{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T15:24:02Z","timestamp":1761060242306,"version":"3.41.0"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319500102"},{"type":"electronic","value":"9783319500119"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-50011-9_1","type":"book-chapter","created":{"date-parts":[[2016,11,24]],"date-time":"2016-11-24T07:10:32Z","timestamp":1479971432000},"page":"3-17","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["ECDSA on Things: IoT Integrity Protection in Practise"],"prefix":"10.1007","author":[{"given":"Johannes","family":"Bauer","sequence":"first","affiliation":[]},{"given":"Ralf C.","family":"Staudemeyer","sequence":"additional","affiliation":[]},{"given":"Henrich C.","family":"P\u00f6hls","sequence":"additional","affiliation":[]},{"given":"Alexandros","family":"Fragkiadakis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,25]]},"reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"P\u00f6hls, H.C., Angelakis, V., Suppan, S., Fischer, K., Oikonomou, G., Tragos, E.Z., Diaz Rodriguez, R., Mouroutis, T.: RERUM: building a reliable IoT upon privacy- and security-enabled smart objects. In: Wireless Communications and Networking Conference Workshop on IoT Communications and Technologies (WCNC 2014), pp. 122\u2013127 (2014)","DOI":"10.1109\/WCNCW.2014.6934872"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Staudemeyer, R.C., P\u00f6hls, H.C., Watson, B.W.: Security & privacy for the internet-of-things communication in the SmartCity. In: Angelakis, V., Tragos, E., P\u00f6hls, H.C., Kapovits, A., Bassi, A. (eds.) Designing, Developing, Facilitating Smart Cities: Urban Design to IoT Solutions, 30 p. Springer, Heidelberg (2016)","DOI":"10.1007\/978-3-319-44924-1_7"},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"M\u00f6ssinger, M., Petschkuhn, B., Bauer, J., Staudemeyer, R.C., Wojcik, M., P\u00f6hls, H.C.: Towards quantifying the cost of a secure IoT: overhead and energy consumption of ECC signatures on an ARM-based device. In: Proceedings of the 5th Workshop on the Internet of Things Smart Objects and Services (IoTSoS 2016), 6 p. (2016)","DOI":"10.1109\/WoWMoM.2016.7523559"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"P\u00f6hls, H.C.: JSON sensor signatures (JSS): end-to-end integrity protection from constrained device to IoT application. In: Proceedings of the Workshop on Extending Seamlessly to the Internet of Things (esIoT 2015), pp. 306\u2013312 (2015)","DOI":"10.1109\/IMIS.2015.48"},{"key":"1_CR5","unstructured":"Zolertia, \u201cZ1 datasheet,\u201d 20 p. (2010)"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Montenegro, G., Kushalnagar, N., Hui, J., Culler, D.: RFC4944 \u2013 transmission of IPv6 packets over IEEE 802.15.4 networks. Requests for Comments (2007)","DOI":"10.17487\/rfc4944"},{"key":"1_CR7","unstructured":"IEEE Standards Association, Part 15.4g: Low-Rate Wireless Personal Area Networks (LR-WPANs) Amendment 3: Physical Layer (PHY) specifications for low-data-rate, wireless, smart metering utility networks. IEEE (2012)"},{"key":"1_CR8","unstructured":"Olsson, J.: \u201c6LoWPAN demystified,\u201d Texas Instruments, 13 p. (2014)"},{"key":"1_CR9","unstructured":"Zolertia, \u201cRE-Mote datasheet,\u201d 2 p. (2015)"},{"key":"1_CR10","unstructured":"Texas Instruments, \u201cCC2538 datasheet,\u201d 32 p. (2015)"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Dunkels, A., Gr\u00f6nvall, B., Voigt, T.: Contiki \u2013 a lightweight and flexible operating system for tiny networked sensors. In: 29th Annual IEEE International Conference on Local Computer Networks (LCN 2004), pp. 455\u2013462 (2004)","DOI":"10.1109\/LCN.2004.38"},{"key":"1_CR12","unstructured":"Angelakis, V., Cuellar, J., Fischer, K., Fowler, S., Gessner, J., Gundleg\u00e5rd, D., Helgesson, D., Konios, G., Lioumpas, A., Lunggren, M., Mardiak, M., Moldovan, G., Mouroutis, T., Nechifor, S., Oikonomou, G., P\u00f6hls, H.C., Ruiz, D., Siris, V., Suppan, S., Stamatakis, G., Stylianou, Y., Traganitis, A., Tragos, E.Z.: The RERUM system architecture (RERUM Deliverable D2.3). Technical report (2014)"},{"key":"1_CR13","unstructured":"Fielding, R.T.: Architectural styles and the design of network-based software architectures. Ph.D. dissertation, Department of Information and Computer Science (2000)"},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Jones, M.: RFC7518 \u2013 JSON Web Algorithms (JWA). Technical report, Requests for Comments, Internet Engineering Task Force (2015)","DOI":"10.17487\/RFC7518"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Josefsson, S.: RFC4648 \u2013 The Base16, Base32, and Base64 data encodings. Technical report, Requests for Comments, Network Working Group (2006)","DOI":"10.17487\/rfc4648"},{"key":"1_CR16","unstructured":"Dang, Q.H.: Secure hash standard. National Institute of Standards and Technology, Gaithersburg, MD, Technical report, August 2015"},{"key":"1_CR17","unstructured":"European Network of Excellence in Cryptology II: ECRYPT II Yearly Report on Algorithms and Keysizes (2011\u20132012). Katholieke Universiteit Leuven, Technical report (2012)"},{"key":"1_CR18","unstructured":"MacKay, K.: micro-ecc. http:\/\/kmackay.ca\/micro-ecc\/"},{"key":"1_CR19","unstructured":"fail0verflow (bushing, marcan, segher, sven), \u201cConsole Hacking 2010 - PS3 Epic Fail (slides),\u201d 27th Chaos Communications Congress (27C3) (2010). http:\/\/events.ccc.de\/congress\/2010\/Fahrplan\/attachments\/1780_27c3_console_hacking_2010.pdf"},{"key":"1_CR20","unstructured":"Klyubin, A.: Some SecureRandom Thoughts (2013). http:\/\/android-developers.blogspot.de\/2013\/08\/some-securerandom-thoughts.html"},{"key":"1_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1007\/978-3-642-23822-2_20","volume-title":"Computer Security \u2013 ESORICS 2011","author":"BB Brumley","year":"2011","unstructured":"Brumley, B.B., Tuveri, N.: Remote timing attacks are still practical. In: Atluri, V., Diaz, C. (eds.) ESORICS 2011. LNCS, vol. 6879, pp. 355\u2013371. Springer, Heidelberg (2011). doi:10.1007\/978-3-642-23822-2_20"},{"key":"1_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1007\/978-3-319-16295-9_4","volume-title":"Progress in Cryptology - LATINCRYPT 2014","author":"DJ Bernstein","year":"2015","unstructured":"Bernstein, D.J., Gastel, B., Janssen, W., Lange, T., Schwabe, P., Smetsers, S.: TweetNaCl: a crypto library in 100 tweets. In: Aranha, D.F., Menezes, A. (eds.) LATINCRYPT 2014. LNCS, vol. 8895, pp. 64\u201383. Springer, Heidelberg (2015). doi:10.1007\/978-3-319-16295-9_4"},{"key":"1_CR23","doi-asserted-by":"crossref","unstructured":"Turner, S., Brown, D., Yiu, K., Housley, R., Polk, T.: RFC5480 - elliptic curve cryptography subject public key information. Technical report, Requests for Comments, Network Working Group (2009)","DOI":"10.17487\/rfc5480"},{"key":"1_CR24","doi-asserted-by":"crossref","unstructured":"Brandt, A., Hui, J., Kelsey, R., Levis, P., Pister, K., Struik, R., Alexander, R.: RFC6550 \u2013 RPL: IPv6 routing protocol for low-power and lossy networks. Technical report, Requests for Comments, Internet Engineering Task Force (2012)","DOI":"10.17487\/rfc6550"},{"key":"1_CR25","unstructured":"L\u00f3pez, D.R., Cuellar, J., Staudemeyer, R.C., Charalampidis, P., Fragkiadakis, A., Kasinathan, P., P\u00f6hls, H.C., Suppan, S., Tragos, E., Weber, R.: Modelling the trustworthiness of the IoT (RERUM Deliverable D3.3), Technical report (2016)"},{"key":"1_CR26","unstructured":"Tragos, E.Z., Bernabe, J.B., Staudemeyer, R.C., Luis, J., Ramos, H., Fragkiadakis, A., Skarmeta, A., Nati, M., Gluhak, A.: Trusted IoT in the complex landscape of governance, security, privacy, availability and safety. In: Digitising the Industry\u00a0\u2013 Internet of Things Connecting the Physical, Digital and Virtual Worlds. River Publishers Series in Communications, pp. 210\u2013239 (2016)"},{"key":"1_CR27","doi-asserted-by":"crossref","unstructured":"Shelby, Z., Hartke, K., Bormann, C.: RFC7252 \u2013 The Constrained Application Protocol (CoAP). Technical report, Requests for Comments, Internet Engineering Task Force (2014)","DOI":"10.17487\/rfc7252"},{"key":"1_CR28","unstructured":"Bormann, C., Shelby, Z.: Block-wise transfers in CoAP. Working Draft, IETF, Internet-Draft (2016)"},{"key":"1_CR29","unstructured":"Shelby, Z., Hartke, K., Bormann, C.: RFC7228 \u2013 terminology for constrained-node networks. Technical report, Requests for Comments, Internet Engineering Task Force (2014)"},{"key":"1_CR30","doi-asserted-by":"crossref","unstructured":"Kovatsch, M.: Demo abstract: human-CoAP interaction with Copper. In: International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS 2011), pp. 1\u20132, Barcelona, Spain (2011)","DOI":"10.1109\/DCOSS.2011.5982145"},{"key":"1_CR31","doi-asserted-by":"crossref","unstructured":"Romkey, J.: RFC1055 \u2013 Nonstandard for transmission of IP datagrams over serial lines: SLIP. Technical report, Requests for Comments, Network Working Group (1988)","DOI":"10.17487\/rfc1055"},{"key":"1_CR32","doi-asserted-by":"crossref","unstructured":"Postel, J.: RFC768 \u2013 User Datagram Protocol. Technical report, Requests for Comments, Internet Engineering Task Force (1980)","DOI":"10.17487\/rfc0768"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-50011-9_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T20:58:42Z","timestamp":1749761922000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-50011-9_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319500102","9783319500119"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-50011-9_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"25 November 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information and Communications Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 November 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 December 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icics2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icics2016.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}