{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T08:00:44Z","timestamp":1743062444207,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031163012"},{"type":"electronic","value":"9783031163029"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-16302-9_11","type":"book-chapter","created":{"date-parts":[[2022,10,5]],"date-time":"2022-10-05T23:03:52Z","timestamp":1665011032000},"page":"148-159","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Enhancing End-to-End Communication Security in IoT Devices Through Application Layer Protocol"],"prefix":"10.1007","author":[{"given":"Rimsha","family":"Zahid","sequence":"first","affiliation":[]},{"given":"Muhammad Waseem","family":"Anwar","sequence":"additional","affiliation":[]},{"given":"Farooque","family":"Azam","sequence":"additional","affiliation":[]},{"given":"Anam","family":"Amjad","sequence":"additional","affiliation":[]},{"given":"Danish","family":"Mukhtar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,6]]},"reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Chze, P.L.R., Leong, K.S.: A secure multi-hop routing for IoT communication. In Proceedings of IEEE World Forum of Internet of Things (WF-IoT), USA, pp. 428\u2013432 (2014)","DOI":"10.1109\/WF-IoT.2014.6803204"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Hameed, S., Idrees, K.F., Hameed, B.: Understanding security requirements and challenges in Internet of Things (IoT): a review. J. Comput. Netw. Commun. 11, 1\u201314 (2019)","DOI":"10.1155\/2019\/9629381"},{"key":"11_CR3","unstructured":"U-Blox Homepage. https:\/\/www.u-blox.com\/en\/blog\/IP-versus-soap-iot-communications. Accessed 18 July 2021"},{"key":"11_CR4","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.is.2016.02.003","volume":"58","author":"S Sicari","year":"2016","unstructured":"Sicari, S., Rizzardi, A., Miorandi, D., Cappiello, C., Coen-Porisini, A.: A secure and quality-aware prototypical architecture for the Internet of Things. Inf. Syst. 58, 43\u201355 (2016)","journal-title":"Inf. Syst."},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Zhang, H., Zhang, T.: Short paper: \u2018A peer to peer security protocol for the internet of things\u2019: secure communication for the sensible things platform. In 18th International Conference on Intelligence in Next Generation Networks, France, pp. 154\u2013156. IEEE (2015)","DOI":"10.1109\/ICIN.2015.7073825"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Kajwadkar, S., Jain, VK.: A novel algorithm for DoS and DDoS attack detection in Internet of Things. In 2018 Conference on Information and Communication Technology (CICT), India, pp. 1\u20134. IEEE (2018)","DOI":"10.1109\/INFOCOMTECH.2018.8722397"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Esquiagola, J., Costa, L., Calcina, P., Zuffo, M.: Enabling CoAP into the swarm: a transparent interception CoAP-HTTP proxy for the Internet of Things. In: 2017 Global Internet of Things Summit (GIoTS), Switzerland, pp. 1\u20136. IEEE (2017)","DOI":"10.1109\/GIOTS.2017.8016220"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Babitha, M.P., Babu, K.R.R.: Secure cloud storage using AES encryption. In: 2016 International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT), India, pp. 859\u2013864. IEEE (2016)","DOI":"10.1109\/ICACDOT.2016.7877709"},{"key":"11_CR9","unstructured":"Colitti, W., Steenhaut, K., Caro, N.D.: Integrating wireless senso: networks with the web. In: Extending the Internet to Low Power and Lossy Networks (2011)"},{"issue":"90","key":"11_CR10","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1016\/j.comcom.2016.03.010","volume":"89","author":"Y Mano","year":"2016","unstructured":"Mano, Y., et al.: Exploiting IoT technologies for enhancing Health Smart Homes through patient identification and emotion recognition. Comput. Commun. 89(90), 178\u2013190 (2016)","journal-title":"Comput. Commun."},{"issue":"8","key":"11_CR11","doi-asserted-by":"publisher","first-page":"68","DOI":"10.3390\/fi10080068","volume":"10","author":"M Miraz","year":"2018","unstructured":"Miraz, M., Ali, M., Excell, P., Picking, R.: Internet of nano-things, things and everything: future growth trends. Future Internet 10(8), 68 (2018)","journal-title":"Future Internet"},{"key":"11_CR12","unstructured":"Soni, D., Makwana, A.: A survey on MQTT: a protocol of Internet of Things (IoT). In: International Conference on Telecommunication, Power Analysis and Computing Techniques (2017)"},{"issue":"4","key":"11_CR13","doi-asserted-by":"publisher","first-page":"1765","DOI":"10.1007\/s11277-016-3398-2","volume":"91","author":"HC Hwang","year":"2016","unstructured":"Hwang, H.C., Park, J., Shon, J.G.: Design and implementation of a reliable message transmission system based on MQTT protocol in IoT. Wirel. Pers. Commun. 91(4), 1765\u20131777 (2016)","journal-title":"Wirel. Pers. Commun."},{"key":"11_CR14","doi-asserted-by":"publisher","first-page":"658","DOI":"10.1016\/j.procs.2012.06.084","volume":"10","author":"F Razzak","year":"2012","unstructured":"Razzak, F.: Spamming the Internet of Things: a possibility and its probable solution. Procedia Comput. Sci. 10, 658\u2013665 (2012)","journal-title":"Procedia Comput. Sci."},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"Alansari, Z., et al.: Internet of Things: infrastructure, architecture, security and privacy. In: 2018 International Conference on Computing, Electronics and Communications Engineering (iCCECE), UK, pp. 150\u2013155. IEEE (2018)","DOI":"10.1109\/iCCECOME.2018.8658516"},{"issue":"2","key":"11_CR16","first-page":"62","volume":"5","author":"V Sundareswaran","year":"2018","unstructured":"Sundareswaran, V., Mahesh, K., Rajesh, M., Salmon, S.: Survey on smart agriculture using IoT. Int. J. Innov. Res. Eng. Manage. (IJIREM) 5(2), 62\u201366 (2018)","journal-title":"Int. J. Innov. Res. Eng. Manage. (IJIREM)"},{"issue":"4","key":"11_CR17","first-page":"54","volume":"7","author":"P Tadejko","year":"2015","unstructured":"Tadejko, P.: Application of Internet of Things in logistics-current challenges. Econ. Manag. 7(4), 54\u201364 (2015)","journal-title":"Econ. Manag."},{"key":"11_CR18","doi-asserted-by":"crossref","unstructured":"Hussain, I., Negi, M.C., Pandey, N.: Proposing an encryption\/decryption scheme for IoT communications using binary-bit sequence and multistage encryption. In: 2018 7th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), India, pp. 709\u2013713. IEEE (2018)","DOI":"10.1109\/ICRITO.2018.8748293"},{"issue":"6","key":"11_CR19","first-page":"4656","volume":"7","author":"A Jhosh","year":"2020","unstructured":"Jhosh, A.: Comparison of encryption algorithms: AES, Blowfish and Twofish for security of wireless networks. Int. Res. J. Eng. Technol. 7(6), 4656\u20134658 (2020)","journal-title":"Int. Res. J. Eng. Technol."},{"key":"11_CR20","doi-asserted-by":"crossref","unstructured":"Panda, M., Nag, A.: Plain text encryption using AES, DES and SALSA20 by Java based bouncy castle API on Windows and Linux. In: 2015 Second International Conference on Advances in Computing and Communication Engineering, India, pp. 541\u2013548. IEEE (2015)","DOI":"10.1109\/ICACCE.2015.130"},{"key":"11_CR21","doi-asserted-by":"crossref","unstructured":"Dibas, H., Sabri, K.E.: A comprehensive performance empirical study of the symmetric algorithms: AES, 3DES, Blowfish and Twofish. In: 2021 International Conference on Information Technology, Jordan, pp. 344\u2013349. IEEE (2021)","DOI":"10.1109\/ICIT52682.2021.9491644"},{"issue":"12","key":"11_CR22","first-page":"151","volume":"4","author":"SD Rihan","year":"2015","unstructured":"Rihan, S.D., Khalid, A., Osman, S.E.: A performance comparison of encryption algorithms AES and DES. Int. J. Eng. Res. Technol. 4(12), 151\u2013154 (2015)","journal-title":"Int. J. Eng. Res. Technol."},{"issue":"1","key":"11_CR23","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1109\/MCOM.2017.1600425CM","volume":"55","author":"G Muhammad","year":"2017","unstructured":"Muhammad, G., Rahman, S.K.M.M., Alelaiwi, A., Alamri, A.: Smart health solution integrating IoT and cloud: a case study of voice pathology monitoring. IEEE Commun. Mag. 55(1), 69\u201373 (2017)","journal-title":"IEEE Commun. Mag."},{"key":"11_CR24","unstructured":"Github Homepage. https:\/\/github.com\/RimshaZahid\/IOTEncryption"}],"container-title":["Communications in Computer and Information Science","Information and Software Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-16302-9_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,5]],"date-time":"2022-10-05T23:24:04Z","timestamp":1665012244000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-16302-9_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031163012","9783031163029"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-16302-9_11","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"6 October 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICIST","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information and Software Technologies","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kaunas","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lithuania","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 October 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 October 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icist2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/icist.ktu.edu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"66","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"35% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}