{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T05:58:15Z","timestamp":1743141495734,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319678061"},{"type":"electronic","value":"9783319678078"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-67807-8_5","type":"book-chapter","created":{"date-parts":[[2017,9,26]],"date-time":"2017-09-26T08:22:18Z","timestamp":1506414138000},"page":"63-73","source":"Crossref","is-referenced-by-count":4,"title":["Authentication Based Elliptic Curves Digital Signature for ZigBee Networks"],"prefix":"10.1007","author":[{"given":"Ouassila","family":"Hoceini","sequence":"first","affiliation":[]},{"given":"Hossam","family":"Afifi","sequence":"additional","affiliation":[]},{"given":"Rachida","family":"Aoudjit","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,27]]},"reference":[{"key":"5_CR1","unstructured":"Digital Signature Standard (DSS), National Institute of Standards and Technology (NIST) (2013)"},{"key":"5_CR2","doi-asserted-by":"publisher","unstructured":"Wang, K., et al.: Strategic anti-eavesdropping game for physical layer security in wireless cooperative networks. IEEE Trans. Veh. Technol. PP(99), doi: 10.1109\/TVT.2017.2703305 . IEEE Vehicular Technology Society","DOI":"10.1109\/TVT.2017.2703305"},{"key":"5_CR3","doi-asserted-by":"publisher","unstructured":"Xu, J., et al.: Proactive eavesdropping via cognitive jamming in fading channels. IEEE Trans. Wireless Commun. 16(5), 2790\u20132806 (2017). doi: 10.1109\/TWC.2017.2666138 , Print ISSN\u00a01536-1276, IEEE Communications Society\u00a0IEEE Signal Processing Society","DOI":"10.1109\/TWC.2017.2666138"},{"key":"5_CR4","doi-asserted-by":"publisher","unstructured":"Saqib, N., et al.: Key exchange protocol for WSN resilient against man in the middle attack. In: IEEE International Conference on Advances in Computer Applications (ICACA), 24 October 2016, Coimbatore, India. IEEE (2016). INSPEC Accession Number:\u00a016776896, doi: 10.1109\/ICACA.2016.7887963","DOI":"10.1109\/ICACA.2016.7887963"},{"key":"5_CR5","doi-asserted-by":"publisher","unstructured":"Eigner, O., Kreimel, P., Tavolato, P.: Detection of man-in-the-middle attacks on industrial control networks. In: 2016 International Conference on Software Security and Assurance (ICSSA), 24\u201325 August 2016, St. Polten, Austria, NSPEC Accession Number:\u00a016693204. IEEE (2016). doi:\u00a0 10.1109\/ICSSA.2016.19","DOI":"10.1109\/ICSSA.2016.19"},{"key":"5_CR6","unstructured":"Baalbaki, B.A.I., Pacheco, J., Tunc, C., AI-Nashif, Y.: Anomaly Behavior Analysis System for ZigBee in Smart Buildings, 978-1-5090-0478-2\/15\/$31.00 \u00a92015 IEEE"},{"key":"5_CR7","unstructured":"http:\/\/www.zigbee.org"},{"key":"5_CR8","unstructured":"Xu, X., Gao, Y., Zhang, W., Li, J.: Research on the Wireless Network Transmission Security Based on IEEE 802.15.4. Research (2009)"},{"key":"5_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1007\/11796435_19","volume-title":"Embedded Computer Systems: Architectures, Modeling, and Simulation","author":"O Hyncica","year":"2006","unstructured":"Hyncica, O., Kacz, P., Fiedler, P., Bradac, Z., Kucera, P., Vrba, R.: On security of PAN wireless systems. In: Vassiliadis, S., Wong, S., H\u00e4m\u00e4l\u00e4inen, T.D. (eds.) SAMOS 2006. LNCS, vol. 4017, pp. 178\u2013185. Springer, Heidelberg (2006). doi: 10.1007\/11796435_19"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Koblitz, A.H., Koblitz, N., Menezes, A.: Elliptic curve cryptography: the serpentine course of a paradigm shift. J. Numb. Theory 131, 781\u2013814 (2011)","DOI":"10.1016\/j.jnt.2009.01.006"},{"key":"5_CR11","unstructured":"Koblitz, N.: Elliptic curve cryptosystems. Math. Comput. 48, 203 (1987). 209MATHMathSciNetCrossRef"},{"key":"5_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1007\/3-540-39799-X_31","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201985 Proceedings","author":"VS Miller","year":"1986","unstructured":"Miller, V.S.: Use of elliptic curves in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417\u2013426. Springer, Heidelberg (1986). doi: 10.1007\/3-540-39799-X_31"},{"key":"5_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/978-3-540-28632-5_9","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"N Gura","year":"2004","unstructured":"Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.C.: Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 119\u2013132. Springer, Heidelberg (2004). doi: 10.1007\/978-3-540-28632-5_9"},{"key":"5_CR14","doi-asserted-by":"publisher","unstructured":"Akhter, F.: Faster scalar multiplication algorithm to implement a secured elliptic curve cryptography system. (IJACSA) Int. J. Adv. Comput. Sci. Appl. 7(1) (2016). doi: 10.14569\/IJACSA.2016.070187 , License:\u00a0CC BY-NC-ND 4.0","DOI":"10.14569\/IJACSA.2016.070187"},{"key":"5_CR15","doi-asserted-by":"publisher","unstructured":"Kulkarni, S., Ghosh, U., Pasupuleti, H.: Considering security for ZigBee protocol using message authentication code. In: IEEE INDICON 2015, pp. 1\u20136 (2015). doi: 10.1109\/INDICON.2015.7443625","DOI":"10.1109\/INDICON.2015.7443625"},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"Elgamal, T.: A public key Cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inform. Theory 31(4) (1985), 469\u2013472 (1985)","DOI":"10.1109\/TIT.1985.1057074"},{"key":"5_CR17","unstructured":"Federal Information Processing Standards Publication, \u201cDigital Signature Standard (DSS),\u201d Gaithersburg, MD, Technical report, July 2013"},{"key":"5_CR18","unstructured":"Al-alak, S., Ahmed, Z., Abdullah, A., Subramiam, S.: AES and ECC mixed for ZigBee wireless sensor security. World Acad. Sci. Eng. Technol. Int. J. Electr. Comput. Energ. Electron. Commun. Eng. 5(9) (2011)"},{"key":"5_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in Cryptology","author":"A Shamir","year":"1985","unstructured":"Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47\u201353. Springer, Heidelberg (1985). doi: 10.1007\/3-540-39568-7_5"},{"key":"5_CR20","unstructured":"Hankerson, D., Menezes, A., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer, New York (2004)"},{"key":"5_CR21","doi-asserted-by":"crossref","unstructured":"Koblitz, N.: Elliptic curve cryptosystems. Math. Comput. 48(177), 203\u2013209 (1987)","DOI":"10.1090\/S0025-5718-1987-0866109-5"},{"key":"5_CR22","unstructured":"https:\/\/tools.ietf.org\/search\/rfc4492#section-6"},{"key":"5_CR23","unstructured":"http:\/\/csrc.nist.gov\/groups\/ST\/toolkit\/documents\/dss\/NISTReCur.pdf"},{"key":"5_CR24","unstructured":"https:\/\/tools.ietf.org\/html\/rfc6234"},{"key":"5_CR25","unstructured":"https:\/\/omnetpp.org"},{"key":"5_CR26","unstructured":"https:\/\/github.com\/kmackay\/micro-ecc"}],"container-title":["Lecture Notes in Computer Science","Mobile, Secure, and Programmable Networking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-67807-8_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,3]],"date-time":"2019-10-03T19:56:15Z","timestamp":1570132575000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-67807-8_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319678061","9783319678078"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-67807-8_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}