World Academy of Science, Engineering and Technology , International Science Index 62 , Vol. 6 , no. 2, pp. 393--396, 2012. Muhammad R Ahmed, Xu Huang, and Dharmendra Sharma, \"A Taxonomy of Internal Attacks in Wireless Sensor Network\", World Academy of Science, Engineering and Technology, International Science Index 62, Vol. 6, no. 2, pp. 393--396, 2012."},{"issue":"3","key":"e_1_3_2_1_2_1","first-page":"1","article-title":"Attacks in Wireless Sensor Networks","volume":"3","author":"Dubey R.","year":"2012","unstructured":"R. Dubey , V. Jain , R.S. Thakur , S.D. Choubey , \" Attacks in Wireless Sensor Networks \", International Journal of Scientific & Engineering Research , Vol. 3 , Issue 3 , pp. 1 -- 4 , 2012 . R. Dubey, V. Jain, R.S. Thakur, S.D. Choubey, \"Attacks in Wireless Sensor Networks\", International Journal of Scientific & Engineering Research, Vol. 3, Issue 3, pp. 1--4, 2012.","journal-title":"International Journal of Scientific & Engineering Research"},{"issue":"3","key":"e_1_3_2_1_3_1","first-page":"241","article-title":"A Review of the Vulnerabilities and Attacks for Wireless Sensor Networks","volume":"9","author":"Kim J. Y","year":"2012","unstructured":"J. Y Kim , R.D. Caytiles , K.J. Kim , \" A Review of the Vulnerabilities and Attacks for Wireless Sensor Networks , Journal of Security Engineering , Vol. 9 , no. 3 , pp. 241 -- 250 , 2012 . J. Y Kim, R.D. Caytiles, K.J. Kim, \"A Review of the Vulnerabilities and Attacks for Wireless Sensor Networks, Journal of Security Engineering, Vol. 9, no. 3, pp. 241--250, 2012.","journal-title":"Journal of Security Engineering"},{"issue":"6","key":"e_1_3_2_1_4_1","first-page":"322","article-title":"Incremental Intrusion Detection System for Wireless Sensor Networks","volume":"2","author":"Shah P.","year":"2013","unstructured":"P. Shah , A. Patel , \" Incremental Intrusion Detection System for Wireless Sensor Networks \", International Journal of Emerging Trends & Technology in Computer Science , Vol. 2 , no 6 , pp. 322 -- 326 , 2013 . P. Shah, A. Patel, \"Incremental Intrusion Detection System for Wireless Sensor Networks\", International Journal of Emerging Trends & Technology in Computer Science, Vol. 2, no 6, pp. 322--326, 2013.","journal-title":"International Journal of Emerging Trends & Technology in Computer Science"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/IISA.2013.6623718"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2014.01.012"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.050113.00191"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2012.6208721"},{"key":"e_1_3_2_1_9_1","volume-title":"http:\/\/www.isi.edu\/nsnam\/ns\/, accessed","author":"The","year":"2015","unstructured":"The network simulator ns-2 , http:\/\/www.isi.edu\/nsnam\/ns\/, accessed 16 May 2015 . The network simulator ns-2, http:\/\/www.isi.edu\/nsnam\/ns\/, accessed 16 May 2015."},{"issue":"3","key":"e_1_3_2_1_10_1","first-page":"390","article-title":"Taxonomy on Security Attacks on Self Configurable Networks","volume":"31","author":"Mohd N.","year":"2014","unstructured":"N. Mohd , S. Annapurna , H.S. Bhadauria , \" Taxonomy on Security Attacks on Self Configurable Networks \", World Applied Sciences Journal , Vol. 31 , no. 3 , pp. 390 -- 398 , 2014 . N. Mohd, S. Annapurna, H.S. Bhadauria, \"Taxonomy on Security Attacks on Self Configurable Networks\", World Applied Sciences Journal, Vol. 31, no. 3, pp. 390--398, 2014.","journal-title":"World Applied Sciences Journal"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2002.1039518"},{"issue":"7","key":"e_1_3_2_1_12_1","first-page":"25","article-title":"Simulation Results and Performance Evaluation of Routing Protocols in Mobile Ad Hoc Networks","volume":"1","author":"Agarwal N. K.","year":"2013","unstructured":"N. K. Agarwal , V. Shrivastava , \" Simulation Results and Performance Evaluation of Routing Protocols in Mobile Ad Hoc Networks \", International Journal of Emerging Science and Engineering (IJESE) , Vol. 1 , no. 7 , pp. 25 -- 28 , 2013 . N. K. Agarwal, V. Shrivastava, \"Simulation Results and Performance Evaluation of Routing Protocols in Mobile Ad Hoc Networks\", International Journal of Emerging Science and Engineering (IJESE), Vol. 1, no. 7, pp. 25--28, 2013.","journal-title":"International Journal of Emerging Science and Engineering (IJESE)"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-33112-6","volume-title":"Wireless Network Security","author":"Xiao Y.","year":"2007","unstructured":"Y. Xiao , X.(S.) Shen, D.-Z. Du , Wireless Network Security , Springer , 2007 . Y. Xiao, X.(S.) Shen, D.-Z. Du, Wireless Network Security, Springer, 2007."},{"key":"e_1_3_2_1_14_1","volume-title":"Systems Security Laboratory, Department of Digital Systems","author":"Darra E.","year":"2013","unstructured":"E. Darra , S.K. Katsikas , Attack Detection Capabilities of Intrusion Detection Systems for Wireless Sensor Networks , Systems Security Laboratory, Department of Digital Systems , University of Piraeus , Greece , 2013 . E. Darra, S.K. Katsikas, Attack Detection Capabilities of Intrusion Detection Systems for Wireless Sensor Networks, Systems Security Laboratory, Department of Digital Systems, University of Piraeus, Greece, 2013."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5121\/ijnsa.2010.2307"},{"key":"e_1_3_2_1_16_1","first-page":"180","volume-title":"Proceedings of the 9th WSEAS international conference on signal, speech and image processing, and 9th WSEAS international conference on Multimedia, internet & video technologies","author":"Lupu T-G.","year":"2009","unstructured":"T-G. Lupu , \" Main Types of Attacks in Wireless Sensor Networks\" , in Proceedings of the 9th WSEAS international conference on signal, speech and image processing, and 9th WSEAS international conference on Multimedia, internet & video technologies , pp. 180 -- 185 , 2009 . T-G. Lupu, \"Main Types of Attacks in Wireless Sensor Networks\", in Proceedings of the 9th WSEAS international conference on signal, speech and image processing, and 9th WSEAS international conference on Multimedia, internet & video technologies, pp. 180--185, 2009."},{"issue":"2","key":"e_1_3_2_1_17_1","first-page":"109","article-title":"Secure Routing for Wireless Mesh Networks","volume":"13","author":"Li C.","year":"2011","unstructured":"C. Li , Z. Wang and C. Yang , \" Secure Routing for Wireless Mesh Networks \", International Journal of Network Security , Vol. 13 , No. 2 , pp. 109 -- 120 , 2011 . C. Li, Z. Wang and C. Yang, \"Secure Routing for Wireless Mesh Networks\", International Journal of Network Security, Vol. 13, No.2, pp.109--120, 2011.","journal-title":"International Journal of Network Security"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-71760-9","volume-title":"Introduction to Network Simulator NS2","author":"Issaraiyakul T.","year":"2009","unstructured":"T. Issaraiyakul and E. Hossain , Introduction to Network Simulator NS2 , Springer , 2009 . T. Issaraiyakul and E. Hossain, Introduction to Network Simulator NS2, Springer, 2009."},{"key":"e_1_3_2_1_20_1","unstructured":"D. Virmani M. Hemrajani S. Chandel \"Exponential Trust Based Mechanism to Detect Black Hole attack in Wireless Sensor Network\" Cornell University Library http:\/\/arxiv.org\/abs\/1401.2541 2014.  D. Virmani M. Hemrajani S. Chandel \"Exponential Trust Based Mechanism to Detect Black Hole attack in Wireless Sensor Network\" Cornell University Library http:\/\/arxiv.org\/abs\/1401.2541 2014."},{"issue":"4","key":"e_1_3_2_1_21_1","first-page":"453","article-title":"Rushing Attack and its Prevention Techniques","volume":"2","author":"Shrivastava S.","year":"2013","unstructured":"S. Shrivastava , \" Rushing Attack and its Prevention Techniques \", International Journal of Application or Innovation in Engineering & Management , Vol. 2 , no 4 , pp. 453 -- 456 , 2013 . S. Shrivastava, \"Rushing Attack and its Prevention Techniques\", International Journal of Application or Innovation in Engineering & Management, Vol. 2, no 4, pp. 453--456, 2013.","journal-title":"International Journal of Application or Innovation in Engineering & Management"},{"issue":"4","key":"e_1_3_2_1_22_1","first-page":"1695","article-title":"Examination of Impact of Flooding attack on MANET and to accentuate on Performance Degradation","volume":"4","author":"Bhuvaneshwari K.","year":"2013","unstructured":"K. Bhuvaneshwari , A.F.S. Devaraj , \" Examination of Impact of Flooding attack on MANET and to accentuate on Performance Degradation \", Int. J. Advanced Networking and Applications , Vol. 4 , no 4 , pp. 1695 -- 1699 , 2013 . K. Bhuvaneshwari, A.F.S. Devaraj, \"Examination of Impact of Flooding attack on MANET and to accentuate on Performance Degradation\", Int. J. Advanced Networking and Applications, Vol. 4, no 4, pp. 1695--1699, 2013.","journal-title":"Int. J. Advanced Networking and Applications"}],"event":{"name":"PCI '15: 19th Panhellenic Conference on Informatics","acronym":"PCI '15","location":"Athens Greece"},"container-title":["Proceedings of the 19th Panhellenic Conference on Informatics"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2801948.2801949","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2801948.2801949","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:07:13Z","timestamp":1750223233000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2801948.2801949"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":21,"alternative-id":["10.1145\/2801948.2801949","10.1145\/2801948"],"URL":"https:\/\/doi.org\/10.1145\/2801948.2801949","relation":{},"subject":[],"published":{"date-parts":[[2015,10]]},"assertion":[{"value":"2015-10-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}