{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:45:16Z","timestamp":1729619116118,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1109\/ecai.2014.7090224","type":"proceedings-article","created":{"date-parts":[[2015,4,25]],"date-time":"2015-04-25T01:08:09Z","timestamp":1429924089000},"page":"55-60","source":"Crossref","is-referenced-by-count":3,"title":["An analysis of security and communication constraints of IPv6-based Sensor Networks"],"prefix":"10.1109","author":[{"given":"Ionela","family":"Halcu","sequence":"first","affiliation":[]},{"given":"Grigore","family":"Stamatescu","sequence":"additional","affiliation":[]},{"given":"Iulia","family":"Stamatescu","sequence":"additional","affiliation":[]},{"given":"Valentin","family":"Sgarciu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Security in IPv6-enabled Wireless Sensor Networks: An Implementation of TLS \/ DTLS for the Contiki Operating System","author":"perelman","year":"2012","journal-title":"Journal of University"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2012.06.144"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2014.05.005"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/WD.2010.5657743"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2010.5684293"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1851275.1851273"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2013.2259691"},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.1002\/9780470686218","author":"shelby","year":"2009","journal-title":"6LoWPAN The Wireless Embedded Internet"},{"article-title":"The Contiki OS - The Operating System for the Internet of Things","year":"0","author":"dunkels","key":"ref3"},{"key":"ref6","article-title":"A sensor network simulator for the Contiki OS","author":"osterlind","year":"2006","journal-title":"SICS Research Report"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1460412.1460483"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.4108\/ICST.SIMUTOOLS2009.5637"},{"key":"ref7","first-page":"79","article-title":"IPv6 Routing Protocol for Low Power and Lossy Sensor Networks Simulation Studies","volume":"14","author":"saad","year":"2012","journal-title":"Sensors Transducers J"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1007\/978-3-642-04766-4_10","article-title":"Contikisec: A secure network layer for wireless sensor networks under the contiki operating system","author":"casado","year":"2009","journal-title":"Proceedings of the 14th Nordic Conference on Secure IT Systems Identity and Privacy in the Internet Age"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1007\/s11235-008-9131-z","article-title":"Model checking wireless sensor network security protocols: TinySec + LEAP + TinyPK","volume":"40","author":"tobarra","year":"2008","journal-title":"Telecommun Syst"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MSNA.2012.6324525"}],"event":{"name":"2014 6th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","start":{"date-parts":[[2014,10,23]]},"location":"Bucharest, Romania","end":{"date-parts":[[2014,10,25]]}},"container-title":["Proceedings of the 2014 6th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7083368\/7090132\/07090224.pdf?arnumber=7090224","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,9]],"date-time":"2023-08-09T19:53:05Z","timestamp":1691610785000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7090224\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/ecai.2014.7090224","relation":{},"subject":[],"published":{"date-parts":[[2014,10]]}}}