{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:31:00Z","timestamp":1750221060570,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,25]],"date-time":"2018-10-25T00:00:00Z","timestamp":1540425600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Research Foundation, NUS and Singtel"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,25]]},"DOI":"10.1145\/3267129.3267147","type":"proceedings-article","created":{"date-parts":[[2018,10,26]],"date-time":"2018-10-26T19:34:05Z","timestamp":1540582445000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Detecting Forwarding Misbehavior In Clustered IoT Networks"],"prefix":"10.1145","author":[{"given":"Nalam","family":"Venkata Abhishek","sequence":"first","affiliation":[{"name":"National University of Singapore, Singapore, Singapore"}]},{"given":"Anshoo","family":"Tandon","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore, Singapore"}]},{"given":"Teng Joon","family":"Lim","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore, Singapore"}]},{"given":"Biplab","family":"Sikdar","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2018,10,25]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2017. IEEE Standard for Information technology--Telecommunications and information exchange between systems - Local and metropolitan area networks-- Specific requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 2: Sub 1 GHz License Exempt Operation. IEEE Std 802.11ah-2016 (May 2017) 1--594.  2017. IEEE Standard for Information technology--Telecommunications and information exchange between systems - Local and metropolitan area networks-- Specific requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 2: Sub 1 GHz License Exempt Operation. IEEE Std 802.11ah-2016 (May 2017) 1--594."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2007.05.024"},{"key":"e_1_3_2_1_3_1","volume-title":"Biplab Sikdar, and Anshoo Tandon.","author":"Abhishek Nalam Venkata","year":"2018","unstructured":"Nalam Venkata Abhishek , Teng Joon Lim , Biplab Sikdar, and Anshoo Tandon. 2018 . An Intrusion Detection System for Detecting Compromised Gateways in Clustered IoT Networks. In 2018 IEEE International Workshop Technical Committee on Communications Quality and Reliability (CQR). IEEE , 1--6. Nalam Venkata Abhishek, Teng Joon Lim, Biplab Sikdar, and Anshoo Tandon. 2018. An Intrusion Detection System for Detecting Compromised Gateways in Clustered IoT Networks. In 2018 IEEE International Workshop Technical Committee on Communications Quality and Reliability (CQR). IEEE, 1--6."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2337336"},{"key":"e_1_3_2_1_5_1","unstructured":"Dave Evans. 2011. The Internet of Things: How the Next Evolution of the Internet Is Changing Everything. https:\/\/www.cisco.com\/c\/dam\/en_us\/about\/ac79\/docs\/innov\/IoT_IBSG_0411FINAL.pdf  Dave Evans. 2011. The Internet of Things: How the Next Evolution of the Internet Is Changing Everything. https:\/\/www.cisco.com\/c\/dam\/en_us\/about\/ac79\/docs\/innov\/IoT_IBSG_0411FINAL.pdf"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2017.7986299"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.01.010"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SERVICES.2015.12"},{"key":"e_1_3_2_1_9_1","unstructured":"Steven M Kay. 1993. Fundamentals of statistical signal processing volume I: estimation theory. (1993).   Steven M Kay. 1993. Fundamentals of statistical signal processing volume I: estimation theory. (1993)."},{"key":"e_1_3_2_1_10_1","volume-title":"Detection Theory. Signal Processing.","author":"Kay Steven M","year":"1998","unstructured":"Steven M Kay . 1998. Fundamentals of statistical signal processing , Vol. II : Detection Theory. Signal Processing. Upper Saddle River, NJ : Prentice Hall ( 1998 ). Steven M Kay. 1998. Fundamentals of statistical signal processing, Vol. II: Detection Theory. Signal Processing. Upper Saddle River, NJ: Prentice Hall (1998)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2015.7069361"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2015.01.006"},{"key":"e_1_3_2_1_13_1","volume-title":"A light-weight countermeasure to forwarding misbehavior in wireless sensor networks: design, analysis, and evaluation","author":"Pu Cong","year":"2016","unstructured":"Cong Pu and Sunho Lim . 2016. A light-weight countermeasure to forwarding misbehavior in wireless sensor networks: design, analysis, and evaluation . IEEE Systems Journal ( 2016 ). Cong Pu and Sunho Lim. 2016. A light-weight countermeasure to forwarding misbehavior in wireless sensor networks: design, analysis, and evaluation. IEEE Systems Journal (2016)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2015.7389051"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2013.04.014"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2016.2526601"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2747942"},{"key":"e_1_3_2_1_18_1","volume-title":"Communications and Signal Processing, 2009. ICICS 2009. 7th International Conference on. IEEE, 1--5.","author":"Tumrongwittayapak Chanatip","year":"2009","unstructured":"Chanatip Tumrongwittayapak and Ruttikorn Varakulsiripunth . 2009 . Detecting sinkhole attack and selective forwarding attack in wireless sensor networks. In Information , Communications and Signal Processing, 2009. ICICS 2009. 7th International Conference on. IEEE, 1--5. Chanatip Tumrongwittayapak and Ruttikorn Varakulsiripunth. 2009. Detecting sinkhole attack and selective forwarding attack in wireless sensor networks. In Information, Communications and Signal Processing, 2009. ICICS 2009. 7th International Conference on. IEEE, 1--5."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/794326"},{"key":"e_1_3_2_1_20_1","volume-title":"Machine learning techniques for intrusion detection. arXiv preprint arXiv:1312.2177","author":"Zamani Mahdi","year":"2013","unstructured":"Mahdi Zamani and Mahnush Movahedi . 2013. Machine learning techniques for intrusion detection. arXiv preprint arXiv:1312.2177 ( 2013 ). Mahdi Zamani and Mahnush Movahedi. 2013. Machine learning techniques for intrusion detection. arXiv preprint arXiv:1312.2177 (2013)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.02.009"}],"event":{"name":"MSWIM '18: 21st ACM Int'l Conference on Modelling, Analysis and Simulation of Wireless and Mobile Systems","sponsor":["SIGSIM ACM Special Interest Group on Simulation and Modeling"],"location":"Montreal QC Canada","acronym":"MSWIM '18"},"container-title":["Proceedings of the 14th ACM International Symposium on QoS and Security for Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3267129.3267147","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3267129.3267147","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:44:41Z","timestamp":1750207481000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3267129.3267147"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,25]]},"references-count":21,"alternative-id":["10.1145\/3267129.3267147","10.1145\/3267129"],"URL":"https:\/\/doi.org\/10.1145\/3267129.3267147","relation":{},"subject":[],"published":{"date-parts":[[2018,10,25]]},"assertion":[{"value":"2018-10-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}