{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T18:44:19Z","timestamp":1746297859725,"version":"3.37.3"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2020,8,3]],"date-time":"2020-08-03T00:00:00Z","timestamp":1596412800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,3]],"date-time":"2020-08-03T00:00:00Z","timestamp":1596412800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2020,11]]},"DOI":"10.1007\/s11277-020-07645-z","type":"journal-article","created":{"date-parts":[[2020,8,3]],"date-time":"2020-08-03T18:05:42Z","timestamp":1596477942000},"page":"1603-1621","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["An Efficient Secure Authentication and Key Establishment Scheme for M2M Communication in 6LoWPAN in Unattended Scenarios"],"prefix":"10.1007","volume":"115","author":[{"given":"Lijun","family":"Gao","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6210-0013","authenticated-orcid":false,"given":"Lu","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Lin","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Maode","family":"Ma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,3]]},"reference":[{"key":"7645_CR1","doi-asserted-by":"crossref","unstructured":"Al-Karaki J. N., & Chen, K. -C. (2014). From M2M communications to the Internet of Things: Opportunities and challenges. Ad Hoc Network, 2014, pp. 1\u20132.","DOI":"10.1016\/j.adhoc.2014.03.006"},{"issue":"2","key":"7645_CR2","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1109\/JIOT.2014.2311693","volume":"1","author":"I Stojmenovic","year":"2014","unstructured":"Stojmenovic, I. (2014). Machine-to-machine communications with in-network data aggregation, processing, and actuation for large-scale cyberphysical systems. IEEE Internet Things, 1(2), 122\u2013128.","journal-title":"IEEE Internet Things"},{"issue":"1","key":"7645_CR3","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1109\/SURV.2013.100713.00203","volume":"16","author":"J Kim","year":"2014","unstructured":"Kim, J., Lee, J., Kim, J., & Yun, J. (2014). M2M service platforms: Survey, issues, and enabling technologies. IEEE Communications Surveys and Tutorials, 16(1), 61\u201376.","journal-title":"IEEE Communications Surveys and Tutorials"},{"issue":"6","key":"7645_CR4","doi-asserted-by":"crossref","first-page":"515","DOI":"10.1109\/JIOT.2015.2417684","volume":"2","author":"L Catarinucciet","year":"2015","unstructured":"Catarinucciet, L. (2015). An IoT-aware architecture for smart healthcare systems. IEEE Internet Things, 2(6), 515\u2013526.","journal-title":"IEEE Internet Things"},{"issue":"4","key":"7645_CR5","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1109\/MCOM.2011.5741163","volume":"49","author":"J Ko","year":"2011","unstructured":"Ko, J., Terzis, A., & Dawson-Haggerty, S. (2011). Connecting low-power and lossy networks to the internet. IEEE Communications Magazine, 49(4), 96\u2013101.","journal-title":"IEEE Communications Magazine"},{"key":"7645_CR6","unstructured":"IEEE 802. 15. 4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specfications for Low-Rate Wireless Personal Area Networks (LR-WPANs), http:\/\/standards.ieee.org\/getieee802\/download\/802.15.4-2003.pdf."},{"key":"7645_CR7","doi-asserted-by":"crossref","unstructured":"Touati, F., & Mnaouer, A. B. (2016). Feasibility and performance evaluation of a 6LoWPANenabled platform for ubiquitous healthcare monitoring. Wireless Communications and Mobile Computing, 2016, pp. 1271\u20131281.","DOI":"10.1002\/wcm.2601"},{"key":"7645_CR8","doi-asserted-by":"crossref","unstructured":"Touati, F., Tabish, R., & Mnaouer, A. B. (2013). Towards u-health: an indoor 6LoWPAN based platform for real-time healthcare monitoring. In Proceedings of the 6th IEEE wireless and mobile networking conference (pp. 1\u20134).","DOI":"10.1109\/WMNC.2013.6548958"},{"issue":"5","key":"7645_CR9","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/MITP.2013.35","volume":"15","author":"H Demirkan","year":"2013","unstructured":"Demirkan, H. (2013). A smart healthcare systems framework. IT Professional, 15(5), 38\u201345.","journal-title":"IT Professional"},{"issue":"3","key":"7645_CR10","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1109\/MNANO.2011.941951","volume":"5","author":"N Agoulmine","year":"2011","unstructured":"Agoulmine, N., & Deen, M. J. (2011). U-health smart home. IEEE Nanotechnology Magazine, 5(3), 6\u201311.","journal-title":"IEEE Nanotechnology Magazine"},{"key":"7645_CR11","doi-asserted-by":"crossref","unstructured":"Misra, S., Goswami, S., & Taneja, C. (2015). PKI adapted model for secure information dissemination in industrial control and automation 6LoWPANs, IEEE Access, 2015, pp. 875\u2013889.","DOI":"10.1109\/ACCESS.2015.2445817"},{"issue":"2","key":"7645_CR12","doi-asserted-by":"crossref","first-page":"895","DOI":"10.1109\/TII.2013.2290893","volume":"10","author":"PB Val","year":"2014","unstructured":"Val, P. B., Valls, M. G., & Cunado, M. B. (2014). A simple data-muling protocol. IEEE Transactions on Industrial Informatics, 10(2), 895\u2013902.","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"7645_CR13","doi-asserted-by":"crossref","unstructured":"Goswami, S., Misra, S., & Taneja, C. (2014). Securing intra-communication in 6LoWPAN: A PKI Integrated Scheme. In Proceedings of the advanced networks and telecommuncations systems, 2014, pp. 14\u201317.","DOI":"10.1109\/ANTS.2014.7057265"},{"key":"7645_CR14","doi-asserted-by":"crossref","unstructured":"Kasinathan, P., Pastrone, C., Spirito, M. A., & Vinkovits, M. (2013). Denial-ofservice detection in 6LoWPAN based Internet of Things. In Proceedings IEEE 9th international conference on wireless and mobile computing, Networking and Communications. 2013, pp. 600\u2013607.","DOI":"10.1109\/WiMOB.2013.6673419"},{"key":"7645_CR15","doi-asserted-by":"crossref","unstructured":"Cervantes, C., Poplade, D., & Nogueira, M. (2015). Detection of Sinkhole attacks for supporting secure routing on 6LoWPAN for Internet of Things. In Proceedings of the integrated network management, 2015, pp.11\u201315.","DOI":"10.1109\/INM.2015.7140344"},{"issue":"12","key":"7645_CR16","doi-asserted-by":"crossref","first-page":"2654","DOI":"10.1002\/sec.406","volume":"7","author":"S Raza","year":"2015","unstructured":"Raza, S., Duquennoy, S., & H\u00f6glund, J. (2015). Secure communication for the Internet of Things a comparison of link-layer security and IPsec for 6LoWPAN. Security & Communication Networks, 7(12), 2654\u20132668.","journal-title":"Security & Communication Networks"},{"key":"7645_CR17","doi-asserted-by":"crossref","unstructured":"H. R. Hussen, G. A. Tizazu, T. Miao, L. Taekkyeun, C. Youngjun, and K. Ki-Hyung, SAKES: Secure authentication and key establishment scheme for M2M communication in the IP-based wireless sensor network (6LoWPAN). in Proceedings of the international conference on ubiquitous and future networks, 2013, pp. 246\u2013251.","DOI":"10.1109\/ICUFN.2013.6614820"},{"key":"7645_CR18","unstructured":"Chen, S. & Ma, M. (2013). A dynamic-encryption authentication scheme for M2M security in cyber-physical systems. In Proceedings of the 2013 IEEE global communications conference, 2013, pp. 2897\u20132901."},{"key":"7645_CR19","doi-asserted-by":"crossref","unstructured":"Fu, A., Zhang, Y., Zhu, Z., Jing, Q., & Feng, J. (2012). An efficient handover authentication scheme with privacy preservation for IEEE 802. 16\u00a0m network. Computers & Security, 2012, pp. 741\u2013749.","DOI":"10.1016\/j.cose.2012.06.008"},{"issue":"3","key":"7645_CR20","doi-asserted-by":"crossref","first-page":"1509","DOI":"10.1007\/s11277-015-2853-9","volume":"85","author":"X Zhang","year":"2015","unstructured":"Zhang, X., Li, G., & Han, W. (2015). Ticket-based authentication for fast handover in wireless mesh networks. Wireless Personal Communications, 85(3), 1509\u20131523.","journal-title":"Wireless Personal Communications"},{"issue":"6","key":"7645_CR21","doi-asserted-by":"crossref","first-page":"2074","DOI":"10.1109\/TII.2016.2604681","volume":"12","author":"Y Qiu","year":"2016","unstructured":"Qiu, Y., & Ma, M. (2016). A Mutual Authentication and Key Establishment Scheme for M2M Communication in 6LoWPAN Networks. IEEE Transactions on Industrial Informatics, 12(6), 2074\u20132085.","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"9","key":"7645_CR22","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/JSEN.2020.2983271","volume":"20","author":"T Muhammad","year":"2020","unstructured":"Muhammad, T., & Ghulam, A. (2020). S6AE: Securing 6LoWPAN using authenticated encryption scheme. Sensors, 20(9), 1\u201323.","journal-title":"Sensors"},{"key":"7645_CR23","doi-asserted-by":"crossref","unstructured":"Verma, A., & Ranga, V. (2020). Mitigation of DIS flooding attacks in RPL based 6LoWPAN networks. Transactions on emerging telecommunications technologies, 2020, 31(2).","DOI":"10.1002\/ett.3802"},{"key":"7645_CR24","doi-asserted-by":"crossref","unstructured":"Baskaran, A. G., Nanda, P., & Nepal, S. (2019). Testbed evaluation of Lightweight Authentication Protocol (LAUP) for 6LoWPAN wireless sensor networks. Concurrency and Computation: Practice and Experience, 2019, 31(23).","DOI":"10.1002\/cpe.4868"},{"issue":"6","key":"7645_CR25","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1109\/MWC.2013.6704479","volume":"20","author":"Z Sheng","year":"2013","unstructured":"Sheng, Z., Yang, S., Yu, Y., Vasilakos, A., McCann, J. A., & Kin, L. (2013). A survey on the IETF protocol suite for the internet of things: Standards, challenges, and opportunities. IEEE Wireless Communications, 20(6), 91\u201398.","journal-title":"IEEE Wireless Communications"},{"key":"7645_CR26","unstructured":"Park, S., Kim, K., Haddad, W., Chakrabarti, S., & Laganier, J. (2011). IPv6 over low power WPAN security analysis. IETF Internet Draft Draft-6lowpanSecurity-Analysis-05, 2011."}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07645-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-020-07645-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07645-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,2]],"date-time":"2021-08-02T23:47:34Z","timestamp":1627948054000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-020-07645-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,3]]},"references-count":26,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,11]]}},"alternative-id":["7645"],"URL":"https:\/\/doi.org\/10.1007\/s11277-020-07645-z","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2020,8,3]]},"assertion":[{"value":"3 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}