{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,29]],"date-time":"2025-06-29T01:10:01Z","timestamp":1751159401408,"version":"3.41.0"},"publisher-location":"Singapore","reference-count":19,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811076046"},{"type":"electronic","value":"9789811076053"}],"license":[{"start":{"date-parts":[[2017,12,20]],"date-time":"2017-12-20T00:00:00Z","timestamp":1513728000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-981-10-7605-3_232","type":"book-chapter","created":{"date-parts":[[2017,12,19]],"date-time":"2017-12-19T11:22:45Z","timestamp":1513682565000},"page":"1457-1463","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Location Privacy for HIP Based Internet of Things"],"prefix":"10.1007","author":[{"given":"Kyung","family":"Choi","sequence":"first","affiliation":[]},{"given":"Mihui","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,20]]},"reference":[{"key":"232_CR1","doi-asserted-by":"crossref","unstructured":"Farinacci, D., Meyer, D., Lewis, D.: The Locator\/ID separation Protocol (LISP). RFC6830 (2013)","DOI":"10.17487\/rfc6830"},{"key":"232_CR2","unstructured":"Moskowitz, R., Heer, T., Jokela, P., Henderson, T.: Host Identity Protocol Version 2 (HIPv2). RFC 7401 (2015)"},{"key":"232_CR3","unstructured":"Atkinson, R., Bhatti, S., Andrews, U.: Identifier-Locator Network Protocol (ILNP) Architectural Description. RFC 6740 (2012)"},{"key":"232_CR4","doi-asserted-by":"crossref","unstructured":"Moskowitz, R., Nikander, P.: Host Identity Protocol (HIP) Architecture. RFC 4423 (2006)","DOI":"10.17487\/rfc4423"},{"key":"232_CR5","unstructured":"Moskowitz, R.: HIP Diet EXchange (DEX). IETF, Internet-Draft (2012)"},{"key":"232_CR6","doi-asserted-by":"crossref","unstructured":"Laganier, J., Eggert, L.: Host Identity Protocol (HIP) Rendezvous Extension. RFC 8004 (2016)","DOI":"10.17487\/RFC8004"},{"key":"232_CR7","doi-asserted-by":"crossref","unstructured":"Saied, Y.B., Olivereau, A.: HIP tiny exchange (TEX): a distributed key exchange scheme for HIP-based Internet of Things. In: 2012 Third International Conference on Communications and Networking (ComNet), pp. 1\u20138, Tunisia (2012)","DOI":"10.1109\/WoWMoM.2012.6263785"},{"key":"232_CR8","unstructured":"Heer, T.: LHIP Lightweight Authentication Extension for HIP. draftheer-hip-lhip-00 (IETF work in progress) (2007)"},{"key":"232_CR9","doi-asserted-by":"crossref","unstructured":"Saied, Y.B., Olivereau, A.: D-HIP: a distributed key exchange scheme for HIP-based Internet of Things. In: 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp. 1\u20137, San Francisco (2012)","DOI":"10.1109\/WoWMoM.2012.6263785"},{"key":"232_CR10","doi-asserted-by":"crossref","unstructured":"Hummen, R., Writz, H., Ziegeldorf, J.H., Hiller, J., Wehrle, K.: Tailoring end-to-end IP security protocols to the Internet of Things. In: 21st IEEE International Conference on Network Protocols (ICNP), pp. 1\u201310, Goettingen (2013)","DOI":"10.1109\/ICNP.2013.6733571"},{"key":"232_CR11","doi-asserted-by":"crossref","unstructured":"Meca, F.V., Ziegeldorf, J.H., Sanchez, P.M., Morchon, O.G.: HIP security architecture for the IP-based Internet of Things. In: 2013 27th International Conference on Advanced Information Networking and Applications Workshops, pp. 1331\u20131336, Barcelona (2013)","DOI":"10.1109\/WAINA.2013.158"},{"key":"232_CR12","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1109\/SURV.2010.021110.00070","volume":"12","author":"P Nikander","year":"2010","unstructured":"Nikander, P., Gurtov, A., Henderson, T.R.: Host identity protocol (HIP): connectivity, mobility, multi-homing, security, and privacy over IPv4 and IPv6 networks. IEEE Commun. Surv. Tutor. 12, 186\u2013204 (2010). IEEE","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"232_CR13","doi-asserted-by":"crossref","unstructured":"S\u00e4\u00e4skilahti, J., S\u00e4rel\u00e4, M.: Risk analysis of host identity protocol: using risk identification method based on value chain dynamics toolkit. In: Proceedings of the Fourth European Conference on Software Architecture: Companion, pp. 210\u2013220, Copenhagen (2010)","DOI":"10.1145\/1842752.1842794"},{"key":"232_CR14","doi-asserted-by":"crossref","unstructured":"Morchon, O.G., Keoh, S.L., Kumar, S., Sanchez, P.M., Meca, F.V., Ziegeldorf, J.H.: Securing the IP-based internet of things with HIP and DTLS. In: Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 119\u2013124, Budapest (2013)","DOI":"10.1145\/2462096.2462117"},{"key":"232_CR15","doi-asserted-by":"crossref","unstructured":"Camarillo, G., Keranen, A.: Host identity protocol (HIP) multi-hop routing extension. RFC 6028 (Experimental), IETF (2010)","DOI":"10.17487\/rfc6028"},{"key":"232_CR16","doi-asserted-by":"crossref","unstructured":"Kovacshazi, Z., Vida, R.: Host identity specific multicast. In: Proceeding of the International Conference on Networking and Services (ICNS 2007), pp. 1\u20139, Athens (2007)","DOI":"10.1109\/ICNS.2007.66"},{"key":"232_CR17","unstructured":"Takkinen, L.: Host identity protocol privacy management. Master\u2019s thesis, Helsinki University of Technology, Telecommunications Software and Multimedia Laboratory (2006)"},{"key":"232_CR18","doi-asserted-by":"crossref","unstructured":"Forsgren, H., Grahn, K., Karvi, T., Pulkkis, G.: Security and trust of public key cryptography options for HIP. In: 2010 10th IEEE International Conference on Computer and Information Technology (CIT 2010), pp. 1079\u20131084, Bradford, UK (2010)","DOI":"10.1109\/CIT.2010.197"},{"key":"232_CR19","volume-title":"A pseudonymous communications infrastructure for the internet","author":"IA Goldberg","year":"2000","unstructured":"Goldberg, I.A., Brewer, E.: A pseudonymous communications infrastructure for the internet. University of California, Berkeley (2000)"}],"container-title":["Lecture Notes in Electrical Engineering","Advances in Computer Science and Ubiquitous Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-7605-3_232","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,29]],"date-time":"2025-06-29T00:33:37Z","timestamp":1751157217000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-7605-3_232"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,20]]},"ISBN":["9789811076046","9789811076053"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-7605-3_232","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2017,12,20]]}}}