{"id":"https://openalex.org/W2587549677","doi":"https://doi.org/10.1109/wf-iot.2016.7845515","title":"Traffic forensics for IPv6-based Wireless Sensor Networks and the Internet of Things","display_name":"Traffic forensics for IPv6-based Wireless Sensor Networks and the Internet of Things","publication_year":2016,"publication_date":"2016-12-01","ids":{"openalex":"https://openalex.org/W2587549677","doi":"https://doi.org/10.1109/wf-iot.2016.7845515","mag":"2587549677"},"language":"en","primary_location":{"id":"doi:10.1109/wf-iot.2016.7845515","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wf-iot.2016.7845515","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE 3rd World Forum on Internet of Things (WF-IoT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://research-information.bris.ac.uk/en/publications/ddfe1922-36e2-41c0-9a52-5c0f40d9997f","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5087021192","display_name":"Vijay Kumar","orcid":"https://orcid.org/0000-0002-3902-9391"},"institutions":[{"id":"https://openalex.org/I36234482","display_name":"University of Bristol","ror":"https://ror.org/0524sp257","country_code":"GB","type":"education","lineage":["https://openalex.org/I36234482"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Vijay Kumar","raw_affiliation_strings":["Faculty of Engineering, University of Bristol, Bristol, UK"],"affiliations":[{"raw_affiliation_string":"Faculty of Engineering, University of Bristol, Bristol, UK","institution_ids":["https://openalex.org/I36234482"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072981915","display_name":"George Oikonomou","orcid":"https://orcid.org/0000-0002-1684-6989"},"institutions":[{"id":"https://openalex.org/I36234482","display_name":"University of Bristol","ror":"https://ror.org/0524sp257","country_code":"GB","type":"education","lineage":["https://openalex.org/I36234482"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"George Oikonomou","raw_affiliation_strings":["Faculty of Engineering, University of Bristol, Bristol, UK"],"affiliations":[{"raw_affiliation_string":"Faculty of Engineering, University of Bristol, Bristol, UK","institution_ids":["https://openalex.org/I36234482"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5084471326","display_name":"Theo Tryfonas","orcid":"https://orcid.org/0000-0003-4024-8003"},"institutions":[{"id":"https://openalex.org/I36234482","display_name":"University of Bristol","ror":"https://ror.org/0524sp257","country_code":"GB","type":"education","lineage":["https://openalex.org/I36234482"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Theo Tryfonas","raw_affiliation_strings":["Faculty of Engineering, University of Bristol, Bristol, UK"],"affiliations":[{"raw_affiliation_string":"Faculty of Engineering, University of Bristol, Bristol, UK","institution_ids":["https://openalex.org/I36234482"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5087021192"],"corresponding_institution_ids":["https://openalex.org/I36234482"],"apc_list":null,"apc_paid":null,"fwci":2.1257,"has_fulltext":true,"cited_by_count":13,"citation_normalized_percentile":{"value":0.89289594,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7693364024162292},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7578230500221252},{"id":"https://openalex.org/keywords/ipv6","display_name":"IPv6","score":0.7515130043029785},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.6880512237548828},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.5020363330841064},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.4698927402496338},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.4657242000102997},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.44542306661605835},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4276007413864136},{"id":"https://openalex.org/keywords/key-distribution-in-wireless-sensor-networks","display_name":"Key distribution in wireless sensor networks","score":0.4233253300189972},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.42184486985206604},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.3743501305580139},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.3662760257720947},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.14034226536750793}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7693364024162292},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7578230500221252},{"id":"https://openalex.org/C84555802","wikidata":"https://www.wikidata.org/wiki/Q2551624","display_name":"IPv6","level":3,"score":0.7515130043029785},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.6880512237548828},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.5020363330841064},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.4698927402496338},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.4657242000102997},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.44542306661605835},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4276007413864136},{"id":"https://openalex.org/C41971633","wikidata":"https://www.wikidata.org/wiki/Q6398155","display_name":"Key distribution in wireless sensor networks","level":4,"score":0.4233253300189972},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.42184486985206604},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.3743501305580139},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3662760257720947},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.14034226536750793},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1109/wf-iot.2016.7845515","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wf-iot.2016.7845515","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE 3rd World Forum on Internet of Things (WF-IoT)","raw_type":"proceedings-article"},{"id":"pmh:oai:research-information.bris.ac.uk:publications/ddfe1922-36e2-41c0-9a52-5c0f40d9997f","is_oa":true,"landing_page_url":null,"pdf_url":"https://research-information.bris.ac.uk/en/publications/ddfe1922-36e2-41c0-9a52-5c0f40d9997f","source":{"id":"https://openalex.org/S4306400895","display_name":"Bristol Research (University of Bristol)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I36234482","host_organization_name":"University of Bristol","host_organization_lineage":["https://openalex.org/I36234482"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""},{"id":"pmh:oai:research-information.bris.ac.uk:openaire/ddfe1922-36e2-41c0-9a52-5c0f40d9997f","is_oa":true,"landing_page_url":"https://research-information.bris.ac.uk/en/publications/ddfe1922-36e2-41c0-9a52-5c0f40d9997f","pdf_url":null,"source":{"id":"https://openalex.org/S7407055359","display_name":"Explore Bristol Research","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Kumar, V, Oikonomou, G & Tryfonas, T 2017, Traffic Forensics for IPv6-Based Wireless Sensor Networks and the Internet of Things. in 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT 2016) : Proceedings of a meeting held 12-14 December 2016, Reston, Virginia, USA., 7845515, Institute of Electrical and Electronics Engineers (IEEE). https://doi.org/10.1109/WF-IoT.2016.7845515","raw_type":"contributionToPeriodical"},{"id":"pmh:oai:research-information.bris.ac.uk:publications/ddfe1922-36e2-41c0-9a52-5c0f40d9997f","is_oa":true,"landing_page_url":"https://hdl.handle.net/1983/ddfe1922-36e2-41c0-9a52-5c0f40d9997f","pdf_url":null,"source":{"id":"https://openalex.org/S4306400895","display_name":"Bristol Research (University of Bristol)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I36234482","host_organization_name":"University of Bristol","host_organization_lineage":["https://openalex.org/I36234482"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Kumar, V, Oikonomou, G & Tryfonas, T 2017, Traffic Forensics for IPv6-Based Wireless Sensor Networks and the Internet of Things. in 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT 2016) : Proceedings of a meeting held 12-14 December 2016, Reston, Virginia, USA., 7845515, Institute of Electrical and Electronics Engineers (IEEE). https://doi.org/10.1109/WF-IoT.2016.7845515","raw_type":"contributionToPeriodical"}],"best_oa_location":{"id":"pmh:oai:research-information.bris.ac.uk:publications/ddfe1922-36e2-41c0-9a52-5c0f40d9997f","is_oa":true,"landing_page_url":null,"pdf_url":"https://research-information.bris.ac.uk/en/publications/ddfe1922-36e2-41c0-9a52-5c0f40d9997f","source":{"id":"https://openalex.org/S4306400895","display_name":"Bristol Research (University of Bristol)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I36234482","host_organization_name":"University of Bristol","host_organization_lineage":["https://openalex.org/I36234482"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""},"sustainable_development_goals":[{"score":0.4099999964237213,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2587549677.pdf","grobid_xml":"https://content.openalex.org/works/W2587549677.grobid-xml"},"referenced_works_count":21,"referenced_works":["https://openalex.org/W1816889752","https://openalex.org/W1822930927","https://openalex.org/W1976262362","https://openalex.org/W1986096467","https://openalex.org/W1988828201","https://openalex.org/W2026609766","https://openalex.org/W2046876000","https://openalex.org/W2056577642","https://openalex.org/W2082539594","https://openalex.org/W2084793163","https://openalex.org/W2153730649","https://openalex.org/W2155613887","https://openalex.org/W2168690261","https://openalex.org/W2232887944","https://openalex.org/W2270181760","https://openalex.org/W2280971486","https://openalex.org/W2325877089","https://openalex.org/W2978540781","https://openalex.org/W4230622395","https://openalex.org/W6693935192","https://openalex.org/W6768703921"],"related_works":["https://openalex.org/W2033347526","https://openalex.org/W2588358127","https://openalex.org/W2154478511","https://openalex.org/W4234451713","https://openalex.org/W4377700345","https://openalex.org/W2061699822","https://openalex.org/W2521264178","https://openalex.org/W3099995967","https://openalex.org/W3037906321","https://openalex.org/W2563040182"],"abstract_inverted_index":{"Research":[0],"and":[1,12,49,55,96,104,152,164],"standardisation":[2],"efforts":[3],"in":[4,116,126],"the":[5,13,21,58,86,89,93,99,106,146],"fields":[6],"of":[7,15,23,27,29,64,88,122,145],"Wireless":[8,129],"Sensor":[9],"Networks":[10,154],"(WSNs)":[11],"Internet":[14],"Things":[16],"(IoT)":[17],"are":[18],"leading":[19],"towards":[20],"adoption":[22],"TCP/IP":[24],"for":[25,150],"deployments":[26,70],"networks":[28],"severely":[30],"constrained":[31],"smart":[32],"embedded":[33],"objects.":[34],"As":[35],"a":[36,62,76],"result,":[37],"wireless":[38],"sensors":[39],"can":[40,82],"now":[41],"be":[42,51,78],"uniquely":[43],"identified":[44],"by":[45,91,168],"an":[46,139,159],"IPv6":[47,147],"address":[48],"thus":[50],"directly":[52],"connected":[53],"to":[54,71,118,162],"reachable":[56],"from":[57],"internet.":[59],"This":[60],"has":[61],"series":[63],"advantages":[65],"but":[66],"also":[67],"exposes":[68],"sensor":[69],"new":[72],"security":[73],"vulnerabilities.":[74],"Should":[75],"deployment":[77],"compromised,":[79],"post-incident":[80],"analysis":[81],"provide":[83],"information":[84],"about":[85],"nature":[87],"attack":[90,140,167],"inspecting":[92],"network's":[94],"state":[95],"traffic":[97,113],"during":[98,103],"time":[100],"period":[101],"prior,":[102],"after":[105],"attack.":[107],"In":[108],"this":[109,134,166],"paper":[110],"we":[111,136,157],"adopt":[112],"forensic":[114],"techniques":[115],"order":[117],"achieve":[119],"post-hoc":[120],"detection":[121],"attacks":[123],"against":[124],"availability":[125],"IPv6-based":[127],"Low-Power":[128,151],"Personal":[130],"Area":[131],"Networks.":[132],"To":[133],"end,":[135],"first":[137],"implement":[138],"which":[141],"exploits":[142],"inherent":[143],"vulnerabilities":[144],"Routing":[148],"Protocol":[149],"Lossy":[153],"(RPL).":[155],"Subsequently,":[156],"present":[158],"automated":[160],"method":[161],"detect":[163],"analyse":[165],"examining":[169],"network":[170],"packet":[171],"captures.":[172]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":5}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
