{"id":"https://openalex.org/W1625679364","doi":"https://doi.org/10.1109/icccn.2015.7288392","title":"Demonstrating the Threat of Hardware Trojans in Wireless Sensor Networks","display_name":"Demonstrating the Threat of Hardware Trojans in Wireless Sensor Networks","publication_year":2015,"publication_date":"2015-08-01","ids":{"openalex":"https://openalex.org/W1625679364","doi":"https://doi.org/10.1109/icccn.2015.7288392","mag":"1625679364"},"language":"en","primary_location":{"id":"doi:10.1109/icccn.2015.7288392","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccn.2015.7288392","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 24th International Conference on Computer Communication and Networks (ICCCN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://zenodo.org/record/1270063","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5050018521","display_name":"Maryam Jalalitabar","orcid":"https://orcid.org/0000-0002-5870-1745"},"institutions":[{"id":"https://openalex.org/I181565077","display_name":"Georgia State University","ror":"https://ror.org/03qt6ba18","country_code":"US","type":"education","lineage":["https://openalex.org/I181565077"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Maryam Jalalitabar","raw_affiliation_strings":["Department of Computer Science, Georgia State University, Atlanta Georgia","Department of Computer Science , Georgia State University , Atlanta, GA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Georgia State University, Atlanta Georgia","institution_ids":["https://openalex.org/I181565077"]},{"raw_affiliation_string":"Department of Computer Science , Georgia State University , Atlanta, GA, USA","institution_ids":["https://openalex.org/I181565077"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109244686","display_name":"Marco Valero","orcid":null},"institutions":[{"id":"https://openalex.org/I181565077","display_name":"Georgia State University","ror":"https://ror.org/03qt6ba18","country_code":"US","type":"education","lineage":["https://openalex.org/I181565077"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Marco Valero","raw_affiliation_strings":["Department of Computer Science, Georgia State University, Atlanta Georgia","Department of Computer Science , Georgia State University , Atlanta, GA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Georgia State University, Atlanta Georgia","institution_ids":["https://openalex.org/I181565077"]},{"raw_affiliation_string":"Department of Computer Science , Georgia State University , Atlanta, GA, USA","institution_ids":["https://openalex.org/I181565077"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5053282089","display_name":"Anu G. Bourgeois","orcid":"https://orcid.org/0000-0002-4705-4888"},"institutions":[{"id":"https://openalex.org/I181565077","display_name":"Georgia State University","ror":"https://ror.org/03qt6ba18","country_code":"US","type":"education","lineage":["https://openalex.org/I181565077"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Anu G. Bourgeois","raw_affiliation_strings":["Georgia State University, Atlanta, GA, US","Department of Computer Science , Georgia State University , Atlanta, GA, USA"],"affiliations":[{"raw_affiliation_string":"Georgia State University, Atlanta, GA, US","institution_ids":["https://openalex.org/I181565077"]},{"raw_affiliation_string":"Department of Computer Science , Georgia State University , Atlanta, GA, USA","institution_ids":["https://openalex.org/I181565077"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5050018521"],"corresponding_institution_ids":["https://openalex.org/I181565077"],"apc_list":null,"apc_paid":null,"fwci":0.6597,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.68391053,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"1","issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.6914517879486084},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6427443623542786},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5773529410362244},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5762266516685486},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5346493124961853},{"id":"https://openalex.org/keywords/hardware-security-module","display_name":"Hardware security module","score":0.5121665000915527},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.501997709274292},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4478394687175751},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.43653571605682373},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3702659010887146},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.3628605008125305},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.2526013255119324},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.18075934052467346}],"concepts":[{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.6914517879486084},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6427443623542786},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5773529410362244},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5762266516685486},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5346493124961853},{"id":"https://openalex.org/C39217717","wikidata":"https://www.wikidata.org/wiki/Q1432354","display_name":"Hardware security module","level":3,"score":0.5121665000915527},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.501997709274292},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4478394687175751},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.43653571605682373},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3702659010887146},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.3628605008125305},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.2526013255119324},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.18075934052467346}],"mesh":[],"locations_count":5,"locations":[{"id":"doi:10.1109/icccn.2015.7288392","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccn.2015.7288392","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 24th International Conference on Computer Communication and Networks (ICCCN)","raw_type":"proceedings-article"},{"id":"pmh:oai:scholarworks.gsu.edu:ebcs_articles-1014","is_oa":false,"landing_page_url":"https://scholarworks.gsu.edu/ebcs_articles/14","pdf_url":null,"source":{"id":"https://openalex.org/S4406922693","display_name":"Digital Archive @ GSU","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"EBCS Articles","raw_type":"text"},{"id":"pmh:oai:scholarworks.gsu.edu:20.500.14694/4247","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ICCCN.2015.7288392.","pdf_url":null,"source":{"id":"https://openalex.org/S4377196399","display_name":"ScholarWorks - Georgia State University (Georgia State University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I181565077","host_organization_name":"Georgia State University","host_organization_lineage":["https://openalex.org/I181565077"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":null},{"id":"pmh:oai:scholarworks.gsu.edu:20.500.14694/7248","is_oa":false,"landing_page_url":"https://hdl.handle.net/20.500.14694/7248","pdf_url":null,"source":{"id":"https://openalex.org/S4377196399","display_name":"ScholarWorks - Georgia State University (Georgia State University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I181565077","host_organization_name":"Georgia State University","host_organization_lineage":["https://openalex.org/I181565077"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":null},{"id":"pmh:oai:zenodo.org:1270063","is_oa":true,"landing_page_url":"https://zenodo.org/record/1270063","pdf_url":null,"source":{"id":"https://openalex.org/S4306400562","display_name":"Zenodo (CERN European Organization for Nuclear Research)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67311998","host_organization_name":"European Organization for Nuclear Research","host_organization_lineage":["https://openalex.org/I67311998"],"host_organization_lineage_names":[],"type":"repository"},"license":"public-domain","license_id":"https://openalex.org/licenses/public-domain","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/conferencePaper"}],"best_oa_location":{"id":"pmh:oai:zenodo.org:1270063","is_oa":true,"landing_page_url":"https://zenodo.org/record/1270063","pdf_url":null,"source":{"id":"https://openalex.org/S4306400562","display_name":"Zenodo (CERN European Organization for Nuclear Research)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67311998","host_organization_name":"European Organization for Nuclear Research","host_organization_lineage":["https://openalex.org/I67311998"],"host_organization_lineage_names":[],"type":"repository"},"license":"public-domain","license_id":"https://openalex.org/licenses/public-domain","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/conferencePaper"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W1500140210","https://openalex.org/W1591013007","https://openalex.org/W1913780224","https://openalex.org/W1940397557","https://openalex.org/W2001441503","https://openalex.org/W2016460936","https://openalex.org/W2071043548","https://openalex.org/W2098536553","https://openalex.org/W2104199388","https://openalex.org/W2104784054","https://openalex.org/W2111341891","https://openalex.org/W2115612375","https://openalex.org/W2120912790","https://openalex.org/W2123241700","https://openalex.org/W2127616184","https://openalex.org/W2129919733","https://openalex.org/W2130403046","https://openalex.org/W2130848267","https://openalex.org/W2131570398","https://openalex.org/W2136032111","https://openalex.org/W2140987300","https://openalex.org/W2147035977","https://openalex.org/W2148357146","https://openalex.org/W2154978532","https://openalex.org/W2157394756","https://openalex.org/W2157977768","https://openalex.org/W2165491783","https://openalex.org/W2476448192","https://openalex.org/W6639841212","https://openalex.org/W6675734724"],"related_works":["https://openalex.org/W1975451135","https://openalex.org/W3148968234","https://openalex.org/W2890570089","https://openalex.org/W2989915292","https://openalex.org/W2295628284","https://openalex.org/W145760256","https://openalex.org/W2028086369","https://openalex.org/W2123841989","https://openalex.org/W4281628474","https://openalex.org/W4317795068"],"abstract_inverted_index":{"As":[0],"the":[1,9,31,64,73,121,153,163,191,198,218,228],"demand":[2],"for":[3,128,176,186],"cheaper":[4],"electronic":[5,37,52],"devices":[6,53],"has":[7,14,110],"increased,":[8],"location":[10],"of":[11,24,30,33,66,102,141,190,231],"manufacturing":[12,32],"foundries":[13],"changed,":[15],"sometimes":[16],"to":[17,58,62,84,87,94,119,134,155,158,200,236,240],"untrusted":[18],"places":[19],"in":[20,49,105,138,146,182,217],"foreign":[21],"countries.":[22],"Some":[23],"these":[25],"locations":[26],"have":[27,173],"limited":[28],"oversight":[29],"complicated":[34],"and":[35,54,145,203,221,244],"sensitive":[36,91],"components":[38],"including":[39],"integrated":[40,44],"circuits":[41,45],"(ICs).":[42],"The":[43,100],"are":[46,75,143],"key":[47],"component":[48],"all":[50],"current":[51],"can":[55,81],"be":[56,59,82,234],"modified":[57],"malicious":[60,70],"or":[61,93],"monitor":[63],"functions":[65],"their":[67,96],"applications.":[68,179],"These":[69],"modifications":[71],"on":[72,162],"ICs":[74],"called":[76],"hardware":[77,103,125,239],"trojans":[78,104,126],"(HWTs).":[79],"HWTs":[80],"designed":[83],"quietly":[85],"monitor,":[86],"actively":[88],"send":[89],"out":[90],"information,":[92],"destroy":[95],"host":[97],"device":[98],"completely.":[99,207],"idea":[101],"Wireless":[106],"Sensor":[107],"Networks":[108],"(WSNs)":[109],"not":[111],"been":[112,174],"investigated":[113],"before;":[114],"thus,":[115],"our":[116,166],"goal":[117],"is":[118,132,195,213],"demonstrate":[120],"potential":[122],"threat":[123],"that":[124,137,172,194,227],"pose":[127],"sensor":[129],"networks.":[130],"This":[131],"important":[133],"study,":[135],"given":[136,214,235],"WSNs":[139],"hundreds":[140],"sensors":[142,171],"deployed":[144],"most":[147],"cases":[148],"left":[149],"unattended,":[150],"which":[151],"gives":[152],"opportunity":[154],"an":[156],"attacker":[157,181],"trigger":[159],"a":[160,183,242],"HWT":[161],"sensors.":[164],"For":[165],"investigation,":[167],"we":[168],"used":[169,175,196],"TelosB":[170],"some":[177],"WSN":[178,219],"An":[180],"network":[184],"can,":[185],"example,":[187],"take":[188],"advantage":[189],"SPI":[192],"bus":[193],"by":[197],"radio":[199],"eavesdrop":[201],"messages":[202],"even":[204],"disrupt":[205],"communications":[206],"Currently,":[208],"security":[209],"breaches":[210],"through":[211,238],"software":[212],"great":[215],"importance":[216,232],"academic":[220],"research":[222,225],"community.":[223],"Our":[224],"shows":[226],"same":[229],"level":[230],"must":[233],"attacks":[237],"ensure":[241],"trusted":[243],"secure":[245],"network.":[246]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
