{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T03:57:43Z","timestamp":1743134263649,"version":"3.40.3"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319723945"},{"type":"electronic","value":"9783319723952"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-72395-2_28","type":"book-chapter","created":{"date-parts":[[2017,12,8]],"date-time":"2017-12-08T04:56:41Z","timestamp":1512709001000},"page":"302-311","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Ensuring IoT\/M2M System Security Under the Limitation of Constrained Gateways"],"prefix":"10.1007","author":[{"given":"Kuan-Lin","family":"Chen","sequence":"first","affiliation":[]},{"given":"Fuchun Joseph","family":"Lin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,9]]},"reference":[{"issue":"4","key":"28_CR1","doi-asserted-by":"publisher","first-page":"2347","DOI":"10.1109\/COMST.2015.2444095","volume":"17","author":"A Al-Fuqaha","year":"2015","unstructured":"Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., Ayyash, M.: Internet of Things: a survey on enabling technologies, protocols, and applications. IEEE Commun. Surv. Tutor. 17(4), 2347\u20132376 (2015). https:\/\/doi.org\/10.1109\/COMST.2015.2444095","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"28_CR2","unstructured":"Network Working Group: The Transport Layer Security (TLS) Protocol, Version 1.2. (2008)"},{"key":"28_CR3","unstructured":"Network Working Group: Datagram Transport Layer Security, Version 1.2. (2012)"},{"key":"28_CR4","doi-asserted-by":"crossref","unstructured":"Hummen, R., Shafagh, H., Raza, S., Voig, T., Wehrle, K.: Delegation-based authentication and authorization for the IP-based Internet of Things. In: 2014 Eleventh Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), pp. 284\u2013292 (2014)","DOI":"10.1109\/SAHCN.2014.6990364"},{"key":"28_CR5","doi-asserted-by":"crossref","unstructured":"Apostolopoulos, G., Peris, V., Saha, D.: Transport layer security: how much does it really cost? In: Proceedings of the Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies, INFOCOM 1999, vol. 2, pp. 717\u2013725. IEEE (1999)","DOI":"10.1109\/INFCOM.1999.751458"},{"key":"28_CR6","doi-asserted-by":"crossref","unstructured":"Kuo, F.C., Tschofenig, H., Meyer, F., Fu, X.: Comparison studies between pre-shared key and public key exchange mechanisms for transport layer security (TLS). Institute for Informatics, University of Goettingen, Technical Report IFI-TB-2006-01 (2006)","DOI":"10.1109\/INFOCOM.2006.52"},{"key":"28_CR7","unstructured":"oneM2M. http:\/\/www.onem2m.org\/about-onem2m\/why-onem2m"},{"key":"28_CR8","unstructured":"oneM2M, TS 0001 v2.10.0: Functional Architecture"},{"key":"28_CR9","unstructured":"oneM2M, TS 0003 v2.4.1: Security Solutions"},{"key":"28_CR10","doi-asserted-by":"crossref","unstructured":"Hsu, Y.-H., Lin, F.J.: Preventing misuse of duplicate certificates in IoT\/M2M systems. In: The 7th International Workshop on Internet on Things: Privacy, Security and Trust (IoTPST), 31 July\u20133 August 2017, Vancouver, Canada (2017)","DOI":"10.1109\/ICCCN.2017.8038508"},{"key":"28_CR11","unstructured":"OM2M. https:\/\/wiki.eclipse.org\/OM2M\/one"},{"key":"28_CR12","unstructured":"VisualVM. https:\/\/visualvm.github.io\/"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-72395-2_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,7]],"date-time":"2019-10-07T14:07:15Z","timestamp":1570457235000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-72395-2_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319723945","9783319723952"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-72395-2_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}