Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2013
2013
2016
2016

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 18 publications
0
4
0
Order By: Relevance
“…This work extends [28] with the addition of 3 new implemented attacks as well as the presentation of BCN-MiniSec to defend against the attacks.…”
Section: Attacks On Beacon-enabled 802154 Networkmentioning
confidence: 98%
See 1 more Smart Citation
“…This work extends [28] with the addition of 3 new implemented attacks as well as the presentation of BCN-MiniSec to defend against the attacks.…”
Section: Attacks On Beacon-enabled 802154 Networkmentioning
confidence: 98%
“…In [28] we introduced several attacks on the beacon-enabled 802.15.4 network. This work extends [28] with the addition of 3 new implemented attacks as well as the presentation of BCN-MiniSec to defend against the attacks.…”
Section: Attacks On Beacon-enabled 802154 Networkmentioning
confidence: 99%
“…Since there is no method of verifying of sensor nodes' identifiers (IDs), Jung et al [14] define two categories of variants of the IEEE 802.15.4 GTS Attack as follows.…”
Section: Guaranteed Time Slot (Gts) Attacksmentioning
confidence: 99%
“…This causes the length of the CAP to momentarily fall below aMinCAPLength, thus reducing the amount of time which member nodes have in order to contend for channel access [1]. While this variant of the GTS Attack has not been previously mentioned in any references, its discovery is inspired by the brief statement made by Jung et al [14] that preventative actions of CAP maintenance are ineffective if a malicious node constantly sends either GTS requests or data at the assigned GTS during the CFP. 5.10.…”
Section: Dos Against Cap Maintenancementioning
confidence: 99%