{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T11:22:11Z","timestamp":1763810531685,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,10,21]],"date-time":"2020-10-21T00:00:00Z","timestamp":1603238400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,10,21]],"date-time":"2020-10-21T00:00:00Z","timestamp":1603238400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,10,21]],"date-time":"2020-10-21T00:00:00Z","timestamp":1603238400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,10,21]]},"DOI":"10.1109\/csnet50428.2020.9265530","type":"proceedings-article","created":{"date-parts":[[2021,4,14]],"date-time":"2021-04-14T04:26:32Z","timestamp":1618374392000},"page":"1-8","source":"Crossref","is-referenced-by-count":18,"title":["Activation of LoRaWAN End Devices by Using Public Key Cryptography"],"prefix":"10.1109","author":[{"given":"Fredrik","family":"Marlind","sequence":"first","affiliation":[{"name":"Chalmers University of Technology,Network and Systems Division,Department of Computer Science and Engineering,412 96 Gothenburg,Sweden"}]},{"given":"Ismail","family":"Butun","sequence":"additional","affiliation":[{"name":"Chalmers University of Technology,Network and Systems Division,Department of Computer Science and Engineering,412 96 Gothenburg,Sweden"}]}],"member":"263","reference":[{"key":"ref10","article-title":"A study of encryption algorithms aes, des and rsa for security","author":"mahajan","year":"2013","journal-title":"Global Journal of Computer Science and Technology"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICCT46805.2019.8947215"},{"key":"ref12","doi-asserted-by":"crossref","DOI":"10.3390\/s18061833","article-title":"Enhancing LoRaWAN security through a lightweight and authenticated key management approach","volume":"18","author":"sanchez-iborra","year":"2018","journal-title":"Sensors (Switzerland)"},{"journal-title":"Tech Rep","article-title":"A technical overview of LoRa &#x00AE; and LoRaWAN &#x2122; What is it?","year":"2015","key":"ref13"},{"key":"ref14","article-title":"An overview of elliptic curve cryptography","author":"l\u00f3pez","year":"2000","journal-title":"Tech Rep"},{"journal-title":"eBACS ECRYPT Benchmarking of Cryptographic Systems","year":"0","key":"ref15"},{"key":"ref16","article-title":"Prevention and detection of intrusions in wireless sensor networks","author":"butun","year":"2013","journal-title":"Ph D Dissertation"},{"key":"ref17","first-page":"945","article-title":"A blind digital signature scheme using elliptic curve digital signature algorithm","volume":"21","author":"b\u00fct\u00fcn","year":"2013","journal-title":"Turkish Journal of Electrical Engineering & Computer Sciences"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-56Ar3"},{"journal-title":"Cryptography and Network Security Principles and Practice","year":"2017","author":"stallings","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC.2017.7868419"},{"journal-title":"LoRaWAN 1 1 Specification","year":"2017","key":"ref6"},{"journal-title":"Lorawan security A white paper prepared for the lora alliance - full end-to-end encryption for iot application providers","year":"0","key":"ref5"},{"key":"ref8","first-page":"1","article-title":"Analysis of lorawan v1. 1 security","author":"butun","year":"2018","journal-title":"Proceedings of the 4th ACM MobiHoc Workshop on Experiences with the Design and Implementation of Smart Objects"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.11.017"},{"key":"ref2","article-title":"The Internet Worm Program: An Analysis","author":"spafford","year":"1988","journal-title":"Tech Rep"},{"journal-title":"IoT connections outlook","year":"0","key":"ref1"},{"key":"ref9","doi-asserted-by":"crossref","DOI":"10.3390\/fi11010003","article-title":"Security risk analysis of lorawan and future directions","volume":"11","author":"butun","year":"2018","journal-title":"Future Internet"}],"event":{"name":"2020 4th Cyber Security in Networking Conference (CSNet)","start":{"date-parts":[[2020,10,21]]},"location":"Lausanne, Switzerland","end":{"date-parts":[[2020,10,23]]}},"container-title":["2020 4th Cyber Security in Networking Conference (CSNet)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9265454\/9265455\/09265530.pdf?arnumber=9265530","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T15:43:17Z","timestamp":1656344597000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9265530\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,21]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/csnet50428.2020.9265530","relation":{},"subject":[],"published":{"date-parts":[[2020,10,21]]}}}