{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T17:12:42Z","timestamp":1742922762774,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319728162"},{"type":"electronic","value":"9783319728179"}],"license":[{"start":{"date-parts":[[2017,12,22]],"date-time":"2017-12-22T00:00:00Z","timestamp":1513900800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-72817-9_1","type":"book-chapter","created":{"date-parts":[[2017,12,21]],"date-time":"2017-12-21T11:44:29Z","timestamp":1513856669000},"page":"3-18","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Towards End-to-End Data Protection in\u00a0Low-Power Networks"],"prefix":"10.1007","author":[{"given":"Vasily","family":"Mikhalev","sequence":"first","affiliation":[]},{"given":"Laurent","family":"Gomez","sequence":"additional","affiliation":[]},{"given":"Frederik","family":"Armknecht","sequence":"additional","affiliation":[]},{"given":"Jos\u00e9","family":"M\u00e1rquez","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,22]]},"reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Abdmeziem, M.R., Tandjaoui, D.: A cooperative end to end key management scheme for E-health applications in the context of internet of things. In: Garcia Pineda, M., Lloret, J., Papavassiliou, S., Ruehrup, S., Westphall, C. (eds.) ADHOC-NOW 2014. LNCS, pp. 35\u201346. Springer, Heidelberg (2014)","DOI":"10.1007\/978-3-662-46338-3_4"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Abdmeziem, M.R., Tandjaoui, D., Romdhani, I.: A decentralized batch-based group key management protocol for mobile internet of things (DBGK). In: 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT\/IUCC\/DASC\/PICOM), pp. 1109\u20131117. IEEE (2015)","DOI":"10.1109\/CIT\/IUCC\/DASC\/PICOM.2015.166"},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Barker, E., Roginsky, A.: SP 800\u2013133. Recommendation for cryptographic key generation. NIST Special Publication 800:133 (2012)","DOI":"10.6028\/NIST.SP.800-133"},{"key":"1_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1007\/3-540-44448-3_41","volume-title":"Advances in Cryptology \u2014 ASIACRYPT 2000","author":"M Bellare","year":"2000","unstructured":"Bellare, M., Namprempre, C.: Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 531\u2013545. Springer, Heidelberg (2000). https:\/\/doi.org\/10.1007\/3-540-44448-3_41"},{"key":"1_CR5","unstructured":"European Commission. EU General Data Protection Regulation (2017)"},{"key":"1_CR6","unstructured":"Bet\u00fcl Durak, F., Vaudenay, S.: Breaking the ff3 format-preserving encryption standard over small domains. Cryptology ePrint Archive, Report 2017\/521 (2017). http:\/\/eprint.iacr.org\/2017\/521"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Dworkin, M.J.: SP 800\u201338A. Recommendation for Block Cipher Modes of Operation: Methods and Techniques. National Institute of Standards & Technology (2001)","DOI":"10.6028\/NIST.SP.800-38a"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Dworkin, M.J.: SP 800\u201338C. Recommendation for block cipher modes of operation: The CCM mode for authentication and confidentiality. National Institute of Standards & Technology (2004)","DOI":"10.6028\/NIST.SP.800-38b-2005"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"Dworkin, M.J.: SP 800\u201338B. Recommendation for block cipher modes of operation: The CMAC mode for authentication. National Institute of Standards & Technology (2005)","DOI":"10.6028\/NIST.SP.800-38b-2005"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Dworkin, M.J.: SP 800\u201338G. Recommendation for Block Cipher Modes of Operation: Methods for Format-Preserving Encryption. National Institute of Standards & Technology (2016)","DOI":"10.6028\/NIST.SP.800-38b"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Lennvall, T., Svensson, S., Hekland, F.: A comparison of WirelessHART and ZigBee for industrial applications. In: IEEE International Workshop on Factory Communication Systems, WFCS 2008, pp. 85\u201388. IEEE (2008)","DOI":"10.1109\/WFCS.2008.4638746"},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"Li, Y.: Design of a key establishment protocol for smart home energy management system. In: 2013 Fifth International Conference on Computational Intelligence, Communication Systems and Networks (CICSyN), pp. 88\u201393. IEEE (2013)","DOI":"10.1109\/CICSYN.2013.42"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Naoui, S., Elhdhili, M.E., Saidane, L.A.: Enhancing the security of the IoT LoraWAN architecture. In: 2016 International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks (PEMWN), pp. 1\u20137, November 2016","DOI":"10.1109\/PEMWN.2016.7842904"},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Porambage, P., Braeken, A., Kumar, P., Gurtov, A., Ylianttila, M.: Proxy-based end-to-end key establishment protocol for the Internet of Things. In: 2015 IEEE International Conference on Communication Workshop (ICCW), pp. 2677\u20132682. IEEE (2015)","DOI":"10.1109\/ICCW.2015.7247583"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Renugadevi, N., Swaminathan, G., Kumar, A.S.: Key management schemes for secure group communication in wireless networks-a survey. In: 2014 International Conference on Contemporary Computing and Informatics (IC3I), pp. 446\u2013450. IEEE (2014)","DOI":"10.1109\/IC3I.2014.7019627"},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Saied, Y.B., Olivereau, A.: D-HIP: a distributed key exchange scheme for HIP-based Internet of Things. In: 2012 IEEE International Symposium on World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp. 1\u20137. IEEE (2012)","DOI":"10.1109\/WoWMoM.2012.6263785"},{"key":"1_CR17","unstructured":"Shen, J., Moh, S., Chung, I.: A novel key management protocol in body area networks. In: Proceedings of the Seventh International Conference on Networking and Services (ICNS 2011), pp. 246\u2013251 (2011)"},{"key":"1_CR18","unstructured":"SigFox: Make things come alive in a secure way (2017). https:\/\/www.sigfox.com\/sites\/default\/files\/1701-SIGFOX-White_Paper_Security.pdf"},{"key":"1_CR19","unstructured":"LoRa Alliance Technical Marketing Workgroup. Technical Overview of LoRa and LoRaWAN (2015)"}],"container-title":["Lecture Notes in Computer Science","Computer Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-72817-9_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,8]],"date-time":"2019-10-08T07:43:51Z","timestamp":1570520631000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-72817-9_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,22]]},"ISBN":["9783319728162","9783319728179"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-72817-9_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017,12,22]]}}}