{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:06:11Z","timestamp":1750309571534,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,6]],"date-time":"2024-12-06T00:00:00Z","timestamp":1733443200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,6]]},"DOI":"10.1145\/3711618.3711640","type":"proceedings-article","created":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T11:22:41Z","timestamp":1740223361000},"page":"181-188","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Trusted Attestation Protocol for Power Internet of Things"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-4051-6580","authenticated-orcid":false,"given":"Erxia","family":"Li","sequence":"first","affiliation":[{"name":"State grid Shanghai energy interaction research institute co., LTD, Shanghai, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-5315-6846","authenticated-orcid":false,"given":"Chaoqun","family":"Kang","sequence":"additional","affiliation":[{"name":"State grid Shanghai energy interaction research institute co., LTD, Shanghai, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-3705-6598","authenticated-orcid":false,"given":"Yuling","family":"Li","sequence":"additional","affiliation":[{"name":"State grid Shanghai energy interaction research institute co., LTD, Shanghai, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-3746-2698","authenticated-orcid":false,"given":"Jin","family":"Peng","sequence":"additional","affiliation":[{"name":"College of Computer Science, Beijing University of Technology, Beijing, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-8233-9332","authenticated-orcid":false,"given":"Zhiheng","family":"Deng","sequence":"additional","affiliation":[{"name":"College of Computer Science, Beijing University of Technology, Beijing, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2025,2,22]]},"reference":[{"issue":"10","key":"e_1_3_3_1_1_2","first-page":"53","article-title":"Risk assessment of the whole process management of power Internet of Things users [J]","volume":"50","author":"Xiaoyu Yang","year":"2022","unstructured":"Yang Xiaoyu, Guo Xiaopeng, Yang Kun. Risk assessment of the whole process management of power Internet of Things users [J]. Smart Power, 2022,50 (10): 53-60.","journal-title":"Smart Power"},{"issue":"09","key":"e_1_3_3_1_2_2","first-page":"29","article-title":"Design and application of security detection system for Power Internet of Things devices [J]","volume":"49","author":"Donglan Liu","year":"2022","unstructured":"Liu Donglan, Zhang Hao, Lu Sihan, et al. Design and application of security detection system for Power Internet of Things devices [J]. Shandong Electric Power Technology, 2022,49 (09): 29-35.","journal-title":"Shandong Electric Power Technology"},{"key":"e_1_3_3_1_3_2","first-page":"3012","volume-title":"High Voltage Technology","author":"Bo Qi","year":"2022","unstructured":"Qi Bo, Ji Mao, Zheng Yuping, et al. Application status and development prospect of power Internet of Things technology in the status evaluation of power transmission and transformation equipment [J]. High Voltage Technology, 2022,48 (08): 3012-3031."},{"key":"e_1_3_3_1_4_2","first-page":"181","article-title":"Security protection of mobile Internet applications in the electric power industry [J]","volume":"01","author":"Hong Zhang","year":"2019","unstructured":"Zhang Hong, Gao Yu, Li Li. Security protection of mobile Internet applications in the electric power industry [J]. Electronic Technology and Software Engineering, 2019, (01): 181-182.","journal-title":"Electronic Technology and Software Engineering"},{"issue":"05","key":"e_1_3_3_1_5_2","first-page":"1120","article-title":"Edge zero trust model against the threat of lost terminals in the power IOT scenario [J]","volume":"59","author":"Jingyu Feng","year":"2022","unstructured":"Feng Jingyu, Yu Tingting, Wang Ziying, et al. Edge zero trust model against the threat of lost terminals in the power IOT scenario [J]. Computer Research and Development, 2022,59 (05): 1120-1132.","journal-title":"Computer Research and Development"},{"issue":"05","key":"e_1_3_3_1_6_2","first-page":"1641","article-title":"Power Internet of Things 5G cloud side-end collaborative framework and resource scheduling method [J]","volume":"46","author":"Zhenyu Zhou","year":"2022","unstructured":"Zhou Zhenyu, Wang Zhao, Liao Haijun, et al. Power Internet of Things 5G cloud side-end collaborative framework and resource scheduling method [J]. Power Grid Technology, 2022,46 (05): 1641-1651.","journal-title":"Power Grid Technology"},{"key":"e_1_3_3_1_7_2","volume-title":"An improved and efficient mutual attestation scheme for session initiation protocol[J]. PloS one","author":"Zhang Yuanyuan","year":"2019","unstructured":"Yuanyuan Zhang, Xie Kunming, Ruan Ou. An improved and efficient mutual attestation scheme for session initiation protocol[J]. PloS one, 2019, 14(3): e213688."},{"key":"e_1_3_3_1_8_2","volume-title":"On a limitation of BAN logic[A]\/\/Springer","author":"Boyd Colin","year":"2001","unstructured":"Colin Boyd, Mao Wenbo. On a limitation of BAN logic[A]\/\/Springer, 2001: 240-247."},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1111\/j.1465-7295.1991.tb01258.x"},{"key":"e_1_3_3_1_10_2","first-page":"1","volume-title":"Multimedia Tools and Applications","author":"Chen Yulei","year":"2022","unstructured":"Yulei Chen, Chen Jianhua. A biometrics-based mutual attestation and key agreement protocol for TMIS using elliptic curve cryptography[J]. Multimedia Tools and Applications, 2022, 1-24."},{"key":"e_1_3_3_1_11_2","first-page":"2017","article-title":"Performance evaluation of cryptographic algorithms over IoT platforms and operating systems[J]","author":"PEREIRA G C, ALVES R C, SILVA F L D","year":"2017","unstructured":"PEREIRA G C, ALVES R C, SILVA F L D, et al. Performance evaluation of cryptographic algorithms over IoT platforms and operating systems[J]. Security and Communication Networks, 2017,2017.","journal-title":"Security and Communication Networks"},{"key":"e_1_3_3_1_12_2","volume-title":"A privacy-preserving RFID attestation protocol based on El-Gamal cryptosystem for secure TMIS[J]. Information sciences","author":"Salem F M","year":"2020","unstructured":"Salem F M, Amin R. A privacy-preserving RFID attestation protocol based on El-Gamal cryptosystem for secure TMIS[J]. Information sciences, 2020, 527: 382-393."}],"event":{"name":"ICCNS 2024: 2024 14th International Conference on Communication and Network Security","acronym":"ICCNS 2024","location":"Xiamen Shanghai China"},"container-title":["Proceedings of the 2024 14th International Conference on Communication and Network Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3711618.3711640","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3711618.3711640","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:19:14Z","timestamp":1750295954000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3711618.3711640"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,6]]},"references-count":12,"alternative-id":["10.1145\/3711618.3711640","10.1145\/3711618"],"URL":"https:\/\/doi.org\/10.1145\/3711618.3711640","relation":{},"subject":[],"published":{"date-parts":[[2024,12,6]]},"assertion":[{"value":"2025-02-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}