{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T10:00:36Z","timestamp":1764842436089,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,11,16]],"date-time":"2020-11-16T00:00:00Z","timestamp":1605484800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Natural Science Foundation of China","award":["61972253,"],"award-info":[{"award-number":["61972253,"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,11,16]]},"DOI":"10.1145\/3384419.3430770","type":"proceedings-article","created":{"date-parts":[[2020,11,25]],"date-time":"2020-11-25T02:08:48Z","timestamp":1606270128000},"page":"258-270","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":34,"title":["SLoRa"],"prefix":"10.1145","author":[{"given":"Xiong","family":"Wang","sequence":"first","affiliation":[{"name":"Shanghai Jiao Tong University"}]},{"given":"Linghe","family":"Kong","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University"}]},{"given":"Zucheng","family":"Wu","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University"}]},{"given":"Long","family":"Cheng","sequence":"additional","affiliation":[{"name":"Clemson University"}]},{"given":"Chenren","family":"Xu","sequence":"additional","affiliation":[{"name":"Peking University, China"}]},{"given":"Guihai","family":"Chen","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University"}]}],"member":"320","published-online":{"date-parts":[[2020,11,16]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600613"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.4"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/CYBConf.2017.7985777"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.3390\/s16091466"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2013.2246011"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409959"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3213299.3213304"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2009.5426152"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SUTC.2010.15"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2017.7917625"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098845"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2639108.2639117"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3300061.3345444"},{"key":"e_1_3_2_1_14_1","unstructured":"Chaojie Gu Jiang Linshan Tan Rui Li Mo and Huang Jun. [n. d.]. Attack-Aware Data Timestamping in Low-Power Synchronization-Free LoRaWAN. arXiv preprint arXiv.  Chaojie Gu Jiang Linshan Tan Rui Li Mo and Huang Jun. [n. d.]. Attack-Aware Data Timestamping in Low-Power Synchronization-Free LoRaWAN. arXiv preprint arXiv."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Ari Juels et al. 2006. RFID security and privacy: A research survey. IEEE journal on selected areas in communications 24 2 (2006) 381--394.  Ari Juels et al. 2006. RFID security and privacy: A research survey. IEEE journal on selected areas in communications 24 2 (2006) 381--394.","DOI":"10.1109\/JSAC.2005.861395"},{"key":"e_1_3_2_1_16_1","volume-title":"Feng Tan, Yan Hong Fan, and Xun Liang. [n. d.]. A novel microcomputer temperature-compensating method for an overtone crystal oscillator","author":"Li Min Qiang","year":"1919","unstructured":"Min Qiang Li , Xian He Huang , Feng Tan, Yan Hong Fan, and Xun Liang. [n. d.]. A novel microcomputer temperature-compensating method for an overtone crystal oscillator . IEEE Transactions on Ultrasonics Ferroelectrics & Frequency Control 52, 11 ([n. d.]), 1919 --1922. Min Qiang Li, Xian He Huang, Feng Tan, Yan Hong Fan, and Xun Liang. [n. d.]. A novel microcomputer temperature-compensating method for an overtone crystal oscillator. IEEE Transactions on Ultrasonics Ferroelectrics & Frequency Control 52, 11 ([n. d.]), 1919--1922."},{"volume-title":"IFIP international information security conference","author":"Li Ticyan","key":"e_1_3_2_1_17_1","unstructured":"Ticyan Li and Guilin Wang . 2007. Security analysis of two ultra-lightweight RFID authentication protocols . In IFIP international information security conference . Springer , 109--120. Ticyan Li and Guilin Wang. 2007. Security analysis of two ultra-lightweight RFID authentication protocols. In IFIP international information security conference. Springer, 109--120."},{"volume-title":"Enhanced wireless channel authentication using time-synched link signature","author":"Liu Yao","key":"e_1_3_2_1_18_1","unstructured":"Yao Liu and Peng Ning . 2012. Enhanced wireless channel authentication using time-synched link signature . In INFOCOM. IEEE. Yao Liu and Peng Ning. 2012. Enhanced wireless channel authentication using time-synched link signature. In INFOCOM. IEEE."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.24"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274783.3274841"},{"key":"e_1_3_2_1_21_1","unstructured":"Marwa Mamoun. 2014. Software Defined Radio. (2014).  Marwa Mamoun. 2014. Software Defined Radio. (2014)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2012.146"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/2394798.2394803"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287853.1287867"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230567"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2006.17"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098243.3098267"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2016.7502939"},{"volume-title":"A multipath channel estimation algorithm using a kalman filter. Diss","author":"Safaya Rupul","key":"e_1_3_2_1_29_1","unstructured":"Rupul Safaya . 1997. A multipath channel estimation algorithm using a kalman filter. Diss . University of Kansas (1997) . Rupul Safaya. 1997. A multipath channel estimation algorithm using a kalman filter. Diss. University of Kansas (1997)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3130970"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2008.061012"},{"key":"e_1_3_2_1_32_1","volume-title":"Netherlands deploy LoRa networks for IoT","author":"Tom\u00e1s JP","year":"2016","unstructured":"JP Tom\u00e1s . 2018. Operators in Korea , Netherlands deploy LoRa networks for IoT 2016 . JP Tom\u00e1s. 2018. Operators in Korea, Netherlands deploy LoRa networks for IoT 2016."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCNCW.2017.7919091"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.110918"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3241539.3241541"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2824939"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2500423.2500444"},{"key":"e_1_3_2_1_38_1","volume-title":"LoRa-key: Secure key generation system for LoRa-based network","author":"Xu Weitao","year":"2018","unstructured":"Weitao Xu , Sanjay Jha , and Wen Hu. 2018. LoRa-key: Secure key generation system for LoRa-based network . IEEE Internet of Things Journal ( 2018 ). Weitao Xu, Sanjay Jha, and Wen Hu. 2018. LoRa-key: Secure key generation system for LoRa-based network. IEEE Internet of Things Journal (2018)."},{"key":"e_1_3_2_1_39_1","volume-title":"Security Vulnerabilities in LoRaWAN. In IEEE\/ACM Third International Conference on Internet-of-Things Design and Implementation. IEEE, 129--140","author":"Yang Xueying","year":"2018","unstructured":"Xueying Yang , Evgenios Karampatzakis , Christian Doerr , and Fernando Kuipers . 2018 . Security Vulnerabilities in LoRaWAN. In IEEE\/ACM Third International Conference on Internet-of-Things Design and Implementation. IEEE, 129--140 . Xueying Yang, Evgenios Karampatzakis, Christian Doerr, and Fernando Kuipers. 2018. Security Vulnerabilities in LoRaWAN. In IEEE\/ACM Third International Conference on Internet-of-Things Design and Implementation. IEEE, 129--140."},{"key":"e_1_3_2_1_40_1","volume-title":"Coverage and Scalability of LoRa LPWAN for Internet of Things. In IEEE\/ACM 26th International Symposium on Quality of Service. IEEE, 1--10","author":"Yousuf Asif M","year":"2018","unstructured":"Asif M Yousuf , Edward M Rochester , Behnam Ousat , and Majid Ghaderi . 2018 . Throughput , Coverage and Scalability of LoRa LPWAN for Internet of Things. In IEEE\/ACM 26th International Symposium on Quality of Service. IEEE, 1--10 . Asif M Yousuf, Edward M Rochester, Behnam Ousat, and Majid Ghaderi. 2018. Throughput, Coverage and Scalability of LoRa LPWAN for Internet of Things. In IEEE\/ACM 26th International Symposium on Quality of Service. IEEE, 1--10."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409949"}],"event":{"name":"SenSys '20: The 18th ACM Conference on Embedded Networked Sensor Systems","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGCOMM ACM Special Interest Group on Data Communication","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGOPS ACM Special Interest Group on Operating Systems","SIGBED ACM Special Interest Group on Embedded Systems","SIGARCH ACM Special Interest Group on Computer Architecture"],"location":"Virtual Event Japan","acronym":"SenSys '20"},"container-title":["Proceedings of the 18th Conference on Embedded Networked Sensor Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3384419.3430770","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3384419.3430770","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:36Z","timestamp":1750197756000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3384419.3430770"}},"subtitle":["towards secure LoRa communications with fine-grained physical layer features"],"short-title":[],"issued":{"date-parts":[[2020,11,16]]},"references-count":41,"alternative-id":["10.1145\/3384419.3430770","10.1145\/3384419"],"URL":"https:\/\/doi.org\/10.1145\/3384419.3430770","relation":{},"subject":[],"published":{"date-parts":[[2020,11,16]]},"assertion":[{"value":"2020-11-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}