{"id":"https://openalex.org/W2066384543","doi":"https://doi.org/10.1109/ncc.2014.6811301","title":"Energy efficient outsider attacks on IEEE 802.15.4 beacon enabled wireless sensor networks","display_name":"Energy efficient outsider attacks on IEEE 802.15.4 beacon enabled wireless sensor networks","publication_year":2014,"publication_date":"2014-02-01","ids":{"openalex":"https://openalex.org/W2066384543","doi":"https://doi.org/10.1109/ncc.2014.6811301","mag":"2066384543"},"language":"en","primary_location":{"id":"doi:10.1109/ncc.2014.6811301","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ncc.2014.6811301","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 Twentieth National Conference on Communications (NCC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5042307903","display_name":"Anjan Reddy Kasireddy","orcid":null},"institutions":[{"id":"https://openalex.org/I1329621470","display_name":"Bhabha Atomic Research Centre","ror":"https://ror.org/05w6wfp17","country_code":"IN","type":"facility","lineage":["https://openalex.org/I1329621470","https://openalex.org/I2799351866","https://openalex.org/I3149292468"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Anjan Reddy Kasireddy","raw_affiliation_strings":["Reactor Control Division, Bhabha Atomic Research Centre, Mumbai, India","Reactor Control Division, Bhabha Atomic Research Centre, Mumbai, India 400085"],"affiliations":[{"raw_affiliation_string":"Reactor Control Division, Bhabha Atomic Research Centre, Mumbai, India","institution_ids":["https://openalex.org/I1329621470"]},{"raw_affiliation_string":"Reactor Control Division, Bhabha Atomic Research Centre, Mumbai, India 400085","institution_ids":["https://openalex.org/I1329621470"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054358197","display_name":"Debabrata A Roy","orcid":"https://orcid.org/0000-0001-6598-300X"},"institutions":[{"id":"https://openalex.org/I1329621470","display_name":"Bhabha Atomic Research Centre","ror":"https://ror.org/05w6wfp17","country_code":"IN","type":"facility","lineage":["https://openalex.org/I1329621470","https://openalex.org/I2799351866","https://openalex.org/I3149292468"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Debabrata A Roy","raw_affiliation_strings":["Reactor Control Division, Bhabha Atomic Research Centre, Mumbai, India","Reactor Control Division, Bhabha Atomic Research Centre, Mumbai, India 400085"],"affiliations":[{"raw_affiliation_string":"Reactor Control Division, Bhabha Atomic Research Centre, Mumbai, India","institution_ids":["https://openalex.org/I1329621470"]},{"raw_affiliation_string":"Reactor Control Division, Bhabha Atomic Research Centre, Mumbai, India 400085","institution_ids":["https://openalex.org/I1329621470"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5075290390","display_name":"Radha Krishna Ganti","orcid":"https://orcid.org/0000-0002-5211-5657"},"institutions":[{"id":"https://openalex.org/I24676775","display_name":"Indian Institute of Technology Madras","ror":"https://ror.org/03v0r5n49","country_code":"IN","type":"facility","lineage":["https://openalex.org/I24676775"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Radha Krishna Ganti","raw_affiliation_strings":["Department of Electrical Engineering, Indian Institute of Technology, Madras Chennai, India","Dept. of Electrical Engineering, Indian Institute of Technology Madras, Chennai, India 600036"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, Indian Institute of Technology, Madras Chennai, India","institution_ids":["https://openalex.org/I24676775"]},{"raw_affiliation_string":"Dept. of Electrical Engineering, Indian Institute of Technology Madras, Chennai, India 600036","institution_ids":["https://openalex.org/I24676775"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5042307903"],"corresponding_institution_ids":["https://openalex.org/I1329621470"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.14596174,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9902999997138977,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ieee-802.15","display_name":"IEEE 802.15","score":0.9037865400314331},{"id":"https://openalex.org/keywords/superframe","display_name":"Superframe","score":0.8910757303237915},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7724347710609436},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.765587329864502},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.755163311958313},{"id":"https://openalex.org/keywords/jamming","display_name":"Jamming","score":0.6889169812202454},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.6224689483642578},{"id":"https://openalex.org/keywords/efficient-energy-use","display_name":"Efficient energy use","score":0.4277295768260956},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4240609407424927},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.15834000706672668},{"id":"https://openalex.org/keywords/electrical-engineering","display_name":"Electrical engineering","score":0.07650604844093323}],"concepts":[{"id":"https://openalex.org/C2780407094","wikidata":"https://www.wikidata.org/wiki/Q3267095","display_name":"IEEE 802.15","level":3,"score":0.9037865400314331},{"id":"https://openalex.org/C137607620","wikidata":"https://www.wikidata.org/wiki/Q7643384","display_name":"Superframe","level":3,"score":0.8910757303237915},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7724347710609436},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.765587329864502},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.755163311958313},{"id":"https://openalex.org/C2779079576","wikidata":"https://www.wikidata.org/wiki/Q17092823","display_name":"Jamming","level":2,"score":0.6889169812202454},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.6224689483642578},{"id":"https://openalex.org/C2742236","wikidata":"https://www.wikidata.org/wiki/Q924713","display_name":"Efficient energy use","level":2,"score":0.4277295768260956},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4240609407424927},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.15834000706672668},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.07650604844093323},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C126042441","wikidata":"https://www.wikidata.org/wiki/Q1324888","display_name":"Frame (networking)","level":2,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ncc.2014.6811301","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ncc.2014.6811301","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 Twentieth National Conference on Communications (NCC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.8999999761581421,"display_name":"Affordable and clean energy","id":"https://metadata.un.org/sdg/7"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W2122285088","https://openalex.org/W2124103816","https://openalex.org/W2136032111","https://openalex.org/W2170121143","https://openalex.org/W4387069703"],"related_works":["https://openalex.org/W2389065308","https://openalex.org/W2535868832","https://openalex.org/W105019685","https://openalex.org/W4362590845","https://openalex.org/W1507441633","https://openalex.org/W3196288301","https://openalex.org/W2138733155","https://openalex.org/W1989590586","https://openalex.org/W2036893478","https://openalex.org/W2085350877"],"abstract_inverted_index":{"Wireless":[0,40],"sensor":[1,41],"networks":[2,20],"based":[3,83,128],"on":[4,84,129],"the":[5,29,37,69,78,85,88,90,93,97,100,107,131,148,153,166],"IEEE":[6,177],"802.15.4":[7,178],"standard":[8],"have":[9,43],"wide":[10],"applications":[11],"in":[12,137,144],"office":[13],"and":[14,49,111,134,147,150,169],"industrial":[15],"automation.":[16],"Most":[17],"of":[18,25,31,68,87,92,99,113,152,159,172,176],"these":[19,138],"utilize":[21],"beacon":[22,135,173],"enabled":[23,174],"mode":[24,175],"operation":[26],"due":[27],"to":[28,53],"availability":[30],"sleep":[32],"states":[33],"which":[34],"can":[35,62,102,117],"extend":[36],"battery":[38],"life.":[39],"nodes":[42],"little":[44],"protection":[45],"against":[46],"radio":[47],"interference":[48],"hence":[50],"very":[51],"susceptible":[52],"jamming.":[54],"The":[55,140,157],"situation":[56],"becomes":[57],"worse":[58],"if":[59],"energy-efficient":[60,115],"jamming":[61,116,126],"be":[63,103,118],"achieved":[64],"by":[65,96],"exploiting":[66],"knowledge":[67],"data":[70],"link":[71],"layer.":[72],"While,":[73],"encryption":[74],"might":[75],"help":[76],"prevent":[77],"jammer":[79],"from":[80],"taking":[81],"actions":[82],"content":[86],"packets,":[89,114],"arrangement":[91],"packets":[94],"induced":[95],"nature":[98],"protocol":[101],"exploited.":[104],"By":[105],"analyzing":[106],"packet":[108],"interarrival":[109],"times":[110],"lengths":[112],"performed.":[119],"In":[120],"this":[121,160],"paper,":[122],"we":[123],"propose":[124],"three":[125],"attacks":[127,154],"learning":[130],"superframe":[132,167],"structure":[133,168],"interval":[136],"networks.":[139],"algorithms":[141],"are":[142,155],"described":[143],"detail,":[145],"simulated":[146],"effectiveness":[149],"efficiency":[151],"examined.":[156],"result":[158],"paper":[161],"provides":[162],"new":[163],"insights":[164],"into":[165],"security":[170],"considerations":[171],"MAC":[179],"protocol.":[180]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
