{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T16:42:51Z","timestamp":1765039371994,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/pst.2016.7906974","type":"proceedings-article","created":{"date-parts":[[2017,4,24]],"date-time":"2017-04-24T17:12:50Z","timestamp":1493053970000},"page":"275-281","source":"Crossref","is-referenced-by-count":4,"title":["Timestamp utilization in Trust-ND mechanism for securing Neighbor Discovery Protocol"],"prefix":"10.1109","author":[{"given":"Iznan H.","family":"Hasbullah","sequence":"first","affiliation":[]},{"given":"Mohammad M.","family":"Kadhum","sequence":"additional","affiliation":[]},{"given":"Yung-Wey","family":"Chong","sequence":"additional","affiliation":[]},{"given":"Kamal","family":"Alieyan","sequence":"additional","affiliation":[]},{"given":"Azlan","family":"Osman","sequence":"additional","affiliation":[]},{"family":"Supriyanto","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/570681.570690"},{"key":"ref11","first-page":"251","article-title":"Neighbor Discovery Protocol Anomaly Detection using Finite State Machine and Strict Anomaly Detection","author":"najjar","year":"2015","journal-title":"Proc 4th Int Conf Internet Applicat Protocol and Services"},{"key":"ref12","first-page":"70","article-title":"Worm propagation strategies in an IPv6 Internet","volume":"31","author":"bellovin","year":"2006","journal-title":"login"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6583"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6104"},{"journal-title":"Trust-ND Lightweight and Secured IPv6 Neighbor Discovery Using A Distributed Trust Mechanism","year":"2015","key":"ref15"},{"key":"ref16","first-page":"324","article-title":"The beta reputation system","author":"j\u00f8sang","year":"2002","journal-title":"Proc 15th Bled Electronic Commerce Conf"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1201\/9781439821916.ch9"},{"journal-title":"Internet Control Message Protocol version 6 (ICMPv6) Parameters","year":"2016","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/304851.304857"},{"key":"ref4","article-title":"Experimentation and Evaluation of IPv6 Secure Neighbor Discovery Protocol","author":"pohl","year":"2007","journal-title":"Naval Postgraduate School"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.17487\/rfc0781"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIT.2007.403"},{"key":"ref6","article-title":"Easy-SEND: A Didactic Implementation of the Secure Neighbor Discovery Protocol for IPv6","author":"chiu","year":"2009","journal-title":"Proc World Congr Eng Comput Sci"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.27"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4301"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3971"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2463"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3756"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4861"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.11591\/telkomnika.v13i1.6929"},{"key":"ref22","article-title":"IPv6 Stateless Address Auto-configuration","author":"thomson","year":"2007","journal-title":"RFC4862"},{"key":"ref21","article-title":"Timestamps and authentication protocols","author":"mitchell","year":"2005","journal-title":"Dept Math Univ of London Surrey UK Tech Rep RHUL-MA-2005&#x2013;3"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/0306-4379(93)90034-X"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.1993.246633"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2007.06.004"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23090"}],"event":{"name":"2016 14th Annual Conference on Privacy, Security and Trust (PST)","start":{"date-parts":[[2016,12,12]]},"location":"Auckland, New Zealand","end":{"date-parts":[[2016,12,14]]}},"container-title":["2016 14th Annual Conference on Privacy, Security and Trust (PST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7899233\/7906913\/07906974.pdf?arnumber=7906974","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,5,22]],"date-time":"2017-05-22T17:49:14Z","timestamp":1495475354000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7906974\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/pst.2016.7906974","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}