{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T07:30:00Z","timestamp":1750750200118},"reference-count":13,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1109\/wcncw.2019.8902746","type":"proceedings-article","created":{"date-parts":[[2019,11,25]],"date-time":"2019-11-25T18:44:54Z","timestamp":1574707494000},"page":"1-6","source":"Crossref","is-referenced-by-count":9,"title":["Enabling End-to-End Secure Connectivity for Low-Power IoT Devices with UAVs"],"prefix":"10.1109","author":[{"given":"Archana","family":"Rajakaruna","sequence":"first","affiliation":[]},{"given":"Ahsan","family":"Manzoor","sequence":"additional","affiliation":[]},{"given":"Pawani","family":"Porambage","sequence":"additional","affiliation":[]},{"given":"Madhusanka","family":"Liyanage","sequence":"additional","affiliation":[]},{"given":"Mika","family":"Ylianttila","sequence":"additional","affiliation":[]},{"given":"Andrei","family":"Gurtov","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"DJI Specs","year":"0","key":"ref10"},{"journal-title":"Libelium","year":"0","key":"ref11"},{"journal-title":"Practical BLE Throughput","year":"0","key":"ref12"},{"journal-title":"Raspberry Pi Power","year":"0","key":"ref13"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2849509"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2579198"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2019.8651711"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2765344"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7470933"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2018.8449780"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2014.2298837"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2444095"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2775042"}],"event":{"name":"2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW)","start":{"date-parts":[[2019,4,15]]},"location":"Marrakech, Morocco","end":{"date-parts":[[2019,4,18]]}},"container-title":["2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8893977\/8902334\/08902746.pdf?arnumber=8902746","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,19]],"date-time":"2022-07-19T20:23:14Z","timestamp":1658262194000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8902746\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/wcncw.2019.8902746","relation":{},"subject":[],"published":{"date-parts":[[2019,4]]}}}