{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T23:49:00Z","timestamp":1725925740854},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319725970"},{"type":"electronic","value":"9783319725987"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-72598-7_15","type":"book-chapter","created":{"date-parts":[[2017,12,1]],"date-time":"2017-12-01T12:06:49Z","timestamp":1512130009000},"page":"243-262","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["DIscovery and REgistration Protocol"],"prefix":"10.1007","author":[{"given":"Marco Lobe","family":"Kome","sequence":"first","affiliation":[]},{"given":"Mariem","family":"Graa","sequence":"additional","affiliation":[]},{"given":"Nora","family":"Cuppens-Boulahia","sequence":"additional","affiliation":[]},{"given":"Fr\u00e9d\u00e9ric","family":"Cuppens","sequence":"additional","affiliation":[]},{"given":"Vincent","family":"Frey","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,2]]},"reference":[{"issue":"7","key":"15_CR1","doi-asserted-by":"crossref","first-page":"1645","DOI":"10.1016\/j.future.2013.01.010","volume":"29","author":"J Gubbi","year":"2013","unstructured":"Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of Things (IoT): a vision, architectural elements, and future directions. Future Gener. Comput. Syst. 29(7), 1645\u20131660 (2013). Including special sections: cyber-enabled distributed computing for ubiquitous cloud and network services & cloud computing and scientific applications \u2013 Big Data, scalable analytics, and beyond","journal-title":"Future Gener. Comput. Syst."},{"key":"15_CR2","unstructured":"Evans, D.: \u201cThe Internet of Things\u201d: how the next evolution of the internet is changing everything. Whitepaper, Cisco Internet Business Solutions Group (IBSG) (2011)"},{"key":"15_CR3","unstructured":"Mirai (malware): April 2017. Page version ID: 775046665"},{"key":"15_CR4","unstructured":"Hunt, S.T.E.: Cyber attack: hackers \u2018weaponised\u2019 everyday devices with malware. The Guardian, October 2016"},{"key":"15_CR5","unstructured":"Attacks on IoT devices more than doubled in 2015, study shows - HOT for Security"},{"key":"15_CR6","unstructured":"thenextweb: Fitbit users are unwittingly sharing details of their sex lives with the world (2013)"},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Cheshire, S., Krochmal, M.: DNS-based service discovery. Technical report (2013)","DOI":"10.17487\/rfc6763"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Hardt, D.: The OAuth 2.0 Authorization Framework (2012)","DOI":"10.17487\/rfc6749"},{"key":"15_CR9","unstructured":"Gerdes, S., Seitz, L., Selander, G., Bormann, D.C.: An architecture for authorization in constrained environments. Internet-Draft draft-ietf-ace-actors-03, Internet Engineering Task Force, Work in Progress, March 2016"},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Khodadadi, F., Dastjerdi, A.V., Buyya, R.: Simurgh: a framework for effective discovery, programming, and integration of services exposed in IoT. In: 2015 International Conference on Recent Advances in Internet of Things (RIoT), pp. 1\u20136. IEEE (2015)","DOI":"10.1109\/RIOT.2015.7104910"},{"key":"15_CR11","unstructured":"MQTT Version 3.1.1"},{"key":"15_CR12","unstructured":"Messaging: Power Profiling: HTTPS Long Polling vs. MQTT with SSL, on Android (MQdev Blog)"},{"key":"15_CR13","unstructured":"stephendnicholas.com"},{"issue":"2","key":"15_CR14","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1145\/857076.857078","volume":"35","author":"PT Eugster","year":"2003","unstructured":"Eugster, P.T., Felber, P.A., Guerraoui, R., Kermarrec, A.-M.: The many faces of publish\/subscribe. ACM Comput. Surv. (CSUR) 35(2), 114\u2013131 (2003)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"15_CR15","unstructured":"Event-B.org"},{"issue":"1","key":"15_CR16","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1007\/s00165-007-0061-4","volume":"20","author":"M Butler","year":"2008","unstructured":"Butler, M., Yadav, D.: An incremental development of the Mondex system in Event-B. Formal Aspects Comput. 20(1), 61\u201377 (2008)","journal-title":"Formal Aspects Comput."},{"key":"15_CR17","doi-asserted-by":"crossref","unstructured":"Kobeissi, N., Bhargavan, K., Blanchet, B.: Automated verification for secure messaging protocols and their implementations: a symbolic and computational approach. In: 2nd IEEE European Symposium on Security and Privacy (EuroS&P2017), Paris, France, pp. 435\u2013450. IEEE, April 2017","DOI":"10.1109\/EuroSP.2017.38"},{"key":"15_CR18","unstructured":"The AVISPA Project"},{"key":"15_CR19","unstructured":"Cervesato, I.: The Dolev-Yao intruder is the most powerful attacker. In: 16th Annual Symposium on Logic in Computer Science\u2013LICS, vol. 1. Citeseer (2001)"},{"key":"15_CR20","unstructured":"Arduino Client for MQTT"},{"key":"15_CR21","unstructured":"eclipse\/paho.mqtt.python"},{"key":"15_CR22","unstructured":"Flask-OAuthlib \u2013 Flask-OAuthlib 0.9.3 documentation"},{"issue":"10","key":"15_CR23","doi-asserted-by":"crossref","first-page":"3711","DOI":"10.1109\/JSEN.2013.2277656","volume":"13","author":"S Raza","year":"2013","unstructured":"Raza, S., Shafagh, H., Hewage, K., Hummen, R., Voigt, T.: Lithe: lightweight secure CoAP for the internet of things. IEEE Sens. J. 13(10), 3711\u20133720 (2013)","journal-title":"IEEE Sens. J."},{"key":"15_CR24","unstructured":"ACE Working Group: Authentication and authorization for constrained environments (ACE) (2017)"},{"key":"15_CR25","unstructured":"Tschofenig, H.: The OAuth 2.0 Internet of Things (IoT) Client Credentials Grant"},{"key":"15_CR26","doi-asserted-by":"crossref","unstructured":"Raza, S., Trabalza, D., Voigt, T.: 6LoWPAN compressed DTLS for CoAP. In: 2012 IEEE 8th International Conference on Distributed Computing in Sensor Systems, pp. 287\u2013289. IEEE (2012)","DOI":"10.1109\/DCOSS.2012.55"},{"key":"15_CR27","unstructured":"Erdtman, S.: Certificate credentials for ACE framework. Internet-Draft draft-erdtman-ace-certificate-credential-00, Internet Engineering Task Force, Work in Progress, April 2016"},{"issue":"8","key":"15_CR28","doi-asserted-by":"crossref","first-page":"2710","DOI":"10.1016\/j.adhoc.2013.05.003","volume":"11","author":"T Kothmayr","year":"2013","unstructured":"Kothmayr, T., Schmitt, C., Hu, W., Br\u00fcnig, M., Carle, G.: DTLS based security and two-way authentication for the Internet of Things. Ad Hoc Netw. 11(8), 2710\u20132723 (2013)","journal-title":"Ad Hoc Netw."},{"key":"15_CR29","unstructured":"User Managed Access - Kantara Initiative"},{"key":"15_CR30","doi-asserted-by":"crossref","unstructured":"Fremantle, P., Aziz, B., Kopecky, J., Scott, P.: Federated identity and access management for the Internet of Things. In: 2014 International Workshop on Secure Internet of Things (SIoT), pp. 10\u201317. IEEE (2014)","DOI":"10.1109\/SIoT.2014.8"},{"key":"15_CR31","unstructured":"Gerdes, S., Bergmann, O., Bormann, C.: Delegated CoAP Authentication and Authorization Framework (DCAF)"},{"issue":"2","key":"15_CR32","doi-asserted-by":"crossref","first-page":"1224","DOI":"10.1109\/JSEN.2014.2361406","volume":"15","author":"S Cirani","year":"2015","unstructured":"Cirani, S., Picone, M., Gonizzi, P., Veltri, L., Ferrari, G.: IoT-OAS: an OAuth-based authorization service architecture for secure services in IoT scenarios. IEEE Sens. J. 15(2), 1224\u20131234 (2015)","journal-title":"IEEE Sens. J."},{"key":"15_CR33","unstructured":"Bradley, J., Denniss, W., Tschofenig, H., Jones, M.: OAuth 2.0 Device Flow for Browserless and Input Constrained Devices"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-72598-7_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,7]],"date-time":"2019-10-07T03:37:51Z","timestamp":1570419471000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-72598-7_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319725970","9783319725987"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-72598-7_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}