{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:10:50Z","timestamp":1750306250848,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T00:00:00Z","timestamp":1490140800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,3,22]]},"DOI":"10.1145\/3018896.3056789","type":"proceedings-article","created":{"date-parts":[[2018,2,23]],"date-time":"2018-02-23T16:12:59Z","timestamp":1519402379000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Security of wireless sensor network (WSN) in smart grid"],"prefix":"10.1145","author":[{"given":"Bashar Ahmed","family":"Alohali","sequence":"first","affiliation":[{"name":"Liverpool John Moores University, Liverpool, United Kingdom"}]},{"given":"Vassilios G.","family":"Vassilakis","sequence":"additional","affiliation":[{"name":"University of York, York, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2017,3,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2225851"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2009.2039455"},{"key":"e_1_3_2_1_3_1","volume-title":"SCADA","author":"Knapp E. D.","year":"2011","unstructured":"E. D. Knapp and J. Langill , Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid , SCADA , and Other Industrial Control Systems , Syngress , 2011 . E. D. Knapp and J. Langill, Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems, Syngress, 2011."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2341586"},{"key":"e_1_3_2_1_5_1","volume-title":"Security and Privacy in Smart Grids","author":"Xiao Y.","year":"2013","unstructured":"Y. Xiao , Security and Privacy in Smart Grids , Taylor & Francis , 2013 . Y. Xiao, Security and Privacy in Smart Grids, Taylor & Francis, 2013."},{"key":"e_1_3_2_1_6_1","volume-title":"Information Science Reference","author":"Jin H.","year":"2010","unstructured":"H. Jin , Handbook of Research on Developments and Trends in Wireless Sensor Networks : From Principle to Practice , Information Science Reference , 2010 . H. Jin, Handbook of Research on Developments and Trends in Wireless Sensor Networks: From Principle to Practice, Information Science Reference, 2010."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/572357"},{"key":"e_1_3_2_1_8_1","volume-title":"IGI Global","author":"Matin M. A.","year":"2014","unstructured":"M. A. Matin , Handbook of Research on Progressive Trends in Wireless Communications and Networking , IGI Global , 2014 . M. A. Matin, Handbook of Research on Progressive Trends in Wireless Communications and Networking, IGI Global, 2014."},{"key":"e_1_3_2_1_9_1","first-page":"80","volume-title":"Security for wireless sensor networks: A review,\" in IEEE Sensors Applications Symposium (SAS)","author":"Healy M.","year":"2009","unstructured":"M. Healy , T. Newe , and E. Lewis , \" Security for wireless sensor networks: A review,\" in IEEE Sensors Applications Symposium (SAS) , 2009 , pp. 80 -- 85 . M. Healy, T. Newe, and E. Lewis, \"Security for wireless sensor networks: A review,\" in IEEE Sensors Applications Symposium (SAS), 2009, pp. 80--85."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCTD.2009.44"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/2563636"},{"key":"e_1_3_2_1_12_1","first-page":"1","volume-title":"Sensor Networks and Information Processing (ISSNIP)","author":"Alohali B. A.","year":"2015","unstructured":"B. A. Alohali and V. G. Vassialkis , \" Secure and energy-efficient multicast routing in smart grids,\" in IEEE Tenth International Conference on Intelligent Sensors , Sensor Networks and Information Processing (ISSNIP) , 2015 , pp. 1 -- 6 . B. A. Alohali and V. G. Vassialkis, \"Secure and energy-efficient multicast routing in smart grids,\" in IEEE Tenth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), 2015, pp. 1--6."},{"key":"e_1_3_2_1_13_1","volume-title":"Wireless Sensor Network Security: A Survey","author":"Walters J. P.","year":"2006","unstructured":"J. P. Walters , Z. Liang , W. Shi , and V. Chaudhary , Wireless Sensor Network Security: A Survey , CRC Press , 2006 . J. P. Walters, Z. Liang, W. Shi, and V. Chaudhary, Wireless Sensor Network Security: A Survey, CRC Press, 2006."},{"key":"e_1_3_2_1_14_1","volume-title":"Information Science Reference","author":"Rawat D. B.","year":"2013","unstructured":"D. B. Rawat , Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications , Information Science Reference , 2013 . D. B. Rawat, Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications, Information Science Reference, 2013."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4842-0986-8","volume-title":"Big Data and The Internet of Things: Enterprise Information Architecture for A New Age","author":"Stackowiak R.","year":"2015","unstructured":"R. Stackowiak , A. Licht , V. Mantha , and L. Nagode , Big Data and The Internet of Things: Enterprise Information Architecture for A New Age , Apress , 2015 . R. Stackowiak, A. Licht, V. Mantha, and L. Nagode, Big Data and The Internet of Things: Enterprise Information Architecture for A New Age, Apress, 2015."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.11591\/telkomnika.v12i2.4178"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.4236\/jcc.2015.35029"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2014.2342796"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2009.090205"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIMSim.2011.62"},{"key":"e_1_3_2_1_21_1","volume-title":"A secure scheme for group communication of wireless IoT devices,\" in IEEE PIMRC Workshop on IoT","author":"Alohali B. A.","year":"2016","unstructured":"B. A. Alohali and V. G. Vassilakis , \" A secure scheme for group communication of wireless IoT devices,\" in IEEE PIMRC Workshop on IoT , 2016 . B. A. Alohali and V. G. Vassilakis, \"A secure scheme for group communication of wireless IoT devices,\" in IEEE PIMRC Workshop on IoT, 2016."},{"key":"e_1_3_2_1_22_1","first-page":"273","volume-title":"Sybil attack detection: Improving security of WSNs for smart power grid application,\" in Smart Grid Conference (SGC)","author":"Najafabadi S. Golestani","year":"2013","unstructured":"S. Golestani Najafabadi , H. R. Naji , and A. Mahani , \" Sybil attack detection: Improving security of WSNs for smart power grid application,\" in Smart Grid Conference (SGC) , 2013 , pp. 273 -- 278 . S. Golestani Najafabadi, H. R. Naji, and A. Mahani, \"Sybil attack detection: Improving security of WSNs for smart power grid application,\" in Smart Grid Conference (SGC), 2013, pp. 273--278."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2006.315852"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.3390\/s90906869"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2014.03.025"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1023646.1023654"}],"event":{"name":"ICC '17: Second International Conference on Internet of Things, Data and Cloud Computing","acronym":"ICC '17","location":"Cambridge United Kingdom"},"container-title":["Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3018896.3056789","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3018896.3056789","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:23:55Z","timestamp":1750220635000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3018896.3056789"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3,22]]},"references-count":26,"alternative-id":["10.1145\/3018896.3056789","10.1145\/3018896"],"URL":"https:\/\/doi.org\/10.1145\/3018896.3056789","relation":{},"subject":[],"published":{"date-parts":[[2017,3,22]]},"assertion":[{"value":"2017-03-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}