{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:53:19Z","timestamp":1750308799862,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,6,21]],"date-time":"2009-06-21T00:00:00Z","timestamp":1245542400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100004963","name":"Seventh Framework Programme","doi-asserted-by":"publisher","award":["21617"],"award-info":[{"award-number":["21617"]}],"id":[{"id":"10.13039\/501100004963","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,6,21]]},"DOI":"10.1145\/1582379.1582399","type":"proceedings-article","created":{"date-parts":[[2009,8,4]],"date-time":"2009-08-04T13:38:06Z","timestamp":1249393086000},"page":"84-89","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A scalable distributed security infrastructure for industrial control and sensor networks"],"prefix":"10.1145","author":[{"given":"Flutra","family":"Osmani","sequence":"first","affiliation":[{"name":"Kungliga Tekniska H\u00f6gskolan, Stockholm, Sweden"}]},{"given":"Adriaan","family":"Slabbert","sequence":"additional","affiliation":[{"name":"Swedish Institute of Computer Science, Kista, Sweden"}]}],"member":"320","published-online":{"date-parts":[[2009,6,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS.2006.29"},{"key":"e_1_3_2_1_2_1","first-page":"79","volume-title":"Sensor Networks and Information Processing Conference, Proceedings of the","year":"2004","unstructured":"C. P. et al. A secure communication protocol for ad-hoc wireless sensor networks. In Intelligent Sensors , Sensor Networks and Information Processing Conference, Proceedings of the , pages 79 -- 84 , 2004 . C. P. et al. A secure communication protocol for ad-hoc wireless sensor networks. In Intelligent Sensors, Sensor Networks and Information Processing Conference, Proceedings of the, pages 79--84, 2004."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2005.1593277"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2006.07.003"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30496-8_2"},{"volume-title":"Seventh IEEE Symposium on Computers and Communications (ISCC)","year":"2002","key":"e_1_3_2_1_6_1","unstructured":"H. L. et al. Self-securing ad hoc wireless networks . In Seventh IEEE Symposium on Computers and Communications (ISCC) , 2002 . H. L. et al. Self-securing ad hoc wireless networks. In Seventh IEEE Symposium on Computers and Communications (ISCC), 2002."},{"volume-title":"et al. A comprehensive performance study of IEEE 802.15.4","year":"2006","key":"e_1_3_2_1_7_1","unstructured":"J. Z. et al. A comprehensive performance study of IEEE 802.15.4 . Wiley Interscience , 2006 . J. Z. et al. A comprehensive performance study of IEEE 802.15.4. Wiley Interscience, 2006."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/941350.941371"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2003.1195151"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1278972.1278992"},{"key":"e_1_3_2_1_11_1","unstructured":"Ns-2 network simulator homepage. http:\/\/nsnam.isi.edu\/nsnam\/index.php\/User_Information.  Ns-2 network simulator homepage. http:\/\/nsnam.isi.edu\/nsnam\/index.php\/User_Information."},{"key":"e_1_3_2_1_12_1","unstructured":"OASIS homepage. http:\/\/www.oasis-open.org\/home\/index.php.  OASIS homepage. http:\/\/www.oasis-open.org\/home\/index.php."},{"key":"e_1_3_2_1_13_1","unstructured":"Openzb open-source toolkit homepage. http:\/\/www.open-zb.net\/about_toolset.php.  Openzb open-source toolkit homepage. http:\/\/www.open-zb.net\/about_toolset.php."},{"key":"e_1_3_2_1_14_1","unstructured":"Opnet network simulator homepage. http:\/\/www.opnet.com\/.  Opnet network simulator homepage. http:\/\/www.opnet.com\/."},{"key":"e_1_3_2_1_15_1","volume-title":"http:\/\/www.dnp.org\/About\/DNP3%20Primer%20Rev%20A.pdf, accessed on","author":"DNP Users Group","year":"2008","unstructured":"DNP Users Group . DNP3 Primer , Revision A , Mar . 2005. http:\/\/www.dnp.org\/About\/DNP3%20Primer%20Rev%20A.pdf, accessed on 28 February 2008 . DNP Users Group. DNP3 Primer, Revision A, Mar. 2005. http:\/\/www.dnp.org\/About\/DNP3%20Primer%20Rev%20A.pdf, accessed on 28 February 2008."},{"volume-title":"June","year":"2006","key":"e_1_3_2_1_16_1","unstructured":"IEC. Telecontrol equipment and systems - Part 5-104 : Transmission protocols - Network access for IEC 60870-5-101 using standard transport profiles , June 2006 . http:\/\/www.ipcomm.de\/protocol\/IEC104\/en\/sheet.html, accessed on 28 February 2008. IEC. Telecontrol equipment and systems - Part 5-104: Transmission protocols - Network access for IEC 60870-5-101 using standard transport profiles, June 2006. http:\/\/www.ipcomm.de\/protocol\/IEC104\/en\/sheet.html, accessed on 28 February 2008."},{"key":"e_1_3_2_1_17_1","volume-title":"Sept.","author":"IEEE Computer Society","year":"2006","unstructured":"IEEE Computer Society . Telecommunications and information exchange between systems- Local and metropolitan area networks- Specific requirements. Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (WPANs) , Sept. 2006 . IEEE Computer Society. Telecommunications and information exchange between systems- Local and metropolitan area networks- Specific requirements. Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (WPANs), Sept. 2006."},{"key":"e_1_3_2_1_18_1","unstructured":"Swedish Institute of Computer Science. http:\/\/www.sics.se\/node\/2465.  Swedish Institute of Computer Science. http:\/\/www.sics.se\/node\/2465."},{"key":"e_1_3_2_1_19_1","unstructured":"Sun Microsystems homepage. http:\/\/sunxacml.sourceforge.net\/.  Sun Microsystems homepage. http:\/\/sunxacml.sourceforge.net\/."},{"key":"e_1_3_2_1_20_1","unstructured":"Why wirelesshart. http:\/\/www.hartcomm2.org\/hart_protocol\/applications\/white_papers\/why_wirelesshart.html.  Why wirelesshart. http:\/\/www.hartcomm2.org\/hart_protocol\/applications\/white_papers\/why_wirelesshart.html."}],"event":{"name":"IWCMC '09: 2009 International Wireless Communications and Mobile Computing Conference","sponsor":["ACM Association for Computing Machinery","Wiley-Blackwell","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGCOMM ACM Special Interest Group on Data Communication","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGDOC ACM Special Interest Group for Design of Communications"],"location":"Leipzig Germany","acronym":"IWCMC '09"},"container-title":["Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1582379.1582399","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1582379.1582399","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:25:57Z","timestamp":1750278357000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1582379.1582399"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6,21]]},"references-count":20,"alternative-id":["10.1145\/1582379.1582399","10.1145\/1582379"],"URL":"https:\/\/doi.org\/10.1145\/1582379.1582399","relation":{},"subject":[],"published":{"date-parts":[[2009,6,21]]},"assertion":[{"value":"2009-06-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}