{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:31:15Z","timestamp":1759332675876,"version":"3.44.0"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2016,12,1]],"date-time":"2016-12-01T00:00:00Z","timestamp":1480550400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2016,12,1]],"date-time":"2016-12-01T00:00:00Z","timestamp":1480550400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/wf-iot.2016.7845511","type":"proceedings-article","created":{"date-parts":[[2017,2,9]],"date-time":"2017-02-09T16:42:54Z","timestamp":1486658574000},"page":"239-244","source":"Crossref","is-referenced-by-count":13,"title":["Data-centric security in military applications of commercial IoT technology"],"prefix":"10.1109","author":[{"given":"Konrad","family":"Wrona","sequence":"first","affiliation":[{"name":"NATO Communications and Information Agency, The Hague, Netherlands"}]},{"given":"Angel","family":"de Castro","sequence":"additional","affiliation":[{"name":"NATO Communications and Information Agency, The Hague, Netherlands"}]},{"given":"Bogdan","family":"Vasilache","sequence":"additional","affiliation":[{"name":"NATO Communications and Information Agency, The Hague, Netherlands"}]}],"member":"263","reference":[{"key":"ref10","first-page":"180","article-title":"New proof methods for attribute-based encryption: Achieving full security through selective techniques","author":"lewko","year":"2012","journal-title":"Advances in Cryptology CRYPTO"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-013-0057-3"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2015.2498900"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2015.7389105"},{"key":"ref14","first-page":"1","article-title":"Secure IoT framework and 2D architecture for End-To-End security","volume":"2","author":"choi","year":"2016","journal-title":"Journal of Supercomputing"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-015-0480-9"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-27763-9_8"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-1023-1_44"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICSAI.2014.7009337"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICCUBEA.2015.19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1952982.1952996"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICMCIS.2016.7496583"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/357369.357372"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.04.010"},{"key":"ref5","article-title":"A Common Approach to the Integration of Object Level Protection in NATO","author":"oudkerk","year":"2014","journal-title":"Proc of the STO Symposium on Cyber Security Science & Engineering"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"2314","DOI":"10.1016\/j.comcom.2007.04.009","article-title":"A survey of key management schemes in wireless sensor networks","volume":"30","author":"xiao","year":"2007","journal-title":"Computer Communications"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1016\/j.jnca.2009.10.001","article-title":"Wireless sensor network key management survey and taxonomy","volume":"33","author":"zhang","year":"2010","journal-title":"Journal of Network and Computer Applications"},{"key":"ref2","first-page":"227","article-title":"Foundations and Practice of Security","volume":"8352","author":"armando","year":"2013","journal-title":"Proc of the FPS"},{"key":"ref9","article-title":"Cryptographic Access Control in support of Object Level Protection","author":"oudkerk","year":"2013","journal-title":"Military Commun and Information Sys Conf (MCC)"},{"key":"ref1","article-title":"Internet of Military Things: Framework for the application of Internet of Things in the military domain","author":"gierlowski","year":"2014","journal-title":"Tech Rep"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MSPCT.2013.6782081"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-18491-3_7"},{"key":"ref21","first-page":"1","article-title":"Sensing service architecture for smart cities using social network platforms","author":"chifor","year":"2016","journal-title":"Soft Computing"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883405"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2358578"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7588283"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2753476.2753482"}],"event":{"name":"2016 IEEE 3rd World Forum on Internet of Things (WF-IoT)","start":{"date-parts":[[2016,12,12]]},"location":"Reston, VA, USA","end":{"date-parts":[[2016,12,14]]}},"container-title":["2016 IEEE 3rd World Forum on Internet of Things (WF-IoT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7831562\/7845389\/07845511.pdf?arnumber=7845511","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,14]],"date-time":"2025-08-14T18:43:35Z","timestamp":1755197015000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7845511\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/wf-iot.2016.7845511","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}