{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T18:43:56Z","timestamp":1768070636565,"version":"3.49.0"},"reference-count":26,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2014,3,1]],"date-time":"2014-03-01T00:00:00Z","timestamp":1393632000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/USG.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Smart Grid"],"published-print":{"date-parts":[[2014,3]]},"DOI":"10.1109\/tsg.2013.2277963","type":"journal-article","created":{"date-parts":[[2013,9,13]],"date-time":"2013-09-13T18:10:10Z","timestamp":1379095810000},"page":"550-558","source":"Crossref","is-referenced-by-count":32,"title":["Smart Grid Mesh Network Security Using Dynamic Key Distribution With Merkle Tree 4-Way Handshaking"],"prefix":"10.1109","volume":"5","author":[{"given":"Bin","family":"Hu","sequence":"first","affiliation":[]},{"given":"Hamid","family":"Gharavi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Wireless sensor networks for clinical information systems: A security perspective","author":"mi?ic","year":"2006","journal-title":"Proc IEEE Int Conf Distrib Comput Syst Workshops (ICDCS)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MOBHOC.2009.5336925"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MASS.2010.5663966"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT.2013.6497909"},{"key":"ref14","year":"2006","journal-title":"?Efficient mesh security and link establishment ?"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1023646.1023655"},{"key":"ref16","year":"2004","journal-title":"Standard for Local and Metropolitan Area Networks Port-Based Network Access Control"},{"key":"ref17","year":"1999","journal-title":"Standard for Information Technology?Telecommunications and Information Exchange Between Systems?LAN\/MAN Specific Requirements Part 11 Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/IITA.2009.275"},{"key":"ref19","year":"0","journal-title":"Secure Hash Standard SHA-1"},{"key":"ref4","year":"2012","journal-title":"Part 15 4 Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (WPANs)?Amendment 4 Physical Layer Specifications for Low Data Rate Wireless Smart Metering Utility Networks"},{"key":"ref3","year":"2006","journal-title":"Draft Amendment to Standard for Information Technology?Telecommunications and Information Exchange Between Systems?LAN\/MAN Specific Requirements?Part 11 Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment ESS Mesh Networking"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2123851"},{"key":"ref5","year":"0","journal-title":"ZigBee Specification ZigBee Document 053474r17"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2009.59"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2167354"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/PECon.2012.6450339"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2159818"},{"key":"ref1","first-page":"994","article-title":"Smart grid?The new and improved power grid: A survey","author":"feng","year":"2012","journal-title":"IEEE Commun Surveys Tuts"},{"key":"ref20","year":"0","journal-title":"Secure Hash Standard SHA-1"},{"key":"ref22","first-page":"972","article-title":"A secure hybrid wireless mesh protocol for 802.11s mesh network","author":"islam","year":"0","journal-title":"Proc Int Conf Comput Sci Its Appl Part I (ICCSA'08)"},{"key":"ref21","first-page":"218","article-title":"A certified digital signature (subtitle: That antique paper from 1979)","volume":"435","author":"merkle","year":"1990","journal-title":"In Proceedings of Crypto 1989"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1007\/978-3-540-24676-3_32","article-title":"Merkle tree traversal in log space and time","volume":"3027","author":"szydlo","year":"0","journal-title":"Proc Eurocrypt 2004"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2008.4664310"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2010.5735848"},{"key":"ref25","article-title":"An automatic security protocol verifier based on resolution theorem proving (invited tutorial)","author":"blanchet","year":"0","journal-title":"Proc 20th Int'l Conf Automated Deduction (CADE 05)"}],"container-title":["IEEE Transactions on Smart Grid"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/5165411\/6740878\/06599007.pdf?arnumber=6599007","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:24:38Z","timestamp":1642004678000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6599007\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,3]]},"references-count":26,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tsg.2013.2277963","relation":{},"ISSN":["1949-3053","1949-3061"],"issn-type":[{"value":"1949-3053","type":"print"},{"value":"1949-3061","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,3]]}}}