{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T23:54:10Z","timestamp":1772063650455,"version":"3.50.1"},"reference-count":69,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea, Ministry of Education, through the Basic Science Research Program","doi-asserted-by":"publisher","award":["2016R1D1A1B03935619"],"award-info":[{"award-number":["2016R1D1A1B03935619"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Soonchunhyang University Research Fund"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2017]]},"DOI":"10.1109\/access.2017.2710379","type":"journal-article","created":{"date-parts":[[2017,6,1]],"date-time":"2017-06-01T18:07:29Z","timestamp":1496340449000},"page":"11100-11117","source":"Crossref","is-referenced-by-count":67,"title":["Secure and Efficient Protocol for Route Optimization in PMIPv6-Based Smart Home IoT Networks"],"prefix":"10.1109","volume":"5","author":[{"given":"Daemin","family":"Shin","sequence":"first","affiliation":[{"name":"Department of Information Security Engineering, Soonchunhyang University, Asan, South Korea"}]},{"given":"Vishal","family":"Sharma","sequence":"additional","affiliation":[{"name":"Department of Information Security Engineering, Soonchunhyang University, Asan, South Korea"}]},{"given":"Jiyoon","family":"Kim","sequence":"additional","affiliation":[{"name":"Department of Information Security Engineering, Soonchunhyang University, Asan, South Korea"}]},{"given":"Soonhyun","family":"Kwon","sequence":"additional","affiliation":[{"name":"Department of Information Security Engineering, Soonchunhyang University, Asan, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0604-3445","authenticated-orcid":false,"given":"Ilsun","family":"You","sequence":"additional","affiliation":[{"name":"Department of Information Security Engineering, Soonchunhyang University, Asan, South Korea"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2541164"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.5.8.984-989"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/NETSOFT.2016.7502436"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/IMIS.2012.64"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICSNC.2008.20"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1002\/dac.1113"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICSPCS.2008.4813675"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICSNC.2008.9"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.08.014"},{"key":"ref34","first-page":"149","article-title":"Proactive correspondent registration for Proxy Mobile IPv6 route optimization","volume":"7","author":"kim","year":"2007","journal-title":"IJCSNS Int J Comput Sci Netw Secur"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4303"},{"key":"ref62","article-title":"Resource exhaustion attack","year":"2017"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5213"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1098\/rspa.1989.0125"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1002\/sec.625"},{"key":"ref64","first-page":"26","article-title":"Enhancing SVO logic for mobile IPv6 security protocols","volume":"2","author":"you","year":"2011","journal-title":"JoWUA"},{"key":"ref27","first-page":"1375","article-title":"SHAD: Swift home agent discovery mechanism to mitigate home registration latency in MIPv6 network","volume":"17","author":"diana","year":"2014","journal-title":"Int Inf Inst Inf"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1504\/IJAHUC.2011.038997"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2015.2477415"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77090-9_73"},{"key":"ref67","author":"issariyakul","year":"2011","journal-title":"Introduction to Network Simulator NS2"},{"key":"ref68","author":"menezes","year":"1997","journal-title":"Handbook of Applied Cryptography"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2005.11.052"},{"key":"ref2","article-title":"Home security system with automatic context-sensitive transition to different modes","author":"kennedy","year":"2016"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2606478"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2005.09.019"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1155\/2009\/957690"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ITC.2010.10"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCE.2008.4580683"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/GreenCom-iThings-CPSCom.2013.242"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2012.2222002"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89985-3_19"},{"key":"ref50","first-page":"3149","article-title":"An efficient route optimization scheme for multiple LMAs in PMIPv6 domain","volume":"95","author":"won-kyeong","year":"2012","journal-title":"IEICE Trans Commun"},{"key":"ref51","first-page":"1053","article-title":"A PMIPv6-based auxiliary mobility management considering traffic locality","author":"kong","year":"2016","journal-title":"Proc Int Conf Comput Sci Appl"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6705"},{"key":"ref58","article-title":"Problem statement of IPv4 support for PMIPv6 localized routing","author":"wu","year":"2009"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6279"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2016.0480"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1080\/10798587.2015.1126950"},{"key":"ref54","first-page":"510","article-title":"Optimized and secure authentication Proxy Mobile IPv6 (OS-PMIPv6) scheme for reducing packet loss","volume":"14","author":"tripathi","year":"2016","journal-title":"Int J Comput Sci Inf Secur"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/BROADCOM.2008.84"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.6109\/jicce.2016.14.2.089"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-33124-9_2"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SSIC.2015.7245682"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/WICOM.2009.5303038"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2015.09.003"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2015.7389144"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1016\/j.jnca.2017.01.033","article-title":"A framework for automating security analysis of the Internet of Things","volume":"83","author":"ge","year":"2017","journal-title":"J Netw Comput Appl"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2016.64"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/COASE.2016.7743474"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4449"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3775"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICASTECH.2014.7068120"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2015.2475298"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CSCWD.2012.6221884"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2016.7815675"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/INVENTIVE.2016.7824790"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.44"},{"key":"ref7","first-page":"13","article-title":"A review on security in smart home development","volume":"15","author":"robles","year":"2010","journal-title":"Int J Adv Sci Technol"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2013.2297705"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.12783\/dtetr\/iect2016\/3714"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0170566"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2012.6379116"},{"key":"ref48","article-title":"Acomprehensive survey of the current trends and extensions for the proxy mobile IPv6 protocol","author":"jabir","year":"0","journal-title":"IEEE Syst J"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.842"},{"key":"ref42","first-page":"1","article-title":"Localized management for proxy mobile IPv6","author":"hwang","year":"2010","journal-title":"Proc Int Conf Inf Netw (ICOIN)"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2012.2209276"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-015-0101-y"},{"key":"ref43","first-page":"3682","article-title":"Localized proxy-MIPv6 with route optimization in IP-based networks","volume":"90","author":"sihun","year":"2007","journal-title":"IEICE Trans Commun"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/7859429\/07937789.pdf?arnumber=7937789","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,27]],"date-time":"2025-06-27T17:46:41Z","timestamp":1751046401000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7937789\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"references-count":69,"URL":"https:\/\/doi.org\/10.1109\/access.2017.2710379","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}