{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T13:38:23Z","timestamp":1730209103984,"version":"3.28.0"},"reference-count":45,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,10,4]],"date-time":"2021-10-04T00:00:00Z","timestamp":1633305600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,10,4]],"date-time":"2021-10-04T00:00:00Z","timestamp":1633305600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10,4]]},"DOI":"10.1109\/cns53000.2021.9705043","type":"proceedings-article","created":{"date-parts":[[2022,2,10]],"date-time":"2022-02-10T15:28:04Z","timestamp":1644506884000},"page":"209-217","source":"Crossref","is-referenced-by-count":4,"title":["HiveGuard: A Network Security Monitoring Architecture for Zigbee Networks"],"prefix":"10.1109","author":[{"given":"Dimitrios-Georgios","family":"Akestoridis","sequence":"first","affiliation":[{"name":"Carnegie Mellon University,Department of Electrical and Computer Engineering,Pittsburgh,Pennsylvania,USA"}]},{"given":"Patrick","family":"Tague","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University,Department of Electrical and Computer Engineering,Moffett Field,California,USA"}]}],"member":"263","reference":[{"key":"ref39","first-page":"37","article-title":"A GNU Radio-based IEEE 802.15.4 testbed","author":"bloessl","year":"2013","journal-title":"Proc FGSN’13"},{"article-title":"IEEE 802.15.4 ZigBee transceiver","year":"0","author":"bloessl","key":"ref38"},{"journal-title":"7799E–AVR–09\/2012 Atmel Corporation","article-title":"ATmega8U2\/16U2\/32U2 datasheet","year":"2012","key":"ref33"},{"article-title":"Modified ATUSB firmware that supports selective jamming and spoofing attacks","year":"0","author":"akestoridis","key":"ref32"},{"journal-title":"Ben-WPAN overview","article-title":"Qi Hardware Inc","year":"0","key":"ref31"},{"journal-title":"IEEE 802 15 4\/ZigBee Security Research Toolkit","article-title":"River Loop Security","year":"0","key":"ref30"},{"article-title":"Some GNU Radio blocks that I use","year":"0","author":"bloessl","key":"ref37"},{"year":"0","key":"ref36","article-title":"GNU Radio – the free and open software radio ecosystem"},{"year":"0","key":"ref35","article-title":"USRP N210 Software Defined Radio (SDR)"},{"journal-title":"8111C–MCU Wireless–09\/09 Atmel Corporation","article-title":"AT86RF231\/ZU\/ZF datasheet","year":"2009","key":"ref34"},{"journal-title":"Kismet","article-title":"Kismet Wireless","year":"0","key":"ref10"},{"article-title":"A collection of GNU Radio Companion flow graphs for the inspection of IEEE 802.15.4-based networks","year":"0","author":"akestoridis","key":"ref40"},{"journal-title":"A IEEE 802 15 4 wireless intrusion detection system using the KillerBee framework","article-title":"River Loop Security","year":"0","key":"ref11"},{"key":"ref12","article-title":"The sensor platform","author":"sanders","year":"2013","journal-title":"Applied Network Security Monitoring"},{"year":"0","key":"ref13","article-title":"Prometheus - monitoring system & time series database"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"100306","DOI":"10.1016\/j.iot.2020.100306","article-title":"A ZigBee intrusion detection system for IoT using secure and efficient data collection","volume":"12","author":"sadikin","year":"2020","journal-title":"Internet of the Things"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2516102"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2013.475"},{"journal-title":"Node js","article-title":"OpenJS Foundation","year":"0","key":"ref17"},{"year":"0","key":"ref18","article-title":"Fast, unopinionated, minimalist web framework for node"},{"year":"0","key":"ref19","article-title":"A declarative, efficient, and flexible JavaScript library for building user interfaces"},{"journal-title":"ZigBee Document 13-0402-13 ZigBee Alliance","article-title":"Base Device Behavior Specification","year":"2016","key":"ref28"},{"journal-title":"ZigBee Alliance White Paper","article-title":"zigbee: Securing the wireless IoT","year":"2017","key":"ref4"},{"journal-title":"Security of SmartThings ecosystem","article-title":"SmartThings Community","year":"0","key":"ref27"},{"journal-title":"ZigBee Document 05-3474-21 ZigBee Alliance","article-title":"ZigBee Specification","year":"2015","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3395351.3399363"},{"journal-title":"ZigBee Document 07-5123 ZigBee Alliance","article-title":"ZigBee Cluster Library Specification","year":"2016","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.14"},{"key":"ref8","first-page":"229","article-title":"Snort - lightweight intrusion detection for networks","author":"roesch","year":"1999","journal-title":"Proc USENIX LISA’99"},{"key":"ref7","article-title":"ZigBee exploited - the good, the bad and the ugly","author":"zillner","year":"0","journal-title":"Black Hat USA"},{"journal-title":"IEEE Std 802 15 4","article-title":"Low-Rate Wireless Personal Area Networks (LR-WPANs)","year":"2011","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(99)00112-7"},{"journal-title":"ZigBee","article-title":"Connectivity Standards Alliance","year":"0","key":"ref1"},{"journal-title":"PostgreSQL The world s most advanced open source database","article-title":"PostgreSQL Global Development Group","year":"0","key":"ref20"},{"article-title":"Wireshark configuration profile for Zigbee traffic","year":"0","author":"akestoridis","key":"ref45"},{"article-title":"Zigator: Security analysis tool for Zigbee networks","year":"0","author":"akestoridis","key":"ref22"},{"year":"0","key":"ref21","article-title":"Send e-mails with Node.JS"},{"year":"0","key":"ref42","article-title":"Userspace tools for Linux IEEE 802.15.4 stack"},{"year":"0","key":"ref24","article-title":"CherryPy is a pythonic, object-oriented HTTP framework"},{"article-title":"Kernel source tree for Raspberry Pi Foundation-provided kernel builds","year":"0","author":"pi","key":"ref41"},{"year":"0","key":"ref23","article-title":"Scapy: the Python-based interactive packet manipulation program & library"},{"year":"0","key":"ref44","article-title":"Wireshark’s official Git repository"},{"journal-title":"Hub firmware release notes - 0 31 4","article-title":"SmartThings Community","year":"0","key":"ref26"},{"year":"0","key":"ref43","article-title":"CRAWDAD: A community resource for archiving wireless data at Dartmouth"},{"key":"ref25","article-title":"ZigBee hacking: Smarter home invasion with ZigDiggity","author":"brown","year":"0","journal-title":"Presentation at Black Hat USA"}],"event":{"name":"2021 IEEE Conference on Communications and Network Security (CNS)","start":{"date-parts":[[2021,10,4]]},"location":"Tempe, AZ, USA","end":{"date-parts":[[2021,10,6]]}},"container-title":["2021 IEEE Conference on Communications and Network Security (CNS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9705016\/9705017\/09705043.pdf?arnumber=9705043","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,30]],"date-time":"2022-05-30T19:08:22Z","timestamp":1653937702000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9705043\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,4]]},"references-count":45,"URL":"https:\/\/doi.org\/10.1109\/cns53000.2021.9705043","relation":{},"subject":[],"published":{"date-parts":[[2021,10,4]]}}}