{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T02:48:54Z","timestamp":1730256534110,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,11]]},"DOI":"10.1109\/icsai.2014.7009337","type":"proceedings-article","created":{"date-parts":[[2015,1,19]],"date-time":"2015-01-19T21:37:49Z","timestamp":1421703469000},"page":"492-496","source":"Crossref","is-referenced-by-count":9,"title":["A study of secured wireless sensor networks with XBee and Arduino"],"prefix":"10.1109","author":[{"given":"A. F. M. Sultanul","family":"Kabir","sequence":"first","affiliation":[]},{"given":"Mollah Ahmed","family":"Shorif","sequence":"additional","affiliation":[]},{"given":"Hua","family":"Li","sequence":"additional","affiliation":[]},{"given":"Qian","family":"Yu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"19"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/CIT.2012.82"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.03.002"},{"year":"0","key":"18"},{"key":"15","first-page":"60","article-title":"Evaluation of zigbee-based body sensor networks","volume":"5","author":"shopov","year":"2011","journal-title":"Annual Journal of Electronics"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.4236\/wsn.2012.41004"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2008.4664272"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/j.proeng.2011.08.284"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1155\/2007\/81864"},{"journal-title":"Telecommunication Technologies 2008 and 2008 2nd Malaysia Conference on Photonics NCTT-MCP 2008 6th National Conference on","article-title":"Wireless home security and automation system utilizing ZigBee based multi-hop communication","year":"2008","author":"mohd adib","key":"12"},{"journal-title":"RSA Security Response to weaknesses in Key Scheduling Algorithm of RC4","year":"2001","author":"rivest","key":"21"},{"year":"2014","key":"3"},{"year":"0","key":"20"},{"year":"2014","key":"2"},{"year":"2014","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.1.1.20-28"},{"key":"7","first-page":"819","article-title":"Efficient RC4 based encryption system for sensor network","author":"dickerson","year":"2005","journal-title":"Defense and Security International Society for Optics and Photonics"},{"key":"6","first-page":"1109","article-title":"RC5-based security in wireless sensor networks: Utilization and performance","author":"kukkurainen","year":"2010","journal-title":"WSEAS TRANSACTIONS on COMPUTERS ISSN"},{"key":"5","first-page":"470","article-title":"Supervisory data acquisition of temperature and humidity in oil palm tissue culture laboratory","author":"hafizah abdul aziz","year":"2010","journal-title":"CIMS"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIT.2007.277"},{"journal-title":"Proceedings of the 2nd International Symposium on Communications Control and Signal Processing","article-title":"The ZigBee experience","year":"2006","author":"hyncica","key":"9"},{"key":"8","first-page":"218","article-title":"A comprehensive performance study of IEEE 802. 15. 4","author":"zheng","year":"2006","journal-title":"Sensor Network Operations IEEE Press Wiley Interscience"}],"event":{"name":"2014 2nd International Conference on Systems and Informatics (ICSAI)","start":{"date-parts":[[2014,11,15]]},"location":"Shanghai, China","end":{"date-parts":[[2014,11,17]]}},"container-title":["The 2014 2nd International Conference on Systems and Informatics (ICSAI 2014)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6994954\/7009247\/07009337.pdf?arnumber=7009337","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T21:33:24Z","timestamp":1490304804000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7009337\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/icsai.2014.7009337","relation":{},"subject":[],"published":{"date-parts":[[2014,11]]}}}