{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T09:48:26Z","timestamp":1729676906050,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1109\/etfa.2014.7005129","type":"proceedings-article","created":{"date-parts":[[2015,1,13]],"date-time":"2015-01-13T21:34:59Z","timestamp":1421184899000},"page":"1-8","source":"Crossref","is-referenced-by-count":22,"title":["Security vulnerabilities and risks in industrial usage of wireless communication"],"prefix":"10.1109","author":[{"given":"S.","family":"Plosz","sequence":"first","affiliation":[]},{"given":"A.","family":"Farshad","sequence":"additional","affiliation":[]},{"given":"M.","family":"Tauber","sequence":"additional","affiliation":[]},{"given":"C.","family":"Lesjak","sequence":"additional","affiliation":[]},{"given":"T.","family":"Ruprechter","sequence":"additional","affiliation":[]},{"given":"N.","family":"Pereira","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Eavesdropping near field communication","author":"kortvedt","year":"2009","journal-title":"The Norwegian Information Security Conference (NISK)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594376"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/NFC.2011.9"},{"key":"ref13","first-page":"1","article-title":"A practical relay attack on ISO 14443 proximity cards","author":"hancke","year":"2005","journal-title":"Technical Report"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SECURECOMM.2005.32"},{"key":"ref15","article-title":"NFCIP-1 security standard protects near field communication","author":"meindl","year":"2009","journal-title":"4th ETSI Security Workshop"},{"journal-title":"NFC-Forum","article-title":"Signature Record Type Definition Candidate Technical Specification","year":"2013","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2013.6488560"},{"key":"ref18","article-title":"Telecommunications and internet protocol harmonization over networks (TIPHON) release 4; protocol framework defnition; methods and protocols for security; part 1: Threat analysis","volume":"4 1 1","year":"2003","journal-title":"Technical Specifcation ETSI TS 102 165&#x2013;1"},{"journal-title":"ZigBee Alliance","article-title":"ZigBee Specification","year":"2012","key":"ref19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2005.849714"},{"journal-title":"Siemens AG","article-title":"Operational Guidelines for Industrial Security","year":"2013","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16161-2_15"},{"key":"ref3","article-title":"Security Considerations in the IP-based Internet of Things","author":"kumar","year":"2013","journal-title":"Internet-Draft IETF"},{"article-title":"802.11n: A Survival Guide","year":"2012","author":"gast","key":"ref6"},{"article-title":"Wireless attacks, A to Z","year":"0","author":"phifer","key":"ref29"},{"key":"ref5","article-title":"Wireless Security in the Home and Office Environment","author":"barbeau","year":"2010","journal-title":"Technical Reports"},{"key":"ref8","article-title":"Vulnerability analysis and attacks on NFC-enabled mobile phones","author":"collin","year":"2009","journal-title":"Availability Reliability and Security 2009 ARES'09 International Conference On IEEE"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1089761.1089764"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.12.017"},{"key":"ref9","article-title":"Security in near field communication (NFC)","author":"haselsteiner","year":"2006","journal-title":"Workshop on RFID Security"},{"key":"ref1","first-page":"36","article-title":"M2M: From Mobile to Embedded Internet","author":"wu","year":"2011","journal-title":"IEEE Communications Magazine"},{"journal-title":"ISA100 Standards Committee","article-title":"ISA100. 11a, Release 1-An Update on the First Wireless Standard Emerging from the Industry for the Industry","year":"2007","key":"ref20"},{"key":"ref22","article-title":"6LoWPAN: Incorporating IEEE 802.15. 4 into the IP architecture. IPSO Alliance","author":"hui","year":"2009","journal-title":"White Paper"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS.2008.15"},{"key":"ref24","first-page":"58","article-title":"Considerations on security in zigbee networks","author":"gianluca","year":"2010","journal-title":"In Sensor Networks Ubiquitous and Trustworthy Computing (SUTC) 2010 IEEE International Conference on"},{"key":"ref23","first-page":"154","article-title":"Analysis and mitigation of vulnerabilities in short-range wireless communications for industrial control systems","volume":"3","author":"bradley","year":"2012","journal-title":"International Journal of Critical Infrastrucutre Protection"},{"key":"ref26","article-title":"An investigation on IEEE 802.15. 4 MAC layer attacks","author":"sokullu","year":"2007","journal-title":"Proc of WPMC"},{"key":"ref25","doi-asserted-by":"crossref","DOI":"10.1145\/1023646.1023654","article-title":"Security considerations for IEEE 802.15. 4 networks","author":"sastry","year":"2004","journal-title":"Proceedings of the 3rd ACM Workshop on Wireless Security ACM"}],"event":{"name":"2014 IEEE Emerging Technology and Factory Automation (ETFA)","start":{"date-parts":[[2014,9,16]]},"location":"Barcelona, Spain","end":{"date-parts":[[2014,9,19]]}},"container-title":["Proceedings of the 2014 IEEE Emerging Technology and Factory Automation (ETFA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6994138\/7005023\/07005129.pdf?arnumber=7005129","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,26]],"date-time":"2022-04-26T19:15:16Z","timestamp":1651000516000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7005129\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/etfa.2014.7005129","relation":{},"subject":[],"published":{"date-parts":[[2014,9]]}}}