{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T10:26:54Z","timestamp":1775730414170,"version":"3.50.1"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031235818","type":"print"},{"value":"9783031235825","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-23582-5_8","type":"book-chapter","created":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:29:01Z","timestamp":1672532941000},"page":"108-122","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Lightweight Authentication Encryption to Improve DTLS, Quark Combined with Overhearing to Prevent DoS and MITM on Low-Resource IoT Devices"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7457-0060","authenticated-orcid":false,"given":"Satyam","family":"Mishra","sequence":"first","affiliation":[]},{"given":"Vu Minh","family":"Phuc","sequence":"additional","affiliation":[]},{"given":"Nguyen Van","family":"Tanh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,1]]},"reference":[{"key":"8_CR1","doi-asserted-by":"publisher","DOI":"10.1093\/wentk\/9780190943813.001.0001","volume-title":"The Internet of Things: What Everyone Needs to Know\u00ae","author":"SJ Shackelford","year":"2020","unstructured":"Shackelford, S.J.: The Internet of Things: What Everyone Needs to Know\u00ae. Oxford University Press, Oxford (2020)"},{"key":"8_CR2","doi-asserted-by":"publisher","DOI":"10.1017\/9781108913560","volume-title":"Introduction to IoT","author":"S Misra","year":"2021","unstructured":"Misra, S., Mukherjee, A., Roy, A.: Introduction to IoT. Cambridge University Press, Cambridge (2021)"},{"key":"8_CR3","volume-title":"Security and Privacy in the Internet of Things: Challenges and Solutions","author":"JH Ramos","year":"2020","unstructured":"Ramos, J.H., Sk\u00e1rmeta, A.: Security and Privacy in the Internet of Things: Challenges and Solutions. IOS Press, Amsterdam (2020)"},{"key":"8_CR4","unstructured":"Tanh, N.V., Tri, N.Q., Duc, T.Q., Giang, N.L.: Solutions to prevent denial of service attacks for wireless sensor networks. In: Second National Conference: Some Issues Selected Information Security and Safety (SoIS 2017) (2017)"},{"key":"8_CR5","unstructured":"Tanh, N.V.: Method of detecting DGA botnet based on CNN and bidirectional LSTM. Presented at the Journal of ICT. Ministry of Information and Communications, Hanoi, 30 December 2017"},{"key":"8_CR6","doi-asserted-by":"publisher","unstructured":"Nguyen, T., Ngo, T., Nguyen, T., Tran, D., Tran, H.A., Bui, T.: The flooding attack in low power and lossy networks: a case study. In: 2018 International Conference on Smart Communications in Network Technologies (SaCoNeT), pp. 183\u2013187 (2018). https:\/\/doi.org\/10.1109\/SaCoNeT.2018.8585451","DOI":"10.1109\/SaCoNeT.2018.8585451"},{"key":"8_CR7","doi-asserted-by":"publisher","unstructured":"Tanh, N., Ngo, T.: A comprehensive security solution for IOT network with integrated technology of improved lightweight encryption mechanisms. Int. J. Simul. Syst. Sci. Technol. (2020). https:\/\/doi.org\/10.5013\/IJSSST.a.21.04.14","DOI":"10.5013\/IJSSST.a.21.04.14"},{"key":"8_CR8","doi-asserted-by":"publisher","unstructured":"Tanh, N.V., Trinh, N.Q.: Building a comprehensive security solution on the IoT network with the method of improving the DTLS protocol to integrate the overhearing mechanism. In: Proceedings of the 13th National Conference on Fundamental and Applied Information Technology Research (FAIR\u20192020), Nha Tang (2020). https:\/\/doi.org\/10.15625\/vap.2020.00233","DOI":"10.15625\/vap.2020.00233"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Nguyen, V.T., Ngo, Q.T., Nguyen, L.G., Nguyen, A.T., Nguyen, V.N.: Improvement of the CurveCP cryptography for enhancing the secure of Internet of Things (2021)","DOI":"10.25073\/2588-1086\/vnucsce.282"},{"key":"8_CR10","doi-asserted-by":"publisher","unstructured":"Tanh, N., Tri, N., Trung, M.: The solution to improve information security for IoT networks by combining lightweight encryption protocols. Indonesian J. Electr. Eng. Comput. Sci. 23, 1727 (2021). https:\/\/doi.org\/10.11591\/ijeecs.v23.i3.pp1727-1735","DOI":"10.11591\/ijeecs.v23.i3.pp1727-1735"},{"key":"8_CR11","doi-asserted-by":"publisher","unstructured":"Lakkundi, V., Singh, K.: Lightweight DTLS implementation in CoAP-based Internet of Things. In: 20th Annual International Conference on Advanced Computing and Communications (ADCOM), pp. 7\u201311 (2014). https:\/\/doi.org\/10.1109\/ADCOM.2014.7103240","DOI":"10.1109\/ADCOM.2014.7103240"},{"key":"8_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-15031-9_1","volume-title":"Cryptographic Hardware and Embedded Systems, CHES 2010","author":"J-P Aumasson","year":"2010","unstructured":"Aumasson, J.-P., Henzen, L., Meier, W., Naya-Plasencia, M.: Quark: a lightweight hash. In: Mangard, S., Standaert, F.-X. (eds.) CHES 2010. LNCS, vol. 6225, pp. 1\u201315. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-15031-9_1"},{"key":"8_CR13","unstructured":"What is MITM (Man in the Middle) Attack: Imperva. https:\/\/www.imperva.com\/learn\/application-security\/man-in-the-middle-attack-mitm\/. Accessed 25 Sept 2022"},{"key":"8_CR14","unstructured":"What is a Botnet? https:\/\/www.paloaltonetworks.com\/cyberpedia\/what-is-botnet. Accessed 25 Sept 2022"},{"key":"8_CR15","unstructured":"Pratt, A.: CIA Triad and New Emerging Technologies: Big Data and IoT. Los Angeles City College and Consultant (2015)"},{"key":"8_CR16","unstructured":"Samonas, S., Coss, D.: The CIA strikes back: redefining confidentiality, integrity and availability in security. J. Inf. Syst. Secur. 10 (2014)"},{"key":"8_CR17","unstructured":"Halstead, J.: 6LoWPAN vs. ZigBee: Two Wireless Technologies Explained: Blog: Link Labs. https:\/\/www.link-labs.com\/blog\/6lowpan-vs-zigbee. Accessed 25 Sept 2022"},{"key":"8_CR18","unstructured":"Reardon, J.: Improving Tor using a TCP-over-DTLS tunnel (2008)"},{"key":"8_CR19","unstructured":"Dredge, S.: What is Tor? a beginner\u2019s guide to the privacy tool (2013). https:\/\/www.theguardian.com\/technology\/2013\/nov\/05\/tor-beginners-guide-nsa-browser"},{"key":"8_CR20","unstructured":"Overview of RFID Systems: OMRON Industrial Automation. https:\/\/www.ia.omron.com\/support\/guide\/47\/introduction.html. Accessed 25 Sept 2022"},{"key":"8_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/978-3-540-78967-3_11","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2008","author":"G Bertoni","year":"2008","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Assche, G.: On the indifferentiability of the sponge construction. In: Smart, N. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 181\u2013197. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-78967-3_11"},{"key":"8_CR22","unstructured":"\u00d6sterlind, F.: A Sensor Network Simulator for the Contiki OS. Swedish Institute of Computer Science (2006)"}],"container-title":["Lecture Notes in Computer Science","Internet of Things \u2013 ICIOT 2022"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-23582-5_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:31:27Z","timestamp":1672533087000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-23582-5_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031235818","9783031235825"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-23582-5_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"1 January 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICIOT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Internet of Things","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Honolulu, HI","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 December 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 December 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iciot2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.servicessociety.org\/iciot","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EDAS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"17","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"9","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"53% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}