{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T09:48:14Z","timestamp":1730281694055,"version":"3.28.0"},"reference-count":35,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1109\/medhocnet.2017.8001657","type":"proceedings-article","created":{"date-parts":[[2017,8,10]],"date-time":"2017-08-10T16:41:50Z","timestamp":1502383310000},"page":"1-7","source":"Crossref","is-referenced-by-count":1,"title":["\u03bcDTNSec: a security layer for disruption-tolerant networks on microcontrollers"],"prefix":"10.1109","author":[{"given":"Dominik","family":"Sch\u00fcrmann","sequence":"first","affiliation":[]},{"given":"Georg","family":"von Zengen","sequence":"additional","affiliation":[]},{"given":"Marvin","family":"Priedigkeit","sequence":"additional","affiliation":[]},{"given":"Lars","family":"Wolf","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s102070100002"},{"journal-title":"SECG","article-title":"SEC1: Elliptic curve cryptography","year":"2009","key":"ref32"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICSENS.2012.6411295"},{"journal-title":"SECG","article-title":"SEC 2: Recommended elliptic curve domain parameters","year":"2010","key":"ref30"},{"journal-title":"Performance Comparison of Elliptic Curve and RSA Digital Signatures","year":"2004","author":"jansma","key":"ref35"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2016.7732981"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/WCSP.2015.7341252"},{"key":"ref11","article-title":"DTNLite: A Reliable Data Transfer Architecture for Sensor Networks","author":"rabin patra","year":"2003","journal-title":"CS294-1 Deeply Embedded Networks (Lecture)"},{"key":"ref12","first-page":"119","article-title":"Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs","author":"gura","year":"2004","journal-title":"Cryptographic Hardware and Embedded Systems (CHES)"},{"journal-title":"NIST","article-title":"Recommendation for Key Management","year":"2016","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2007.04.009"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77690-1_19"},{"key":"ref16","article-title":"Pairing-based cryptography for sensor networks","author":"oliveira","year":"2006","journal-title":"5th IEEE International Symposium on Network Computing and Applications"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.05.013"},{"journal-title":"RELIC Is An Efficient LIbrary for Cryptography","year":"0","author":"aranha","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/LCNW.2012.6424089"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2378783"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6257"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1007\/978-3-642-04766-4_10","article-title":"ContikiSec: A secure network layer for wireless sensor networks under the contiki operating system","author":"casado","year":"2009","journal-title":"Identity and Privacy in the Internet Age"},{"key":"ref3","article-title":"An Overview of &#x00B5;DTN: Unifying DTNs and WSNs","author":"von zengen","year":"2012","journal-title":"Proceedings of the 11th GI\/ITG KuVS Fachgespra?ch Drahtlose Sensornetze (FGSN)"},{"journal-title":"DTN2 Reference Implementation","year":"0","key":"ref6"},{"journal-title":"BG","article-title":"AVR-Crypto-Lib","year":"0","key":"ref29"},{"key":"ref5","first-page":"1","article-title":"IBR-DTN: A lightweight, modular and highly portable bundle protocol implementation","volume":"37","author":"schildt","year":"2011","journal-title":"Electronic Communications of the EASST"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MASS.2012.6502520"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6260"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5050"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MASS.2016.039"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2337336"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2593069.2593238"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/NetSys.2017.7903957"},{"journal-title":"Atmel corporation","article-title":"AT86RF231\/ZU\/ZF datasheet","year":"0","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/WONS.2011.5720202"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1031495.1031515"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2008.47"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2007.4379708"}],"event":{"name":"2017 16th Annual Mediterranean Ad-Hoc Networking Workshop (Med-Hoc-Net)","start":{"date-parts":[[2017,6,28]]},"location":"Budva","end":{"date-parts":[[2017,6,30]]}},"container-title":["2017 16th Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8000696\/8001634\/08001657.pdf?arnumber=8001657","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,9]],"date-time":"2020-04-09T23:35:45Z","timestamp":1586475345000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8001657\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/medhocnet.2017.8001657","relation":{},"subject":[],"published":{"date-parts":[[2017,6]]}}}