{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T16:56:33Z","timestamp":1776444993276,"version":"3.51.2"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030222628","type":"print"},{"value":"9783030222635","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,6,19]],"date-time":"2019-06-19T00:00:00Z","timestamp":1560902400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-22263-5_47","type":"book-chapter","created":{"date-parts":[[2019,6,18]],"date-time":"2019-06-18T04:03:54Z","timestamp":1560830634000},"page":"493-502","update-policy":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A LoRaWAN Based Energy Efficient Data Encryption Method"],"prefix":"10.1007","author":[{"given":"Kun-Lin","family":"Tsai","sequence":"first","affiliation":[]},{"given":"Fang-Yie","family":"Leu","sequence":"additional","affiliation":[]},{"given":"Shuo-Wen","family":"Chang","sequence":"additional","affiliation":[]},{"given":"Jiun-Yi","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Huei-Tang","family":"Luo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,19]]},"reference":[{"issue":"5","key":"47_CR1","doi-asserted-by":"publisher","first-page":"2140","DOI":"10.1109\/TII.2017.2679740","volume":"13","author":"B Tang","year":"2017","unstructured":"Tang, B., Chen, Z., Hefferman, G., Pei, S., Wei, T., He, H., Yang, Q.: Incorporating intelligence in fog computing for big data analysis in smart cities. IEEE Trans. Industr. Inf. 13(5), 2140\u20132150 (2017)","journal-title":"IEEE Trans. Industr. Inf."},{"key":"47_CR2","doi-asserted-by":"crossref","unstructured":"Ahmad, S., Badwelan, A., Ghaleb, A.M., Qamhan, A., Sharaf, M.: Analyzing critical failures in a production process: is industrial IoT the solution? In: Wireless Communications and Mobile Computing, vol. 2018, pp. 1\u201312, Dec 2018. Article ID 6951318","DOI":"10.1155\/2018\/6951318"},{"key":"47_CR3","doi-asserted-by":"publisher","first-page":"10288","DOI":"10.1109\/ACCESS.2016.2638038","volume":"4","author":"KH Yeh","year":"2016","unstructured":"Yeh, K.H.: A secure IoT-based healthcare system with body sensor networks. IEEE Access 4, 10288\u201310299 (2016)","journal-title":"IEEE Access"},{"key":"47_CR4","unstructured":"[Online]. Available: \n                    https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/www.lora-alliance.org\/"},{"key":"47_CR5","unstructured":"Prasithsangaree, P., Krishnamurthy, P.: Analysis of energy consumption of RC4 and AES algorithms in wireless LANs. In: Proceedings of IEEE Global Telecommunications Conference (GLOBECOM), pp. 1445\u20131449, Dec 2003"},{"key":"47_CR6","unstructured":"McGrew, D.: Low power wireless scenarios and techniques for saving bandwidth without sacrificing security. In: Proceedings of NIST Lightweight Cryptography Workshop, pp. 1\u201315, July 2015"},{"issue":"3","key":"47_CR7","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1007\/s11277-011-0385-5","volume":"61","author":"T Heer","year":"2011","unstructured":"Heer, T., Garcia-Morchon, O., Hummen, R., Keoh, S.L., Kumar, S.S., Wehrle, K.: Security challenges in the IP-based Internet of things. Wireless Pers. Commun. 61(3), 527\u2013542 (2011)","journal-title":"Wireless Pers. Commun."},{"key":"47_CR8","doi-asserted-by":"publisher","first-page":"45325","DOI":"10.1109\/ACCESS.2018.2852563","volume":"6","author":"KL Tsai","year":"2018","unstructured":"Tsai, K.L., Huang, Y.L., Leu, F.Y., You, I., Huang, Y.L., Tsai, C.H.: AES-128 based secure low power communication for LoRaWAN IoT environments. IEEE Access 6, 45325\u201345334 (2018)","journal-title":"IEEE Access"},{"key":"47_CR9","unstructured":"LoRaWAN Backend Interfaces 1.0 Specification, LoRa Alliance Inc. (2017)"},{"issue":"1","key":"47_CR10","first-page":"1","volume":"11","author":"I Butun","year":"2019","unstructured":"Butun, I., Pereira, N., Gidlund, M.: Security risk analysis of LoRaWAN and future directions. Future Internet 11(1), 1\u201322 (2019). Article 3","journal-title":"Future Internet"},{"key":"47_CR11","unstructured":"Miller, R.: LoRa security\u2014building a secure LoRa solution. MWR Labs Whitepaper, Mar 2016"},{"issue":"6","key":"47_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/s18061888","volume":"18","author":"I You","year":"2018","unstructured":"You, I., Kwon, S., Choudhary, G., Sharma, V., Seo, J.: An enhanced LoRaWAN security protocol for privacy preservation in IoT with a case study on a smart factory-enabled parking system. Sensors 18(6), 1\u201332 (2018). Article 1888","journal-title":"Sensors"},{"key":"47_CR13","doi-asserted-by":"crossref","unstructured":"Kim, J., Song, J.: A dual key-based activation scheme for secure LoRaWAN. In: Wireless Communications and Mobile Computing, vol. 2017, pp. 1\u201312, Nov 2017. Article 6590713","DOI":"10.1155\/2017\/6590713"},{"key":"47_CR14","doi-asserted-by":"crossref","unstructured":"Oniga, B., Dadarlat, V., De Poorter, E., Munteanu, A.: Analysis, design and implementation of secure LoRaWAN sensor network. In: Proceedings of IEEE International Conference on Intelligent Computer Communication and Processing, pp. 421\u2013428, Sept 2017","DOI":"10.1109\/ICSENS.2017.8233990"},{"key":"47_CR15","doi-asserted-by":"crossref","unstructured":"D\u00f6nmez, T.C.M., Nigussie, E.: Security of join procedure and its delegation in LoRaWAN v1.1. In: Proceedings of International Conference on Future Networks and Communications, pp. 204\u2013211 (2018)","DOI":"10.1016\/j.procs.2018.07.202"},{"key":"47_CR16","doi-asserted-by":"crossref","unstructured":"Naoui, S., Elhdhili, M.E., Saidane, L.A.: Trusted third party based key management for enhancing LoRaWAN security. In: Proceedings of IEEE\/ACS International Conference on Computer Systems and Applications, pp. 1306\u20131313, Oct 2017","DOI":"10.1109\/AICCSA.2017.73"},{"key":"47_CR17","doi-asserted-by":"crossref","unstructured":"Cheng, Y., Saputra, H., Goh, L.M., Wu, Y.: Secure smart metering based on LoRa technology. In: Proceedings of IEEE International Conference on Identity, Security, and Behavior Analysis, pp. 1\u20138, Jan 2018","DOI":"10.1109\/ISBA.2018.8311466"},{"issue":"10","key":"47_CR18","doi-asserted-by":"publisher","first-page":"2834","DOI":"10.1109\/TCSI.2014.2335651","volume":"61","author":"KL Tsai","year":"2014","unstructured":"Tsai, K.L., Chang, Y.J., Cheng, Y.C.: Automatic charge balancing content addressable memory with self-control mechanism. IEEE Trans. Circuits Syst. I Regul. Pap. 61(10), 2834\u20132841 (2014)","journal-title":"IEEE Trans. Circuits Syst. I Regul. Pap."}],"container-title":["Advances in Intelligent Systems and Computing","Innovative Mobile and Internet Services in Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-22263-5_47","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,28]],"date-time":"2019-06-28T21:30:30Z","timestamp":1561757430000},"score":1,"resource":{"primary":{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/link.springer.com\/10.1007\/978-3-030-22263-5_47"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,19]]},"ISBN":["9783030222628","9783030222635"],"references-count":18,"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1007\/978-3-030-22263-5_47","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,6,19]]},"assertion":[{"value":"19 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IMIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sydney, NSW","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"imis2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}