{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T13:27:12Z","timestamp":1774358832398,"version":"3.50.1"},"reference-count":35,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/100000015","name":"Department of Energy","doi-asserted-by":"crossref","id":[{"id":"10.13039\/100000015","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Smart Grid"],"published-print":{"date-parts":[[2015]]},"DOI":"10.1109\/tsg.2015.2499766","type":"journal-article","created":{"date-parts":[[2015,12,3]],"date-time":"2015-12-03T19:07:15Z","timestamp":1449169635000},"page":"1-10","source":"Crossref","is-referenced-by-count":28,"title":["Security Implications of Transport Layer Protocols in Power Grid Synchrophasor Data Communication"],"prefix":"10.1109","author":[{"given":"Yujue","family":"Wang","sequence":"first","affiliation":[]},{"given":"Thoshitha T.","family":"Gamage","sequence":"additional","affiliation":[]},{"given":"Carl H.","family":"Hauser","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1007\/11761679_2","article-title":"Cryptography in theory and practice: The case of encryption in IPsec","author":"paterson","year":"2006","journal-title":"Advances in Cryptology&#x2014;EUROCRYPT 2006"},{"key":"ref32","article-title":"A cryptographic evaluation of IPsec","author":"ferguson","year":"2000"},{"key":"ref31","article-title":"A constructive analysis of IPsec","author":"jost","year":"2014"},{"key":"ref30","article-title":"Simple-VPN: Simple IPsec configuration","author":"srivatsan","year":"2010"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2004.1378370"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866363"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.130712"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6257523"},{"key":"ref12","author":"morris","year":"1985","journal-title":"A weakness in the 4 2BSD Unix TCP\/IP Software"},{"key":"ref13","first-page":"2","article-title":"Simple active attack against TCP","volume":"2","author":"joncheray","year":"1995","journal-title":"Proc 50th IEEE Conf Decis Control Eur Control Conf (CDC-ECC)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/S0140-3664(99)00064-X"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.29"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382258"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/EPEC.2009.5420809"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.010912.00035"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.5121\/ijdps.2012.3611"},{"key":"ref28","author":"tiller","year":"2001","journal-title":"A Technical Guide to IPSec Virtual Private Networks"},{"key":"ref4","first-page":"1","year":"2011"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4301"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2013.2279182"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1952982.1952995"},{"key":"ref29","author":"doraswamy","year":"2002","journal-title":"IPsec"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653666"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2010.5717318"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622046"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2011.2106805"},{"key":"ref1","first-page":"1","article-title":"Synchrophasor standards development&#x2014;IEEE C37.118 & IEC 61850","author":"martin","year":"2011","journal-title":"Proc Hawaii Int Conf System Science (HICSS)"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2011.6160641"},{"key":"ref20","year":"1981","journal-title":"Transmission Control Protocol Internet Requests for Comments RFC Editor RFC 793"},{"key":"ref22","author":"dierks","year":"2008","journal-title":"The Transport Layer Security (TLS) Protocol Version 1 2 Internet Requests for Comments RFC Editor RFC 5246"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT.2013.6497785"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2003.10.003"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.42"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/MPAE.2005.1405870"},{"key":"ref25","article-title":"The design and implementation of datagram TLS","author":"modadugu","year":"2004","journal-title":"Proc Network and Distributed System Security Symp (NDSS)"}],"container-title":["IEEE Transactions on Smart Grid"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/5165411\/7410169\/7346493.pdf?arnumber=7346493","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:47:35Z","timestamp":1642006055000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7346493\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/tsg.2015.2499766","relation":{},"ISSN":["1949-3053","1949-3061"],"issn-type":[{"value":"1949-3053","type":"print"},{"value":"1949-3061","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]}}}