{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:59:49Z","timestamp":1750309189478,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,6,18]],"date-time":"2018-06-18T00:00:00Z","timestamp":1529280000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,6,18]]},"DOI":"10.1145\/3212480.3212488","type":"proceedings-article","created":{"date-parts":[[2018,6,28]],"date-time":"2018-06-28T16:38:41Z","timestamp":1530203921000},"page":"190-195","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["SWARD"],"prefix":"10.1145","author":[{"given":"Maxime","family":"Montoya","sequence":"first","affiliation":[{"name":"Univ. Grenoble Alpes, CEA, LETI, DACLE, Grenoble, France"}]},{"given":"Simone","family":"Bacles-Min","sequence":"additional","affiliation":[{"name":"Univ. Grenoble Alpes, CEA, LETI, DACLE, Grenoble, France"}]},{"given":"Anca","family":"Molnos","sequence":"additional","affiliation":[{"name":"Univ. Grenoble Alpes, CEA, LETI, DACLE, Grenoble, France"}]},{"given":"Jacques J.A.","family":"Fournier","sequence":"additional","affiliation":[{"name":"Univ. Grenoble Alpes, CEA, LETI, DSYS, Grenoble, France"}]}],"member":"320","published-online":{"date-parts":[[2018,6,18]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"A. Augustin J. Yi T. Clausen and W.M. Townsley. 2016. A Study of LoRa: Long Range and Low Power Networks for the Internet of Things. Sensors 16 9 (2016).  A. Augustin J. Yi T. Clausen and W.M. Townsley. 2016. A Study of LoRa: Long Range and Low Power Networks for the Internet of Things. Sensors 16 9 (2016).","DOI":"10.3390\/s16091466"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37288-9_11"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"A. Bogdanov M. Kne\u017eevi\u0107 G. Leander D. Toz K. Var\u0131c\u0131 and I. Verbauwhede. 2011. spongent: A Lightweight Hash Function. In Cryptographic Hardware and Embedded Systems - CHES 2011. Springer 312--325.   A. Bogdanov M. Kne\u017eevi\u0107 G. Leander D. Toz K. Var\u0131c\u0131 and I. Verbauwhede. 2011. spongent: A Lightweight Hash Function. In Cryptographic Hardware and Embedded Systems - CHES 2011. Springer 312--325.","DOI":"10.1007\/978-3-642-23951-9_21"},{"volume-title":"Counteracting Denial-of-Sleep Attacks in Wake-Up-Radio-Based Sensing Systems. In 13th Annual IEEE Int. Conference on Sensing, Communication, and Networking (SECON). 1--9.","author":"Capossele A. T.","key":"e_1_3_2_1_4_1","unstructured":"A. T. Capossele , V. Cervo , C. Petrioli , and D. Spenza . 2016 . Counteracting Denial-of-Sleep Attacks in Wake-Up-Radio-Based Sensing Systems. In 13th Annual IEEE Int. Conference on Sensing, Communication, and Networking (SECON). 1--9. A. T. Capossele, V. Cervo, C. Petrioli, and D. Spenza. 2016. Counteracting Denial-of-Sleep Attacks in Wake-Up-Radio-Based Sensing Systems. In 13th Annual IEEE Int. Conference on Sensing, Communication, and Networking (SECON). 1--9."},{"key":"e_1_3_2_1_5_1","volume-title":"Secure Hash Standard. Federal Inf. Process. Stds. (NIST FIPS) 180-4 (Aug","author":"Dang Q. H.","year":"2015","unstructured":"Q. H. Dang . 2015. Secure Hash Standard. Federal Inf. Process. Stds. (NIST FIPS) 180-4 (Aug . 2015 ). Q. H. Dang. 2015. Secure Hash Standard. Federal Inf. Process. Stds. (NIST FIPS) 180-4 (Aug. 2015)."},{"key":"e_1_3_2_1_6_1","unstructured":"M. J. Dworkin etal 2001. Advanced Encryption Standard (AES). Federal Inf. Process. Stds. (NIST FIPS) - 197 (Nov. 2001).  M. J. Dworkin et al. 2001. Advanced Encryption Standard (AES). Federal Inf. Process. Stds. (NIST FIPS) - 197 (Nov. 2001)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECURWARE.2009.36"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2387191.2387206"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5121\/ijassn.2013.3101"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2014.08.008"},{"key":"e_1_3_2_1_11_1","volume-title":"Secure Wake-Up Scheme for WBANs. IEICE Transactions on Communications E93.B, 4","author":"Liu J.-W","year":"2010","unstructured":"J.-W Liu , M. Al Ameen , and K.-S. Kwak . 2010. Secure Wake-Up Scheme for WBANs. IEICE Transactions on Communications E93.B, 4 ( 2010 ), 854--857. J.-W Liu, M. Al Ameen, and K.-S. Kwak. 2010. Secure Wake-Up Scheme for WBANs. IEICE Transactions on Communications E93.B, 4 (2010), 854--857."},{"volume-title":"2014 International Conference on Collaboration Technologies and Systems (CTS). 279--286","author":"Stecklina O.","key":"e_1_3_2_1_12_1","unstructured":"O. Stecklina , S. Kornemann , and M. Methfessel . 2014. A secure wake-up scheme for low power wireless sensor nodes . In 2014 International Conference on Collaboration Technologies and Systems (CTS). 279--286 . O. Stecklina, S. Kornemann, and M. Methfessel. 2014. A secure wake-up scheme for low power wireless sensor nodes. In 2014 International Conference on Collaboration Technologies and Systems (CTS). 279--286."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"J. Suhonen M. Kohvakka V. Kaseva T. D. H\u00e4m\u00e4l\u00e4inen and M. H\u00e4nnik\u00e4inen. 2010. Low-power Wireless Sensor Network Platforms. In Handbook of Signal Processing Systems. Springer 123--160.  J. Suhonen M. Kohvakka V. Kaseva T. D. H\u00e4m\u00e4l\u00e4inen and M. H\u00e4nnik\u00e4inen. 2010. Low-power Wireless Sensor Network Platforms. In Handbook of Signal Processing Systems. Springer 123--160.","DOI":"10.1007\/978-1-4419-6345-1_6"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2013.60"},{"key":"e_1_3_2_1_15_1","volume-title":"The RISC-V Instruction Set Manual","volume":"2","author":"Waterman A.","year":"2014","unstructured":"A. Waterman , Y. Lee , D. A. Patterson , and K. Asanov\u00edc . 2014 . The RISC-V Instruction Set Manual , Volume I: User-Level ISA, Version 2 .0. EECS Department, University of California, Berkeley, Tech. Rep. UCB\/EECS- 2014 -54 (May 2014). A. Waterman, Y. Lee, D. A. Patterson, and K. Asanov\u00edc. 2014. The RISC-V Instruction Set Manual, Volume I: User-Level ISA, Version 2.0. EECS Department, University of California, Berkeley, Tech. Rep. UCB\/EECS-2014-54 (May 2014)."}],"event":{"name":"WiSec '18: 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Stockholm Sweden","acronym":"WiSec '18"},"container-title":["Proceedings of the 11th ACM Conference on Security &amp; Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3212480.3212488","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3212480.3212488","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:54:15Z","timestamp":1750287255000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3212480.3212488"}},"subtitle":["A Secure WAke-up RaDio against Denial-of-Service on IoT devices"],"short-title":[],"issued":{"date-parts":[[2018,6,18]]},"references-count":15,"alternative-id":["10.1145\/3212480.3212488","10.1145\/3212480"],"URL":"https:\/\/doi.org\/10.1145\/3212480.3212488","relation":{},"subject":[],"published":{"date-parts":[[2018,6,18]]},"assertion":[{"value":"2018-06-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}