{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:21:52Z","timestamp":1759134112830,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,3]]},"DOI":"10.1109\/wcnc.2015.7127747","type":"proceedings-article","created":{"date-parts":[[2015,6,18]],"date-time":"2015-06-18T16:06:10Z","timestamp":1434643570000},"page":"1835-1840","source":"Crossref","is-referenced-by-count":15,"title":["Strong authentication countermeasures using dynamic keying for sinkhole and distance spoofing attacks in smart grid networks"],"prefix":"10.1109","author":[{"given":"Clark","family":"Taylor","sequence":"first","affiliation":[]},{"given":"Thienne","family":"Johnson","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2014.2332107"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1281492.1281494"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/794326"},{"key":"ref13","article-title":"Network security architecture for demand response\/sensor networks","author":"subrahamanyam","year":"2006","journal-title":"Tech Rep"},{"key":"ref4","article-title":"Routing requirements for urban low-power and lossy networks","author":"dohler","year":"2009","journal-title":"RFC 5548"},{"key":"ref3","article-title":"Industrial routing requirements in low-power and lossy networks","author":"pister","year":"2009","journal-title":"RFC 5673"},{"key":"ref6","article-title":"Applicability statement for the routing protocol for low power and lossy networks RPL in AMI networks","author":"popa","year":"2011","journal-title":"Internet draft"},{"key":"ref5","article-title":"Building automation routing requirements in low-power and lossy networks","author":"martocci","year":"2010","journal-title":"RFC 5867"},{"article-title":"Wireless mesh routing in smart utility networks","year":"0","author":"iyer","key":"ref8"},{"year":"2013","key":"ref7","article-title":"Wireless sensor network simulator"},{"key":"ref2","article-title":"Home automation routing requirements in low-power and lossy networks","author":"brandt","year":"2010","journal-title":"RFC 5826"},{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.5120\/7446-0401","article-title":"Performance analysis of rip, ospf, igrp and eigrp routing protocols in a network","volume":"48","author":"rakheja","year":"2012","journal-title":"International Journal of Computer Applications"},{"article-title":"A byte-oriented aes-256 implementation","year":"2007","author":"levin","key":"ref9"}],"event":{"name":"2015 IEEE Wireless Communications and Networking Conference (WCNC)","start":{"date-parts":[[2015,3,9]]},"location":"New Orleans, LA","end":{"date-parts":[[2015,3,12]]}},"container-title":["2015 IEEE Wireless Communications and Networking Conference (WCNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7121206\/7127309\/07127747.pdf?arnumber=7127747","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T10:03:36Z","timestamp":1498212216000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7127747\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,3]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/wcnc.2015.7127747","relation":{},"subject":[],"published":{"date-parts":[[2015,3]]}}}