{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T14:59:55Z","timestamp":1753887595676,"version":"3.41.2"},"reference-count":15,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2018,6,24]],"date-time":"2018-06-24T00:00:00Z","timestamp":1529798400000},"content-version":"vor","delay-in-days":174,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100007041","name":"Universidad de Zaragoza","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100007041","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003176","name":"Ministerio de Educaci\u00f3n, Cultura y Deporte","doi-asserted-by":"publisher","award":["CAS17\/00005"],"award-info":[{"award-number":["CAS17\/00005"]}],"id":[{"id":"10.13039\/501100003176","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003329","name":"Ministerio de Econom\u00eda y Competitividad","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003329","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Wireless Communications and Mobile Computing"],"published-print":{"date-parts":[[2018,1]]},"abstract":"<jats:p>Sensor networks and Internet of Things (IoT) are useful for many purposes such as military defense, sensing in smart homes, precision agriculture, underwater monitoring in aquaculture, and ambient\u2010assisted living for healthcare. Efficient and secure data forwarding is essential to maintain seamless communications and to provide fast services. However, IoT devices and sensors usually have low processing capabilities and vulnerabilities. For example, attacks such as the Distributed Denial of Service (DDoS) can easily hinder sensor networks and IoT devices. In this context, the current approach presents an agent\u2010based simulation solution for exploring strategies for defending from different DDoS attacks. The current work focuses on obtaining low\u2010consuming defense strategies in terms of processing capabilities, so that these can be applied in sensor networks and IoT devices. The experimental results show that the simulator was useful for (a) defining defense and attack strategies, (b) assessing the effectiveness of defense strategies against attack ones, and (c) defining efficient defense strategies with low response times.<\/jats:p>","DOI":"10.1155\/2018\/7264269","type":"journal-article","created":{"date-parts":[[2018,6,24]],"date-time":"2018-06-24T23:31:42Z","timestamp":1529883102000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["ABS\u2010DDoS: An Agent\u2010Based Simulator about Strategies of Both DDoS Attacks and Their Defenses, to Achieve Efficient Data Forwarding in Sensor Networks and IoT Devices"],"prefix":"10.1155","volume":"2018","author":[{"given":"Franks","family":"Gonz\u00e1lez-Landero","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2726-6760","authenticated-orcid":false,"given":"Iv\u00e1n","family":"Garc\u00eda-Magari\u00f1o","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4773-4904","authenticated-orcid":false,"given":"Raquel","family":"Lacuesta","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0862-0533","authenticated-orcid":false,"given":"Jaime","family":"Lloret","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2018,6,24]]},"reference":[{"key":"e_1_2_8_1_2","doi-asserted-by":"publisher","DOI":"10.3390\/s17081781"},{"key":"e_1_2_8_2_2","doi-asserted-by":"publisher","DOI":"10.3390\/s17112606"},{"key":"e_1_2_8_3_2","doi-asserted-by":"crossref","unstructured":"LeeS. H. LeeS. SongH. andLeeH. S. Wireless sensor network design for tactical military applications : Remote large-scale environments Proceedings of the MILCOM 2009 - 2009 IEEE Military Communications Conference October 2009 Boston MA USA 1\u20137 https:\/\/doi.org\/10.1109\/MILCOM.2009.5379900.","DOI":"10.1109\/MILCOM.2009.5379900"},{"key":"e_1_2_8_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2764467"},{"key":"e_1_2_8_5_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2015.08.049"},{"key":"e_1_2_8_6_2","first-page":"35","article-title":"Computer network attack and defense technology","volume":"1","author":"Yang X.","year":"2018","journal-title":"Information and Computer Security"},{"key":"e_1_2_8_7_2","doi-asserted-by":"publisher","DOI":"10.5120\/7640-0724"},{"key":"e_1_2_8_8_2","first-page":"1","article-title":"IoTPOT: analysing the rise of IoT compromises","volume":"9","author":"Pa Y. M. P.","year":"2015","journal-title":"EMU"},{"key":"e_1_2_8_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2014.2328587"},{"key":"e_1_2_8_10_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.12.037"},{"key":"e_1_2_8_11_2","doi-asserted-by":"crossref","unstructured":"GkountisC. TahaM. LloretJ. andKambourakisG. Lightweight algorithm for protecting SDN controller against DDoS attacks Proceedings of the 2017 10th IFIP Wireless and Mobile Networking Conference (WMNC) September 2017 Valencia 1\u20136 https:\/\/doi.org\/10.1109\/WMNC.2017.8248858.","DOI":"10.1109\/WMNC.2017.8248858"},{"key":"e_1_2_8_12_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpat.2017.05.006"},{"key":"e_1_2_8_13_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2015.09.003"},{"key":"e_1_2_8_14_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2014.10.009"},{"key":"e_1_2_8_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2015.2487361"}],"container-title":["Wireless Communications and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2018\/7264269.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2018\/7264269.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2018\/7264269","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T06:39:12Z","timestamp":1723012752000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2018\/7264269"}},"subtitle":[],"editor":[{"given":"Wei","family":"Wang","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2018,1]]},"references-count":15,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,1]]}},"alternative-id":["10.1155\/2018\/7264269"],"URL":"https:\/\/doi.org\/10.1155\/2018\/7264269","archive":["Portico"],"relation":{},"ISSN":["1530-8669","1530-8677"],"issn-type":[{"type":"print","value":"1530-8669"},{"type":"electronic","value":"1530-8677"}],"subject":[],"published":{"date-parts":[[2018,1]]},"assertion":[{"value":"2018-03-23","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-05-28","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-06-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"7264269"}}