{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T05:50:23Z","timestamp":1757310623085,"version":"3.37.3"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"20","license":[{"start":{"date-parts":[[2021,8,1]],"date-time":"2021-08-01T00:00:00Z","timestamp":1627776000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,8,1]],"date-time":"2021-08-01T00:00:00Z","timestamp":1627776000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,8]]},"DOI":"10.1007\/s11042-021-11236-w","type":"journal-article","created":{"date-parts":[[2021,8,27]],"date-time":"2021-08-27T00:25:58Z","timestamp":1630023958000},"page":"31467-31486","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A lightweight improvement of PeDAAC protocol for 6LoWPAN in the Internet of Things"],"prefix":"10.1007","volume":"80","author":[{"given":"Reza","family":"Soltani","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8949-9180","authenticated-orcid":false,"given":"Saeid","family":"Pashazadeh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,26]]},"reference":[{"key":"11236_CR1","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.jnca.2017.04.002","volume":"88","author":"FA Alaba","year":"2017","unstructured":"Alaba FA, Othman M, Hashem IAT, Alotaibi F (2017) Internet of things Security: A Survey. J Netw Comput Appl 88:10\u201328. https:\/\/doi.org\/10.1016\/j.jnca.2017.04.002","journal-title":"J Netw Comput Appl"},{"key":"11236_CR2","doi-asserted-by":"publisher","unstructured":"Al-Ani A, Anbar M, Al-Ani AK, Hasbullah IH (2020) DHCPv6Auth: a mechanism to improve DHCPv6 authentication and privacy. S\u0101dhan\u0101 45:33. https:\/\/doi.org\/10.1007\/s12046-019-1244-4","DOI":"10.1007\/s12046-019-1244-4"},{"key":"11236_CR3","first-page":"156","volume":"45","author":"M Alshahrani","year":"2019","unstructured":"Alshahrani M, Traore I (2019) Secure mutual authentication and automated access control for IoT smart home using cumulative Keyed-hash chain. J Inf Secur Appl 45:156\u2013175","journal-title":"J Inf Secur Appl"},{"key":"11236_CR4","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s10207-019-00445-y","volume":"19","author":"P Aufner","year":"2020","unstructured":"Aufner P (2020) The IoT security gap: a look down into the valley between threat models and their implementation. Int J Inf Secur 19:3\u201314. https:\/\/doi.org\/10.1007\/s10207-019-00445-y","journal-title":"Int J Inf Secur"},{"issue":"3","key":"11236_CR5","doi-asserted-by":"publisher","first-page":"2779","DOI":"10.1007\/s10586-017-0853-0","volume":"20","author":"M Bilal","year":"2017","unstructured":"Bilal M, Kang SG (2017) A secure key agreement protocol for dynamic group. Cluster Comput 20(3):2779\u20132792","journal-title":"Cluster Comput"},{"key":"11236_CR6","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-020-07649-9","author":"PM Chanal","year":"2020","unstructured":"Chanal PM, Kakkasageri MS (2020) Security and privacy in IoT: a survey. Wirel Pers Commun. https:\/\/doi.org\/10.1007\/s11277-020-07649-9","journal-title":"Wirel Pers Commun"},{"key":"11236_CR7","doi-asserted-by":"publisher","first-page":"1603","DOI":"10.1007\/s11277-020-07645-z","volume":"115","author":"L Gao","year":"2020","unstructured":"Gao L, Zhang L, Feng L, Maode M (2020) An efficient secure authentication and key establishment scheme for M2M communication in 6LoWPAN in unattended scenarios. Wirel Pers Commun 115:1603\u20131621. https:\/\/doi.org\/10.1007\/s11277-020-07645-z","journal-title":"Wirel Pers Commun"},{"key":"11236_CR8","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1016\/j.adhoc.2018.01.013","volume":"82","author":"G Glissa","year":"2019","unstructured":"Glissa G, Meddeb A (2019) 6LowPSec: An end-to-end security protocol for 6LoWPAN. Ad Hoc Netw 82:100\u2013112","journal-title":"Ad Hoc Netw"},{"key":"11236_CR9","doi-asserted-by":"publisher","unstructured":"Granjal J, Monteiro E. Silva JS (2010) Enabling network-layer security on ipv6 wireless sensor networks. In: Global telecommunications conference (GLOBECOM 2010). IEEE, New York, pp 1\u20136. https:\/\/doi.org\/10.1109\/GLOCOM.2010.5684293","DOI":"10.1109\/GLOCOM.2010.5684293"},{"key":"11236_CR10","doi-asserted-by":"publisher","unstructured":"Hussen HR, Tizazu GA, Ting M, Lee T, Choi Y, Kim K-H (2013) Sakes: secure authentication and key establishment scheme for m2m communication in the IP-based wireless sensor network (6LoWPAN). In: 2013 Fifth international conference on ubiquitous and future networks (ICUFN), p 246\u201351. https:\/\/doi.org\/10.1109\/ICUFN.2013.6614820","DOI":"10.1109\/ICUFN.2013.6614820"},{"key":"11236_CR11","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1016\/j.future.2014.11.009","volume":"49","author":"H Jiang","year":"2015","unstructured":"Jiang H, Shen F, Chen S, Li KC, Jeong YS (2015) A secure and scalable storage system for aggregate data in IoT. Future Gen Comput Syst 49:133\u2013141. https:\/\/doi.org\/10.1016\/j.future.2014.11.009","journal-title":"Future Gen Comput Syst"},{"issue":"7","key":"11236_CR12","first-page":"1","volume":"2","author":"RSM Joshitta","year":"2016","unstructured":"Joshitta RSM, Arockiam L (2016) Security in IoT environment: a survey. Int J Inf TechnolMech Eng (IJITME) 2(7):1\u20138","journal-title":"Int J Inf TechnolMech Eng (IJITME)"},{"key":"11236_CR13","doi-asserted-by":"publisher","unstructured":"Kanuparthi A, Karri R, Addepalli S (2013) Hardware and embedded security in the context of Internet of things. In: Proc. of the ACM workshop on Security, privacy & dependability for cyber vehicles, p 61\u201364. https:\/\/doi.org\/10.1145\/2517968.2517976","DOI":"10.1145\/2517968.2517976"},{"key":"11236_CR14","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1016\/j.comnet.2018.03.012","volume":"141","author":"DE Kouicem","year":"2018","unstructured":"Kouicem DE, Bouabdallah A, Lakhlef H (2018) Internet of things security: A top-down survey. Comput Netw 141:199\u2013221. https:\/\/doi.org\/10.1016\/j.comnet.2018.03.012","journal-title":"Comput Netw"},{"key":"11236_CR15","doi-asserted-by":"publisher","unstructured":"Kumar JS, Patel DR (2014) A survey on Internet of things: Security and privacy issues. Int J Comput Appl 90(11):20\u201326. https:\/\/doi.org\/10.5120\/15764-4454","DOI":"10.5120\/15764-4454"},{"key":"11236_CR16","doi-asserted-by":"publisher","first-page":"13","DOI":"10.26599\/TST.2018.9010020","volume":"23","author":"L Li","year":"2018","unstructured":"Li L, Ren G, Liu Y, Wu J (2018) Secure DHCPv6 mechanism for DHCPv6 security and privacy protection. Tsinghua Sci Technol 23:13\u201321","journal-title":"Tsinghua Sci Technol"},{"key":"11236_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cose.2017.08.007","volume":"72","author":"J Li","year":"2018","unstructured":"Li J, Zhang Y, Chen X, Xiang Y (2018) Secure attribute-based data sharing for resource-limited users in cloud computing. Comput Secur 72:1\u201312","journal-title":"Comput Secur"},{"key":"11236_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jisa.2019.02.005","volume":"46","author":"A Lohachab","year":"2019","unstructured":"Lohachab A (2019) ECC based inter-device authentication and authorization scheme using MQTT for IoT networks. J Inf Secur Appl 46:1\u201312. https:\/\/doi.org\/10.1016\/j.jisa.2019.02.005","journal-title":"J Inf Secur Appl"},{"key":"11236_CR19","doi-asserted-by":"publisher","unstructured":"Lokulwar PP, Deshmukh HR (2017) Threat analysis and attacks modelling in routing towards IoT, 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, pp 721\u2013726. https:\/\/doi.org\/10.1109\/I-SMAC.2017.8058273","DOI":"10.1109\/I-SMAC.2017.8058273"},{"key":"11236_CR20","unstructured":"Lynn B Euclid\u2019s Algorithm. The Pairing-Based Cryptography Library. https:\/\/crypto.stanford.edu\/pbc\/notes\/numbertheory\/euclid.html. Accessed 2000"},{"key":"11236_CR21","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/j.cose.2017.05.004","volume":"70","author":"M Mavani","year":"2017","unstructured":"Mavani M, Asawa K (2017) Modeling and analyses of IP spoofing attack in 6Lowpan network. Comput Secur 70:95\u2013110","journal-title":"Comput Secur"},{"key":"11236_CR22","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/j.adhoc.2018.06.010","volume":"79","author":"M Mavani","year":"2018","unstructured":"Mavani M, Asawa K (2018) Privacy enabled disjoint and dynamic address auto-configuration protocol for 6Lowpan. Ad Hoc Netw 79:72\u201386. https:\/\/doi.org\/10.1016\/j.adhoc.2018.06.010","journal-title":"Ad Hoc Netw"},{"key":"11236_CR23","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1007\/s12083-019-00792-6","volume":"13","author":"M Mavani","year":"2020","unstructured":"Mavani M, Asawa K (2020) Resilient against spoofing in 6LoWPAN networks by temporary-private IPv6 addresses. Peer-to-Peer Netw Appl 13:333\u2013347. https:\/\/doi.org\/10.1007\/s12083-019-00792-6","journal-title":"Peer-to-Peer Netw Appl"},{"issue":"3","key":"11236_CR24","first-page":"459","volume":"18","author":"A Mayzaud","year":"2016","unstructured":"Mayzaud A, Badonnel R, Chrisment I (2016) A taxonomy of attacks in RPL-based Internet of Things. Int J Netw Secur 18(3):459\u2013473","journal-title":"Int J Netw Secur"},{"key":"11236_CR25","doi-asserted-by":"publisher","unstructured":"Newsome J, Shi E, Song D, Perrig A (2004) The sybil attack in sensor networks: analysis & defenses. In: Proc. Of the 3rd ACM International Symposium on Information processing in sensor networks. IPSN ,p 259\u2013268. https:\/\/doi.org\/10.1109\/IPSN.2004.239019","DOI":"10.1109\/IPSN.2004.239019"},{"key":"11236_CR26","unstructured":"Park S, Kim K, Haddad W, Chakrabarti S, Laganier J (2011) Ipv6 over low power wpan security analysis. IETF Draft. draft-daniel-6lowpan-security-analysis-05. https:\/\/datatracker.ietf.org\/doc\/draft-daniel-6lowpan-security-analysis"},{"issue":"3","key":"11236_CR27","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1109\/MCC.2016.63","volume":"3","author":"D Puthal","year":"2016","unstructured":"Puthal D, Nepal S, Ranjan R, Chen J (2016) Threats to networking cloud and edge datacenters in the Internet of Things. IEEE Cloud Comput 3(3):64\u201371. https:\/\/doi.org\/10.1109\/MCC.2016.63","journal-title":"IEEE Cloud Comput"},{"key":"11236_CR28","doi-asserted-by":"publisher","first-page":"20319","DOI":"10.1007\/s11042-020-08683-2","volume":"79","author":"S Rana","year":"2020","unstructured":"Rana S, Mishra D (2020) Secure and ubiquitous authenticated content distribution framework for IoT enabled DRM system. Multimed Tools Appl 79:20319\u201320341. https:\/\/doi.org\/10.1007\/s11042-020-08683-2","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"11236_CR29","doi-asserted-by":"publisher","first-page":"1582","DOI":"10.1109\/COMST.2018.2885894","volume":"21","author":"A Raoof","year":"2019","unstructured":"Raoof A, Matrawy A, Lung C (2019) Routing attacks and mitigation methods for RPL-based Internet of Things. IEEE Commun Surv Tutorials 21(2):1582\u20131606. https:\/\/doi.org\/10.1109\/COMST.2018.2885894","journal-title":"IEEE Commun Surv Tutorials"},{"issue":"1","key":"11236_CR30","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1109\/TCSVT.2016.2605045","volume":"28","author":"Z Sun","year":"2018","unstructured":"Sun Z, Zhang Q, Li Y, Tan Y (2018) DPPDL: a dynamic partial-parallel data layout for green video surveillance storage. IEEE Trans Circuits Syst Video Technol 28(1):193\u2013205","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"4","key":"11236_CR31","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/j.jnca.2018.01.011","volume":"107","author":"Y Tan","year":"2018","unstructured":"Tan Y, Xue Y, Liang C, Zheng J, Zhang Q, Zheng J, Li Y (2018) A root privilege management scheme with revocable authorization for Android devices. J Netw Comput Appl 107(4):69\u201382. https:\/\/doi.org\/10.1016\/j.jnca.2018.01.011","journal-title":"J Netw Comput Appl"},{"key":"11236_CR32","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s11235-019-00599-z","volume":"73","author":"R Vishwakarma","year":"2020","unstructured":"Vishwakarma R, Jain AK (2020) A survey of DDoS attacking techniques and defence mechanisms in the IoT network. Telecommun Syst 73:3\u201325. https:\/\/doi.org\/10.1007\/s11235-019-00599-z","journal-title":"Telecommun Syst"},{"issue":"5","key":"11236_CR33","doi-asserted-by":"publisher","first-page":"1250","DOI":"10.1109\/JIOT.2017.2694844","volume":"4","author":"Y Yang","year":"2017","unstructured":"Yang Y, Wu L, Yin G, Li L, Zhao H (2017) A survey on security and privacy issues in Internet-of-Things. IEEE Internet Things J 4(5):1250\u20131258. https:\/\/doi.org\/10.1109\/JIOT.2017.2694844","journal-title":"IEEE Internet Things J"},{"key":"11236_CR34","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1016\/j.future.2014.10.010","volume":"49","author":"X Yao","year":"2014","unstructured":"Yao X, Chen Z, Tian Y (2014) A lightweight attribute-based encryption scheme for the Internet of Things. Future Gen Comput Syst 49:104\u2013112","journal-title":"Future Gen Comput Syst"},{"key":"11236_CR35","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.jnca.2017.02.009","volume":"84","author":"BB Zarpel\u00e3o","year":"2017","unstructured":"Zarpel\u00e3o BB, Miani RS, Kawakani CT, de Alvarenga SC (2017) A survey of intrusion detection in Internet of Things. J Netw Comput Appl 84:25\u201337","journal-title":"J Netw Comput Appl"},{"key":"11236_CR36","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1016\/j.ins.2018.03.007","volume":"445","author":"X Zhang","year":"2018","unstructured":"Zhang X, Liang C, Zhang Q, Li Y, Zheng J, Tan Y (2018) Building covert timing channels by packet rearrangement over mobile networks. Inf Sci 445:66\u201378. https:\/\/doi.org\/10.1016\/j.ins.2018.03.007","journal-title":"Inf Sci"},{"key":"11236_CR37","doi-asserted-by":"publisher","unstructured":"Zhao K, Ge L (2013) A survey on the Internet of things security. In: 9th International Conference on Computational Intelligence and Security (CIS), IEEE, new York, p 663\u2013667. https:\/\/doi.org\/10.1109\/CIS.2013.145","DOI":"10.1109\/CIS.2013.145"},{"issue":"4","key":"11236_CR38","doi-asserted-by":"publisher","first-page":"048103","DOI":"10.1007\/s11432-017-9212-2","volume":"61","author":"J Zheng","year":"2018","unstructured":"Zheng J, Tan YA, Zhang Q, Zhang X, Zhu L, Zhang Q (2018) Cross-cluster asymmetric group key agreement for wireless sensor networks. Sci China Inf Sci 61(4):048103. https:\/\/doi.org\/10.1007\/s11432-017-9212-2","journal-title":"Sci China Inf Sci"},{"key":"11236_CR39","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1016\/j.future.2017.01.031","volume":"73","author":"H Zhu","year":"2017","unstructured":"Zhu H, Tan Y, Zhang X, Zhu L, Zhang C, Zheng J (2017) A round-optimal lattice-based blind signature scheme for cloud services. Future Gen Comput Syst 73:106\u2013114. https:\/\/doi.org\/10.1016\/j.future.2017.01.031","journal-title":"Future Gen Comput Syst"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11236-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-11236-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11236-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,8]],"date-time":"2023-01-08T05:27:36Z","timestamp":1673155656000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-11236-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8]]},"references-count":39,"journal-issue":{"issue":"20","published-print":{"date-parts":[[2021,8]]}},"alternative-id":["11236"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-11236-w","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2021,8]]},"assertion":[{"value":"14 September 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 April 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 July 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 August 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}