{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T12:04:42Z","timestamp":1742990682167,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":20,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811596087"},{"type":"electronic","value":"9789811596094"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-9609-4_3","type":"book-chapter","created":{"date-parts":[[2020,11,1]],"date-time":"2020-11-01T16:03:18Z","timestamp":1604246598000},"page":"23-33","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["LoRaWAN Network Server Session Keys Establish Method with the Assistance of Join Server"],"prefix":"10.1007","author":[{"given":"Kun-Lin","family":"Tsai","sequence":"first","affiliation":[]},{"given":"Fang-Yie","family":"Leu","sequence":"additional","affiliation":[]},{"given":"Li-Chun","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Chi","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jhih-Yan","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,2]]},"reference":[{"key":"3_CR1","doi-asserted-by":"publisher","first-page":"1089","DOI":"10.1016\/j.procs.2015.05.122","volume":"52","author":"A Gaur","year":"2015","unstructured":"Gaur, A., Scotney, B., Parr, G., McClean, S.: Smart city architecture and its applications based on IoT. Proc. Comput. Sci. 52, 1089\u20131094 (2015)","journal-title":"Proc. Comput. Sci."},{"issue":"2","key":"3_CR2","first-page":"1","volume":"8","author":"C-S Shih","year":"2018","unstructured":"Shih, C.-S., Chou, J.-J., Lin, K.-J.: WuKong: Secure Run-Time environment and data-driven IoT applications for Smart Cities and Smart Buildings. J. Internet Serv. Inf. Secur. 8(2), 1\u201317 (2018)","journal-title":"J. Internet Serv. Inf. Secur."},{"issue":"10","key":"3_CR3","doi-asserted-by":"publisher","first-page":"4590","DOI":"10.1109\/TII.2018.2843802","volume":"14","author":"DA Chekired","year":"2018","unstructured":"Chekired, D.A., Khoukhi, L., Mouftah, H.T.: Industrial IoT data scheduling based on hierarchical fog computing: a key for enabling smart factory. IEEE Trans. Industr. Inf. 14(10), 4590\u20134602 (2018)","journal-title":"IEEE Trans. Industr. Inf."},{"key":"3_CR4","unstructured":"Flore, D.: 3GPP Standards for the Internet-of-Things, Recuperado el 25 (2016)"},{"key":"3_CR5","unstructured":"Lora-alliance. \n                  https:\/\/www.lora-alliance.org\n                  \n                . Accessed 15 Aug 2019"},{"key":"3_CR6","unstructured":"Sigfox. \n                  https:\/\/www.sigfox.com\n                  \n                . Accessed 15 Aug 2019"},{"key":"3_CR7","unstructured":"Telensa. \n                  http:\/\/www.telensa.com\n                  \n                . Accessed 15 Aug 2019"},{"key":"3_CR8","unstructured":"Weightless. \n                  http:\/\/www.weightless.org\n                  \n                . Accessed 15 Aug 2019"},{"key":"3_CR9","unstructured":"LoRa Alliance Technical Committee: LoRaWAN Backend Interfaces 1.0 Specification. LoRa Alliance (2017)"},{"key":"3_CR10","unstructured":"LoRa Alliance Technical Committee: LoRaWAN 1.1 Specification. LoRa Alliance (2017)"},{"key":"3_CR11","unstructured":"Announcing the Advanced Encryption Standard (AES). Federal Information Processing Standards Publication 197. United States National Institute of Standards and Technology (2001)"},{"issue":"2","key":"3_CR12","first-page":"1","volume":"10","author":"V Korzhuk","year":"2019","unstructured":"Korzhuk, V., Groznykh, A., Menshikov, A., Strecker, M.: Identification of attacks against wireless sensor networks based on behaviour analysis graphics processing units. J. Wirel. Mob. Netw. Ubiquit. Comput. Depend. Appl. 10(2), 1\u201321 (2019)","journal-title":"J. Wirel. Mob. Netw. Ubiquit. Comput. Depend. Appl."},{"issue":"4","key":"3_CR13","first-page":"1","volume":"9","author":"C Gritti","year":"2018","unstructured":"Gritti, C., \u00d6nen, M., Molva, R., Susilo, W., Plantard, T.: Device identification and personal data attestation in networks. J. Wirel. Mob. Netw. Ubiquit. Comput. Depend. Appl. 9(4), 1\u201325 (2018)","journal-title":"J. Wirel. Mob. Netw. Ubiquit. Comput. Depend. Appl."},{"issue":"3","key":"3_CR14","first-page":"54","volume":"8","author":"I Kotenko","year":"2018","unstructured":"Kotenko, I., Saenko, I., Branitskiy, A.: Applying big data processing and machine learning methods for mobile Internet of Things security monitoring. J. Internet Serv. Inf. Secur. 8(3), 54\u201363 (2018)","journal-title":"J. Internet Serv. Inf. Secur."},{"issue":"2","key":"3_CR15","first-page":"1","volume":"9","author":"H Hui","year":"2019","unstructured":"Hui, H., et al.: Survey on blockchain for Internet of Things. J. Internet Serv. Inf. Secur. 9(2), 1\u201330 (2019)","journal-title":"J. Internet Serv. Inf. Secur."},{"issue":"1","key":"3_CR16","first-page":"1","volume":"11","author":"I Butun","year":"2019","unstructured":"Butun, I., Pereira, N., Gidlund, M.: Security risk analysis of LoRaWAN and future directions. Fut. Internet 11(1), 1\u201322 (2019). Article ID 3","journal-title":"Fut. Internet"},{"key":"3_CR17","unstructured":"Miller R.: LoRa Security \u2013 Building a Secure LoRa Solution. MWR Labs, Whitepaper (2016)"},{"issue":"6","key":"3_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/s18061888","volume":"18","author":"I You","year":"2018","unstructured":"You, I., Kwon, S., Choudhary, G., Sharma, V., Seo, J.: An enhanced LoRaWAN security protocol for privacy preservation in IoT with a case study on a smart factory-enabled parking system. Sensors 18(6), 1\u201332 (2018). Article ID 1888","journal-title":"Sensors"},{"issue":"6","key":"3_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/s18061833","volume":"18","author":"R Sanchez-Iborra","year":"2018","unstructured":"Sanchez-Iborra, R., et al.: Enhancing LoRaWAN security through a lightweight and authenticated key management approach. Sensors 18(6), 1\u201318 (2018). Article ID 1833","journal-title":"Sensors"},{"key":"3_CR20","doi-asserted-by":"crossref","unstructured":"Hayati, N., Suryanegara, M., Ramli, K., Suryanto, Y.: Potential development of AES-128-bit key generation for LoRaWAN security. In: International Conference on Communication Engineering and Technology Proceedings, Nagoya, Japan, pp. 57\u201361 (2019)","DOI":"10.1109\/ICCET.2019.8726884"}],"container-title":["Communications in Computer and Information Science","Mobile Internet Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-9609-4_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,3]],"date-time":"2020-11-03T08:21:48Z","timestamp":1604391708000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-9609-4_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789811596087","9789811596094"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-9609-4_3","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"2 November 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MobiSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Mobile Internet Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taichung","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taiwan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 October 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mobisecsymposium2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/isyou.info\/conf\/mobisec19\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"44","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"13","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"30% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}