{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,4]],"date-time":"2025-09-04T13:32:08Z","timestamp":1756992728633,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":23,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789811695759"},{"type":"electronic","value":"9789811695766"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-16-9576-6_3","type":"book-chapter","created":{"date-parts":[[2022,1,22]],"date-time":"2022-01-22T13:02:27Z","timestamp":1642856547000},"page":"30-43","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Comparative Analysis of Bluetooth LE and EDHOC for Potential Security Protocol in Artificial Pancreas System"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7121-4204","authenticated-orcid":false,"given":"Daniel Gerbi","family":"Duguma","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9611-1036","authenticated-orcid":false,"given":"Philip Virgil","family":"Astillo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4751-256X","authenticated-orcid":false,"given":"Yonas Engida","family":"Gebremariam","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8074-4899","authenticated-orcid":false,"given":"Bonam","family":"Kim","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0604-3445","authenticated-orcid":false,"given":"Ilsun","family":"You","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,22]]},"reference":[{"issue":"3","key":"3_CR1","first-page":"47","volume":"10","author":"M Alizadeh","year":"2020","unstructured":"Alizadeh, M., Andersson, K., Schel\u00e9n, O.: A survey of secure internet of things in relation to blockchain. J. Internet Serv. Inf. Secur. (JISIS) 10(3), 47\u201375 (2020)","journal-title":"J. Internet Serv. Inf. Secur. (JISIS)"},{"issue":"4","key":"3_CR2","first-page":"77","volume":"11","author":"P Angin","year":"2020","unstructured":"Angin, P., Anisi, M.H., G\u00f6ksel, F., G\u00fcrsoy, C., B\u00fcy\u00fckg\u00fclc\u00fc, A.: AgriLoRa: a digital twin framework for smart agriculture. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. 11(4), 77\u201396 (2020)","journal-title":"J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl."},{"issue":"3","key":"3_CR3","first-page":"50","volume":"11","author":"R Bembenik","year":"2020","unstructured":"Bembenik, R., Falcman, K.: BLE indoor positioning system using RSSI-based trilateration. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. 11(3), 50\u201369 (2020)","journal-title":"J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl."},{"issue":"1","key":"3_CR4","first-page":"35","volume":"11","author":"D Caputo","year":"2020","unstructured":"Caputo, D., Verderame, L., Ranieri, A., Merlo, A., Caviglione, L.: Fine-hearing google home: why silence will not protect your privacy. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. 11(1), 35\u201353 (2020)","journal-title":"J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl."},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Chen, H., Jia, X., Li, H.: A brief introduction to IoT gateway. In: IET International Conference on Communication Technology and Application (ICCTA 2011), pp. 610\u2013613. IET (2011)","DOI":"10.1049\/cp.2011.0740"},{"key":"3_CR6","unstructured":"Daniel, D.: Advantages and challenges of the internet of things (IoT) in healthcare (2019). https:\/\/y-sbm.com\/blog\/internet-of-things-in-helthcare. Accessed 05 Aug 2021"},{"key":"3_CR7","unstructured":"G. Selander, F.P., Hartke, K.: Requirements for CoAP end-to-end security, July 2017. http:\/\/www.ietf.org\/internet-drafts\/draft-hartke-coree2e-security-reqs-03.txt"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"G. Selander, J. Mattsson, F.P., Seitz, L.: Object security for constrained restful environments (oscore), July 2019. https:\/\/tools.ietf.org\/html\/rfc8613","DOI":"10.17487\/RFC8613"},{"key":"3_CR9","unstructured":"G. Selander, J.M., Palombini, F.: Ephemeral Diffie-Hellman over COSE (EDHOC) (2019). https:\/\/datatracker.ietf.org\/doc\/draft-selander-lake-edhoc\/"},{"issue":"1","key":"3_CR10","first-page":"42","volume":"27","author":"S Gajbhiye","year":"2018","unstructured":"Gajbhiye, S., Karmakar, S., Sharma, M., Sharma, S.: Two-party secure connection in bluetooth-enabled devices. Inf. Secur. J.: Glob. Perspect. 27(1), 42\u201356 (2018)","journal-title":"Inf. Secur. J.: Glob. Perspect."},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Gajbhiye, S., Sharma, M., Karmkar, S., Sharma, S.: Design, implementation and security analysis of bluetooth pairing protocol in NS2. In: 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 1711\u20131717. IEEE (2016)","DOI":"10.1109\/ICACCI.2016.7732294"},{"key":"3_CR12","unstructured":"World Health Oganizationi: Diabete (2020). https:\/\/www.who.int\/newsroom\/fact-sheets\/detail\/diabetes. Accessed 05 Aug 2021"},{"issue":"3","key":"3_CR13","doi-asserted-by":"publisher","first-page":"2117","DOI":"10.1109\/JIOT.2019.2959428","volume":"7","author":"S P\u00e9rez","year":"2019","unstructured":"P\u00e9rez, S., Hern\u00e1ndez-Ramos, J.L., Raza, S., Skarmeta, A.: Application layer key establishment for end-to-end security in IoT. IEEE Internet Things J. 7(3), 2117\u20132128 (2019)","journal-title":"IEEE Internet Things J."},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Rescorla, E., Modadugu, N.: Datagram transport layer security version 1.2 (2012)","DOI":"10.17487\/rfc6347"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Schaad, J.: Cbor object signing and encryption (COSE), July 2017. https:\/\/tools.ietf.org\/html\/rfc8152","DOI":"10.17487\/RFC8152"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Shelby, Z., Hartke, K., Bormann, C.: The constrained application protocol (CoAP) (2014)","DOI":"10.17487\/rfc7252"},{"issue":"2","key":"3_CR17","first-page":"55","volume":"11","author":"YA Shichkina","year":"2020","unstructured":"Shichkina, Y.A., Kataeva, G.V., Irishina, Y.A., Stanevich, E.S.: The use of mobile phones to monitor the status of patients with parkinson\u2019s disease. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. 11(2), 55\u201373 (2020)","journal-title":"J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl."},{"issue":"5","key":"3_CR18","doi-asserted-by":"publisher","first-page":"1158","DOI":"10.3390\/s19051158","volume":"19","author":"DZ Sun","year":"2019","unstructured":"Sun, D.Z., Sun, L.: On secure simple pairing in bluetooth standard v5. 0-part i: authenticated link key security and its home automation and entertainment applications. Sensors 19(5), 1158 (2019)","journal-title":"Sensors"},{"issue":"4","key":"3_CR19","first-page":"59","volume":"10","author":"SK Wong","year":"2020","unstructured":"Wong, S.K., Yiu, S.M.: Identification of device motion status via bluetooth discovery. J. Internet Serv. Inf. Secur. 10(4), 59\u201369 (2020)","journal-title":"J. Internet Serv. Inf. Secur."},{"issue":"4","key":"3_CR20","first-page":"16","volume":"11","author":"SK Wong","year":"2020","unstructured":"Wong, S.K., Yiu, S.M.: Location spoofing attack detection with pre-installed sensors in mobile devices. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. 11(4), 16\u201330 (2020)","journal-title":"J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl."},{"key":"3_CR21","unstructured":"Woolley, M.: Bluetooth core specification v5. In: Bluetooth (2019)"},{"issue":"4","key":"3_CR22","first-page":"229","volume":"14","author":"TC Yeh","year":"2012","unstructured":"Yeh, T.C., Peng, J.R., Wang, S.S., Hsu, J.P.: Securing bluetooth communications. Int. J. Netw. Secur. 14(4), 229\u2013235 (2012)","journal-title":"Int. J. Netw. Secur."},{"key":"3_CR23","doi-asserted-by":"crossref","unstructured":"Zhong, C.L., Zhu, Z., Huang, R.G.: Study on the iot architecture and gateway technology. In: 2015 14th International Symposium on Distributed Computing and Applications for Business Engineering and Science (DCABES), pp. 196\u2013199. IEEE (2015)","DOI":"10.1109\/DCABES.2015.56"}],"container-title":["Communications in Computer and Information Science","Mobile Internet Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-9576-6_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,16]],"date-time":"2024-09-16T19:02:27Z","timestamp":1726513347000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-9576-6_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9789811695759","9789811695766"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-9576-6_3","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"22 January 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MobiSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Mobile Internet Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Jeju Island","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 October 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 October 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mobisecsymposium2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/isyou.info\/conf\/mobisec21\/I","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"66","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"42% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}