{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T02:48:48Z","timestamp":1742957328328,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030870485"},{"type":"electronic","value":"9783030870492"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-87049-2_18","type":"book-chapter","created":{"date-parts":[[2022,3,3]],"date-time":"2022-03-03T05:04:20Z","timestamp":1646283860000},"page":"535-558","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Application Layer Protocols for Internet of Things"],"prefix":"10.1007","author":[{"given":"Abdon","family":"Serianni","sequence":"first","affiliation":[]},{"given":"Floriano","family":"De Rango","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,3]]},"reference":[{"key":"18_CR1","doi-asserted-by":"crossref","unstructured":"Rayes, A., Salam, S.: Internet of Things from Hype to Reality: The Road to Digitization. Springer (2019)","DOI":"10.1007\/978-3-319-99516-8"},{"issue":"2011","key":"18_CR2","first-page":"1","volume":"1","author":"D Evans","year":"2011","unstructured":"Evans, D.: The internet of things: how the next evolution of the internet is changing everything. CISCO White Paper 1(2011), 1\u201311 (2011)","journal-title":"CISCO White Paper"},{"issue":"4","key":"18_CR3","doi-asserted-by":"publisher","first-page":"2347","DOI":"10.1109\/COMST.2015.2444095","volume":"17","author":"A Al-Fuqaha","year":"2015","unstructured":"Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., Ayyash, M.: Internet of things: a survey on enabling technologies, protocols, and applications. IEEE Commun. Surv. Tutor. 17(4), 2347\u20132376 (2015)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"Vashi, S., Ram, J., Modi, J., Verma, S., Prakash, C.: Internet of things (IoT): a vision, architectural elements, and security issues. In: 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), pp. 492\u2013496. IEEE (2017)","DOI":"10.1109\/I-SMAC.2017.8058399"},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Salman, T., Jain, R.: Networking protocols and standards for internet of things. Internet of Things and Data Analytics Handbook, vol. 2015, pp. 215\u2013238 (2015)","DOI":"10.1002\/9781119173601.ch13"},{"issue":"1","key":"18_CR6","first-page":"11","volume":"3","author":"V Karagiannis","year":"2015","unstructured":"Karagiannis, V., Chatzimisios, P., Vazquez-Gallego, F., Alonso-Zarate, J.: A survey on application layer protocols for the internet of things. Trans. IoT Cloud Comput. 3(1), 11\u201317 (2015)","journal-title":"Trans. IoT Cloud Comput."},{"key":"18_CR7","unstructured":"Salman, T., Jain, R.: A survey of protocols and standards for internet of things. arXiv preprint arXiv:1903.11549 (2019)"},{"issue":"1","key":"18_CR8","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/MWC.2005.1404569","volume":"12","author":"E Ferro","year":"2005","unstructured":"Ferro, E., Potorti, F.: Bluetooth and Wi-Fi wireless protocols: a survey and a comparison. IEEE Wirel. Commun. 12(1), 12\u201326 (2005)","journal-title":"IEEE Wirel. Commun."},{"key":"18_CR9","doi-asserted-by":"crossref","unstructured":"Park, M.: IEEE 802.11 ah: sub-1-GHz license-exempt operation for the internet of things. IEEE Commun. Mag. 53(9), 145\u2013151 (2015)","DOI":"10.1109\/MCOM.2015.7263359"},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"Siekkinen, M., Hiienkari, M., Nurminen, J.K., Nieminen, J.: How low energy is bluetooth low energy? Comparative measurements with ZigBee, 802.15.4. In: 2012 IEEE Wireless Communications and Networking Conference Workshops (WCNCW), pp. 232\u2013237. IEEE (2012)","DOI":"10.1109\/WCNCW.2012.6215496"},{"issue":"6","key":"18_CR11","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1109\/MCOM.2010.5473869","volume":"48","author":"C Gomez","year":"2010","unstructured":"Gomez, C., Paradells, J.: Wireless home automation networks: a survey of architectures and technologies. IEEE Commun. Mag. 48(6), 92\u2013101 (2010)","journal-title":"IEEE Commun. Mag."},{"key":"18_CR12","unstructured":"Stanford-Clark, A., Truong, H.L.: MQTT for Sensor Networks (MQTT-SN) Protocol Specification, vol. 1, p. 2. International Business Machines (IBM) Corporation Version (2013)"},{"key":"18_CR13","unstructured":"Locke, D.: MQ telemetry transport (MQTT) V3.1 protocol specification. IBM Developer Works Technical Library, vol. 15 (2010)"},{"key":"18_CR14","doi-asserted-by":"crossref","unstructured":"Saint-Andre, P.: Extensible messaging and presence protocol (XMPP): Core (2004)","DOI":"10.17487\/rfc3920"},{"key":"18_CR15","volume-title":"Architectural Styles and the Design of Network-Based Software Architectures","author":"RT Fielding","year":"2000","unstructured":"Fielding, R.T., Taylor, R.N.: Architectural Styles and the Design of Network-Based Software Architectures, vol. 7. University of California, Irvine (2000)"},{"key":"18_CR16","unstructured":"Chen, X.: Constrained Application Protocol for Internet of Things. https:\/\/www.cse.wustl.edu\/jain\/cse574-14\/ftp\/coap (2014)"},{"issue":"2","key":"18_CR17","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/MIC.2012.29","volume":"16","author":"C Bormann","year":"2012","unstructured":"Bormann, C., Castellani, A.P., Shelby, Z.: CoAP: an application protocol for billions of tiny internet nodes. IEEE Internet Comput. 16(2), 62\u201367 (2012)","journal-title":"IEEE Internet Comput."},{"key":"18_CR18","doi-asserted-by":"crossref","unstructured":"Thangavel, D., Ma, X., Valera, A., Tan, H.-X., Tan, C.K.-Y.: Performance evaluation of MQTT and CoAP via a common middleware. In: 2014 IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), pp. 1\u20136. IEEE (2014)","DOI":"10.1109\/ISSNIP.2014.6827678"},{"key":"18_CR19","doi-asserted-by":"crossref","unstructured":"De Rango, F., Potrino, G., Tropea, M., Fazio, P.: Energy-aware dynamic Internet of Things security system based on Elliptic Curve Cryptography and Message Queue Telemetry Transport protocol for mitigating Replay attacks. In: Pervasive and Mobile Computing, vol. 61. Elsevier (2020)","DOI":"10.1016\/j.pmcj.2019.101105"},{"issue":"6","key":"18_CR20","doi-asserted-by":"publisher","first-page":"1469","DOI":"10.3390\/s19061469","volume":"19","author":"AF Santamaria","year":"2019","unstructured":"Santamaria, A.F., Raimondo, P., Tropea, M., De Rango, F., Aiello, C.: An IoT surveillance system based on a decentralised architecture. Sensors 19(6), 1469 (2019)","journal-title":"Sensors"},{"key":"18_CR21","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1016\/j.comcom.2018.06.010","volume":"128","author":"AF Santamaria","year":"2018","unstructured":"Santamaria, A.F., De Rango, F., Serianni, A., Raimondo, P.: A real IoT device deployment for e-Health applications under lightweight communication protocols, activity classifier and edge data filtering. Comput. Commun. 128, 60\u201373 (2018)","journal-title":"Comput. Commun."},{"key":"18_CR22","doi-asserted-by":"crossref","unstructured":"Santamaria, A.F., Raimondo, P., De Rango, F., Serianni, A.: A two stages fuzzy logic approach for Internet of Things (IoT) wearable devices. In: 2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), pp. 1\u20136. IEEE (2016)","DOI":"10.1109\/PIMRC.2016.7794563"},{"key":"18_CR23","doi-asserted-by":"crossref","unstructured":"De Rango, F., Tropea, M., Fazio, P.: Mitigating DoS attacks in IoT EDGE Layer to preserve QoS topics and nodes\u2019 energy. In: IEEE INFOCOM 2020\u2014IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 842\u2013847. IEEE (2020)","DOI":"10.1109\/INFOCOMWKSHPS50562.2020.9162902"}],"container-title":["Lecture Notes in Networks and Systems","Advances in Computing, Informatics, Networking and Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-87049-2_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,28]],"date-time":"2022-04-28T12:12:37Z","timestamp":1651147957000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-87049-2_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030870485","9783030870492"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-87049-2_18","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"3 March 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}