{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:57:42Z","timestamp":1740099462805,"version":"3.37.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030249069"},{"type":"electronic","value":"9783030249076"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24907-6_14","type":"book-chapter","created":{"date-parts":[[2019,7,10]],"date-time":"2019-07-10T15:02:46Z","timestamp":1562770966000},"page":"166-182","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["TLShps: SDN-Based TLS Handshake Protocol Simplification for IoT"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2175-0375","authenticated-orcid":false,"given":"Lei","family":"Yan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1438-7018","authenticated-orcid":false,"given":"Maode","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Yan","family":"Ma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,11]]},"reference":[{"key":"14_CR1","unstructured":"OpenFlow switch specification, March 2015. \n                    https:\/\/www.opennetworking.org\/wp-content\/uploads\/2014\/10\/openflow-switch-v1.5.1.pdf"},{"issue":"1871","key":"14_CR2","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1098\/rspa.1989.0125","volume":"426","author":"M Burrows","year":"1989","unstructured":"Burrows, M., Abadi, M., Needham, R.M.: A logic of authentication. Proc. R. Soc. Lond. A Math. Phys. Eng. Sci. 426(1871), 233\u2013271 (1989). \n                    https:\/\/doi.org\/10.1098\/rspa.1989.0125","journal-title":"Proc. R. Soc. Lond. A Math. Phys. Eng. Sci."},{"key":"14_CR3","doi-asserted-by":"publisher","first-page":"18570","DOI":"10.1109\/ACCESS.2018.2820086","volume":"6","author":"J Cai","year":"2018","unstructured":"Cai, J., et al.: A handshake protocol with unbalanced cost for wireless updating. IEEE Access 6, 18570\u201318581 (2018). \n                    https:\/\/doi.org\/10.1109\/ACCESS.2018.2820086","journal-title":"IEEE Access"},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"Dierks, T., Rescorla, E.: The transport layer security (TLS) protocol version 1.2. RFC 5246, August 2008. \n                    https:\/\/tools.ietf.org\/html\/rfc5246","DOI":"10.17487\/rfc5246"},{"key":"14_CR5","doi-asserted-by":"publisher","unstructured":"Dragomir, D., Gheorghe, L., Costea, S., Radovici, A.: A survey on secure communication protocols for IoT systems. In: 2016 International Workshop on Secure Internet of Things (SIoT), pp. 47\u201362, September 2016. \n                    https:\/\/doi.org\/10.1109\/SIoT.2016.012","DOI":"10.1109\/SIoT.2016.012"},{"issue":"1","key":"14_CR6","doi-asserted-by":"publisher","first-page":"812","DOI":"10.1109\/COMST.2018.2862350","volume":"21","author":"I Farris","year":"2019","unstructured":"Farris, I., Taleb, T., Khettab, Y., Song, J.: A survey on emerging SDN and NFV security mechanisms for IoT systems. IEEE Commun. Surv. Tutorials 21(1), 812\u2013837 (2019). \n                    https:\/\/doi.org\/10.1109\/COMST.2018.2862350","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"14_CR7","doi-asserted-by":"publisher","unstructured":"Feng, Z., Hu, G.: Secure cooperative event-triggered control of linear multiagent systems under DoS attacks. IEEE Trans. Control Syst. Technol. 1\u201312 (2019). \n                    https:\/\/doi.org\/10.1109\/TCST.2019.2892032","DOI":"10.1109\/TCST.2019.2892032"},{"issue":"1","key":"14_CR8","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1109\/MIC.2018.112102200","volume":"22","author":"C Gomez","year":"2018","unstructured":"Gomez, C., Arcia-Moret, A., Crowcroft, J.: TCP in the Internet of Things: from ostracism to prominence. IEEE Internet Comput. 22(1), 29\u201341 (2018). \n                    https:\/\/doi.org\/10.1109\/MIC.2018.112102200","journal-title":"IEEE Internet Comput."},{"issue":"2","key":"14_CR9","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/s13389-014-0090-x","volume":"5","author":"S Gueron","year":"2015","unstructured":"Gueron, S., Krasnov, V.: Fast prime field elliptic-curve cryptography with 256-bit primes. J. Crypt. Eng. 5(2), 141\u2013151 (2015). \n                    https:\/\/doi.org\/10.1007\/s13389-014-0090-x","journal-title":"J. Crypt. Eng."},{"key":"14_CR10","unstructured":"Gupta, V., Stebila, D., Fung, S., Shantz, S.C., Gura, N., Eberle, H.: Speeding up secure Web transactions using elliptic curve cryptography. In: NDSS (2004)"},{"key":"14_CR11","doi-asserted-by":"publisher","unstructured":"Hummen, R., Shafagh, H., Raza, S., Voig, T., Wehrle, K.: Delegation-based authentication and authorization for the IP-based Internet of Things. In: 2014 Eleventh Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), pp. 284\u2013292, June 2014. \n                    https:\/\/doi.org\/10.1109\/SAHCN.2014.6990364","DOI":"10.1109\/SAHCN.2014.6990364"},{"key":"14_CR12","unstructured":"Koponen, T., et al.: Onix: a distributed control platform for large-scale production networks. In: OSDI, vol. 10, pp. 1\u20136 (2010)"},{"key":"14_CR13","doi-asserted-by":"publisher","unstructured":"Malik, K.M., Malik, H., Baumann, R.: Towards vulnerability analysis of voice-driven interfaces and countermeasures for replay attacks. In: 2019 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR), pp. 523\u2013528, March 2019. \n                    https:\/\/doi.org\/10.1109\/MIPR.2019.00106","DOI":"10.1109\/MIPR.2019.00106"},{"issue":"6","key":"14_CR14","doi-asserted-by":"publisher","first-page":"1638","DOI":"10.1109\/TIFS.2018.2883177","volume":"14","author":"Y Mirsky","year":"2019","unstructured":"Mirsky, Y., Kalbo, N., Elovici, Y., Shabtai, A.: Vesper: using echo analysis to detect man-in-the-middle attacks in LANs. IEEE Trans. Inf. Forensics Secur. 14(6), 1638\u20131653 (2019). \n                    https:\/\/doi.org\/10.1109\/TIFS.2018.2883177","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"14_CR15","doi-asserted-by":"publisher","unstructured":"Mzid, R., Boujelben, M., Youssef, H., Abid, M.: Adapting TLS handshake protocol for heterogenous IP-based WSN using identity based cryptography. In: 2010 International Conference on Wireless and Ubiquitous Systems, pp. 1\u20138, October 2010. \n                    https:\/\/doi.org\/10.1109\/ICWUS.2010.5671367","DOI":"10.1109\/ICWUS.2010.5671367"},{"key":"14_CR16","doi-asserted-by":"publisher","unstructured":"Park, J., Kang, N.: Lightweight secure communication for CoAP-enabled Internet of Things using delegated DTLS handshake. In: 2014 International Conference on Information and Communication Technology Convergence (ICTC), pp. 28\u201333, October 2014. \n                    https:\/\/doi.org\/10.1109\/ICTC.2014.6983078","DOI":"10.1109\/ICTC.2014.6983078"},{"issue":"3","key":"14_CR17","doi-asserted-by":"publisher","first-page":"681","DOI":"10.1007\/s11276-015-1182-y","volume":"23","author":"J Park","year":"2017","unstructured":"Park, J., Kwon, H., Kang, N.: IoT\u2013cloud collaboration to establish a secure connection for lightweight devices. Wireless Netw. 23(3), 681\u2013692 (2017). \n                    https:\/\/doi.org\/10.1007\/s11276-015-1182-y","journal-title":"Wireless Netw."},{"key":"14_CR18","doi-asserted-by":"publisher","unstructured":"Peng, C., Zhang, Q., Tang, C.: Improved TLS handshake protocols using identity-based cryptography. In: 2009 International Symposium on Information Engineering and Electronic Commerce, pp. 135\u2013139, May 2009. \n                    https:\/\/doi.org\/10.1109\/IEEC.2009.33","DOI":"10.1109\/IEEC.2009.33"},{"key":"14_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/978-3-319-40509-4_18","volume-title":"Ad-hoc, Mobile, and Wireless Networks","author":"P Pittoli","year":"2016","unstructured":"Pittoli, P., David, P., No\u00ebl, T.: DTLS improvements for fast handshake and\u00a0bigger payload in constrained environments. In: Mitton, N., Loscri, V., Mouradian, A. (eds.) ADHOC-NOW 2016. LNCS, vol. 9724, pp. 251\u2013262. Springer, Cham (2016). \n                    https:\/\/doi.org\/10.1007\/978-3-319-40509-4_18"},{"key":"14_CR20","unstructured":"Rescorla, E., Modadugu, N.: Datagram transport layer security version 1.2. RFC 6347 (2012). \n                    https:\/\/tools.ietf.org\/html\/rfc6347"},{"key":"14_CR21","doi-asserted-by":"publisher","unstructured":"Seo, J., et al.: An ECDH-based light-weight mutual authentication scheme on local SIP. In: 2015 Seventh International Conference on Ubiquitous and Future Networks, pp. 871\u2013873, July 2015. \n                    https:\/\/doi.org\/10.1109\/ICUFN.2015.7182668","DOI":"10.1109\/ICUFN.2015.7182668"},{"key":"14_CR22","doi-asserted-by":"publisher","unstructured":"Tiburski, R.T., Amaral, L.A., de Matos, E., de Azevedo, D.F.G., Hessel, F.: Evaluating the use of TLS and DTLS protocols in IoT middleware systems applied to E-health. In: 2017 14th IEEE Annual Consumer Communications Networking Conference (CCNC), pp. 480\u2013485, January 2017. \n                    https:\/\/doi.org\/10.1109\/CCNC.2017.7983155","DOI":"10.1109\/CCNC.2017.7983155"},{"key":"14_CR23","unstructured":"Tootoonchian, A., Ganjali, Y.: HyperFlow: a distributed control plane for OpenFlow. In: Proceedings of the 2010 Internet Network Management Conference on Research on Enterprise Networking, p. 3 (2010)"},{"key":"14_CR24","doi-asserted-by":"publisher","unstructured":"Wu, D., Li, J., Das, S.K., Wu, J., Ji, Y., Li, Z.: A novel distributed denial-of-service attack detection scheme for software defined networking environments. In: 2018 IEEE International Conference on Communications (ICC), pp. 1\u20136, May 2018. \n                    https:\/\/doi.org\/10.1109\/ICC.2018.8422448","DOI":"10.1109\/ICC.2018.8422448"},{"issue":"2","key":"14_CR25","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/MCOM.2018.1700621","volume":"56","author":"Q Yan","year":"2018","unstructured":"Yan, Q., Huang, W., Luo, X., Gong, Q., Yu, F.R.: A multi-level DDoS mitigation framework for the industrial Internet of Things. IEEE Commun. Mag. 56(2), 30\u201336 (2018). \n                    https:\/\/doi.org\/10.1109\/MCOM.2018.1700621","journal-title":"IEEE Commun. Mag."}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24907-6_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,10]],"date-time":"2019-07-10T15:05:37Z","timestamp":1562771137000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24907-6_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030249069","9783030249076"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24907-6_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SpaCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Atlanta, GA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spaccs2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/cse.stfx.ca\/~cybermatics\/2019\/spaccs\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}