{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T23:37:21Z","timestamp":1767915441975,"version":"3.49.0"},"reference-count":31,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2016,4,15]],"date-time":"2016-04-15T00:00:00Z","timestamp":1460678400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Purdue Cyber Center"},{"DOI":"10.13039\/100000001","name":"US National Science Foundation","doi-asserted-by":"crossref","award":["CNS-1111512 and CNS-1016722"],"award-info":[{"award-number":["CNS-1111512 and CNS-1016722"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Sen. Netw."],"published-print":{"date-parts":[[2016,5,12]]},"abstract":"<jats:p>In wireless sensor networks, packet losses are often an indicator of possible undergoing attacks. Therefore, security solutions aiming at providing comprehensive protection must include functions for packet-loss detection. Determining the actual cause of these losses is crucial to a quick and automated reaction to the attack, be it a simple reporting of the attack or a more sophisticated action such as packet rerouting and retransmission. Packet losses in wireless sensor networks can be caused by either attacks affecting the nodes or attacks focused on the wireless links. The efficacy of the response to such attacks is highly dependent on an accurate identification of the actual attack cause. Therefore, approaches to correctly identifying the cause of packet losses are needed. The work presented in this article addresses this problem by designing and implementing a fine-grained analysis (FGA) tool that investigates packet-loss events and reports their most likely cause. Our FGA tool profiles the wireless links between the nodes, as well as their neighborhood, by leveraging resident parameters, such as RSSI and LQI, available within every received packet. The design of the system is fully distributed and event-driven, and its low overhead makes it suitable for resource-constrained entities such as wireless motes. We have validated our approach through real-world experiments, showing that our FGA tool is effective in differentiating between the various attacks that may affect nodes and links.<\/jats:p>","DOI":"10.1145\/2886103","type":"journal-article","created":{"date-parts":[[2016,4,15]],"date-time":"2016-04-15T12:29:25Z","timestamp":1460723365000},"page":"1-30","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Node or Link? Fine-Grained Analysis of Packet-Loss Attacks in Wireless Sensor Networks"],"prefix":"10.1145","volume":"12","author":[{"given":"Daniele","family":"Midi","sequence":"first","affiliation":[{"name":"Purdue University, West Lafayette IN"}]},{"given":"Elisa","family":"Bertino","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette IN"}]}],"member":"320","published-online":{"date-parts":[[2016,4,15]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Tom M. Apostol and Mamikon A. Mnatsakanian. 2004. Centroids constructed graphically. Mathematics Magazine 201--210.  Tom M. Apostol and Mamikon A. Mnatsakanian. 2004. Centroids constructed graphically. Mathematics Magazine 201--210.","DOI":"10.1080\/0025570X.2004.11953252"},{"key":"e_1_2_1_2_1","first-page":"8","article-title":"Increasing RSSI localization accuracy with distance reference anchor in wireless sensor networks","volume":"11","author":"Bekcibasi Ugur","year":"2014","journal-title":"Acta Polytechnica Hungarica"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2009.5355013"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2013.92"},{"key":"e_1_2_1_5_1","volume-title":"15th International Symposium on Wireless Personal Multimedia Communications (WPMC\u201912)","author":"Chen Yeong-Sheng","year":"2012"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/938985.939000"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1023720.1023732"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/570681.570688"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1791212.1791227"},{"key":"e_1_2_1_10_1","volume-title":"Proceedings of the 13th European Wireless Conference.","author":"Krontiris Ioannis"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2012.78"},{"key":"e_1_2_1_12_1","doi-asserted-by":"crossref","unstructured":"F. Mouton and H. S. Venter. 2011. A prototype for achieving digital forensic readiness on wireless sensor networks. In AFRICON\u201911. 1--6. DOI:http:\/\/dx.doi.orgt\/10.1109\/AFRCON.2011.6072117  F. Mouton and H. S. Venter. 2011. A prototype for achieving digital forensic readiness on wireless sensor networks. In AFRICON\u201911. 1--6. DOI:http:\/\/dx.doi.orgt\/10.1109\/AFRCON.2011.6072117","DOI":"10.1109\/AFRCON.2011.6072117"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2012.6459972"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/1706428.1706472"},{"key":"e_1_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Cyril Onwubiko and Thomas Owens. 2012. Situational Awareness in Computer Network Defense: Principles Methods and Applications. Information Science Reference Hershey PA.   Cyril Onwubiko and Thomas Owens. 2012. Situational Awareness in Computer Network Defense: Principles Methods and Applications. Information Science Reference Hershey PA.","DOI":"10.4018\/978-1-4666-0104-8"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICACT.2006.206151"},{"key":"e_1_2_1_17_1","volume-title":"4th International Symposium on Information Processing in Sensor Networks (IPSN\u201905)","author":"Polastre J.","year":"2005"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1163593.1163597"},{"key":"e_1_2_1_19_1","volume-title":"Proceedings of IEEE SECON.","author":"Ramach Krishna N."},{"key":"e_1_2_1_20_1","volume-title":"3rd IEEE Consumer Communications and Networking Conference (CCNC\u201906)","volume":"1","author":"Roman R.","year":"2006"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517351.2517408"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2010.2045416"},{"key":"e_1_2_1_23_1","volume-title":"Proceedings of the 3rd Workshop on Embedded Networked Sensors (EmNets\u201906)","author":"Srinivasan Kannan","year":"2006"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS.2012.24"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2668332.2668351"},{"key":"e_1_2_1_26_1","unstructured":"A. Thottam Parameswaran M. I. Husain and S. Upadhyaya. Sep 2009. Is RSSI a reliable parameter in sensor localization algorithms\u2014an experimental study. 28th IEEE SRDS F2DA Workshop.  A. Thottam Parameswaran M. I. Husain and S. Upadhyaya. Sep 2009. Is RSSI a reliable parameter in sensor localization algorithms\u2014an experimental study. 28th IEEE SRDS F2DA Workshop."},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2006.315852"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/WIMESH.2010.5507909"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1435473.1435475"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-006-5064-1"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSNC.2006.66"}],"container-title":["ACM Transactions on Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2886103","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2886103","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:38:50Z","timestamp":1750221530000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2886103"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4,15]]},"references-count":31,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2016,5,12]]}},"alternative-id":["10.1145\/2886103"],"URL":"https:\/\/doi.org\/10.1145\/2886103","relation":{},"ISSN":["1550-4859","1550-4867"],"issn-type":[{"value":"1550-4859","type":"print"},{"value":"1550-4867","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,4,15]]},"assertion":[{"value":"2014-10-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-01-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-04-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}