{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:42:50Z","timestamp":1759333370317,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1109\/nextcomp.2019.8883600","type":"proceedings-article","created":{"date-parts":[[2019,10,29]],"date-time":"2019-10-29T00:25:08Z","timestamp":1572308708000},"page":"1-7","source":"Crossref","is-referenced-by-count":3,"title":["Securing Industrial Wireless Networks: Enhancing SDN with PhySec"],"prefix":"10.1109","author":[{"given":"Christoph","family":"Lipps","sequence":"first","affiliation":[]},{"given":"Dennis","family":"Krummacker","sequence":"additional","affiliation":[]},{"given":"Hans Dieter","family":"Schotten","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC.2015.7354602"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2779180"},{"key":"ref12","first-page":"563","article-title":"A Survey on SDN Based Security in Internet of Things","author":"kanagavelu","year":"2018","journal-title":"Future of Information and Communication Conference 2018 Advances in Information and Communication Networks"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/RoEduNet.2015.7311820"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2841113.2841117"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2014.7022913"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ATC.2016.7764761"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7081071"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2017.2784180"},{"key":"ref19","article-title":"Enabling Trust in IIoT: An PhySec Based Approach","author":"lipps","year":"2019","journal-title":"International Conference on Cyber Warfare and Security"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2018.06.232"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"1028","DOI":"10.1016\/j.procs.2015.05.099","article-title":"New Security Architecture for IoT Network","volume":"52","author":"flauzac","year":"2015","journal-title":"Procedia Computer Science"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/APCC.2015.7412534"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.041110.00022"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SpliTech.2016.7555946"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2982629"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2015.110"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MOBISECSERV.2018.8311440"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2018.8502561"},{"key":"ref22","article-title":"Physical Unclonable Functions for Device Authentication and Secret Key Generation","author":"suh","year":"2007","journal-title":"44th ACM\/IEEE Design Automation Conference"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586132"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.06.013"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICDIS.2018.00013"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567117"},{"key":"ref25","article-title":"You Believe You Understand What You Think I Said","author":"bardwell","year":"2004","journal-title":"The Truth About 802 11 Signal And Noise Metrics ADiscussion Clarifying Often-Misused 802 11 WLAN Terminologies\" Connect802 Coporation Tech Rep"}],"event":{"name":"2019 Conference on Next Generation Computing Applications (NextComp)","start":{"date-parts":[[2019,9,19]]},"location":"Mauritius","end":{"date-parts":[[2019,9,21]]}},"container-title":["2019 Conference on Next Generation Computing Applications (NextComp)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8882365\/8883436\/08883600.pdf?arnumber=8883600","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,19]],"date-time":"2022-07-19T20:23:01Z","timestamp":1658262181000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8883600\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/nextcomp.2019.8883600","relation":{},"subject":[],"published":{"date-parts":[[2019,9]]}}}