{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T17:07:22Z","timestamp":1732036042103},"reference-count":45,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2016,9,1]],"date-time":"2016-09-01T00:00:00Z","timestamp":1472688000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Ad Hoc Networks"],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1016\/j.adhoc.2016.04.011","type":"journal-article","created":{"date-parts":[[2016,4,30]],"date-time":"2016-04-30T05:49:14Z","timestamp":1461995354000},"page":"26-40","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":15,"special_numbering":"C","title":["Improving sensor network immunity under worm attacks: A software diversity approach"],"prefix":"10.1016","volume":"47","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-1786-2892","authenticated-orcid":false,"given":"Yi","family":"Yang","sequence":"first","affiliation":[]},{"given":"Sencun","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Guohong","family":"Cao","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.adhoc.2016.04.011_bib0001","unstructured":"ATmega128(L). http:\/\/www.atmel.com\/dyn\/resources\/prod-documents\/doc2467.pdf."},{"key":"10.1016\/j.adhoc.2016.04.011_bib0002","unstructured":"Backtracking. http:\/\/en.wikipedia.org\/wiki\/Backtracking."},{"key":"10.1016\/j.adhoc.2016.04.011_bib0003","unstructured":"Introduction to Percolation Theory. http:\/\/garnet.berkeley.edu\/~jqwu\/paper1\/paper1.html."},{"key":"10.1016\/j.adhoc.2016.04.011_bib0004","unstructured":"Memory Sections in Related Pages. http:\/\/hubbard.engr.scu.edu\/embedded\/avr\/doc\/avr-libc\/avr-libc-user-manual\/."},{"key":"10.1016\/j.adhoc.2016.04.011_bib0005","unstructured":"Mica Motes. Crossbow Technology, Inc. http:\/\/www.xbow.com."},{"key":"10.1016\/j.adhoc.2016.04.011_bib0006","unstructured":"MSP430 Microcontrollers. Texas Instrument. http:\/\/www.ti.com\/."},{"key":"10.1016\/j.adhoc.2016.04.011_bib0007","unstructured":"Percolation theory. http:\/\/en.wikipedia.org\/wiki\/Percolation-theory."},{"key":"10.1016\/j.adhoc.2016.04.011_bib0008","series-title":"SASN\u201906","article-title":"Diversify sensor nodes to improve resilience against node compromise","author":"Alarifi","year":"2006"},{"key":"10.1016\/j.adhoc.2016.04.011_bib0009","unstructured":"M.G. Bailey, Malware resistant networking using system diversity, SIGITE \u201905."},{"key":"10.1016\/j.adhoc.2016.04.011_bib0010","series-title":"The Mathematical Theory of Infectious Diseases and Its Applications","author":"Bailey","year":"1975"},{"key":"10.1016\/j.adhoc.2016.04.011_bib0011","series-title":"ASIACCS","article-title":"Design space and analysis of worm defense strategies","author":"Brumley","year":"2006"},{"key":"10.1016\/j.adhoc.2016.04.011_bib0013","unstructured":"P. De, Y. Liu, S.K. Das, Modeling node compromise spread in wireless sensor networks using epidemic theory, WOWMOM \u201906."},{"key":"10.1016\/j.adhoc.2016.04.011_bib0014","unstructured":"M. Draief, A. Ganesh, L. Massoulie, Thresholds for virus spread on networks, ValueTools\u201906."},{"key":"10.1016\/j.adhoc.2016.04.011_bib0015","series-title":"IEEE INFOCOM","article-title":"A key management scheme for wireless sensor networks using deployment knowledge","author":"Du","year":"2004"},{"key":"10.1016\/j.adhoc.2016.04.011_bib0016","article-title":"A key predistribution scheme for sensor networks using deployment knowledge","author":"Du","year":"2006","journal-title":"IEEE Trans. Depend. Secure Comput."},{"key":"10.1016\/j.adhoc.2016.04.011_bib0017","unstructured":"S. Forrest, A. Somayaji, D. Ackley, Building diverse computer systems, HOTOS \u201997."},{"key":"10.1016\/j.adhoc.2016.04.011_bib0018","series-title":"Infocom","article-title":"The effect of network topology on the spread of epidemics","author":"Ganesh","year":"2005"},{"key":"10.1016\/j.adhoc.2016.04.011_bib0019","series-title":"CCS","article-title":"Countering code injection attacks with instruction set randomization","author":"Kc","year":"2003"},{"key":"10.1016\/j.adhoc.2016.04.011_bib0020","unstructured":"Q. Gu, R. Noorani, Towards self-propagate mal-packets in sensor networks, ACM WiSec\u201908."},{"key":"10.1016\/j.adhoc.2016.04.011_bib0021","series-title":"Computer Algorithms\/C++","author":"Horowitz","year":"1996"},{"key":"10.1016\/j.adhoc.2016.04.011_bib0022","series-title":"Graph Coloring Problems","author":"Jensen","year":"1995"},{"key":"10.1016\/j.adhoc.2016.04.011_bib0023","series-title":"Proceedings of International Conference on Distributed Computing Systems","article-title":"MNP: multihop network programming for sensor networks","author":"Kulkarni","year":"2005"},{"key":"10.1016\/j.adhoc.2016.04.011_bib0024","series-title":"IPSN","article-title":"Harbor: Software-Based Memory Protection for Sensor Nodes","author":"Kumar","year":"2007"},{"key":"10.1016\/j.adhoc.2016.04.011_bib0025","series-title":"Technical Report HPL-2002-178","article-title":"Towards diversity of cots software applications: Reducing risks of widespread faults and attacks","author":"C.Mont","year":"2002"},{"key":"10.1016\/j.adhoc.2016.04.011_bib0026","series-title":"MILCOM","article-title":"Cost adaptive mechanism to provide network diversity for manet reactive routing protocols","author":"Roux","year":"2000"},{"key":"10.1016\/j.adhoc.2016.04.011_bib0027","doi-asserted-by":"crossref","unstructured":"A.J. O\u2019Donnell, H. Sethu, On achieving software diversity for improved network security using distributed coloring algorithms. In CCS \u201904.","DOI":"10.1145\/1030083.1030101"},{"key":"10.1016\/j.adhoc.2016.04.011_bib0028","unstructured":"A. One, Smashing the stack for fun and profit. Phrack 49. http:\/\/www.phrack.org\/show.php?p=49a=14."},{"key":"10.1016\/j.adhoc.2016.04.011_bib0029","series-title":"Chapter Handbook of Graphs and Networks: from the Genome to the Internet","article-title":"Epidemics and immunization in scale-free networks","author":"Pastor-Satorras","year":"2002"},{"key":"10.1016\/j.adhoc.2016.04.011_bib0030","series-title":"Technical Report UUCS-06-007","article-title":"Memory safety and untrusted extensions for tinyos","author":"Regehr","year":"2006"},{"key":"10.1016\/j.adhoc.2016.04.011_bib0031","series-title":"Proceedings of the 11th USENIX Security Symposium","article-title":"How to own the internet in your spare time","author":"Staniford","year":"2002"},{"key":"10.1016\/j.adhoc.2016.04.011_bib0033","series-title":"USENIX Secucrity\u201906","article-title":"SigFree: a signature-free buffer overflow attack blocker","author":"Wang","year":"2006"},{"key":"10.1016\/j.adhoc.2016.04.011_bib0034","series-title":"Mobihoc","article-title":"SDAP: a secure hop-by-hop data aggregation protocol for sensor networks","author":"Yang","year":"2006"},{"key":"10.1016\/j.adhoc.2016.04.011_bib0035","unstructured":"Y. Zhang, H. Vin, L. Alvisi, W. Lee, S.K. Dao, Heterogeneous networking: a new survivability paradigm. NSPW\u201901."},{"key":"10.1016\/j.adhoc.2016.04.011_bib0036","series-title":"IPSN","article-title":"Seluge: Secure and dos-resistant code dissemination in wireless sensor networks","author":"Hyun","year":"2008"},{"key":"10.1016\/j.adhoc.2016.04.011_bib0037","series-title":"Infocom","article-title":"Lightweight remote image management for secure code dissemination in wireless sensor networks","author":"Liu","year":"2009"},{"key":"10.1016\/j.adhoc.2016.04.011_bib0038","series-title":"CCS","article-title":"LEAP: efficient security mechanisms for large-scale distributed sensor networks","author":"Zhu","year":"2003"},{"key":"10.1016\/j.adhoc.2016.04.011_bib0040","series-title":"Introduction to Algorithms","author":"Cormen","year":"2001"},{"key":"10.1016\/j.adhoc.2016.04.011_bib0041","series-title":"CCS 2008","article-title":"Code Injection Attacks on Harvard-Architecture Devices","author":"Francillon","year":"2008"},{"key":"10.1016\/j.adhoc.2016.04.011_bib0042","series-title":"IEEE ICC","article-title":"Defending Sensor Worm Attack Using Software Diversity Approach","author":"Liu","year":"2011"},{"key":"10.1016\/j.adhoc.2016.04.011_bib0043","series-title":"Web-Age Information Management Lecture Notes in Computer Science","article-title":"SWORDS: improving sensor networks immunity under worm attacks","author":"Gui","year":"2010"},{"key":"10.1016\/j.adhoc.2016.04.011_bib0044","doi-asserted-by":"crossref","DOI":"10.1155\/2015\/874782","article-title":"Distributed software-attestation defense against sensor worm propagation","author":"Ho","year":"2015","journal-title":"J. Sensors"},{"key":"10.1016\/j.adhoc.2016.04.011_bib0045","series-title":"IEEE Globecom","article-title":"Self-Propagate Mal-Packets in Wireless Sensor Networks: Dynamics and Defense Implications","author":"Sun","year":"2008"},{"key":"10.1016\/j.adhoc.2016.04.011_bib0046","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2010.10.002","article-title":"A study of self-propagating mal-packets in sensor networks: attacks and defenses","author":"Gu","year":"2011","journal-title":"J. Comput. Security"},{"key":"10.1016\/j.adhoc.2016.04.011_bib0047","series-title":"Proceedings of the 28th IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec)","article-title":"Toward software diversity in heterogeneous networked systems","author":"Huang","year":"2014"},{"key":"10.1016\/j.adhoc.2016.04.011_bib0048","series-title":"Proceedings of ACM mobihoc","article-title":"Improving sensor network immunity under worm attacks: a software diversity approach","author":"Yang","year":"2008"}],"container-title":["Ad Hoc Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1570870516301159?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1570870516301159?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2018,9,12]],"date-time":"2018-09-12T18:22:39Z","timestamp":1536776559000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1570870516301159"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9]]},"references-count":45,"alternative-id":["S1570870516301159"],"URL":"https:\/\/doi.org\/10.1016\/j.adhoc.2016.04.011","relation":{},"ISSN":["1570-8705"],"issn-type":[{"value":"1570-8705","type":"print"}],"subject":[],"published":{"date-parts":[[2016,9]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Improving sensor network immunity under worm attacks: A software diversity approach","name":"articletitle","label":"Article Title"},{"value":"Ad Hoc Networks","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.adhoc.2016.04.011","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2016 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}]}}