{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T08:51:51Z","timestamp":1725871911999},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319498058"},{"type":"electronic","value":"9783319498065"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-49806-5_23","type":"book-chapter","created":{"date-parts":[[2016,11,23]],"date-time":"2016-11-23T12:34:29Z","timestamp":1479904469000},"page":"426-443","source":"Crossref","is-referenced-by-count":5,"title":["Formal Verification of a Cross-Layer, Trustful Space-Time Protocol for Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Douglas Sim\u00f5es","family":"Silva","sequence":"first","affiliation":[]},{"given":"Davi","family":"Resner","sequence":"additional","affiliation":[]},{"given":"Rick Lopes","family":"de Souza","sequence":"additional","affiliation":[]},{"given":"Jean Everson","family":"Martina","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,24]]},"reference":[{"issue":"15","key":"23_CR1","doi-asserted-by":"crossref","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L Atzori","year":"2010","unstructured":"Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 2787\u20132805 (2010)","journal-title":"Comput. Netw."},{"issue":"4","key":"23_CR2","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1007\/s00145-008-9026-x","volume":"21","author":"M Bellare","year":"2008","unstructured":"Bellare, M., Namprempre, C.: Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. J. Cryptology 21(4), 469\u2013491 (2008)","journal-title":"J. Cryptology"},{"key":"23_CR3","doi-asserted-by":"crossref","unstructured":"Bernstein, D.J.: The poly1305-aes message-authentication code. In: Proceedings of Fast Software Encryption, Paris, France, pp. 32\u201349, February 2005","DOI":"10.1007\/11502760_3"},{"key":"23_CR4","doi-asserted-by":"crossref","unstructured":"Blanchet, B., Abadi, M., Fournet, C.: Automated verification of selected equivalences for security protocols. In: 20th Annual IEEE Symposium on Logic in Computer Science (LICS 2005), pp. 331\u2013340. IEEE (2005)","DOI":"10.1109\/LICS.2005.8"},{"key":"23_CR5","unstructured":"Blanchet, B., Cheval, V., Allamigeon, X., Smyth, B.: Proverif: Cryptographic protocol verifier in the formal model (2010)"},{"key":"23_CR6","unstructured":"Blanchet, B., Smyth, B., Cheval, V.: Proverif 1.90: Automatic cryptographic protocol verifier, user manual and tutorial (2015). http:\/\/prosecco.gforge.inria.fr\/personal\/bblanche\/proverif\/manual.pdf"},{"key":"23_CR7","unstructured":"CERP-IoT, V.: Challenges for realising the internet of things, no. March. European Commission-Information Society and Media DG (2010)"},{"issue":"1","key":"23_CR8","doi-asserted-by":"crossref","first-page":"418","DOI":"10.1016\/j.jnca.2010.03.004","volume":"34","author":"WR Claycomb","year":"2011","unstructured":"Claycomb, W.R., Shin, D.: A novel node level security policy framework for wireless sensor networks. J. Netw. Comput. Appl. 34(1), 418\u2013428 (2011)","journal-title":"J. Netw. Comput. Appl."},{"issue":"5","key":"23_CR9","doi-asserted-by":"crossref","first-page":"727","DOI":"10.1016\/j.adhoc.2010.08.020","volume":"9","author":"O Delgado-Mohatar","year":"2011","unstructured":"Delgado-Mohatar, O., F\u00faster-Sabater, A., Sierra, J.M.: A light-weight authentication scheme for wireless sensor networks. Ad Hoc Netw. 9(5), 727\u2013735 (2011)","journal-title":"Ad Hoc Netw."},{"key":"23_CR10","doi-asserted-by":"crossref","unstructured":"Faquih, A., Kadam, P., Saquib, Z.: Cryptographic techniques for wireless sensor networks: A survey. In: 2015 IEEE Bombay Section Symposium (IBSS), pp. 1\u20136. IEEE (2015)","DOI":"10.1109\/IBSS.2015.7456652"},{"issue":"1","key":"23_CR11","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1109\/SURV.2013.081313.00231","volume":"16","author":"B Fu","year":"2014","unstructured":"Fu, B., Xiao, Y., Deng, H.J., Zeng, H.: A survey of cross-layer designs in wireless networks. IEEE Commun. Surv. Tutorials 16(1), 110\u2013126 (2014)","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"7","key":"23_CR12","doi-asserted-by":"crossref","first-page":"1645","DOI":"10.1016\/j.future.2013.01.010","volume":"29","author":"J Gubbi","year":"2013","unstructured":"Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of things (iot): a vision, architectural elements, and future directions. Future Gener. Comput. Syst. 29(7), 1645\u20131660 (2013)","journal-title":"Future Gener. Comput. Syst."},{"issue":"S9","key":"23_CR13","doi-asserted-by":"crossref","first-page":"198","DOI":"10.17485\/ijst\/2015\/v8iS9\/65573","volume":"8","author":"B Kiruthika","year":"2015","unstructured":"Kiruthika, B., Ezhilarasie, R., Umamakeswari, A.: Implementation of modified rc4 algorithm for wireless sensor networks on cc2431. Indian J. Sci. Technol. 8(S9), 198\u2013206 (2015)","journal-title":"Indian J. Sci. Technol."},{"issue":"2","key":"23_CR14","doi-asserted-by":"crossref","first-page":"523","DOI":"10.1016\/j.jnca.2010.11.009","volume":"34","author":"LD Mendes","year":"2011","unstructured":"Mendes, L.D., Rodrigues, J.J.: A survey on cross-layer solutions for wireless sensor networks. J. Netw. Comput. Appl. 34(2), 523\u2013534 (2011)","journal-title":"J. Netw. Comput. Appl."},{"key":"23_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1007\/11502760_20","volume-title":"Fast Software Encryption","author":"AKL Yau","year":"2005","unstructured":"Yau, A.K.L., Paterson, K.G., Mitchell, C.J.: Padding oracle attacks on CBC-mode encryption with secret and random IVs. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol. 3557, pp. 299\u2013319. Springer, Heidelberg (2005). doi: 10.1007\/11502760_20"},{"key":"23_CR16","doi-asserted-by":"crossref","unstructured":"Rajeswari, S.R., Seenivasagam, V.: Comparative study on various authentication protocols in wireless sensor networks. Sci. World J. 2016, 16 (2016)","DOI":"10.1155\/2016\/6854303"},{"key":"23_CR17","doi-asserted-by":"crossref","unstructured":"Reghelin, R., Fr\u00f6hlich, A.A.: A decentralized location system for sensor networks using cooperative calibration and heuristics. In: Proceedings of the 9th ACM International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, pp. 139\u2013146. ACM (2006)","DOI":"10.1145\/1164717.1164742"},{"issue":"8","key":"23_CR18","doi-asserted-by":"crossref","first-page":"4554","DOI":"10.1109\/TVT.2009.2019663","volume":"58","author":"K Ren","year":"2009","unstructured":"Ren, K., Yu, S., Lou, W., Zhang, Y.: Multi-user broadcast authentication in wireless sensor networks. IEEE Trans. Veh. Technol. 58(8), 4554\u20134564 (2009)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"23_CR19","doi-asserted-by":"crossref","unstructured":"Resner, D., Frohlich, A.A.: Design rationale of a cross-layer, trustful space-time protocol for wireless sensor networks. In: 2015 IEEE 20th Conference on Emerging Technologies & Factory Automation (ETFA), pp. 1\u20138. IEEE (2015)","DOI":"10.1109\/ETFA.2015.7301413"},{"key":"23_CR20","unstructured":"Resner, D., Fr\u00f6hlich, A.A.: Key establishment and trustful communication for the internet of things. In: 4th SENSORNETS (2015)"},{"key":"23_CR21","doi-asserted-by":"crossref","unstructured":"Resner, D., Fr\u00f6hlich, A.A., Wanner, L.F.: Speculative Precision Time Protocol: submicrosecond clock synchronization for the IoT. In: 21th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA 2016), Berlin, Germany (August 2016, To appear)","DOI":"10.1109\/ETFA.2016.7733533"},{"key":"23_CR22","doi-asserted-by":"crossref","unstructured":"Suo, H., Wan, J., Zou, C., Liu, J.: Security in the internet of things: a review. In: 2012 International Conference on Computer Science and Electronics Engineering (ICCSEE), vol. 3, pp. 648\u2013651. IEEE (2012)","DOI":"10.1109\/ICCSEE.2012.373"},{"key":"23_CR23","unstructured":"Vijayakumar, P., Vijayalakshmi, V.: Effective key establishment and authentication protocol for wireless sensor networks using elliptic curve cryptography. In: Proceedings of the Conference on Mobile and Pervasive Computing (CoMPC08) (2008)"},{"key":"23_CR24","doi-asserted-by":"crossref","unstructured":"Wander, A.S., Gura, N., Eberle, H., Gupta, V., Shantz, S.C.: Energy analysis of public-key cryptography for wireless sensor networks. In: Third IEEE International Conference on Pervasive Computing and Communications, pp. 324\u2013328. IEEE (2005)","DOI":"10.1109\/PERCOM.2005.18"},{"issue":"2","key":"23_CR25","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1109\/COMST.2006.315852","volume":"8","author":"Y Wang","year":"2006","unstructured":"Wang, Y., Attebury, G., Ramamurthy, B.: A survey of security issues in wireless sensor networks. IEEE Commun. Surv. Tutorials 8(2), 2\u201323 (2006)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"23_CR26","doi-asserted-by":"crossref","unstructured":"Wong, K.H., Zheng, Y., Cao, J., Wang, S.: A dynamic user authentication scheme for wireless sensor networks. In: IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC 2006), vol. 1, pp. 8\u2013pp. IEEE (2006)","DOI":"10.1109\/SUTC.2006.1636182"},{"key":"23_CR27","doi-asserted-by":"crossref","unstructured":"Zhao, K., Ge, L.: A survey on the internet of things security. In: 2013 9th International Conference on Computational Intelligence and Security (CIS), pp. 663\u2013667. IEEE (2013)","DOI":"10.1109\/CIS.2013.145"},{"issue":"4","key":"23_CR28","doi-asserted-by":"crossref","first-page":"500","DOI":"10.1145\/1218556.1218559","volume":"2","author":"S Zhu","year":"2006","unstructured":"Zhu, S., Setia, S., Jajodia, S.: Leap+: Efficient security mechanisms for large-scale distributed sensor networks. ACM Trans. Sensor Netw. (TOSN) 2(4), 500\u2013528 (2006)","journal-title":"ACM Trans. Sensor Netw. (TOSN)"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49806-5_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T04:18:18Z","timestamp":1498364298000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49806-5_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319498058","9783319498065"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49806-5_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}