{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T14:13:02Z","timestamp":1773843182062,"version":"3.50.1"},"reference-count":9,"publisher":"IEEE","license":[{"start":{"date-parts":[[2018,6,1]],"date-time":"2018-06-01T00:00:00Z","timestamp":1527811200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2018,6,1]],"date-time":"2018-06-01T00:00:00Z","timestamp":1527811200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1109\/iwcmc.2018.8450310","type":"proceedings-article","created":{"date-parts":[[2018,8,30]],"date-time":"2018-08-30T22:00:16Z","timestamp":1535666416000},"page":"249-254","source":"Crossref","is-referenced-by-count":5,"title":["A Simple Approach for Securing IoT Data Transmitted over Multi-RATs"],"prefix":"10.1109","author":[{"given":"Rida","family":"Diba","sequence":"first","affiliation":[{"name":"Faculty of Computer Studies, Arab Open University, Beirut, Lebanon"}]},{"given":"Elias","family":"Yaacoub","sequence":"additional","affiliation":[{"name":"Faculty of Computer Studies, Arab Open University, Beirut, Lebanon"}]},{"given":"Mohammed","family":"Al-Husseini","sequence":"additional","affiliation":[{"name":"Beirut Research and Innovation Center (BRIC), Beirut, Lebanon"}]},{"given":"Hassan","family":"Noura","sequence":"additional","affiliation":[{"name":"Faculty of Computer Studies, Arab Open University, Beirut, Lebanon"}]},{"given":"Khalid","family":"Abualsaud","sequence":"additional","affiliation":[{"name":"Dept. of Computer Science &#x0026; Engineering, Qatar University, Doha, P.O. Box 2713, Qatar"}]},{"given":"Tamer","family":"Khattab","sequence":"additional","affiliation":[{"name":"Dept. of Electrical Engineering, College of Engineering, Qatar University, Doha, P.O. Box 2713, Qatar"}]},{"given":"Mohsen","family":"Guizani","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Idaho, Moscow, ID, USA"}]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2015.7347982"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2437951"},{"key":"ref6","author":"nayan","year":"0","journal-title":"Wireless Body Area Network"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/BIBE.2015.7367689"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1016\/j.jnca.2017.01.008","article-title":"An optimized approach to video traffic splitting in heterogeneous wireless networks with energy and QoE considerations","volume":"83","author":"abbas","year":"2017","journal-title":"Journal of Network and Computer Applications (Elsevier)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2014.6952687"},{"key":"ref2","first-page":"8","article-title":"Survey on Wireless Body Area Sensor Networks for healthcare applications: Signal Processing, data analysis and feedback","author":"abualsaud","year":"2011","journal-title":"in the Proc of the 3rd Inter Conf on Computing and Informatics ICOCI2011"},{"key":"ref9","article-title":"DAWWSEN: A Defense Mechanism Against Wormhole Attacks in Wireless Sensor Networks","author":"el kaissi","year":"2005","journal-title":"International Conference on Innovations in Information Technology (IIT&#x2019;05)"},{"key":"ref1","first-page":"55","article-title":"Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey","author":"kumar","year":"2012","journal-title":"SENSORS"}],"event":{"name":"2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC)","location":"Limassol, Cyprus","start":{"date-parts":[[2018,6,25]]},"end":{"date-parts":[[2018,6,29]]}},"container-title":["2018 14th International Wireless Communications &amp; Mobile Computing Conference (IWCMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8410977\/8450266\/08450310.pdf?arnumber=8450310","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,14]],"date-time":"2022-11-14T22:04:05Z","timestamp":1668463445000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8450310\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1109\/iwcmc.2018.8450310","relation":{},"subject":[],"published":{"date-parts":[[2018,6]]}}}