{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T20:20:47Z","timestamp":1740169247645,"version":"3.37.3"},"reference-count":27,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/100013276","name":"WearIT4Health Project through the Interreg V-A Euregio Meuse-Rhine","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100013276","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008530","name":"European Union and the European Regional Development Fund","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100008530","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Province of Limburg - Belgium"},{"name":"CyberSecurity Research Flanders","award":["VR20192203"]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2021.3075980","type":"journal-article","created":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T20:21:15Z","timestamp":1619554875000},"page":"67466-67476","source":"Crossref","is-referenced-by-count":4,"title":["Communication and Security Trade-Offs for Battery-Powered Devices: A Case Study on Wearable Medical Sensor Systems"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9455-7875","authenticated-orcid":false,"given":"Jori","family":"Winderickx","sequence":"first","affiliation":[]},{"given":"Pierre","family":"Bellier","sequence":"additional","affiliation":[]},{"given":"Patrick","family":"Duflot","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8753-7895","authenticated-orcid":false,"given":"Nele","family":"Mentens","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.02.020"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3349568.3351548"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2007.4460126"},{"journal-title":"Threat Modeling Designing for Security","year":"2014","author":"shostack","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-04722-4"},{"article-title":"Algorithms, key size and protocols report (2018), h2020-ict-2014-project 645421, d5.4","year":"2018","author":"smart","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"journal-title":"Pre-Shared Key Ciphersuites for Transport Layer Security (TLS)","year":"2005","author":"tschofenig","key":"ref18"},{"year":"2016","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s12553-017-0180-8"},{"journal-title":"ARM mbed TLS","year":"2019","author":"holdings","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1814539.1814550"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2007.135"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CODESISSS.2015.7331376"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2015.2511301"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2014.6990364"},{"key":"ref2","first-page":"3","article-title":"CodeBlue: An ad hoc sensor network infrastructure for emergency medical care","author":"malan","year":"2004","journal-title":"Proc Int Workshop Wearable Implant Body Sensor Netw"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4120"},{"key":"ref1","first-page":"88","article-title":"Regulation (eu) 2016\/679 of the European parliament and of the council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing directive 95\/46\/ec (general data protection regulation)","volume":"2016","year":"2016","journal-title":"Off J Eur Union"},{"journal-title":"The Transport Layer Security (TLS) Protocol Version 1 2","year":"2008","author":"rescorla","key":"ref20"},{"journal-title":"Cc3120 Simplelink Wi-Fi Network Processor Internet-of-Things Solution for MCU Applications","year":"2019","key":"ref22"},{"journal-title":"Msp432p4011 Simplelink Ultra-Low-Power 32-Bit Arm Cortex-M4f MCU With Precision ADC 2Mb Flash and 256Kb RAM","year":"2019","key":"ref21"},{"journal-title":"RabbitMQ is the most widely deployed open source message broker","year":"2019","key":"ref24"},{"journal-title":"Docker Enterprise is the Industry-Leading Container Platform","year":"2019","key":"ref23"},{"journal-title":"Cryptographic Key Length Recommendation","year":"2018","author":"giry","key":"ref26"},{"key":"ref25","first-page":"113","article-title":"Algorithms key sizes and parameters report-2014","volume":"tp 5 14 84 en n","author":"smart","year":"2014","journal-title":"European Union Agency for Netw Inf Security"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09416711.pdf?arnumber=9416711","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T19:55:50Z","timestamp":1639770950000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9416711\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/access.2021.3075980","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2021]]}}}