{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T15:11:44Z","timestamp":1768835504427,"version":"3.49.0"},"reference-count":16,"publisher":"Breda Publishing Press","issue":"1","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Network Security"],"published-print":{"date-parts":[[2018,1]]},"abstract":"<jats:p> The ZigBee wireless technology was developed by the ZigBee alliance and is a low-cost communication solution with low power consumption. <jats:sup>1,2<\/jats:sup> ZigBee applications are often embedded into electrical circuits that are widely used in home and building automation, PC peripherals and medical sensors. <jats:sup>3,4<\/jats:sup> <\/jats:p>","DOI":"10.1016\/s1353-4858(18)30008-4","type":"journal-article","created":{"date-parts":[[2018,1,29]],"date-time":"2018-01-29T11:12:05Z","timestamp":1517224325000},"page":"13-19","source":"Crossref","is-referenced-by-count":9,"title":["Mitigating replay attacks with ZigBee solutions"],"prefix":"10.70985","volume":"2018","author":[{"given":"Fadi","family":"Farha","sequence":"first","affiliation":[{"name":"University of Science and Technology Beijing"}]},{"given":"Hongsong","family":"Chen","sequence":"additional","affiliation":[{"name":"University of Science and Technology Beijing"}]}],"member":"51855","reference":[{"key":"bib1","unstructured":"D Gislason   \u2018Zigbee Wireless Networking'; \n2008: \nNewnes>\nAccessed Jan 2018. www.sciencedirect.com\/science\/book\/9780750685979"},{"key":"bib2","doi-asserted-by":"crossref","unstructured":"SS Iyengar  \nN Parameshwaran  \nV Phoha  \nN Balakrishanan  \nC Okaye   \u2018Fundamentals of Sensor Network Programming: Applications and Technology'; \n2011: \nJohn Wiley & Sons>","DOI":"10.1002\/9780470890158"},{"key":"bib3","volume-title":"\u2018802.15.4-2011 \u2013 IEEE Standard for Local and metropolitan area networks \u2013 Part 15.4: Low-Rate Wireless Personal Area Networks(LR-WPANs'","year":"2011"},{"issue":"3","key":"bib4","doi-asserted-by":"crossref","first-page":"1221","DOI":"10.1109\/TCE.2009.5277979","volume":"55","author":"Imran A","year":"2009","journal-title":"IEEE Transactions on Consumer Electronics"},{"key":"bib5","first-page":"494497","volume-title":"Second International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"2","author":"Li H","year":"2010"},{"key":"bib6","first-page":"508511","volume-title":"Third International Conference on Multimedia Information Networking and Security","author":"Sun M","year":"2011"},{"key":"bib7","first-page":"399403","volume-title":"The International Conference on Information Network","author":"Choi K","year":"2012"},{"issue":"4","key":"bib8","doi-asserted-by":"crossref","DOI":"10.1109\/TSMCC.2010.2045373","volume":"40","author":"Alcaraz C","year":"2010","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part C Applications and Reviews"},{"key":"bib9","first-page":"51325138","volume-title":"46th Hawaii International Conference on System Sciences","author":"Vidgren N","year":"2013"},{"key":"bib10","unstructured":"J Cache  \nJ Wright  \nV Liu   \u2018Hacking Exposed Wireless: Wireless Security Secrets and Solutions'; \nJul 2010: \nMcGraw-Hill>\nSecond Edition"},{"key":"bib12","first-page":"494497","volume-title":"Second International Conference on Networks Security, Wireless Communications and Trusted Computing","author":"Li H","year":"2010"},{"key":"bib13","first-page":"426430","volume-title":"International Conference on Computational Intelligence and Security","author":"Yang B","year":"2009"},{"key":"bib14","first-page":"199206","volume-title":"14th International Conference on Hybrid Intelligent Systems","author":"Olawumi O","year":"2014"},{"key":"bib15","first-page":"46","volume-title":"Proceedings of the 33rd Annual Conference of the IEEE Industrial Electronics Society (IECON)","author":"Lee JS","year":"2007"},{"key":"bib16","first-page":"298302","volume-title":"International Forum on Computer Science-Technology and Applications","volume":"1","author":"Chunqing L","year":"2009"},{"key":"bib17","first-page":"16","volume-title":"Annual IEEE India Conference (INDICON)","author":"Kulkarni S","year":"2015"}],"container-title":["Network Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1353485818300084?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1353485818300084?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/www.magonlinelibrary.com\/doi\/pdf\/10.1016\/S1353-4858%2818%2930008-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,3]],"date-time":"2024-12-03T22:17:51Z","timestamp":1733264271000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.magonlinelibrary.com\/doi\/10.1016\/S1353-4858%2818%2930008-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1]]},"references-count":16,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,1]]}},"alternative-id":["10.1016\/S1353-4858(18)30008-4"],"URL":"https:\/\/doi.org\/10.1016\/s1353-4858(18)30008-4","relation":{},"ISSN":["1353-4858","1872-9371"],"issn-type":[{"value":"1353-4858","type":"print"},{"value":"1872-9371","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,1]]}}}