{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T19:54:30Z","timestamp":1725393270740},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1109\/ecai.2017.8166389","type":"proceedings-article","created":{"date-parts":[[2017,12,7]],"date-time":"2017-12-07T23:31:59Z","timestamp":1512689519000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Authentication mechanism for data gathering protocol in wireless sensor networks"],"prefix":"10.1109","author":[{"given":"Alexandru-Valentin","family":"Vladuta","sequence":"first","affiliation":[]},{"given":"Victor-Valeriu","family":"Patriciu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"MAWSN-manifold authentication in wireless sensor network","author":"ambika","year":"2013","journal-title":"WorId Congress on Information and Communication Technologies (WICT)"},{"key":"ref11","article-title":"Lite-IDE based hierarchical node authentication protocol for energy efficient in WSN","author":"cho","year":"2014","journal-title":"Ninth International Conference on Computational Intelligence and Security"},{"key":"ref12","article-title":"Ticket-based authentication protocol for underwater wireless sensor network","author":"yun","year":"2016","journal-title":"International Conference on Ubiquitous and Future Networks (ICUFN"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.1023\/A:1019102017510","article-title":"The new intrusion prevention and detection approaches for clustering-based sensor networks","author":"su","year":"0","journal-title":"Wireless Communications and Networking Conference"},{"key":"ref14","article-title":"Modeling and analysis of LEAP, a key management protocol for wireless sensor networks","author":"verma","year":"2013","journal-title":"10th Annual IEEE Communications Society Conference on Sensor Mesh and Ad Hoc Communications and Networks (SECON)"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/APCC.2016.7581460"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICEEOT.2016.7755272"},{"journal-title":"Implementation of ECC with Hidden Generator Point in Wireless Sensor Network","year":"2014","author":"kodali","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICCDA.2010.5541288"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ISSNIP.2015.7106939"},{"journal-title":"Internet of mobile things Mobility-driven challenges designs and implementations","year":"2016","author":"nahrstedt","key":"ref4"},{"key":"ref3","first-page":"660","article-title":"Medical application on internet of things","author":"zhao","year":"2011","journal-title":"International Conference on Computer Theory and Applications (ICCTA)"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICITST.2015.7412116"},{"journal-title":"Security Considerations in the IP-based Internet of Things","year":"2013","author":"garcia-morchon","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57186-7_25"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ZINC.2016.7513647"},{"journal-title":"On the application of IOT (Internet of Things) for securing industrial threats","year":"2014","author":"usman","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICICIP.2011.6008384"},{"key":"ref9","article-title":"An efficient authentication protocol and key establishment in dynamic WSN","author":"abd","year":"2016","journal-title":"6th International Conference on Information Communication and Management"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICASI.2016.7539800"},{"key":"ref21","article-title":"3-level secure Kerberos authentication for smart home systems using IoT","author":"gaikwad","year":"2016","journal-title":"International Conference on Next Generation Computing Technologies (NGCT)"}],"event":{"name":"2017 9th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","start":{"date-parts":[[2017,6,29]]},"location":"Targoviste","end":{"date-parts":[[2017,7,1]]}},"container-title":["2017 9th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8119309\/8166382\/08166389.pdf?arnumber=8166389","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,7]],"date-time":"2019-10-07T17:39:53Z","timestamp":1570469993000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8166389\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/ecai.2017.8166389","relation":{},"subject":[],"published":{"date-parts":[[2017,6]]}}}