{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T08:54:47Z","timestamp":1762505687198,"version":"3.44.0"},"reference-count":13,"publisher":"IEEE","license":[{"start":{"date-parts":[[2010,10,1]],"date-time":"2010-10-01T00:00:00Z","timestamp":1285891200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2010,10,1]],"date-time":"2010-10-01T00:00:00Z","timestamp":1285891200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,10]]},"DOI":"10.1109\/wd.2010.5657743","type":"proceedings-article","created":{"date-parts":[[2010,12,10]],"date-time":"2010-12-10T23:02:46Z","timestamp":1292022166000},"page":"1-6","source":"Crossref","is-referenced-by-count":20,"title":["A secure interconnection model for IPv6 enabled wireless sensor networks"],"prefix":"10.1109","author":[{"given":"Jorge","family":"Granjal","sequence":"first","affiliation":[{"name":"University of Coimbra, Portugal"}]},{"given":"Edmundo","family":"Monteiro","sequence":"additional","affiliation":[{"name":"University of Coimbra, Portugal"}]},{"given":"Jorge S\u00e1","family":"Sa\u0301 Silva","sequence":"additional","affiliation":[{"name":"University of Coimbra, Portugal"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICAST.2008.4747687"},{"key":"ref11","article-title":"Using Advanced Encryption Standdard (AES) CCM Mode with IPSec Encapsulating Security Payload (ESP)","author":"housley","year":"2005","journal-title":"RFC 4309 Internet Engineering Task Force"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MAHSS.2008.4660130"},{"article-title":"RFC 4301 - Secure Architecture for the Internet Protocol","year":"2005","author":"kent","key":"ref13"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2005.41"},{"key":"ref3","article-title":"IPv6 over Low Power WPAN Security Analysis","author":"park","year":"2009","journal-title":"Internet draft"},{"key":"ref6","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-04766-4_10","article-title":"ContikiSec: A Secure Network Layer for Wireless Sensor Networks under the Contiki Operating System","author":"casado","year":"2009"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2009.47"},{"year":"0","key":"ref8"},{"year":"0","key":"ref7"},{"key":"ref2","article-title":"Transmission of IPv6 Packets over IEEE 802.15.4 Networks","author":"montenegro","year":"2007","journal-title":"RFC 4944"},{"key":"ref1","first-page":"1","article-title":"Wireless Sensor Network Security: A Survey","author":"walters","year":"0","journal-title":"Security in Distributed Grid and Pervasive Computing"},{"key":"ref9","article-title":"Wireless Sensor Network Security: A Survey","author":"walters","year":"2006","journal-title":"Security in Distributed Grid and Pervasive Computing"}],"event":{"name":"2010 IFIP Wireless Days (WD)","start":{"date-parts":[[2010,10,20]]},"location":"Venice, Italy","end":{"date-parts":[[2010,10,22]]}},"container-title":["2010 IFIP Wireless Days"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5644810\/5657694\/05657743.pdf?arnumber=5657743","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T18:23:22Z","timestamp":1756319002000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/5657743\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/wd.2010.5657743","relation":{},"subject":[],"published":{"date-parts":[[2010,10]]}}}