{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T14:48:38Z","timestamp":1773413318137,"version":"3.50.1"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1109\/cns.2014.6997467","type":"proceedings-article","created":{"date-parts":[[2014,12,30]],"date-time":"2014-12-30T23:15:04Z","timestamp":1419981304000},"page":"67-72","source":"Crossref","is-referenced-by-count":104,"title":["Securing smart home: Technologies, security challenges, and security requirements"],"prefix":"10.1109","author":[{"given":"Changmin","family":"Lee","sequence":"first","affiliation":[]},{"given":"Luca","family":"Zappaterra","sequence":"additional","affiliation":[]},{"family":"Kwanghee Choi","sequence":"additional","affiliation":[]},{"family":"Hyeong-Ah Choi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","author":"ngak","year":"0","journal-title":"Hacked Iphone Chargers Could Let Snoops Spy on Devices"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/384264.379006"},{"key":"18","author":"lawson","year":"0","journal-title":"Reverse-engineering A Smart Meter"},{"key":"15","article-title":"A survey on wireless sensor network security","volume":"1","author":"sen","year":"2009","journal-title":"International Journal of Computer Network and Information Security"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2009.090404"},{"key":"13","article-title":"Constrained application protocol (coap), draft-ietf-core-coap-13","author":"shelby","year":"2012","journal-title":"Orlando The Internet Engineering Task Force-IETF Dec"},{"key":"14","first-page":"119","article-title":"Comparing elliptic curve cryptography and rsa on 8-bit cpus","volume":"2004","author":"gura","year":"2004","journal-title":"Cryptographic Hardware and Embedded Systems-CHES"},{"key":"11","author":"hui","year":"2013","journal-title":"Multicast Protocol for Low Power and Lossy Networks (mpl)"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6120"},{"key":"21","first-page":"104","article-title":"Gts attack: An ieee 802.15. 4 mac layer attack in wireless sensor networks","volume":"2","author":"sokullu","year":"2009","journal-title":"International Journal on Advances in Internet Technology"},{"key":"20","article-title":"Killerbee-practical zigbee exploitation framework","author":"wright","year":"2009","journal-title":"Toorcon11"},{"key":"22","doi-asserted-by":"crossref","first-page":"103","DOI":"10.3233\/JCS-2007-15105","article-title":"Detecting ieee 802.11 mac layer misbehavior in ad hoc networks: Robust strategies against individual and colluding attackers","volume":"15","author":"radosavac","year":"2007","journal-title":"Journal of Computer Security"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2005.1577958"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2356"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/ISADS.2009.5207373"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/794326"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1016\/S1570-8705(03)00008-8"},{"key":"28","article-title":"Taxonomy of security attacks in sensor networks and countermeasures","author":"roosta","year":"2006","journal-title":"The First IEEE International Conference on System Integration and Reliability Improvements"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2002.1039518"},{"key":"3","year":"0","journal-title":"Belkin Patches Massive Smart Home Device Vulnerability"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.01.010"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6550"},{"key":"1","doi-asserted-by":"crossref","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","article-title":"The internet of things: A survey","volume":"54","author":"atzori","year":"2010","journal-title":"Computer Networks"},{"key":"30","year":"0","journal-title":"Xmpploit"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-27139-2_7"},{"key":"6","first-page":"157","article-title":"Case study of a black hole attack on 6lowpan-rpl","author":"chugh","year":"2012","journal-title":"SECURWARE 2012 the Sixth International Conference on Emerging Security Information Systems and Technologies"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2004.38"},{"key":"4","year":"0","journal-title":"Hacking Home Automation Systems through your Power Lines"},{"key":"9","article-title":"6lowpan: Incorporating ieee 802.15. 4 into the ip architecture","author":"hui","year":"2009","journal-title":"IPSO Alliance White Paper #2"},{"key":"8","author":"baccelli","year":"2012","journal-title":"Riot One Os to Rule Them All in the Iot"}],"event":{"name":"2014 IEEE Conference on Communications and Network Security (CNS)","location":"San Francisco, CA, USA","start":{"date-parts":[[2014,10,29]]},"end":{"date-parts":[[2014,10,31]]}},"container-title":["2014 IEEE Conference on Communications and Network Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6982337\/6997445\/06997467.pdf?arnumber=6997467","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T11:20:57Z","timestamp":1602674457000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6997467"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/cns.2014.6997467","relation":{},"subject":[],"published":{"date-parts":[[2014,10]]}}}