{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:05:36Z","timestamp":1750309536714,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,6]],"date-time":"2024-12-06T00:00:00Z","timestamp":1733443200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,6]]},"DOI":"10.1145\/3711618.3711639","type":"proceedings-article","created":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T11:22:41Z","timestamp":1740223361000},"page":"171-180","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Trusted measurement technology for Power Internet of Things"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-5315-6846","authenticated-orcid":false,"given":"Chaoqun","family":"Kang","sequence":"first","affiliation":[{"name":"State grid Shanghai energy interaction research institute co., LTD, Shanghai, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-4051-6580","authenticated-orcid":false,"given":"Keqi","family":"Zhu","sequence":"additional","affiliation":[{"name":"State grid Shanghai energy interaction research institute co., LTD, Shanghai, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-3705-6598","authenticated-orcid":false,"given":"Yuling","family":"Li","sequence":"additional","affiliation":[{"name":"State grid Shanghai energy interaction research institute co., LTD, Shanghai, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-3746-2698","authenticated-orcid":false,"given":"Jin","family":"Peng","sequence":"additional","affiliation":[{"name":"College of Computer Science, Beijing University of Technology, Beijing, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-8233-9332","authenticated-orcid":false,"given":"Zhiheng","family":"Deng","sequence":"additional","affiliation":[{"name":"College of Computer Science, Beijing University of Technology, Beijing, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2025,2,22]]},"reference":[{"key":"e_1_3_3_1_1_2","first-page":"58965","article-title":"Security in the Power Internet of Things: The State of the Art and Challenges","volume":"7","author":"Zhang Y.","year":"2019","unstructured":"Zhang, Y., & Tan, L. (2019). \"Security in the Power Internet of Things: The State of the Art and Challenges.\" IEEE Access, 7, 58965-58981.","journal-title":"IEEE Access"},{"issue":"1","key":"e_1_3_3_1_2_2","first-page":"12","article-title":"Trust Anchors in IoT: A Survey","volume":"8","author":"Smith J.","year":"2017","unstructured":"Smith, J., et al. (2017). \"Trust Anchors in IoT: A Survey.\" Journal of Internet Services and Applications, 8(1), 12-36.","journal-title":"Journal of Internet Services and Applications"},{"issue":"6","key":"e_1_3_3_1_3_2","first-page":"55","article-title":"Enhancing IoT Security with Trusted Computing","volume":"53","author":"Lee M. K.","year":"2020","unstructured":"Lee, M. K., et al. (2020). \"Enhancing IoT Security with Trusted Computing.\" IEEE Computer, 53(6), 55-63.","journal-title":"IEEE Computer"},{"key":"e_1_3_3_1_4_2","volume-title":"TPM Main Specification.\" Trusted Computing Group","author":"Trusted Computing Group","year":"2007","unstructured":"Trusted Computing Group. (2007). \"TPM Main Specification.\" Trusted Computing Group."},{"issue":"4","key":"e_1_3_3_1_5_2","first-page":"483","article-title":"Cyber-Physical Systems Security: A Systematic Mapping Study","volume":"29","author":"Huang Q.","year":"2021","unstructured":"Huang, Q., & Liu, J. (2021). \"Cyber-Physical Systems Security: A Systematic Mapping Study.\" Journal of Computer Security, 29(4), 483-509.","journal-title":"Journal of Computer Security"},{"key":"e_1_3_3_1_6_2","first-page":"105623","article-title":"TPCM: A Trusted Platform Control Module for Power IoT","volume":"117","author":"Lee M. K.","year":"2020","unstructured":"Lee, M. K., et al. (2020). \"TPCM: A Trusted Platform Control Module for Power IoT.\" International Journal of Electrical Power & Energy Systems, 117, 105623.","journal-title":"International Journal of Electrical Power & Energy Systems"},{"key":"e_1_3_3_1_7_2","first-page":"410","article-title":"A Novel Trust Management Framework for Multi-Agent Systems in Power IoT","volume":"145","author":"Smith J.","year":"2018","unstructured":"Smith, J., et al. (2018). \"A Novel Trust Management Framework for Multi-Agent Systems in Power IoT.\" Energy Procedia, 145, 410-415.","journal-title":"Energy Procedia"},{"issue":"3","key":"e_1_3_3_1_8_2","first-page":"1963","article-title":"Trust Management for the Power IoT: An Overview","volume":"16","author":"Zhang Y.","year":"2020","unstructured":"Zhang, Y., & Tan, L. (2020). \"Trust Management for the Power IoT: An Overview.\" IEEE Transactions on Industrial Informatics, 16(3), 1963-1971.","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"e_1_3_3_1_9_2","first-page":"30511","article-title":"Security Challenges in the 5G Era: A Focus on IoT","volume":"9","author":"Huang Q.","year":"2021","unstructured":"Huang, Q., & Liu, J. (2021). \"Security Challenges in the 5G Era: A Focus on IoT.\" IEEE Access, 9, 30511-30524.","journal-title":"IEEE Access"},{"issue":"2","key":"e_1_3_3_1_10_2","first-page":"1598","article-title":"Dual-System Architecture for Trusted Power IoT Terminals","volume":"36","author":"Lee M. K.","year":"2021","unstructured":"Lee, M. K., et al. (2021). \"Dual-System Architecture for Trusted Power IoT Terminals.\" IEEE Transactions on Power Systems, 36(2), 1598-1607. M. Young, The Technical Writer's Handbook. Mill Valley, CA: University Science, 1989.","journal-title":"IEEE Transactions on Power Systems"},{"key":"e_1_3_3_1_11_2","volume-title":"Performance comparison of modified AODV in reference point group mobility and random waypoint mobility models[A]\/\/IEEE","author":"Harris Simaremare Syarif Abdusy","year":"2013","unstructured":"Harris Simaremare, Syarif Abdusy, Abouaissa Abdelhafid, et al. Performance comparison of modified AODV in reference point group mobility and random waypoint mobility models[A]\/\/IEEE, 2013: 3542-3546."},{"key":"e_1_3_3_1_12_2","volume-title":"Ad hoc on-demand distance vector (AODV) routing[R]","author":"Charles Perkins Belding-Royer","year":"2003","unstructured":"Charles Perkins, Belding-Royer Elizabeth, Das Samir. Ad hoc on-demand distance vector (AODV) routing[R]. 2003."},{"key":"e_1_3_3_1_13_2","first-page":"1","volume-title":"Development and Sustainability","author":"Shahid Sultan Javaid Qaisar","year":"2021","unstructured":"Shahid Sultan, Javaid Qaisar, Malik Arif-Jamal, et al. Collaborative-trust approach toward malicious node detection in vehicular ad hoc networks[J]. Environment, Development and Sustainability, 2021, 1-19."},{"key":"e_1_3_3_1_14_2","first-page":"8864","volume-title":"IEEE Transactions on Industrial Informatics","author":"Liu Yang Yu Keping","year":"2021","unstructured":"Liu Yang, Yu Keping, Yang Simon-X, et al. An intelligent trust cloud management method for secure clustering in 5G enabled internet of medical things[J]. IEEE Transactions on Industrial Informatics, 2021, 18(12): 8864-8875"}],"event":{"name":"ICCNS 2024: 2024 14th International Conference on Communication and Network Security","acronym":"ICCNS 2024","location":"Xiamen Shanghai China"},"container-title":["Proceedings of the 2024 14th International Conference on Communication and Network Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3711618.3711639","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3711618.3711639","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:29Z","timestamp":1750295909000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3711618.3711639"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,6]]},"references-count":14,"alternative-id":["10.1145\/3711618.3711639","10.1145\/3711618"],"URL":"https:\/\/doi.org\/10.1145\/3711618.3711639","relation":{},"subject":[],"published":{"date-parts":[[2024,12,6]]},"assertion":[{"value":"2025-02-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}