{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,6]],"date-time":"2024-08-06T11:24:48Z","timestamp":1722943488596},"reference-count":32,"publisher":"Engineering and Technology Publishing","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["jcm"],"published-print":{"date-parts":[[2016]]},"DOI":"10.12720\/jcm.11.1.108-117","type":"journal-article","created":{"date-parts":[[2016,8,4]],"date-time":"2016-08-04T03:38:32Z","timestamp":1470281912000},"source":"Crossref","is-referenced-by-count":2,"title":["SRDA: A Secure Routing and Data Aggregation Approach for Wireless Smart Meter"],"prefix":"10.12720","author":[{"name":"Shenyang Institute of Automation Chinese Academy of Sciences, Shenyang and 110016, China","sequence":"first","affiliation":[]},{"given":"Ming","family":"Wan","sequence":"first","affiliation":[]},{"given":"Wenli","family":"Shang","sequence":"additional","affiliation":[]},{"given":"Peng","family":"Zeng","sequence":"additional","affiliation":[]},{"given":"Jianming","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"4977","published-online":{"date-parts":[[2016]]},"reference":[{"key":"ref1","first-page":"144","article-title":"Information system architecture for smart grids","volume":"36","author":"Cao","year":"2013","unstructured":"[1] J. W. Cao, Y. X. Wan, T. G. Yu, et al., \"Information system architecture for smart grids,\" Chinese Journal of Computers, vol. 36, pp. 144-167, Jan. 2013.","journal-title":"Chinese Journal of Computers"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.021312.00034"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/psce.2011.5772451"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.12.017"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2013.2260940"},{"key":"ref6","first-page":"1","article-title":"Cyber security issues for Advanced Metering Infrastructure (AMI","volume-title":"Proc IEEE Power and Energy Society General Meeting-Conversion and Delivery of Electrical Energy in the 21st Century","author":"Cleveland","year":"2008","unstructured":"[6] F. M. Cleveland, \"Cyber security issues for Advanced Metering Infrastructure (AMI),\" in Proc. IEEE Power and Energy Society General Meeting-Conversion and Delivery of Electrical Energy in the 21st Century, Pittsburgh, USA, Jul. 2008, pp. 1-5."},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/peds.2009.5385726"},{"key":"ref8","first-page":"30","article-title":"Power management software design and implementation based on wireless remote meter reading system","volume":"10","author":"Wang","year":"2012","unstructured":"[8] Z. F. Wang, J. Xu, Z. Zhu, Y. N. Wang, and H. Q. Gu, \"Power management software design and implementation based on wireless remote meter reading system,\" Machinery Design & Manufacture, vol. 10, pp. 30-32, Oct. 2012.","journal-title":"Machinery Design & Manufacture"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/icwits.2012.6417808"},{"key":"ref10","volume-title":"Research on secure routing mechanism for wireless sensor networks","author":"Song","year":"2009","unstructured":"[10] F. Song, \"Research on secure routing mechanism for wireless sensor networks,\" University of Science and Technology of China, 2009."},{"key":"ref11","first-page":"670","article-title":"A hierarchical intrusion detection model in wireless sensor networks","volume":"42","author":"Sun","year":"2013","unstructured":"[11] Z. W. Sun, G. W, Liang, Y. Bai, et al., \"A hierarchical intrusion detection model in wireless sensor networks,\" Information and Control, vol. 42, pp. 670-676, 2013.","journal-title":"Inf Contr","ISSN":"http:\/\/id.crossref.org\/issn\/0019-9958","issn-type":"print"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/indin.2013.6622924"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2228343"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.122111.00145"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/telfor.2012.6419164"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2013.6574667"},{"key":"ref17","first-page":"1","article-title":"Secure smart meter infrastructure in muti-dweling environment","volume-title":"Proc 25th IEEE Canadian Conference on Electrical & Computer Engineering","author":"Vaidya","year":"2012","unstructured":"[17] B. Vaidya, D. Makrakis, and H. Moufah, \"Secure smart meter infrastructure in muti-dweling environment,\" in Proc. 25th IEEE Canadian Conference on Electrical & Computer Engineering, Montreal, Canada, Apr. 2012, pp. 1-4."},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/wi-iat.2012.89"},{"key":"ref19","first-page":"408","article-title":"Security multipath routing for AMI network in smart grid","volume-title":"Proc IEEE 31st International Performance Computing and Communications Conference","author":"Vaidya","year":"2012","unstructured":"[19] B. Vaidya, D. Makrakis, and H. Mouftah, \"Security multipath routing for AMI network in smart grid,\" in Proc. IEEE 31st International Performance Computing and Communications Conference, Austin, USA, Dec. 2012, pp. 408-415."},{"key":"ref20","first-page":"327","article-title":"Secure information aggregation for smart grids usinghomomorphic encryption","volume-title":"Proc First IEEE International Conference on Smart Grid Communications","author":"Li","year":"2010","unstructured":"[20] F. Li, B. Luo, and P. Liu, \"Secure information aggregation for smart grids usinghomomorphic encryption,\" in Proc. First IEEE International Conference on Smart Grid Communications, Gaithersburg, USA, Oct. 2010, pp. 327-332."},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.130716"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2013.6655270"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ISSNIP.2013.6529767"},{"key":"ref24","first-page":"343","article-title":"Identity-based cryptography techniques and appications (a review","volume-title":"Proc 5th International Conference on Computational Intelligence and Communication Networks","author":"Anand","year":"2013","unstructured":"[24] D. Anand, V. Khemchandani, and R. K. Sharma, \"Identity-based cryptography techniques and appications (a review),\" in Proc. 5th International Conference on Computational Intelligence and Communication Networks, Mathura, India, Sep. 2013, pp. 343-348."},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/mascots.2013.58"},{"key":"ref26","first-page":"1212","article-title":"Cost balanced routing algorithms based on link quality in WSN","volume":"32","author":"Hao","year":"2010","unstructured":"[26] X. C. Hao, J. J. Dou, H. R. Liu, L. P. Guo, and B. Lin, \"Cost balanced routing algorithms based on link quality in WSN,\" Journal of Electronics & Information Technology, vol. 32, pp. 1212-1218, 2010.","journal-title":"Dianzi Yu Xinxi Xuebao","ISSN":"http:\/\/id.crossref.org\/issn\/1009-5896","issn-type":"print"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.2013.6461198"},{"key":"ref28","first-page":"10","article-title":"On controller performance in software-defined networks","volume-title":"Proc 2nd USENIX Conference on Hot Topics in Management of Internet Cloud and Enterprise Networks and Services","author":"Tootoonchian","year":"2012","unstructured":"[28] A. Tootoonchian, S. Gorbunov, Y. Ganjali, et al., \"On controller performance in software-defined networks,\" in Proc. 2nd USENIX Conference on Hot Topics in Management of Internet, Cloud, and Enterprise Networks and Services, CA, USA, Apr. 2012, pp. 10-10."},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/indcon.2012.6420675"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1080\/00207160.2012.757599"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2011.5963368"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2184512.2184588"}],"container-title":["Journal of Communications"],"original-title":[],"link":[{"URL":"http:\/\/www.jocm.us\/uploadfile\/2016\/0115\/20160115051749287.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,2,4]],"date-time":"2017-02-04T03:06:20Z","timestamp":1486177580000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.jocm.us\/index.php?m=content&c=index&a=show&catid=157&id=928"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"references-count":32,"URL":"https:\/\/doi.org\/10.12720\/jcm.11.1.108-117","relation":{},"ISSN":["2374-4367"],"issn-type":[{"type":"print","value":"2374-4367"}],"subject":[],"published":{"date-parts":[[2016]]}}}