{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T22:12:07Z","timestamp":1743113527546,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":23,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789811695759"},{"type":"electronic","value":"9789811695766"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-16-9576-6_1","type":"book-chapter","created":{"date-parts":[[2022,1,22]],"date-time":"2022-01-22T13:02:27Z","timestamp":1642856547000},"page":"3-15","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Secure LoRaWAN Root Key Update Scheme for\u00a0IoT Environment"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1317-6019","authenticated-orcid":false,"given":"Kun-Lin","family":"Tsai","sequence":"first","affiliation":[]},{"given":"Li-Woei","family":"Chen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7746-7800","authenticated-orcid":false,"given":"Fang-Yie","family":"Leu","sequence":"additional","affiliation":[]},{"given":"Hsiung-Chieh","family":"Hsu","sequence":"additional","affiliation":[]},{"given":"Chuan-Tian","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,22]]},"reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Aheleroff, S., et al.: IoT-enabled smart appliances under industry 4.0: a case study. Adv. Eng. Inform. 43(101043), 1\u201314 (2020)","DOI":"10.1016\/j.aei.2020.101043"},{"issue":"1","key":"1_CR2","first-page":"35","volume":"11","author":"D Caputo","year":"2020","unstructured":"Caputo, D., Verderame, L., Ranieri, A., Merlo, A., Caviglione, L.: Fine-hearing Google home: why silence will not protect your privacy. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 11(1), 35\u201353 (2020)","journal-title":"J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA)"},{"issue":"4","key":"1_CR3","first-page":"77","volume":"11","author":"P Angin","year":"2020","unstructured":"Angin, P., Anisi, M.H., G\u00f6ksel, F., G\u00fcrsoy, C., B\u00fcy\u00fckg\u00fclc\u00fc, A.: AgriLoRa: a digital twin framework for smart agriculture. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 11(4), 77\u201396 (2020)","journal-title":"J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA)"},{"key":"1_CR4","doi-asserted-by":"publisher","first-page":"23601","DOI":"10.1109\/ACCESS.2020.2968741","volume":"8","author":"C Badii","year":"2020","unstructured":"Badii, C., Bellini, P., Difino, A., Nesi, P.: Smart city IoT platform respecting GDPR privacy and security aspects. IEEE Access 8, 23601\u201323623 (2020)","journal-title":"IEEE Access"},{"key":"1_CR5","doi-asserted-by":"publisher","first-page":"512","DOI":"10.1016\/j.procir.2016.05.050","volume":"50","author":"N Shariatzadeh","year":"2016","unstructured":"Shariatzadeh, N., Lundholm, T., Lindberg, L., Sivard, G.: Integration of digital factory with smart factory based on internet of things. Proc. Cirp 50, 512\u2013517 (2016)","journal-title":"Proc. Cirp"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Liu, Y., Liu, L., Chen, W.P.: Intelligent traffic light control using distributed multi-agent Q learning. In: 2017 IEEE 20th International Conference on Intelligent Transportation Systems (ITSC), pp. 1\u20138 (2017)","DOI":"10.1109\/ITSC.2017.8317730"},{"issue":"4","key":"1_CR7","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1109\/MSP.2021.3057298","volume":"38","author":"K Qian","year":"2021","unstructured":"Qian, K., Zhang, Z., Yamamoto, Y., Schuller, B.W.: Artificial intelligence internet of things for the elderly: from assisted living to health-care monitoring. IEEE Signal Process. Mag. 38(4), 78\u201388 (2021)","journal-title":"IEEE Signal Process. Mag."},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Katayama, K., Takahashi, H., Yokoyama, S., G\u00e4fvert, K., Kinoshita, T.: Evacuation guidance support using cooperative agent-based IoT devices. In: 2017 IEEE 6th Global Conference on Consumer Electronics (GCCE), pp. 1\u20132 (2017)","DOI":"10.1109\/GCCE.2017.8229431"},{"key":"1_CR9","unstructured":"L. A. T. Committee. Lorawan backend interfaces 1.0 specification. https:\/\/lora-alliance.org\/. Accessed 1 Aug 2021"},{"key":"1_CR10","unstructured":"L. A. T. Committee. Lorawan 1.1 specification. https:\/\/lora-alliance.org\/. Accessed 1 Aug 2021"},{"issue":"3","key":"1_CR11","first-page":"47","volume":"10","author":"M Alizadeh","year":"2020","unstructured":"Alizadeh, M., Andersson, K., Schel\u00e9n, O.: A survey of secure Internet of Things in relation to blockchain. J. Internet Serv. Inf. Secur. (JISIS) 10(3), 47\u201375 (2020)","journal-title":"J. Internet Serv. Inf. Secur. (JISIS)"},{"issue":"2","key":"1_CR12","first-page":"1","volume":"9","author":"H Hui","year":"2019","unstructured":"Hui, H., et al.: Survey on blockchain for internet of things. J. Internet Serv. Inf. Secur. (JISIS) 9(2), 1\u201330 (2019)","journal-title":"J. Internet Serv. Inf. Secur. (JISIS)"},{"key":"1_CR13","first-page":"1","volume":"197","author":"NF Pub","year":"2001","unstructured":"Pub, N.F.: Announcing the advanced encryption standard (AES). Federal Inf. Process. Stand. Publ. 197, 1\u201351 (2001)","journal-title":"Federal Inf. Process. Stand. Publ."},{"key":"1_CR14","doi-asserted-by":"publisher","first-page":"54631","DOI":"10.1109\/ACCESS.2020.2978100","volume":"8","author":"KL Tsai","year":"2020","unstructured":"Tsai, K.L., Leu, F.Y., Hung, L.L., Ko, C.Y.: Secure session key generation method for LoRaWAN servers. IEEE Access 8, 54631\u201354640 (2020)","journal-title":"IEEE Access"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Noura, H., Hatoum, T., Salman, O., Yaacoub, J.P., Chehab, A.: LoRaWAN security survey: issues, threats and possible mitigation techniques. Internet Things 100303, 1\u201337 (2020)","DOI":"10.1016\/j.iot.2020.100303"},{"key":"1_CR16","doi-asserted-by":"publisher","first-page":"146348","DOI":"10.1109\/ACCESS.2019.2941972","volume":"7","author":"KL Tsai","year":"2019","unstructured":"Tsai, K.L., Leu, F.Y., You, I., Chang, S.W., Hu, S.J., Park, H.: Low-power AES data encryption architecture for a LoRaWAN. IEEE Access 7, 146348\u2013146357 (2019)","journal-title":"IEEE Access"},{"issue":"6","key":"1_CR17","doi-asserted-by":"publisher","first-page":"1888","DOI":"10.3390\/s18061888","volume":"18","author":"I You","year":"2018","unstructured":"You, I., Kwon, S., Choudhary, G., Sharma, V., Seo, J.T.: An enhanced LoRaWAN security protocol for privacy preservation in IoT with a case study on a smart factory-enabled parking system. Sensors 18(6), 1888 (2018)","journal-title":"Sensors"},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"Raad, N., Hasan, T., Chalak, A., Waleed, J.: Secure data in lorawan network by adaptive method of elliptic-curve cryptography. In: 2019 International Conference on Computing and Information Science and Technology and Their Applications (ICCISTA), pp. 1\u20136 (2019)","DOI":"10.1109\/ICCISTA.2019.8830653"},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"Naoui, S., Elhdhili, M.E., Saidane, L.A.: Trusted third party based key management for enhancing LoRaWAN security. In: 2017 IEEE\/ACS 14th International Conference on Computer Systems and Applications (AICCSA), pp. 1306\u20131313 (2017)","DOI":"10.1109\/AICCSA.2017.73"},{"key":"1_CR20","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1016\/j.comnet.2018.11.017","volume":"148","author":"M Eldefrawy","year":"2019","unstructured":"Eldefrawy, M., Butun, I., Pereira, N., Gidlund, M.: Formal security analysis of LoRaWAN. Comput. Netw. 148, 328\u2013339 (2019)","journal-title":"Comput. Netw."},{"key":"1_CR21","doi-asserted-by":"crossref","unstructured":"Donmez, T.C., Nigussie, E.: Key management through delegation for LoRaWAN based healthcare monitoring systems. In: 2019 13th International Symposium on Medical Information and Communication Technology (ISMICT), pp. 1\u20136 (2019)","DOI":"10.1109\/ISMICT.2019.8743947"},{"issue":"4","key":"1_CR22","doi-asserted-by":"publisher","first-page":"34","DOI":"10.3390\/cryptography2040034","volume":"2","author":"J Han","year":"2018","unstructured":"Han, J., Wang, J.: An enhanced key management scheme for LoRaWAN. Cryptography 2(4), 34 (2018)","journal-title":"Cryptography"},{"key":"1_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"414","DOI":"10.1007\/978-3-540-70545-1_38","volume-title":"Computer Aided Verification","author":"CJF Cremers","year":"2008","unstructured":"Cremers, C.J.F.: The Scyther tool: verification, falsification, and analysis of security protocols. In: Gupta, A., Malik, S. (eds.) CAV 2008. LNCS, vol. 5123, pp. 414\u2013418. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-70545-1_38"}],"container-title":["Communications in Computer and Information Science","Mobile Internet Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-9576-6_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,21]],"date-time":"2022-04-21T16:08:03Z","timestamp":1650557283000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-9576-6_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9789811695759","9789811695766"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-9576-6_1","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"22 January 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MobiSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Mobile Internet Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Jeju Island","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 October 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 October 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mobisecsymposium2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/isyou.info\/conf\/mobisec21\/I","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"66","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"42% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}