{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:22:55Z","timestamp":1740140575325,"version":"3.37.3"},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2016,10,19]],"date-time":"2016-10-19T00:00:00Z","timestamp":1476835200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100002631","name":"Gachon University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002631","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1186\/s13638-016-0746-6","type":"journal-article","created":{"date-parts":[[2016,10,19]],"date-time":"2016-10-19T02:09:01Z","timestamp":1476842941000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Secure dissemination of software updates for intelligent mobility in future wireless networks"],"prefix":"10.1186","volume":"2016","author":[{"given":"JongHyup","family":"Lee","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5513-0836","authenticated-orcid":false,"given":"Taekyoung","family":"Kwon","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,19]]},"reference":[{"key":"746_CR1","unstructured":"Command Five. SK hack by an advanced persistent threat (2011). http:\/\/www.commandfive.com\/papers\/C5_APT_SKHack.pdf ."},{"key":"746_CR2","volume-title":"Software Piracy Exposed\u2014Secrets from the Dark Side Revealed","author":"P Craig","year":"2005","unstructured":"P Craig, Software Piracy Exposed\u2014Secrets from the Dark Side Revealed, 1st edn. (Syngress Publishing, Rockland, 2005)."},{"key":"746_CR3","doi-asserted-by":"publisher","first-page":"636","DOI":"10.1109\/CSIE.2009.45","volume-title":"Computer Science and Information Engineering, 2009 WRI World Congress On","author":"J Zhao","year":"2009","unstructured":"J Zhao, N Yao, S Cai, in Computer Science and Information Engineering, 2009 WRI World Congress On, 2. A new method to protect software from cracking (IEEE New York, 2009), pp. 636\u2013638."},{"key":"746_CR4","volume-title":"The IDA Pro Book: the Unofficial Guide to the World\u2019s Most Popular Disassembler","author":"C Eagle","year":"2011","unstructured":"C Eagle, The IDA Pro Book: the Unofficial Guide to the World\u2019s Most Popular Disassembler (No Starch Press, San Francisco, 2011)."},{"issue":"1","key":"746_CR5","first-page":"4:1","volume":"13","author":"M Abadi","year":"2009","unstructured":"M Abadi, M Budiu, \u00da Erlingsson, J Ligatti, Control-flow integrity principles, implementations, and applications. Trans. Inform. Syst. Secur. (TISSEC). 13(1), 4:1\u20134.40 (2009).","journal-title":"Trans. Inform. Syst. Secur. (TISSEC)"},{"key":"746_CR6","doi-asserted-by":"crossref","unstructured":"GC Necula, S McPeak, SP Rahul, W Weimer, in International Conference on Compiler Construction. CIL: intermediate language and tools for analysis and transformation of C programs (Springer Berlin Heidelberg, 2002), pp. 213\u2013228.","DOI":"10.1007\/3-540-45937-5_16"},{"issue":"1","key":"746_CR7","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/s11265-008-0271-x","volume":"59","author":"L-J Chen","year":"2010","unstructured":"L-J Chen, T Sun, N-C Liang, An evaluation study of mobility support in ZigBee networks. J. Signal Process. Syst.59(1), 111\u2013122 (2010).","journal-title":"J. Signal Process. Syst."},{"key":"746_CR8","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1109\/ICoICT.2014.6914042","volume-title":"Information and Communication Technology (ICoICT), 2014 2nd International Conference On","author":"N Khamphakdee","year":"2014","unstructured":"N Khamphakdee, N Benjamas, S Saiyod, in Information and Communication Technology (ICoICT), 2014 2nd International Conference On. Improving intrusion detection system based on snort rules for network probe attack detection (IEEE New York, 2014), pp. 69\u201374."},{"key":"746_CR9","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1109\/WIMOB.2005.1512911","volume-title":"Wireless And Mobile Computing, Networking And Communications, 2005.(WiMob\u20192005), IEEE International Conference On","author":"I Onat","year":"2005","unstructured":"I Onat, A Miri, in Wireless And Mobile Computing, Networking And Communications, 2005.(WiMob\u20192005), IEEE International Conference On, 3. An intrusion detection system for wireless sensor networks (IEEE New York, 2005), pp. 253\u2013259."},{"key":"746_CR10","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1109\/ICARA.2015.7081151","volume-title":"Automation, Robotics and Applications (ICARA), 2015 6th International Conference On","author":"A Ashraful Alam","year":"2015","unstructured":"A Ashraful Alam, D Eyers, Z Huang, in Automation, Robotics and Applications (ICARA), 2015 6th International Conference On. Helping secure robots in WSN environments by monitoring WSN software updates for intrusions (IEEE New York, 2015), pp. 223\u2013229."},{"key":"746_CR11","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1109\/ITME.2008.4743870","volume-title":"IT in Medicine and Education, 2008. ITME 2008. IEEE International Symposium On","author":"Y Mo","year":"2008","unstructured":"Y Mo, Y Ma, L Xu, in IT in Medicine and Education, 2008. ITME 2008. IEEE International Symposium On. Design and implementation of intrusion detection based on mobile agents (IEEE New York, 2008), pp. 278\u2013281."},{"key":"746_CR12","first-page":"326","volume-title":"Proceedings of the 5th International Conference on Information Processing in Sensor Networks","author":"PK Dutta","year":"2006","unstructured":"PK Dutta, JW Hui, DC Chu, DE Culler, in Proceedings of the 5th International Conference on Information Processing in Sensor Networks. Securing the deluge network programming system (ACM New York, 2006), pp. 326\u2013333."},{"key":"746_CR13","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/iThings\/CPSCom.2011.45","volume-title":"Internet of Things (iThings\/CPSCom), 2011 International Conference on and 4th International Conference on Cyber, Physical and Social Computing","author":"J Liu","year":"2011","unstructured":"J Liu, W Tong, in Internet of Things (iThings\/CPSCom), 2011 International Conference on and 4th International Conference on Cyber, Physical and Social Computing. A framework for dynamic updating of service pack in the internet of things (IEEE New York, 2011), pp. 33\u201342."},{"key":"746_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ISCE.2015.7177805","volume-title":"Consumer Electronics (ISCE), 2015 IEEE International Symposium On","author":"SG Hong","year":"2015","unstructured":"SG Hong, NS Kim, T Heo, in Consumer Electronics (ISCE), 2015 IEEE International Symposium On. A smartphone connected software updating framework for IoT devices (IEEE New York, 2015), pp. 1\u20132."},{"key":"746_CR15","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1109\/SECPRI.2004.1301329","volume-title":"SP \u201904: Proceedings of the 2004 IEEE Symposium on Security and Privacy","author":"A Seshadri","year":"2004","unstructured":"A Seshadri, A Perrig, L van Doorn, P Khosla, in SP \u201904: Proceedings of the 2004 IEEE Symposium on Security and Privacy. SWATT: software-based attestation for embedded devices (IEEE Oakland, 2004), pp. 272\u2013282."},{"issue":"5","key":"746_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1095809.1095812","volume":"39","author":"A Seshadri","year":"2005","unstructured":"A Seshadri, M Luk, E Shi, A Perrig, L van Doorn, P Khosla, Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems. ACM SIGOPS Oper. Syst. Rev.39(5), 1\u201316 (2005).","journal-title":"ACM SIGOPS Oper. Syst. Rev."},{"key":"746_CR17","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1145\/1161289.1161306","volume-title":"WiSe \u201906: Proceedings of the 5th ACM Workshop on Wireless Security","author":"A Seshadri","year":"2006","unstructured":"A Seshadri, M Luk, A Perrig, L van Doorn, P Khosla, in WiSe \u201906: Proceedings of the 5th ACM Workshop on Wireless Security. SCUBA: Secure Code Update By Attestation in sensor networks (ACM New York, 2006), pp. 85\u201394."},{"issue":"2","key":"746_CR18","doi-asserted-by":"publisher","first-page":"25","DOI":"10.14257\/ijsia.2014.8.2.03","volume":"8","author":"S Kiyomoto","year":"2014","unstructured":"S Kiyomoto, Y Miyake, Lightweight attestation scheme for wireless sensor network. International Journal of Security and Its Applications. 8(2), 25\u201340 (2014).","journal-title":"International Journal of Security and Its Applications"}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-016-0746-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13638-016-0746-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-016-0746-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,26]],"date-time":"2020-09-26T19:21:30Z","timestamp":1601148090000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-016-0746-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,19]]},"references-count":18,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,12]]}},"alternative-id":["746"],"URL":"https:\/\/doi.org\/10.1186\/s13638-016-0746-6","relation":{},"ISSN":["1687-1499"],"issn-type":[{"type":"electronic","value":"1687-1499"}],"subject":[],"published":{"date-parts":[[2016,10,19]]},"article-number":"250"}}