{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T18:40:26Z","timestamp":1755801626834,"version":"3.44.0"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.1109\/indin41052.2019.8972080","type":"proceedings-article","created":{"date-parts":[[2020,1,31]],"date-time":"2020-01-31T00:16:43Z","timestamp":1580429803000},"page":"425-431","source":"Crossref","is-referenced-by-count":1,"title":["Security in Wireless Sensor Networks: A formal verification of protocols"],"prefix":"10.1109","author":[{"given":"Giann Spilere","family":"Nandi","sequence":"first","affiliation":[{"name":"CISTER - Research Centre in Real-Time &#x0026; Embedded Computing Systems,Portugal"}]},{"given":"David","family":"Pereira","sequence":"additional","affiliation":[{"name":"CISTER - Research Centre in Real-Time &#x0026; Embedded Computing Systems,Portugal"}]},{"given":"Mart\u00edn","family":"Vigil","sequence":"additional","affiliation":[{"name":">Universidade Federal de Santa Catarina,Brazil"}]},{"given":"Ricardo","family":"Moraes","sequence":"additional","affiliation":[{"name":">Universidade Federal de Santa Catarina,Brazil"}]},{"given":"Anal\u00facia Schiaffino","family":"Morales","sequence":"additional","affiliation":[{"name":">Universidade Federal de Santa Catarina,Brazil"}]},{"given":"Gustavo","family":"Ara\u00fajo","sequence":"additional","affiliation":[{"name":">Universidade Federal de Santa Catarina,Brazil"}]}],"member":"263","reference":[{"article-title":"A survey of attacks, security mechanisms and challenges in wireless sensor networks","year":"0","author":"padmavathi","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.1997.596782"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/INSS.2008.4610921"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2012.6423591"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICACA.2016.7887963"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1007\/s00165-012-0269-9","article-title":"Formal verification of security protocol implementations: a survey","volume":"26","author":"avalle","year":"2012","journal-title":"Formal Aspects of Computing"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"ref17","first-page":"339","author":"nguyen","year":"2016","journal-title":"Authenticated Key Agreement Mediated by a Proxy Re-encryptor for the Internet of Things"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.40"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2014.01.011"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"1309","DOI":"10.1002\/sec.256","article-title":"KALwEN: a new practical and interoperable key management scheme for body sensor networks","volume":"4","author":"law","year":"2010","journal-title":"Security and Communication Networks"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICIN.2015.7073822"},{"key":"ref27","article-title":"Modelling and analysing a wsn secure aggregation protocol : A comparison of languages and tool support","author":"cambazoglu","year":"2015","journal-title":"Uppsala University Computing Science Tech Rep 2015-033"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2779844"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.protcy.2012.10.119"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.bushor.2015.03.008"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/359657.359659"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"2556","DOI":"10.1016\/j.comcom.2006.02.006","article-title":"A lightweight secure protocol for wireless sensor networks","volume":"29","author":"sun","year":"2006","journal-title":"Computer Communications"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2015.09.021"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(95)00144-2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MIE.2017.2649104"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/VNC.2013.6737613"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1561\/3300000004"},{"journal-title":"Cryptography and Network Security Principles and Practice","year":"2010","author":"stallings","key":"ref21"},{"journal-title":"Proverif 1 86pl3 Automatic Cryptographic Protocol Verifier User Manual and Tutorial","year":"2017","author":"blanchet","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1993.287633"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2673239"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC.2018.8301746"}],"event":{"name":"2019 IEEE 17th International Conference on Industrial Informatics (INDIN)","start":{"date-parts":[[2019,7,22]]},"location":"Helsinki, Finland","end":{"date-parts":[[2019,7,25]]}},"container-title":["2019 IEEE 17th International Conference on Industrial Informatics (INDIN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8961950\/8972012\/08972080.pdf?arnumber=8972080","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,20]],"date-time":"2025-08-20T18:35:38Z","timestamp":1755714938000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8972080\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/indin41052.2019.8972080","relation":{},"subject":[],"published":{"date-parts":[[2019,7]]}}}