{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:49:37Z","timestamp":1740098977076,"version":"3.37.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319698106"},{"type":"electronic","value":"9783319698113"}],"license":[{"start":{"date-parts":[[2017,11,2]],"date-time":"2017-11-02T00:00:00Z","timestamp":1509580800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-69811-3_70","type":"book-chapter","created":{"date-parts":[[2017,11,1]],"date-time":"2017-11-01T00:08:02Z","timestamp":1509494882000},"page":"788-795","source":"Crossref","is-referenced-by-count":3,"title":["A Light Weight Data Encryption Method for WSN Communication"],"prefix":"10.1007","author":[{"given":"Kun-Lin","family":"Tsai","sequence":"first","affiliation":[]},{"given":"Fang-Yie","family":"Leu","sequence":"additional","affiliation":[]},{"given":"Tung-Hung","family":"Su","sequence":"additional","affiliation":[]},{"given":"Yi-Chen","family":"Chang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,2]]},"reference":[{"key":"70_CR1","doi-asserted-by":"crossref","unstructured":"Chahid, Y., Benabdellah, M., Azizi, A.: Internet of Things security. In: Proceedings of International Conference on Wireless Technologies, Embedded and Intelligent Systems, pp. 1\u20136 (2017)","DOI":"10.1109\/WITS.2017.7934655"},{"key":"70_CR2","doi-asserted-by":"crossref","unstructured":"Pathan, A.-S.K., Lee, H.-W., Hong, C.S.: Security in wireless sensor networks: issues and challenges. In: Proceedings of International Conference on Advanced Communication Technology, pp. 1043\u20131048 (2006)","DOI":"10.1109\/ICACT.2006.206151"},{"issue":"6","key":"70_CR3","doi-asserted-by":"crossref","first-page":"1243","DOI":"10.1109\/TSMCC.2012.2205680","volume":"42","author":"K Islam","year":"2012","unstructured":"Islam, K., Shen, W., Wang, X.: Wireless sensor network reliability and security in factory automation: a survey. IEEE Trans. Syst. Man Cybern. Part C (Appl. Rev.) 42(6), 1243\u20131256 (2012)","journal-title":"IEEE Trans. Syst. Man Cybern. Part C (Appl. Rev.)"},{"issue":"3","key":"70_CR4","doi-asserted-by":"crossref","first-page":"423","DOI":"10.1080\/10798587.2015.1121615","volume":"22","author":"KL Tsai","year":"2016","unstructured":"Tsai, K.L., Leu, F.Y., Tsai, S.H.: Data encryption method using environmental secret key with server assistance. Intell. Autom. Soft Comput. 22(3), 423\u2013430 (2016)","journal-title":"Intell. Autom. Soft Comput."},{"key":"70_CR5","doi-asserted-by":"crossref","unstructured":"Prasithsangaree, P., Krishnamurthy, P.: Analysis of energy consumption of RC4 and AES algorithms in wireless LANs. In: Proceedings of IEEE Global Telecommunications Conference, pp. 1445\u20131449 (2003)","DOI":"10.1109\/GLOCOM.2003.1258477"},{"key":"70_CR6","doi-asserted-by":"crossref","unstructured":"Syverson, P.: A taxonomy of replay attacks. In: Proceedings of Computer Security Foundations Workshop, pp. 187\u2013191 (1994)","DOI":"10.1109\/CSFW.1994.315935"},{"issue":"5","key":"70_CR7","doi-asserted-by":"crossref","first-page":"460","DOI":"10.1109\/LWC.2016.2585549","volume":"5","author":"JK Tugnait","year":"2016","unstructured":"Tugnait, J.K.: Detection of active eavesdropping attack by spoofing relay in multiple antenna systems. IEEE Wirel. Commun. Lett. 5(5), 460\u2013463 (2016)","journal-title":"IEEE Wirel. Commun. Lett."},{"key":"70_CR8","doi-asserted-by":"crossref","unstructured":"Cogliati, B., Seurin, Y.: Strengthening the known-key security notion for block ciphers. In: Proceedings of International Conference on Fast Software Encryption, pp. 494\u2013513 (2016)","DOI":"10.1007\/978-3-662-52993-5_25"},{"issue":"1","key":"70_CR9","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/MCOM.2017.1600363CM","volume":"55","author":"J Zhou","year":"2017","unstructured":"Zhou, J., Cao, Z., Dong, X., Vasilakos, A.V.: Security and privacy for cloud-based IoT: challenges, countermeasures, and future directions. IEEE Commun. Mag. 55(1), 26\u201333 (2017)","journal-title":"IEEE Commun. Mag."},{"key":"70_CR10","doi-asserted-by":"crossref","unstructured":"Newsome, J., Shi, E., Song, D., Perrig, A.: The Sybil attack in sensor networks: analysis & defenses. Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks, pp. 259\u2013268 (2004)","DOI":"10.1145\/984622.984660"},{"key":"70_CR11","doi-asserted-by":"crossref","unstructured":"Karlof, C., Sastry, N., Wagner, D.: TinySec: a link layer security architecture for wireless sensor networks. In: Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, pp. 162\u2013175 (2004)","DOI":"10.1145\/1031495.1031515"},{"issue":"1","key":"70_CR12","doi-asserted-by":"crossref","first-page":"577","DOI":"10.1109\/COMST.2015.2459691","volume":"18","author":"K-A Shim","year":"2016","unstructured":"Shim, K.-A.: A survey of public-key cryptographic primitives in wireless sensor networks. IEEE Commun. Surv. Tutorials 18(1), 577\u2013601 (2016)","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"1","key":"70_CR13","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/MSP.2015.7","volume":"13","author":"W Trappe","year":"2015","unstructured":"Trappe, W., Howard, R., Moore, R.S.: Low-energy security: limits and opportunities in the Internet of Things. IEEE Secur. Priv. 13(1), 14\u201321 (2015)","journal-title":"IEEE Secur. Priv."},{"key":"70_CR14","doi-asserted-by":"crossref","unstructured":"Salami, S.A., Baek, J., Salah, K., Damiani, E.: Lightweight encryption for smart home. In: Proceedings of International Conference on Availability, Reliability and Security, pp. 382\u2013388 (2016)","DOI":"10.1109\/ARES.2016.40"},{"key":"70_CR15","doi-asserted-by":"crossref","unstructured":"Bui, D.-H., Puschini, D., Bacles-Min, S., Beign\u00e9, E., Tran, X.-T.: Ultra low-power and low-energy 32-bit datapath AES architecture for IoT applications. In: Proceedings of International Conference on IC Design and Technology, pp. 1\u20134 (2016)","DOI":"10.1109\/ICICDT.2016.7542076"},{"issue":"1","key":"70_CR16","first-page":"47","volume":"6","author":"CE Weng","year":"2016","unstructured":"Weng, C.E., Sharma, V., Chen, H.C., Mao, C.H.: PEER: proximity-based energy-efficient routing algorithm for wireless sensor networks. J. Internet Serv. Inf. Secur. 6(1), 47\u201356 (2016)","journal-title":"J. Internet Serv. Inf. Secur."},{"issue":"3","key":"70_CR17","doi-asserted-by":"crossref","first-page":"527","DOI":"10.1007\/s11277-011-0385-5","volume":"61","author":"T Heer","year":"2011","unstructured":"Heer, T., Garcia-Morchon, O., Hummen, R., Keoh, S.L., Kumar, S.S., Wehrle, K.: Security challenges in the IP-based Internet of Things. Wirel. Pers. Commun. 61(3), 527\u2013542 (2011)","journal-title":"Wirel. Pers. Commun."},{"issue":"2","key":"70_CR18","doi-asserted-by":"crossref","first-page":"427","DOI":"10.1109\/JSYST.2015.2418434","volume":"11","author":"FY Leu","year":"2017","unstructured":"Leu, F.Y., Tsai, K.L., Hsiao, Y.T., Yang, C.T.: An internal intrusion detection and protection system by using data mining and forensic techniques. IEEE Syst. J. 11(2), 427\u2013438 (2017)","journal-title":"IEEE Syst. J."},{"issue":"3","key":"70_CR19","first-page":"40","volume":"6","author":"S Aram","year":"2016","unstructured":"Aram, S., Shirvani, R.A., Pasero, E.G., Chouikha, M.F.: Implantable medical devices; networking security survey. J. Internet Serv. Inf. Secur. 6(3), 40\u201360 (2016)","journal-title":"J. Internet Serv. Inf. Secur."},{"issue":"1","key":"70_CR20","first-page":"79","volume":"8","author":"F Valenza","year":"2017","unstructured":"Valenza, F., Su, T., Spinoso, S., Lioy, A., Sisto, R., Vallini, M.: A formal approach for network security policy validation. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 8(1), 79\u2013100 (2017)","journal-title":"J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA)"},{"key":"70_CR21","unstructured":"Announcing the ADVANCED ENCRYPTION STANDARD (AES): Federal Information Processing Standards Publication 197. United States National Institute of Standards and Technology (NIST) (2001)"},{"key":"70_CR22","doi-asserted-by":"crossref","first-page":"6261","DOI":"10.1109\/ACCESS.2016.2613442","volume":"4","author":"KL Tsai","year":"2016","unstructured":"Tsai, K.L., Huang, Y.L., Leu, F.Y., You, I.: TTP based high-efficient multi-key exchange protocol. IEEE Access. 4, 6261\u20136271 (2016)","journal-title":"IEEE Access."}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances on Broad-Band Wireless Computing, Communication and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-69811-3_70","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,11,1]],"date-time":"2017-11-01T00:43:49Z","timestamp":1509497029000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-69811-3_70"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,2]]},"ISBN":["9783319698106","9783319698113"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-69811-3_70","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2017,11,2]]}}}