{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T21:18:19Z","timestamp":1726003099938},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030053444"},{"type":"electronic","value":"9783030053451"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-05345-1_35","type":"book-chapter","created":{"date-parts":[[2018,12,7]],"date-time":"2018-12-07T09:07:56Z","timestamp":1544173676000},"page":"407-416","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["An Enhanced Key Management Scheme for LoRaWAN"],"prefix":"10.1007","author":[{"given":"Jialuo","family":"Han","sequence":"first","affiliation":[]},{"given":"Jidong","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,7]]},"reference":[{"key":"35_CR1","doi-asserted-by":"crossref","unstructured":"Naoui, S., Elhdhili, M.E., Saidane, L.A.: Enhancing the security of the IoT LoraWAN architecture. In: 2016 International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks (PEMWN), pp. 1\u20137 (2016)","DOI":"10.1109\/PEMWN.2016.7842904"},{"key":"35_CR2","unstructured":"Sornin, N., Yegin, A.: LoRaWAN backend interfaces 1.0 specification. Lora Alliance Standard Specification, 11 October 2017. www.lora-alliance.org . Accessed 20 Mar 2018"},{"key":"35_CR3","unstructured":"Sornin, N., Yegin, A.: LoRa specification 1.1. Lora Alliance Standard Specification, 11 October 2017. www.lora-alliance.org . Accessed 20 Mar 2018"},{"key":"35_CR4","unstructured":"Miller, R.: LoRa security: building a secure LoRa solution, 1st edn. MWR LABS (2016)"},{"key":"35_CR5","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.compeleceng.2011.01.009","volume":"37","author":"R Roman","year":"2011","unstructured":"Roman, R., Alcaraz, C., Lopez, J., Sklavos, N.: Key management systems for sensor networks in the context of the Internet of Things. Comput. Electr. Eng. 37, 147\u2013159 (2011)","journal-title":"Comput. Electr. Eng."},{"key":"35_CR6","doi-asserted-by":"crossref","unstructured":"SeungJae, N., DongYeop, H., WoonSeob, S., Ki-Hyung, K.: Scenario and countermeasure for replay attack using join request messages in LoRaWAN. In: 2017 International Conference on Information Networking (ICOIN), pp. 718\u2013720 (2017)","DOI":"10.1109\/ICOIN.2017.7899580"},{"key":"35_CR7","doi-asserted-by":"crossref","unstructured":"Kim, J., Song, J.: A simple and efficient replay attack prevention scheme for LoRaWAN. In: ACM International Conference Proceeding Series, pp. 32\u201336 (2017)","DOI":"10.1145\/3163058.3163064"},{"key":"35_CR8","unstructured":"Gildas Avoine, L.F.: Rescuing LoRaWAN 1.0. INSA Rennes, CNRS, France (2016)"},{"key":"35_CR9","doi-asserted-by":"crossref","unstructured":"Zhang, Z.-K., Cho, M.C.Y., Shieh, S.: Emerging security threats and countermeasures in IoT. In: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security (ASIA CCS 2015), pp. 1\u20136. ACM (2015)","DOI":"10.1145\/2714576.2737091"},{"key":"35_CR10","doi-asserted-by":"crossref","unstructured":"Hossain, M.M., Fotouhi, M., Hasan, R.: Towards an analysis of security issues, challenges, and open problems in the internet of tings. In: Proceedings of the IEEE World Congress on Services, SERVICES, pp. 21\u201328 (2015)","DOI":"10.1109\/SERVICES.2015.12"},{"key":"35_CR11","doi-asserted-by":"crossref","unstructured":"Zhao, K., Ge, L.: A survey on the internet of things security. In: Proceedings of the 9th International Conference on Computational Intelligence and Security, CIS, pp. 663\u2013667 (2013)","DOI":"10.1109\/CIS.2013.145"},{"key":"35_CR12","doi-asserted-by":"crossref","first-page":"765143","DOI":"10.1155\/2011\/765143","volume":"2011","author":"J He","year":"2011","unstructured":"He, J., Zhang, X., Wei, Q.: EDDK: energy-efficient distributed deterministic key management for wireless sensor networks. EURASIP J. Wirel. Commun. Netw. 2011, 765143 (2011)","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"key":"35_CR13","doi-asserted-by":"crossref","unstructured":"Barker, E., Barker, W., Burr, W., Polk, W., Smid, M.: Recommendation for Key Management Part 1: General (Revision 4). NIST Special Publication (2016)","DOI":"10.6028\/NIST.SP.800-57pt1r4"},{"key":"35_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"631","DOI":"10.1007\/978-3-642-14623-7_34","volume-title":"Advances in Cryptology \u2013 CRYPTO 2010","author":"H Krawczyk","year":"2010","unstructured":"Krawczyk, H.: Cryptographic extraction and key derivation: the HKDF scheme. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 631\u2013648. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-14623-7_34"},{"key":"35_CR15","unstructured":"National Institute of Standards and Technology, FIPS 198-1, The Keyed-Hash Message Authentication Code, Federal Information Processing Standard (FIPS), Publication 198-1 (2008)"},{"key":"35_CR16","doi-asserted-by":"crossref","unstructured":"Chen, L.: SP 800-56C. Recommendation for key derivation through extraction-then-expansion. National Institute of Standards & Technology (2011)","DOI":"10.6028\/NIST.SP.800-56c"},{"key":"35_CR17","doi-asserted-by":"crossref","unstructured":"Dworkin, M.J.: SP 800-38B. Recommendation for block cipher modes of operation: the CMAC mode for authentication. National Institute of Standards & Technology (2005)","DOI":"10.6028\/NIST.SP.800-38b-2005"},{"key":"35_CR18","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/978-3-540-68351-3_7","volume-title":"New Stream Cipher Designs","author":"M Boesgaard","year":"2008","unstructured":"Boesgaard, M., Vesterager, M., Zenner, E.: The rabbit stream cipher. In: Matthew, R., Olivier, B. (eds.) New Stream Cipher Designs, pp. 69\u201383. Springer, Berlin (2008). https:\/\/doi.org\/10.1007\/978-3-540-68351-3_7"},{"issue":"9","key":"35_CR19","doi-asserted-by":"publisher","first-page":"1978","DOI":"10.3390\/s17091978","volume":"17","author":"M Su\u00e1rez-Albela","year":"2017","unstructured":"Su\u00e1rez-Albela, M., Fern\u00e1ndez-Caram\u00e9s, T.M., Fraga-Lamas, P., Castedo, L.: A practical evaluation of a high-security energy-efficient gateway for IoT fog computing applications. Sensors 17(9), 1978 (2017)","journal-title":"Sensors"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-05345-1_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T20:04:34Z","timestamp":1573070674000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-05345-1_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030053444","9783030053451"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-05345-1_35","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"SpaCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Melbourne, NSW","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 December 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 December 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spaccs2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/space2018.cse.iitk.ac.in\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}