{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:10:51Z","timestamp":1750306251586,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T00:00:00Z","timestamp":1490140800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,3,22]]},"DOI":"10.1145\/3018896.3056797","type":"proceedings-article","created":{"date-parts":[[2018,2,23]],"date-time":"2018-02-23T16:12:59Z","timestamp":1519402379000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["A review on smart grid network security issues over 6LoWPAN"],"prefix":"10.1145","author":[{"given":"Augustus E.","family":"Ibhaze","sequence":"first","affiliation":[{"name":"Covenant University, Ota Ogun State Nigeria"}]},{"given":"Moses U.","family":"Akpabio","sequence":"additional","affiliation":[{"name":"Covenant University, Ota Ogun State Nigeria"}]},{"given":"Samuel N.","family":"John","sequence":"additional","affiliation":[{"name":"Covenant University, Ota Ogun State Nigeria"}]}],"member":"320","published-online":{"date-parts":[[2017,3,22]]},"reference":[{"volume-title":"Fifth IEEE International Conference on Communication Systems and Network Technologies, 643 -- 647","author":"Vohra S.","key":"e_1_3_2_1_1_1"},{"volume-title":"Topology Authentication in RPL. IEEE Conference on Computer Communications Workshops. 73--74","year":"2013","author":"Schmidt C.","key":"e_1_3_2_1_2_1"},{"volume-title":"IEEE International Conference on Pervasive Computing (ICPC). 1--6","author":"Pongle P.","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/PES.2008.4596961"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/44.31557"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"N. Kushalnagar G. Montenegro and C. Schumacher. 2007. IPv6 over LowPower Wireless Personal Area Networks (6LoWPANs): Overview Assumptions Problem Statement and Goals. RFC 4919.  N. Kushalnagar G. Montenegro and C. Schumacher. 2007. IPv6 over LowPower Wireless Personal Area Networks (6LoWPANs): Overview Assumptions Problem Statement and Goals. RFC 4919.","DOI":"10.17487\/rfc4919"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"J. Ko A. Terzis S. Dawson-Haggerty D. E. Culler J. W. Hui and P. Levis. 2011. Connecting Low-Power and lossy Networks to the Internet. IEEE Communications Magazine. 96--101  J. Ko A. Terzis S. Dawson-Haggerty D. E. Culler J. W. Hui and P. Levis. 2011. Connecting Low-Power and lossy Networks to the Internet. IEEE Communications Magazine. 96--101","DOI":"10.1109\/MCOM.2011.5741163"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Z. Shelby and C. Bormann. 2009. 6LoWPAN: The Wireless Embedded Internet. Wiley-Blackwell West Sussex United Kingdom.   Z. Shelby and C. Bormann. 2009. 6LoWPAN: The Wireless Embedded Internet. Wiley-Blackwell West Sussex United Kingdom.","DOI":"10.1002\/9780470686218"},{"key":"e_1_3_2_1_9_1","unstructured":"A. Le J. Loo A. Lasebae M. Aiash and Y. Luo. 6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach.  A. Le J. Loo A. Lasebae M. Aiash and Y. Luo. 6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach."},{"volume-title":"IEEE International Conference on Distributed Computing in Sensor. 1--8.","author":"Raza S.","key":"e_1_3_2_1_10_1"},{"volume-title":"Workshop of SmartObjectSecurity","author":"Raza S.","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"G. Montenegro N. Kushalnagar J. Hui and D. Culler. 2007. Transmission of IPv6 Packets over IEEE 802.15.4 Networks. RFC 4944.  G. Montenegro N. Kushalnagar J. Hui and D. Culler. 2007. Transmission of IPv6 Packets over IEEE 802.15.4 Networks. RFC 4944.","DOI":"10.17487\/rfc4944"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICHIT.2008.261"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462096.2462107"},{"volume-title":"12th Asia-Pacific Network Operations and Management Conference on Management Enabling the Future Internet for Changing Business and New Computing Services","author":"Cho E.","key":"e_1_3_2_1_15_1"},{"key":"e_1_3_2_1_16_1","article-title":"Denial-of-Service attacks on 6LoWPAN-RPL networks: Threats and an intrusion detection system proposition","author":"Anass R.","year":"2014","journal-title":"Journal of Advanced Computer Science and Technology. 143--153"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2356"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"M. Dunlop S. Groat W. Urbanski R. Marchany and J. Tront. 2011. MT6D: a moving target IPv6 defense \" MILCOM. 1321--1326.  M. Dunlop S. Groat W. Urbanski R. Marchany and J. Tront. 2011. MT6D: a moving target IPv6 defense \" MILCOM. 1321--1326.","DOI":"10.1109\/MILCOM.2011.6127486"},{"key":"e_1_3_2_1_19_1","unstructured":"S. e. a. Group. 2010. Introduction to NISTIR 7628 Guidelines for Smart Grid Cyber Security.  S. e. a. Group. 2010. Introduction to NISTIR 7628 Guidelines for Smart Grid Cyber Security."},{"key":"e_1_3_2_1_20_1","unstructured":"S. Misra Muthucumaru Maheswaran and Salman Hashmi. Security Challenges and Approaches in Internet of Things. SpringerBriefs in Electrical and Computer Engineering.   S. Misra Muthucumaru Maheswaran and Salman Hashmi. Security Challenges and Approaches in Internet of Things. SpringerBriefs in Electrical and Computer Engineering."}],"event":{"name":"ICC '17: Second International Conference on Internet of Things, Data and Cloud Computing","acronym":"ICC '17","location":"Cambridge United Kingdom"},"container-title":["Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3018896.3056797","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3018896.3056797","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:23:55Z","timestamp":1750220635000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3018896.3056797"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3,22]]},"references-count":20,"alternative-id":["10.1145\/3018896.3056797","10.1145\/3018896"],"URL":"https:\/\/doi.org\/10.1145\/3018896.3056797","relation":{},"subject":[],"published":{"date-parts":[[2017,3,22]]},"assertion":[{"value":"2017-03-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}