{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:44:17Z","timestamp":1740123857634,"version":"3.37.3"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2020,5,18]],"date-time":"2020-05-18T00:00:00Z","timestamp":1589760000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,5,18]],"date-time":"2020-05-18T00:00:00Z","timestamp":1589760000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Ministry of Science and ICT (MSIT), South Korea"},{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2020,8]]},"DOI":"10.1007\/s11276-020-02330-2","type":"journal-article","created":{"date-parts":[[2020,5,18]],"date-time":"2020-05-18T21:02:50Z","timestamp":1589835770000},"page":"4615-4635","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Security offloading network system for expanded security coverage in IPv6-based resource constrained data service networks"],"prefix":"10.1007","volume":"26","author":[{"given":"Jiyong","family":"Han","sequence":"first","affiliation":[]},{"given":"Daeyoung","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,5,18]]},"reference":[{"issue":"7","key":"2330_CR1","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MC.2017.201","volume":"50","author":"C Kolias","year":"2017","unstructured":"Kolias, C., Kambourakis, G., Stavrou, A., & Voas, J. (2017). Ddos in the iot: Mirai and other botnets. Computer, 50(7), 80\u201384. https:\/\/doi.org\/10.1109\/MC.2017.201.","journal-title":"Computer"},{"key":"2330_CR2","doi-asserted-by":"crossref","unstructured":"Bormann, C., Ersue, M., & Keranen, A. (2014). Terminology for constrained-node networks. Internet Engineering Task Force (IETF), RFC 7228.","DOI":"10.17487\/rfc7228"},{"key":"2330_CR3","doi-asserted-by":"crossref","unstructured":"Rescorla, E., & Modadugu, N. (2012). Datagram transport layer security version 1.2. Tech. rep.","DOI":"10.17487\/rfc6347"},{"key":"2330_CR4","doi-asserted-by":"publisher","unstructured":"Hummen, R., Shafagh, H., Raza, S., Voig, T., & Wehrle, K. (2014). Delegation-based authentication and authorization for the ip-based internet of things. In 2014 eleventh annual IEEE international conference on sensing, communication, and networking (SECON), pp. 284\u2013292. https:\/\/doi.org\/10.1109\/SAHCN.2014.6990364.","DOI":"10.1109\/SAHCN.2014.6990364"},{"key":"2330_CR5","doi-asserted-by":"publisher","unstructured":"Hummen, R., Ziegeldorf, J. H., Shafagh, H., Raza, S., & Wehrle, K. (2013). Towards viable certificate-based authentication for the internet of things. In Proceedings of the 2Nd ACM workshop on hot topics on wireless network security and privacy, HotWiSec \u201913, pp. 37\u201342. ACM, New York, NY, USA. https:\/\/doi.org\/10.1145\/2463183.2463193.","DOI":"10.1145\/2463183.2463193"},{"key":"2330_CR6","unstructured":"Gerdes, S., Bergmann, O., & Bormann, C. (2015). Delegated coap authentication and authorization framework (dcaf). IETF draft,. gerdes-core-dcaf-authorize-04."},{"key":"2330_CR7","doi-asserted-by":"publisher","unstructured":"Raza, S., Trabalza, D., & Voigt, T. (2012). 6lowpan compressed dtls for coap. In 2012 IEEE 8th international conference on distributed computing in sensor systems, pp. 287\u2013289. https:\/\/doi.org\/10.1109\/DCOSS.2012.55.","DOI":"10.1109\/DCOSS.2012.55"},{"issue":"10","key":"2330_CR8","doi-asserted-by":"publisher","first-page":"3711","DOI":"10.1109\/JSEN.2013.2277656","volume":"13","author":"S Raza","year":"2013","unstructured":"Raza, S., Shafagh, H., Hewage, K., Hummen, R., & Voigt, T. (2013). Lithe: Lightweight secure coap for the internet of things. IEEE Sensors Journal, 13(10), 3711\u20133720.","journal-title":"IEEE Sensors Journal"},{"key":"2330_CR9","doi-asserted-by":"crossref","unstructured":"Tschofenig, H., & Fossati, T. (2016). Transport layer security (tls)\/datagram transport layer security (dtls) profiles for the internet of things. Tech. rep.","DOI":"10.17487\/RFC7925"},{"key":"2330_CR10","unstructured":"Gerdes, S., Seitz, L., Selander, G., & Bormann, D.C. (2018). An architecture for authorization in constrained environments. Internet-Draft draft-ietf-ace-actors-07, Internet Engineering Task Force. https:\/\/tools.ietf.org\/html\/draft-ietf-ace-actors-07. Work in Progress."},{"issue":"6","key":"2330_CR11","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MWC.2010.5675776","volume":"17","author":"S Hong","year":"2010","unstructured":"Hong, S., Kim, D., Ha, M., Bae, S., Park, S. J., Jung, W., et al. (2010). Snail: an ip-based wireless sensor network approach to the internet of things. IEEE Wireless Communications, 17(6), 34\u201342. https:\/\/doi.org\/10.1109\/MWC.2010.5675776.","journal-title":"IEEE Wireless Communications"},{"key":"2330_CR12","doi-asserted-by":"publisher","unstructured":"Shelby, Z., Hartke, K., & Bormann, C. (2014). The constrained application protocol (CoAP). RFC 7252. https:\/\/doi.org\/10.17487\/RFC7252. https:\/\/rfc-editor.org\/rfc\/rfc7252.txt.","DOI":"10.17487\/RFC7252"},{"issue":"12","key":"2330_CR13","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1109\/MCOM.2017.1600534","volume":"55","author":"C Gomez","year":"2017","unstructured":"Gomez, C., Paradells, J., Bormann, C., & Crowcroft, J. (2017). From 6lowpan to 6lo: Expanding the universe of ipv6-supported technologies for the internet of things. IEEE Communications Magazine, 55(12), 148\u2013155. https:\/\/doi.org\/10.1109\/MCOM.2017.1600534.","journal-title":"IEEE Communications Magazine"},{"key":"2330_CR14","doi-asserted-by":"publisher","unstructured":"Montenegro, G., Schumacher, C., & Kushalnagar, N. (2007). IPv6 over low-power wireless personal area networks (6LoWPANs): Overview, assumptions, problem statement, and goals. RFC 4919. https:\/\/doi.org\/10.17487\/RFC4919. https:\/\/rfc-editor.org\/rfc\/rfc4919.txt.","DOI":"10.17487\/RFC4919"},{"key":"2330_CR15","doi-asserted-by":"publisher","unstructured":"Vasseur, J. (2014). Terms used in routing for low-power and lossy networks. RFC 7102. https:\/\/doi.org\/10.17487\/RFC7102. https:\/\/rfc-editor.org\/rfc\/rfc7102.txt.","DOI":"10.17487\/RFC7102"},{"key":"2330_CR16","doi-asserted-by":"crossref","unstructured":"Dierks, T., & Rescorla, E. (2008). The transport layer security (tls) protocol version 1.2. Tech. rep.","DOI":"10.17487\/rfc5246"},{"key":"2330_CR17","unstructured":"Oma lightweight m2m (2019). https:\/\/www.omaspecworks.org\/what-is-oma-specworks\/iot\/lightweight-m2m-lwm2m\/."},{"key":"2330_CR18","unstructured":"Contiki: The open source os for the internet of things (2019). http:\/\/www.contiki-os.org\/."},{"key":"2330_CR19","doi-asserted-by":"publisher","unstructured":"Han, J., Ha, M., & Kim, D. (2015). Practical security analysis for the constrained node networks: Focusing on the dtls protocol. In 2015 5th international conference on the internet of things (IOT), pp. 22\u201329. https:\/\/doi.org\/10.1109\/IOT.2015.7356544.","DOI":"10.1109\/IOT.2015.7356544"},{"issue":"4","key":"2330_CR20","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1007\/s11276-005-1766-z","volume":"11","author":"DSJ De Couto","year":"2005","unstructured":"De Couto, D. S. J., Aguayo, D., Bicket, J., & Morris, R. (2005). A high-throughput path metric for multi-hop wireless routing. Wireless Network, 11(4), 419\u2013434. https:\/\/doi.org\/10.1007\/s11276-005-1766-z.","journal-title":"Wireless Network"},{"key":"2330_CR21","doi-asserted-by":"crossref","unstructured":"Winter, T., Thubert, P., Brandt, A., Hui, J., Kelsey, R., Levis, P., Pister, K., Struik, R., Vasseur, J.P., & Alexander, R. (2012). Rpl: Ipv6 routing protocol for low-power and lossy networks. Tech. rep.","DOI":"10.17487\/rfc6550"},{"key":"2330_CR22","doi-asserted-by":"crossref","unstructured":"Draves, R., Padhye, J., & Zill, B. (2004). Routing in multi-radio, multi-hop wireless mesh networks. pp. 114\u2013128. Cited By 1777.","DOI":"10.1145\/1023720.1023732"},{"key":"2330_CR23","unstructured":"How does aes encryption work? (2019). https:\/\/proprivacy.com\/guides\/aes-encryption."},{"key":"2330_CR24","unstructured":"Algorithms, key sizes and parameters report (2013). https:\/\/www.enisa.europa.eu\/activities\/identity-and-trust\/library\/deliverables\/algorithms-key-sizes-and-parameters-report."},{"key":"2330_CR25","unstructured":"Msp430f543x, msp430f541x mixed-signal microcontrollers datasheet (rev. f) (2018). http:\/\/www.ti.com\/lit\/ds\/symlink\/msp430f5438.pdf."},{"key":"2330_CR26","doi-asserted-by":"publisher","unstructured":"El-hajj, M., Maroun, C., Fadlallah, A., & Serhrouchni, A. (2018). Analysis of cryptographic algorithms on iot hardware platforms. pp. 1\u20135. https:\/\/doi.org\/10.1109\/CSNET.2018.8602942.","DOI":"10.1109\/CSNET.2018.8602942"},{"key":"2330_CR27","doi-asserted-by":"publisher","unstructured":"Montenegro, G., Hui, J., Culler, D., & Kushalnagar, N. (2007). Transmission of IPv6 packets over IEEE 802.15.4 networks. RFC 4944. https:\/\/doi.org\/10.17487\/RFC4944. https:\/\/rfc-editor.org\/rfc\/rfc4944.txt.","DOI":"10.17487\/RFC4944"},{"key":"2330_CR28","doi-asserted-by":"publisher","unstructured":"Thubert, P., & Hui, J. (2015). Compression format for IPv6 datagrams over IEEE 802.15.4-based networks. RFC 6282. https:\/\/doi.org\/10.17487\/rfc6282. https:\/\/rfc-editor.org\/rfc\/rfc6282.txt.","DOI":"10.17487\/rfc6282"},{"key":"2330_CR29","doi-asserted-by":"publisher","unstructured":"Alexander, R., Brandt, A., Vasseur, J., Hui, J., Pister, K., Thubert, P., Levis, P., Struik, R., Kelsey, R., & Winter, T. (2012). RPL: IPv6 routing protocol for low-power and lossy networks. RFC 6550. https:\/\/doi.org\/10.17487\/RFC6550. https:\/\/rfc-editor.org\/rfc\/rfc6550.txt.","DOI":"10.17487\/RFC6550"},{"key":"2330_CR30","unstructured":"Texas instruments, dallas, texas, united states (2019). http:\/\/www.ti.com."},{"key":"2330_CR31","unstructured":"Eclipse tinydtls, eclipse foundation (2017). https:\/\/projects.eclipse.org\/projects\/iot.tinydtls."},{"key":"2330_CR32","doi-asserted-by":"crossref","unstructured":"Bormann, C. (2014). 6lowpan-ghc: generic header compression for ipv6 over low-power wireless personal area networks (6lowpans). Tech. rep.","DOI":"10.17487\/rfc7400"},{"key":"2330_CR33","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/11513988_27","volume-title":"Computer aided verification","author":"A Armando","year":"2005","unstructured":"Armando, A., Basin, D., Boichut, Y., Chevalier, Y., Compagna, L., Cuellar, J., et al. (2005). The avispa tool for the automated validation of internet security protocols and applications. In K. Etessami & S. K. Rajamani (Eds.), Computer aided verification (pp. 281\u2013285). Berlin: Springer."},{"key":"2330_CR34","unstructured":"Von\u00a0Oheimb, D. (2005). The high-level protocol specification language hlpsl developed in the eu project avispa. In Proceedings of APPSEM 2005 workshop (pp. 1\u201317)."},{"issue":"2","key":"2330_CR35","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev, D., & Yao, A. (1983). On the security of public key protocols. IEEE Transactions on information theory, 29(2), 198\u2013208.","journal-title":"IEEE Transactions on information theory"},{"issue":"3","key":"2330_CR36","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/s10207-004-0055-7","volume":"4","author":"D Basin","year":"2005","unstructured":"Basin, D., M\u00f6dersheim, S., & Vigano, L. (2005). Ofmc: A symbolic model checker for security protocols. International Journal of Information Security, 4(3), 181\u2013208.","journal-title":"International Journal of Information Security"},{"key":"2330_CR37","doi-asserted-by":"crossref","unstructured":"Turuani, M. (2006). The cl-atse protocol analyser. In International conference on rewriting techniques and applications (pp. 277\u2013286). Berlin: Springer.","DOI":"10.1007\/11805618_21"},{"key":"2330_CR38","doi-asserted-by":"crossref","unstructured":"Armando, A., & Compagna, L. (2004). Satmc: a sat-based model checker for security protocols. In European workshop on logics in artificial intelligence (pp. 730\u2013733). Berlin: Springer.","DOI":"10.1007\/978-3-540-30227-8_68"},{"key":"2330_CR39","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/j.entcs.2005.11.052","volume":"155","author":"L Vigan\u00f2","year":"2006","unstructured":"Vigan\u00f2, L. (2006). Automated security protocol analysis with the avispa tool. Electronic Notes in Theoretical Computer Science, 155, 61\u201386.","journal-title":"Electronic Notes in Theoretical Computer Science"},{"key":"2330_CR40","doi-asserted-by":"publisher","first-page":"7:7","DOI":"10.1155\/2015\/393754","volume":"2015","author":"N Kang","year":"2015","unstructured":"Kang, N., Park, J., Kwon, H., & Jung, S. (2015). Esse: Efficient secure session establishment for internet-integrated wireless sensor networks. International Journal of Distributed Sensor Networks, 2015, 7:7\u20137:7. https:\/\/doi.org\/10.1155\/2015\/393754.","journal-title":"International Journal of Distributed Sensor Networks"},{"key":"2330_CR41","doi-asserted-by":"crossref","unstructured":"Porambage, P., Braeken, A., Kumar, P., Gurtov, A., & Ylianttila, M. (2015). Efficient key establishment for constrained iot devices with collaborative hip-based approach. In 2015 IEEE global communications conference (GLOBECOM) (pp. 1\u20136). IEEE.","DOI":"10.1109\/GLOCOM.2015.7417094"},{"key":"2330_CR42","doi-asserted-by":"publisher","unstructured":"Moskowitz, R., Jokela, P., Henderson, T., & Nikander, P. (2015). Host identity protocol. RFC 5201. https:\/\/doi.org\/10.17487\/rfc5201. https:\/\/rfc-editor.org\/rfc\/rfc5201.txt.","DOI":"10.17487\/rfc5201"},{"key":"2330_CR43","doi-asserted-by":"crossref","unstructured":"Capossele, A., Cervo, V., De Cicco, G., & Petrioli, C. (2015). Security as a coap resource: An optimized dtls implementation for the iot. In 2015 IEEE international conference on communications (ICC) (pp. 549\u2013554). IEEE.","DOI":"10.1109\/ICC.2015.7248379"},{"key":"2330_CR44","unstructured":"The ietf wg, dtls in constrained environment (dice) (2017). https:\/\/datatracker.ietf.org\/wg\/dice\/charter."},{"key":"2330_CR45","unstructured":"The ietf wg, authentication and authorization or constrained environments (ace) (2019). https:\/\/datatracker.ietf.org\/wg\/ace\/charter."},{"key":"2330_CR46","doi-asserted-by":"publisher","unstructured":"Seitz, L., Gerdes, S., Selander, G., Mani, M., & Kumar, S. (2016). Use Cases for Authentication and Authorization in Constrained Environments. RFC 7744. https:\/\/doi.org\/10.17487\/rfc7744. https:\/\/rfc-editor.org\/rfc\/rfc7744.txt.","DOI":"10.17487\/rfc7744"},{"key":"2330_CR47","unstructured":"Seitz, L., Selander, G., Wahlstroem, E., Erdtman, S., & Tschofenig, H. (2019). Authentication and authorization for constrained environments (ACE) using the OAuth 2.0 framework (ACE-OAuth). Internet-Draft draft-ietf-ace-oauth-authz-24, Internet Engineering Task Force. https:\/\/tools.ietf.org\/html\/draft-ietf-ace-oauth-authz-24. Work in Progress."}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-020-02330-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11276-020-02330-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-020-02330-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,17]],"date-time":"2021-05-17T23:21:30Z","timestamp":1621293690000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11276-020-02330-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5,18]]},"references-count":47,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2020,8]]}},"alternative-id":["2330"],"URL":"https:\/\/doi.org\/10.1007\/s11276-020-02330-2","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"type":"print","value":"1022-0038"},{"type":"electronic","value":"1572-8196"}],"subject":[],"published":{"date-parts":[[2020,5,18]]},"assertion":[{"value":"18 May 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}