{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,10]],"date-time":"2025-11-10T13:44:35Z","timestamp":1762782275646,"version":"3.37.3"},"reference-count":85,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"name":"National Standardization Project for Intelligent Manufacturing\u2014research and verification of IPv6-based standard for industrial Internet"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/access.2019.2901801","type":"journal-article","created":{"date-parts":[[2019,2,26]],"date-time":"2019-02-26T20:28:52Z","timestamp":1551212932000},"page":"28835-28846","source":"Crossref","is-referenced-by-count":14,"title":["Is DNS Ready for Ubiquitous Internet of Things?"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6635-482X","authenticated-orcid":false,"given":"Zhiwei","family":"Yan","sequence":"first","affiliation":[]},{"given":"Hongtao","family":"Li","sequence":"additional","affiliation":[]},{"given":"Sherali","family":"Zeadally","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Zeng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5089-9929","authenticated-orcid":false,"given":"Guanggang","family":"Geng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref73","DOI":"10.17487\/RFC7706"},{"year":"2015","author":"wang","journal-title":"A Survey of the DNS Cache Service in China","key":"ref72"},{"year":"2016","author":"lemon","journal-title":"Stateful Multi-Link DNS Service Discovery","key":"ref71"},{"year":"2017","author":"yan","journal-title":"Service and Neighbor Discovery in ITS","key":"ref70"},{"doi-asserted-by":"publisher","key":"ref76","DOI":"10.17487\/rfc5891"},{"doi-asserted-by":"publisher","key":"ref77","DOI":"10.17487\/RFC7766"},{"doi-asserted-by":"publisher","key":"ref74","DOI":"10.17487\/RFC8198"},{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.3390\/s18041212"},{"year":"1997","author":"duerst","journal-title":"Normalization of Internationalized Identifiers","key":"ref75"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1109\/MWC.2015.7368833"},{"year":"2012","author":"vixie","journal-title":"DNS Response Rate Limiting (DNS RRL)","key":"ref78"},{"year":"2013","journal-title":"Using the response rate limiting feature in BIND 9 10","key":"ref79"},{"year":"2011","author":"johnson","journal-title":"Mobility support in IPv6","key":"ref33"},{"year":"2016","journal-title":"Cisco","key":"ref32"},{"year":"2015","author":"zhang","journal-title":"ICN based Architecture for IoT&#x2014;Requirements and Challenges","key":"ref31"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1145\/1658939.1658941"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1109\/COMSNETS.2013.6465579"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1109\/MCOM.2010.5402677"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.17487\/rfc6830"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.17487\/rfc5213"},{"doi-asserted-by":"publisher","key":"ref60","DOI":"10.17487\/rfc3007"},{"doi-asserted-by":"publisher","key":"ref62","DOI":"10.1109\/LCN.2008.4664258"},{"year":"2009","journal-title":"Root Scaling Study Description of the DNS Root Scaling Model","key":"ref61"},{"doi-asserted-by":"publisher","key":"ref63","DOI":"10.1109\/ACCESS.2017.2700323"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.17487\/rfc6698"},{"doi-asserted-by":"publisher","key":"ref64","DOI":"10.17487\/rfc4861"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.17487\/rfc4035"},{"doi-asserted-by":"publisher","key":"ref65","DOI":"10.17487\/rfc3315"},{"doi-asserted-by":"publisher","key":"ref66","DOI":"10.17487\/rfc6763"},{"year":"2016","journal-title":"Why is IoT Security important?","key":"ref29"},{"doi-asserted-by":"publisher","key":"ref67","DOI":"10.17487\/rfc6762"},{"year":"2018","author":"jeong","journal-title":"IP Wireless Access in Vehicular Environments (IPWAVE) Problem Statement and Use Cases IETF draft","key":"ref68"},{"year":"2018","author":"jeong","journal-title":"DNS Name Autoconfiguration for Internet of Things Devices","key":"ref69"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1016\/j.jksuci.2016.10.003"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1016\/j.comnet.2010.05.010"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.17487\/rfc1034"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.17487\/rfc5730"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1145\/52325.52338"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.17487\/rfc5891"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.17487\/rfc7480"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.17487\/rfc4034"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.17487\/rfc4033"},{"doi-asserted-by":"publisher","key":"ref50","DOI":"10.17487\/rfc6841"},{"doi-asserted-by":"publisher","key":"ref51","DOI":"10.17487\/rfc6781"},{"doi-asserted-by":"publisher","key":"ref59","DOI":"10.17487\/rfc2136"},{"key":"ref58","first-page":"429","article-title":"Security and cost analyses of DNSSEC protocol","author":"yao","year":"2012","journal-title":"Proc Int Conf Trustworthy Comput Services"},{"doi-asserted-by":"publisher","key":"ref57","DOI":"10.17487\/RFC7626"},{"doi-asserted-by":"publisher","key":"ref56","DOI":"10.17487\/RFC7673"},{"doi-asserted-by":"publisher","key":"ref55","DOI":"10.17487\/RFC7672"},{"doi-asserted-by":"publisher","key":"ref54","DOI":"10.17487\/RFC7671"},{"doi-asserted-by":"publisher","key":"ref53","DOI":"10.17487\/rfc6698"},{"doi-asserted-by":"publisher","key":"ref52","DOI":"10.17487\/RFC8027"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/SINKHROINFO.2017.7997540"},{"year":"2019","journal-title":"Gartner","key":"ref11"},{"year":"2002","author":"williams","journal-title":"Requirements for automatic configuration of ip hosts","key":"ref40"},{"year":"2015","journal-title":"Internet of the Things","key":"ref12"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/JIOT.2017.2785659"},{"year":"2007","journal-title":"GS1 EPCglobal EPCglobal Object Name Service (ONS) 1 0 1","key":"ref14"},{"year":"2015","journal-title":"HANDLE NET (version 8 1) Technical Manual","key":"ref15"},{"doi-asserted-by":"publisher","key":"ref82","DOI":"10.1109\/ACCESS.2017.2685434"},{"key":"ref16","first-page":"1","article-title":"A survey of information-centric networking (draft)","author":"ahlgren","year":"2011","journal-title":"Proc Dagstuhl Seminar 10492 Inf Centric Netw"},{"doi-asserted-by":"publisher","key":"ref81","DOI":"10.1109\/90.929852"},{"key":"ref17","first-page":"1","article-title":"Enabling Internet-of-Things services in the mobilityfirst future Internet architecture","author":"li","year":"2012","journal-title":"Proc Int Symp World of Wireless Mobile and Multimedia Networks (WoWMOM)"},{"doi-asserted-by":"publisher","key":"ref84","DOI":"10.1145\/1030194.1015504"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1016\/j.future.2016.07.015"},{"doi-asserted-by":"publisher","key":"ref83","DOI":"10.1109\/INFOCOM.2006.207"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.3390\/s18093160"},{"doi-asserted-by":"publisher","key":"ref80","DOI":"10.1109\/90.222913"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.3390\/su10061998"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1016\/j.adhoc.2012.02.016"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1108\/JSTPM-07-2018-079"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1108\/JSTPM-02-2018-0020"},{"doi-asserted-by":"publisher","key":"ref85","DOI":"10.1109\/MITS.2018.2806620"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/MC.2017.179"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/TMSCS.2017.2705683"},{"doi-asserted-by":"publisher","key":"ref49","DOI":"10.1109\/ARES.2007.139"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/ITechA.2015.7317398"},{"doi-asserted-by":"publisher","key":"ref46","DOI":"10.1016\/j.adhoc.2016.06.010"},{"year":"2019","journal-title":"IETF 6lo WG","key":"ref45"},{"doi-asserted-by":"publisher","key":"ref48","DOI":"10.1007\/s11276-015-0977-1"},{"year":"2009","author":"ain","journal-title":"D2 3-Architecture Definition Component Descriptions and Requirements Deliverable","key":"ref47"},{"year":"2016","journal-title":"Functional Architecture","key":"ref42"},{"doi-asserted-by":"publisher","key":"ref41","DOI":"10.1016\/j.compeleceng.2012.02.011"},{"doi-asserted-by":"publisher","key":"ref44","DOI":"10.17487\/rfc4787"},{"doi-asserted-by":"publisher","key":"ref43","DOI":"10.1049\/iet-net.2016.0001"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8600701\/08653281.pdf?arnumber=8653281","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T09:08:07Z","timestamp":1643274487000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8653281\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":85,"URL":"https:\/\/doi.org\/10.1109\/access.2019.2901801","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2019]]}}}