{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T02:32:14Z","timestamp":1773541934516,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,8,27]],"date-time":"2018-08-27T00:00:00Z","timestamp":1535328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,8,27]]},"DOI":"10.1145\/3230833.3232805","type":"proceedings-article","created":{"date-parts":[[2018,8,13]],"date-time":"2018-08-13T12:29:48Z","timestamp":1534163388000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":27,"title":["On Track of Sigfox Confidentiality with End-to-End Encryption"],"prefix":"10.1145","author":[{"given":"Radek","family":"Fujdiak","sequence":"first","affiliation":[{"name":"Brno University of Technology, Brno, Czech Republic"}]},{"given":"Petr","family":"Blazek","sequence":"additional","affiliation":[{"name":"Brno University of Technology, Brno, Czech Republic"}]},{"given":"Konstantin","family":"Mikhaylov","sequence":"additional","affiliation":[{"name":"University of Oulu, Oulu, Finland"}]},{"given":"Lukas","family":"Malina","sequence":"additional","affiliation":[{"name":"Brno University of Technology, Brno, Czech Republic"}]},{"given":"Petr","family":"Mlynek","sequence":"additional","affiliation":[{"name":"Brno University of Technology, Brno, Czech Republic"}]},{"given":"Jiri","family":"Misurec","sequence":"additional","affiliation":[{"name":"Brno University of Technology, Brno, Czech Republic"}]},{"given":"Vojtech","family":"Blazek","sequence":"additional","affiliation":[{"name":"Brno University of Technology, Brno, Czech Republic"}]}],"member":"320","published-online":{"date-parts":[[2018,8,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2016. 8-bit AVR Microcontrollers: ATmega328\/P. (2016). (Technical documentation).  2016. 8-bit AVR Microcontrollers: ATmega328\/P. (2016). (Technical documentation)."},{"key":"e_1_3_2_1_2_1","volume-title":"A study of LoRa: Long range & low power networks for the internet of things. Sensors 16, 9 (9","author":"Augustin Alo\u00ffs","year":"2016","unstructured":"Alo\u00ffs Augustin , Jiazi Yi , Thomas Clausen , and William Mark Townsley . 2016. A study of LoRa: Long range & low power networks for the internet of things. Sensors 16, 9 (9 2016 ), 1466. Alo\u00ffs Augustin, Jiazi Yi, Thomas Clausen, and William Mark Townsley. 2016. A study of LoRa: Long range & low power networks for the internet of things. Sensors 16, 9 (9 2016), 1466."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.3390\/s16111960"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1080\/01611194.2011.583711"},{"key":"e_1_3_2_1_5_1","unstructured":"Daniel J Bernstein. 2008. ChaCha a variant of Salsa20. (2008). http:\/\/cr.yp.to\/chacha\/chacha-20080120.pdf  Daniel J Bernstein. 2008. ChaCha a variant of Salsa20. (2008). http:\/\/cr.yp.to\/chacha\/chacha-20080120.pdf"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2016.7721743"},{"key":"e_1_3_2_1_7_1","volume-title":"Internet of Things security and forensics: Challenges and opportunities. Future Generation Computer Systems 78 (part 2) (1","author":"Conti Mauro","year":"2018","unstructured":"Mauro Conti , Ali Dehghantanha , Katrin Franke , and Steve Watson . 2018. Internet of Things security and forensics: Challenges and opportunities. Future Generation Computer Systems 78 (part 2) (1 2018 ), 544--546. Mauro Conti, Ali Dehghantanha, Katrin Franke, and Steve Watson. 2018. Internet of Things security and forensics: Challenges and opportunities. Future Generation Computer Systems 78 (part 2) (1 2018), 544--546."},{"key":"e_1_3_2_1_8_1","unstructured":"Dallas Semiconductor 2018. DS18B20: Programmable Resolution 1-Wire\u00aeDigital Thermometer. Dallas Semiconductor. (Technical documentation).  Dallas Semiconductor 2018. DS18B20: Programmable Resolution 1-Wire\u00aeDigital Thermometer. Dallas Semiconductor. (Technical documentation)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2007.178"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2505632"},{"key":"e_1_3_2_1_11_1","volume-title":"Computer and Information Technology","author":"Guibene Wael","year":"2015","unstructured":"Wael Guibene , Keith E Nolan , and Mark Y Kelly . 2015. Survey on clean slate cellular-iot standard proposals . In Computer and Information Technology ; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT\/IUCC\/DASC\/PICOM), 2015 IEEE International Conference on. IEEE , 1596--1599. Wael Guibene, Keith E Nolan, and Mark Y Kelly. 2015. Survey on clean slate cellular-iot standard proposals. In Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT\/IUCC\/DASC\/PICOM), 2015 IEEE International Conference on. IEEE, 1596--1599."},{"key":"e_1_3_2_1_12_1","volume-title":"Introduction to modern cryptography","author":"Katz Jonathan","unstructured":"Jonathan Katz and Yehuda Lindell . 2015. Introduction to modern cryptography . CRC press . ( second edition). Jonathan Katz and Yehuda Lindell. 2015. Introduction to modern cryptography. CRC press. (second edition)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.SP.800-82r2","volume-title":"Guide to Industrial Control Systems (ICS) Security. (5","author":"Keith Stouffer","year":"2015","unstructured":"Stouffer Keith , Lightman Suzanne , Pillitteri Victoria , Abrams Marshall , and Adam Hahn . 2015. Guide to Industrial Control Systems (ICS) Security. (5 2015 ). https:\/\/csrc.nist.gov\/publications\/detail\/sp\/800-82\/rev-2\/final ( Rev . 2). Stouffer Keith, Lightman Suzanne, Pillitteri Victoria, Abrams Marshall, and Adam Hahn. 2015. Guide to Industrial Control Systems (ICS) Security. (5 2015). https:\/\/csrc.nist.gov\/publications\/detail\/sp\/800-82\/rev-2\/final (Rev. 2)."},{"key":"e_1_3_2_1_14_1","unstructured":"Keysight Technologies 2015. Keysight N6705 DC Power Analyzer. Keysight Technologies. http:\/\/literature.cdn.keysight.com\/litweb\/pdf\/N6705-90010.pdf (Technical documentation no. N6705-90010).  Keysight Technologies 2015. Keysight N6705 DC Power Analyzer. Keysight Technologies. http:\/\/literature.cdn.keysight.com\/litweb\/pdf\/N6705-90010.pdf (Technical documentation no. N6705-90010)."},{"key":"e_1_3_2_1_15_1","volume-title":"LPWAN SigFox node","author":"LPWAN Co.","unstructured":"LPWAN Co. , Ltd. 2016. LPWAN SigFox node . LPWAN Co., Ltd. (Technical documentation, Version 1.0). LPWAN Co., Ltd. 2016. LPWAN SigFox node. LPWAN Co., Ltd. (Technical documentation, Version 1.0)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.4236\/ait.2016.62002"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2015.7389049"},{"key":"e_1_3_2_1_18_1","unstructured":"Microchip Technology Inc. 2014. MCP7940N. Microchip Technology Inc. (Technical documentation).  Microchip Technology Inc. 2014. MCP7940N. Microchip Technology Inc. (Technical documentation)."},{"key":"e_1_3_2_1_19_1","volume-title":"Comparison of the device lifetime in wireless networks for the internet of things","author":"Morin \u00c9lodie","year":"2017","unstructured":"\u00c9lodie Morin , Mickael Maman , Roberto Guizzetti , and Andrzej Duda . 2017. Comparison of the device lifetime in wireless networks for the internet of things . IEEE Access 5 (4 2017 ), 7097--7114. \u00c9lodie Morin, Mickael Maman, Roberto Guizzetti, and Andrzej Duda. 2017. Comparison of the device lifetime in wireless networks for the internet of things. IEEE Access 5 (4 2017), 7097--7114."},{"key":"e_1_3_2_1_20_1","volume-title":"Tea extensions","author":"Needham Roger M","year":"1997","unstructured":"Roger M Needham and David J Wheeler . 1997. Tea extensions . Report (Cambridge University , Cambridge, UK , 1997 ) Google Scholar (1997). Roger M Needham and David J Wheeler. 1997. Tea extensions. Report (Cambridge University, Cambridge, UK, 1997) Google Scholar (1997)."},{"key":"e_1_3_2_1_21_1","volume-title":"Ericsson mobility report. (11","author":"Niklas Hauveldop","year":"2017","unstructured":"Hauveldop Niklas . 2017. Ericsson mobility report. (11 2017 ). https:\/\/www.ericsson.com\/assets\/local\/mobility-report\/documents\/2017\/ericsson-mobility-report-november-2017-central-and-eastern-europe.pdf Hauveldop Niklas. 2017. Ericsson mobility report. (11 2017). https:\/\/www.ericsson.com\/assets\/local\/mobility-report\/documents\/2017\/ericsson-mobility-report-november-2017-central-and-eastern-europe.pdf"},{"key":"e_1_3_2_1_22_1","unstructured":"Menachemi Nir and Adam Langley. 2015. Internet Research Task Force (IRTF). (2015).  Menachemi Nir and Adam Langley. 2015. Internet Research Task Force (IRTF). (2015)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSNET.2008.019258"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSensT.2017.8304507"},{"key":"e_1_3_2_1_25_1","volume-title":"Low power wide area networks: A survey. arXiv preprint arXiv:1606.07360","author":"Raza Usman","year":"2016","unstructured":"Usman Raza , Parag Kulkarni , and Mahesh Sooriyabandara . 2016. Low power wide area networks: A survey. arXiv preprint arXiv:1606.07360 ( 2016 ). Usman Raza, Parag Kulkarni, and Mahesh Sooriyabandara. 2016. Low power wide area networks: A survey. arXiv preprint arXiv:1606.07360 (2016)."},{"key":"e_1_3_2_1_26_1","volume-title":"Low power wide area networks: An overview","author":"Raza Usman","year":"2017","unstructured":"Usman Raza , Parag Kulkarni , and Mahesh Sooriyabandara . 2017. Low power wide area networks: An overview . IEEE Communications Surveys & Tutorials 19, 2 (1 2017 ), 855--873. Usman Raza, Parag Kulkarni, and Mahesh Sooriyabandara. 2017. Low power wide area networks: An overview. IEEE Communications Surveys & Tutorials 19, 2 (1 2017), 855--873."},{"key":"e_1_3_2_1_27_1","unstructured":"Blank Rebecca and Gallagher Patrick. 2013. NIST Special Publication 800--53. (2013). (Rev. 4).  Blank Rebecca and Gallagher Patrick. 2013. NIST Special Publication 800--53. (2013). (Rev. 4)."},{"key":"e_1_3_2_1_28_1","unstructured":"Weatherley Rhys. 2018. Arduino Cryptography Library. (2018). https:\/\/rweather.github.io\/arduinolibs\/ (software).  Weatherley Rhys. 2018. Arduino Cryptography Library. (2018). https:\/\/rweather.github.io\/arduinolibs\/ (software)."},{"key":"e_1_3_2_1_29_1","volume-title":"Tinyness: an overview of tea and related ciphers. Draft v0 3, 3","author":"Russell Matthew D","year":"2004","unstructured":"Matthew D Russell . 2004. Tinyness: an overview of tea and related ciphers. Draft v0 3, 3 ( 2004 ). Matthew D Russell. 2004. Tinyness: an overview of tea and related ciphers. Draft v0 3, 3 (2004)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.3390\/s16050708"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"e_1_3_2_1_32_1","unstructured":"Sigfox 2017. Secure Sigfox Ready devices: Recommendation guide. Sigfox. (Technical documentation rev. 34).  Sigfox 2017. Secure Sigfox Ready devices: Recommendation guide. Sigfox. (Technical documentation rev. 34)."},{"key":"e_1_3_2_1_33_1","unstructured":"Sigfox 2017. Sigfox Technical Overview. Sigfox. (Technical documentation).  Sigfox 2017. Sigfox Technical Overview. Sigfox. (Technical documentation)."},{"key":"e_1_3_2_1_34_1","unstructured":"Oriol Sola Campillo. 2017. Security issues in Internet of Things. (2017). http:\/\/hdl.handle.net\/2117\/109290  Oriol Sola Campillo. 2017. Security issues in Internet of Things. (2017). http:\/\/hdl.handle.net\/2117\/109290"},{"key":"e_1_3_2_1_35_1","volume-title":"Secret signaling system. (7","author":"Vernam Gilbert","year":"1919","unstructured":"Gilbert Vernam . 1919. Secret signaling system. (7 1919 ). https:\/\/patents.google.com\/patent\/US1310719 US Patent 1919-07-22 (US 1310719A). Gilbert Vernam. 1919. Secret signaling system. (7 1919). https:\/\/patents.google.com\/patent\/US1310719 US Patent 1919-07-22 (US1310719A)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-58108-1_16"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.02.009"},{"key":"e_1_3_2_1_38_1","volume-title":"Nov. 14th","author":"Zuniga Juan Carlos","year":"2016","unstructured":"Juan Carlos Zuniga and Benoit Ponsard . 2016. Sigfox system description. LPWAN@ IETF97 , Nov. 14th ( 2016 ). Juan Carlos Zuniga and Benoit Ponsard. 2016. Sigfox system description. LPWAN@ IETF97, Nov. 14th (2016)."}],"event":{"name":"ARES 2018: International Conference on Availability, Reliability and Security","location":"Hamburg Germany","acronym":"ARES 2018","sponsor":["Universit\u00e4t Hamburg Universit\u00e4t Hamburg"]},"container-title":["Proceedings of the 13th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230833.3232805","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3230833.3232805","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:07:50Z","timestamp":1750212470000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230833.3232805"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,27]]},"references-count":38,"alternative-id":["10.1145\/3230833.3232805","10.1145\/3230833"],"URL":"https:\/\/doi.org\/10.1145\/3230833.3232805","relation":{},"subject":[],"published":{"date-parts":[[2018,8,27]]},"assertion":[{"value":"2018-08-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}