{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:35:33Z","timestamp":1740148533967,"version":"3.37.3"},"reference-count":14,"publisher":"Wiley","license":[{"start":{"date-parts":[[2019,6,11]],"date-time":"2019-06-11T00:00:00Z","timestamp":1560211200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100006109","name":"Vedeck\u00e1 Grantov\u00e1 Agent\u00fara M\u0160VVa\u0160 SR a SAV","doi-asserted-by":"publisher","award":["1\/0272\/18"],"award-info":[{"award-number":["1\/0272\/18"]}],"id":[{"id":"10.13039\/501100006109","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Sensors"],"published-print":{"date-parts":[[2019,6,11]]},"abstract":"<jats:p>Wireless monitoring systems are currently a common part of both industrial and domestic solutions. In case of industrial use, it may be a sensory system at a point where it is not possible to implement a fixed line, or it is necessary to repeatedly change the position, respectively, the location of the measuring probes. This is, in particular, the monitoring of environmental parameters (temperature, humidity) in bulk materials, biomass, or agricultural crops in storage facilities. For domestic use, local weather devices and systems are part of smart households such as lock control (entrance gate, apartment entrance), light control, and HVAC control. Devices that utilize wireless technology for communication include IoT devices as well. This article describes the use of the VirtualWire communication protocol using radio frequency waves with a carrier frequency of 433MHz-900MHz. The main topic of the article is the design and implementation of a secure one-way communication channel. Such a solution consists of a transmitting device with implemented desired sensors and a receiving device that aggregates data from multiple transmitters.<\/jats:p>","DOI":"10.1155\/2019\/7810709","type":"journal-article","created":{"date-parts":[[2019,6,11]],"date-time":"2019-06-11T19:31:28Z","timestamp":1560281488000},"page":"1-10","source":"Crossref","is-referenced-by-count":1,"title":["Implementation of Secure Communication via the RF Module for Data Acquisition"],"prefix":"10.1155","volume":"2019","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5570-5150","authenticated-orcid":true,"given":"Juraj","family":"Dudak","sequence":"first","affiliation":[{"name":"Faculty of Materials Science and Technology in Trnava, Slovak University of Technology in Bratislava, Slovakia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2550-1675","authenticated-orcid":true,"given":"Gabriel","family":"Gaspar","sequence":"additional","affiliation":[{"name":"Faculty of Materials Science and Technology in Trnava, Slovak University of Technology in Bratislava, Slovakia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7025-1911","authenticated-orcid":true,"given":"Pavol","family":"Tanuska","sequence":"additional","affiliation":[{"name":"Faculty of Materials Science and Technology in Trnava, Slovak University of Technology in Bratislava, Slovakia"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/3680851","volume":"2018","year":"2018","journal-title":"Security and Communication Networks"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/4296934","volume":"2018","year":"2018","journal-title":"Security and Communication Networks"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/6492592"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.5120\/ijca2017913548"},{"volume":"585","journal-title":"IACR Cryptology","year":"2013","key":"5"},{"key":"7","series-title":"Lecture Notes in Computer Science","first-page":"50","volume-title":"Automatic differential analysis of arx block ciphers with application to speck and lea","volume":"9723","year":"2016"},{"issue":"1","key":"8","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1049\/iet-ifs.2016.0503","volume":"12","year":"2018","journal-title":"IET Information Security"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1002\/ecj.12012"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/9591768","volume":"2018","year":"2018","journal-title":"Security and Communication Networks"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-23923-1_56"},{"issue":"1","key":"15","first-page":"378","volume":"19","year":"2018","journal-title":"IEEE Sensors Journal"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1016\/j.protcy.2016.08.111"},{"volume":"1036","journal-title":"IACR Cryptology","year":"2017","key":"19"},{"key":"21","series-title":"LightSec","volume-title":"The simon and speck block ciphers on avr 8-bit microcontrollers","volume":"8898","year":"2014"}],"container-title":["Journal of Sensors"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/js\/2019\/7810709.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/js\/2019\/7810709.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/js\/2019\/7810709.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,11]],"date-time":"2019-06-11T19:31:35Z","timestamp":1560281495000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/js\/2019\/7810709\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,11]]},"references-count":14,"alternative-id":["7810709","7810709"],"URL":"https:\/\/doi.org\/10.1155\/2019\/7810709","relation":{},"ISSN":["1687-725X","1687-7268"],"issn-type":[{"type":"print","value":"1687-725X"},{"type":"electronic","value":"1687-7268"}],"subject":[],"published":{"date-parts":[[2019,6,11]]}}}