{"id":"https://openalex.org/W3187542790","doi":"https://doi.org/10.1007/s11416-021-00392-0","title":"A framework for formal analysis and simulative evaluation of security attacks in wireless sensor networks","display_name":"A framework for formal analysis and simulative evaluation of security attacks in wireless sensor networks","publication_year":2021,"publication_date":"2021-08-06","ids":{"openalex":"https://openalex.org/W3187542790","doi":"https://doi.org/10.1007/s11416-021-00392-0","mag":"3187542790"},"language":"en","primary_location":{"id":"doi:10.1007/s11416-021-00392-0","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s11416-021-00392-0","pdf_url":"https://link.springer.com/content/pdf/10.1007/s11416-021-00392-0.pdf","source":{"id":"https://openalex.org/S2764922190","display_name":"Journal of Computer Virology and Hacking Techniques","issn_l":"2263-8733","issn":["2263-8733"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Virology and Hacking Techniques","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s11416-021-00392-0.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5065265267","display_name":"Cinzia Bernardeschi","orcid":"https://orcid.org/0000-0003-1604-4465"},"institutions":[{"id":"https://openalex.org/I108290504","display_name":"University of Pisa","ror":"https://ror.org/03ad39j10","country_code":"IT","type":"education","lineage":["https://openalex.org/I108290504"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Cinzia Bernardeschi","raw_affiliation_strings":["Department of Information Engineering, University of Pisa, Pisa, Italy"],"affiliations":[{"raw_affiliation_string":"Department of Information Engineering, University of Pisa, Pisa, Italy","institution_ids":["https://openalex.org/I108290504"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003061509","display_name":"Gianluca Dini","orcid":"https://orcid.org/0000-0002-6029-5467"},"institutions":[{"id":"https://openalex.org/I108290504","display_name":"University of Pisa","ror":"https://ror.org/03ad39j10","country_code":"IT","type":"education","lineage":["https://openalex.org/I108290504"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Gianluca Dini","raw_affiliation_strings":["Department of Information Engineering, University of Pisa, Pisa, Italy"],"affiliations":[{"raw_affiliation_string":"Department of Information Engineering, University of Pisa, Pisa, Italy","institution_ids":["https://openalex.org/I108290504"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088309110","display_name":"Maurizio Palmieri","orcid":"https://orcid.org/0000-0002-6177-0928"},"institutions":[{"id":"https://openalex.org/I108290504","display_name":"University of Pisa","ror":"https://ror.org/03ad39j10","country_code":"IT","type":"education","lineage":["https://openalex.org/I108290504"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Maurizio Palmieri","raw_affiliation_strings":["Department of Information Engineering, University of Pisa, Pisa, Italy"],"affiliations":[{"raw_affiliation_string":"Department of Information Engineering, University of Pisa, Pisa, Italy","institution_ids":["https://openalex.org/I108290504"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001176450","display_name":"Francesco Racciatti","orcid":"https://orcid.org/0000-0002-0452-5010"},"institutions":[{"id":"https://openalex.org/I45084792","display_name":"University of Florence","ror":"https://ror.org/04jr1s763","country_code":"IT","type":"education","lineage":["https://openalex.org/I45084792"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Francesco Racciatti","raw_affiliation_strings":["Department of Information Engineering, University of Florence, Florence, Italy"],"affiliations":[{"raw_affiliation_string":"Department of Information Engineering, University of Florence, Florence, Italy","institution_ids":["https://openalex.org/I45084792"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5065265267"],"corresponding_institution_ids":["https://openalex.org/I108290504"],"apc_list":{"value":2390,"currency":"EUR","value_usd":2990},"apc_paid":{"value":2390,"currency":"EUR","value_usd":2990},"fwci":0.6403,"has_fulltext":true,"cited_by_count":7,"citation_normalized_percentile":{"value":0.71082334,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":97},"biblio":{"volume":"17","issue":"3","first_page":"249","last_page":"263"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9923999905586243,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8853687047958374},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.5706528425216675},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5448198318481445},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5278651118278503},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.49683406949043274},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.47880372405052185},{"id":"https://openalex.org/keywords/formal-verification","display_name":"Formal verification","score":0.4216562509536743},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.4176506996154785},{"id":"https://openalex.org/keywords/formal-description","display_name":"Formal description","score":0.4171861410140991},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3315497040748596},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.21539217233657837},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.15395256876945496},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.0833442211151123}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8853687047958374},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.5706528425216675},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5448198318481445},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5278651118278503},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.49683406949043274},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.47880372405052185},{"id":"https://openalex.org/C111498074","wikidata":"https://www.wikidata.org/wiki/Q173326","display_name":"Formal verification","level":2,"score":0.4216562509536743},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.4176506996154785},{"id":"https://openalex.org/C2985583900","wikidata":"https://www.wikidata.org/wiki/Q722617","display_name":"Formal description","level":2,"score":0.4171861410140991},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3315497040748596},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.21539217233657837},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.15395256876945496},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0833442211151123},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1007/s11416-021-00392-0","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s11416-021-00392-0","pdf_url":"https://link.springer.com/content/pdf/10.1007/s11416-021-00392-0.pdf","source":{"id":"https://openalex.org/S2764922190","display_name":"Journal of Computer Virology and Hacking Techniques","issn_l":"2263-8733","issn":["2263-8733"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Virology and Hacking Techniques","raw_type":"journal-article"},{"id":"pmh:oai:arpi.unipi.it:11568/1105672","is_oa":true,"landing_page_url":"https://hdl.handle.net/11568/1105672","pdf_url":null,"source":{"id":"https://openalex.org/S4377196265","display_name":"CINECA IRIS Institutial research information system (University of Pisa)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I108290504","host_organization_name":"University of Pisa","host_organization_lineage":["https://openalex.org/I108290504"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/article"},{"id":"pmh:oai:zenodo.org:81117","is_oa":true,"landing_page_url":"https://www.openaccessrepository.it/record/81117","pdf_url":null,"source":{"id":"https://openalex.org/S4306402478","display_name":"INFM-OAR (INFN Catania)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210116497","host_organization_name":"Istituto Nazionale di Fisica Nucleare, Sezione di Catania","host_organization_lineage":["https://openalex.org/I4210116497"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/article"}],"best_oa_location":{"id":"doi:10.1007/s11416-021-00392-0","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s11416-021-00392-0","pdf_url":"https://link.springer.com/content/pdf/10.1007/s11416-021-00392-0.pdf","source":{"id":"https://openalex.org/S2764922190","display_name":"Journal of Computer Virology and Hacking Techniques","issn_l":"2263-8733","issn":["2263-8733"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Virology and Hacking Techniques","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.9100000262260437,"id":"https://metadata.un.org/sdg/7","display_name":"Affordable and clean energy"}],"awards":[{"id":"https://openalex.org/G75858821","display_name":null,"funder_award_id":"CrossLab","funder_id":"https://openalex.org/F4320321873","funder_display_name":"Ministero dell\u2019Istruzione, dell\u2019Universit\u00e0 e della Ricerca"},{"id":"https://openalex.org/G8091430692","display_name":null,"funder_award_id":"(MIUR)","funder_id":"https://openalex.org/F4320321873","funder_display_name":"Ministero dell\u2019Istruzione, dell\u2019Universit\u00e0 e della Ricerca"}],"funders":[{"id":"https://openalex.org/F4320317295","display_name":"Dipartimenti di Eccellenza","ror":null},{"id":"https://openalex.org/F4320321873","display_name":"Ministero dell\u2019Istruzione, dell\u2019Universit\u00e0 e della Ricerca","ror":"https://ror.org/0166hxq48"},{"id":"https://openalex.org/F4320324499","display_name":"Universit\u00e0 di Pisa","ror":"https://ror.org/03ad39j10"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3187542790.pdf","grobid_xml":"https://content.openalex.org/works/W3187542790.grobid-xml"},"referenced_works_count":21,"referenced_works":["https://openalex.org/W572872720","https://openalex.org/W1496267491","https://openalex.org/W2015508929","https://openalex.org/W2029980541","https://openalex.org/W2032838477","https://openalex.org/W2048099096","https://openalex.org/W2056441173","https://openalex.org/W2091936226","https://openalex.org/W2101508170","https://openalex.org/W2106689909","https://openalex.org/W2113881275","https://openalex.org/W2116678681","https://openalex.org/W2118851449","https://openalex.org/W2166336539","https://openalex.org/W2503885215","https://openalex.org/W2553387277","https://openalex.org/W2616777436","https://openalex.org/W2755619129","https://openalex.org/W2766073798","https://openalex.org/W2782630803","https://openalex.org/W4251328413"],"related_works":["https://openalex.org/W1975451135","https://openalex.org/W1515524860","https://openalex.org/W2416851461","https://openalex.org/W4287777441","https://openalex.org/W2178511292","https://openalex.org/W2113624447","https://openalex.org/W2097261973","https://openalex.org/W1865621670","https://openalex.org/W3165045451","https://openalex.org/W1559071892"],"abstract_inverted_index":{"Abstract":[0],"When":[1],"designing":[2],"Wireless":[3],"Sensor":[4],"Networks":[5],"it":[6],"is":[7,209],"important":[8],"to":[9,36,85,106,121,152,165],"analyze":[10],"their":[11,97],"security":[12,26,38,42,58,93,155],"risks":[13],"and":[14,40,79,95,120,168,186,188],"provide":[15],"adequate":[16,154],"solutions":[17],"for":[18,30,82,183],"protecting":[19],"them":[20],"from":[21],"malicious":[22],"attacks.":[23],"Unfortunately,":[24],"perfect":[25],"cannot":[27],"be":[28,65,150,163],"achieved,":[29],"performance":[31],"reasons.":[32],"Therefore,":[33],"designers":[34,84],"have":[35],"devise":[37],"priorities,":[39],"select":[41,153],"mechanisms":[43],"accordingly.":[44],"However,":[45],"in":[46,135],"the":[47,51,54,61,87,108,112,130,133,158,190],"early":[48],"stages":[49],"of":[50,57,89,111,118,124,132,137,196,204],"design":[52,100],"process,":[53],"concrete":[55],"effects":[56,88],"attacks":[59,134],"on":[60,181,194],"system":[62,173],"may":[63],"not":[64],"clearly":[66],"identified.":[67],"In":[68],"this":[69],"paper,":[70],"we":[71],"propose":[72],"a":[73,116,199,206],"framework":[74,179],"that":[75,171],"integrates":[76],"formal":[77,184],"verification":[78,187],"network":[80,139,200],"simulation":[81],"enabling":[83],"evaluate":[86,96],"attacks,":[90,119],"identify":[91],"possible":[92],"mechanisms,":[94,156],"effectiveness,":[98],"since":[99],"time.":[101],"Formal":[102],"methods":[103],"are":[104,175],"used":[105,151],"build":[107],"abstract":[109,160],"model":[110,161],"application,":[113],"together":[114],"with":[115],"set":[117],"state":[122],"properties":[123,174],"general":[125],"validity.":[126],"The":[127,178],"simulator":[128],"measures":[129],"impact":[131],"terms":[136],"common":[138],"parameters,":[140],"like":[141],"energy":[142],"consumption":[143],"or":[144],"computational":[145],"effort.":[146],"Such":[147],"information":[148],"can":[149,162],"then":[157],"initial":[159],"refined":[164],"adopt":[166],"them,":[167],"finally":[169],"prove":[170],"former":[172],"still":[176],"verified.":[177],"relies":[180],"UPPAAL":[182],"modeling":[185],"uses":[189],"Attack":[191],"Simulation":[192],"Framework":[193],"top":[195],"Castalia":[197],"as":[198],"simulator.":[201],"As":[202],"proof":[203],"concept,":[205],"case":[207],"study":[208],"shown.":[210]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2}],"updated_date":"2026-04-12T07:58:50.170612","created_date":"2021-08-16T00:00:00"}
