{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T21:43:39Z","timestamp":1775079819303,"version":"3.50.1"},"reference-count":50,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100004663","name":"Ministry of Science and Technology, Taiwan","doi-asserted-by":"publisher","award":["MOST 107-2221-E-029-006"],"award-info":[{"award-number":["MOST 107-2221-E-029-006"]}],"id":[{"id":"10.13039\/501100004663","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Cross-Ministry Giga KOREA Project"},{"name":"Korea Government (MSIT) through the Development of 20Gbps P2MP wireless backhaul for 5G convergence service","award":["GK19N0600"],"award-info":[{"award-number":["GK19N0600"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/access.2019.2941972","type":"journal-article","created":{"date-parts":[[2019,9,17]],"date-time":"2019-09-17T19:57:51Z","timestamp":1568750271000},"page":"146348-146357","source":"Crossref","is-referenced-by-count":59,"title":["Low-Power AES Data Encryption Architecture for a LoRaWAN"],"prefix":"10.1109","volume":"7","author":[{"given":"Kun-Lin","family":"Tsai","sequence":"first","affiliation":[]},{"given":"Fang-Yie","family":"Leu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0604-3445","authenticated-orcid":false,"given":"Ilsun","family":"You","sequence":"additional","affiliation":[]},{"given":"Shuo-Wen","family":"Chang","sequence":"additional","affiliation":[]},{"given":"Shiung-Jie","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Hoonyong","family":"Park","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.3390\/en11030573"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/6590713"},{"key":"ref33","first-page":"1","article-title":"130 nm low power asynchronous AES core","author":"el-meligy","year":"2017","journal-title":"Proc IEEE Int Symp Circuits Syst (ISCAS)"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/DSD.2006.40"},{"key":"ref31","first-page":"1","article-title":"Range and coexistence analysis of long range unlicensed communication","author":"reynders","year":"2017","journal-title":"Proc 23rd Int Conf Telecommun"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CYBConf.2017.7985777"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.3390\/s18061888"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.3390\/s18061833"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2017.2716386"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ATC.2018.8587500"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2018.11.003"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1108\/IntR-07-2014-0173"},{"key":"ref29","author":"miller","year":"2016","journal-title":"LoRa security&#x2014;Building a secure LoRa solution"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2843802"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s00170-015-7220-1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.7"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.3390\/s18061675"},{"key":"ref21","first-page":"1","article-title":"A lightweight authentication and data encryption method for IoT communication","author":"tsai","year":"2018","journal-title":"Proc Int Symp Mobile Internet Secur"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2852563"},{"key":"ref23","year":"2017","journal-title":"A White Paper Prepared for the LoRa Alliance Gemalto Actility and Semtech"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.4236\/ait.2012.21001"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600363CM"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2019.8702450"},{"key":"ref10","year":"2019","journal-title":"LoRa Alliance"},{"key":"ref11","year":"2019","journal-title":"SigFox"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/SAS.2019.8705992"},{"key":"ref12","year":"2019","journal-title":"Weightless"},{"key":"ref13","year":"2019","journal-title":"Wi-Fi HaLow"},{"key":"ref14","first-page":"1","article-title":"Device identification and personal data attestation in networks","volume":"9","author":"gritti","year":"2018","journal-title":"J Wireless Mobile Netw Ubiquitous Comput Dependable Appl"},{"key":"ref15","first-page":"54","article-title":"Applying big data processing and machine learning methods for mobile Internet of Things security monitoring","volume":"8","author":"kotenko","year":"2018","journal-title":"J Internet Services Inf Secur"},{"key":"ref16","year":"2001","journal-title":"Announcing the Advanced Encryption Standard (AES)"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2003.1258477"},{"key":"ref18","first-page":"1","article-title":"Low power wireless scenarios and techniques for saving bandwidth without sacrificing security","author":"mcgrew","year":"2015","journal-title":"NIST Workshop on Lightweight Cryptography"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-011-0385-5"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2015.2417684"},{"key":"ref3","first-page":"1","article-title":"WuKong: Secure run-time environment and data-driven IoT applications for smart cities and smart buildings","volume":"8","author":"shih","year":"2018","journal-title":"J Internet Services Inf Secur"},{"key":"ref6","article-title":"Ericsson mobility report","author":"cerwall","year":"2018"},{"key":"ref5","first-page":"42","article-title":"PPM: Privacy policy manager for home energy management system","volume":"9","author":"rahman","year":"2018","journal-title":"J Wireless Mobile Netw Ubiquitous Comput Dependable Appl"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3281022.3281025"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3390\/s18041282"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.3390\/fi11010003"},{"key":"ref9","author":"flore","year":"2016","journal-title":"3GPP standards for the Internet-of-Things"},{"key":"ref46","first-page":"198","article-title":"Multiplicative masking and power analysis of AES","author":"goli?","year":"2002","journal-title":"Proc 9th Int Workshop Cryptograph Hardw Embed Syst (CHES)"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30564-4_5"},{"key":"ref48","first-page":"1","article-title":"Survey on blockchain for Internet of Things","volume":"9","author":"hui","year":"2019","journal-title":"J Internet Services Inf Secur"},{"key":"ref47","first-page":"41","article-title":"Security of 5G-mobile backhaul networks: A survey","volume":"9","author":"choudhary","year":"2018","journal-title":"J Wireless Mobile Netw Ubiquitous Comput Dependable Appl"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA.2017.73"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2014.2335651"},{"key":"ref44","first-page":"493","article-title":"A LoRaWAN based energy efficient data encryption method","author":"tsai","year":"2019","journal-title":"Proc Int Conf Innov Mobile Internet Services Ubiquitous Comput"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ISBA.2018.8311466"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8600701\/08840874.pdf?arnumber=8840874","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,10]],"date-time":"2021-08-10T19:40:19Z","timestamp":1628624419000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8840874\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":50,"URL":"https:\/\/doi.org\/10.1109\/access.2019.2941972","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]}}}