{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T11:58:42Z","timestamp":1768910322061,"version":"3.49.0"},"reference-count":71,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.2993700","type":"journal-article","created":{"date-parts":[[2020,5,12]],"date-time":"2020-05-12T00:08:04Z","timestamp":1589242084000},"page":"90294-90315","source":"Crossref","is-referenced-by-count":16,"title":["Addressless: Enhancing IoT Server Security Using IPv6"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7876-3708","authenticated-orcid":false,"given":"Renjie","family":"Liu","sequence":"first","affiliation":[]},{"given":"Zhe","family":"Weng","sequence":"additional","affiliation":[]},{"given":"Shanshan","family":"Hao","sequence":"additional","affiliation":[]},{"given":"Deliang","family":"Chang","sequence":"additional","affiliation":[]},{"given":"Congxiao","family":"Bao","sequence":"additional","affiliation":[]},{"given":"Xing","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7113"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6105"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987445"},{"key":"ref38","article-title":"Scanning the IPv6 Internet: Towards a comprehensive hitlist","author":"gasser","year":"2016","journal-title":"arXiv 1607 05179"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-54328-4_3"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.02.022"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815678"},{"key":"ref30","article-title":"Evaluating network security using Internet-wide measurements","author":"gasser","year":"2019"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2016.52"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278559"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-76481-8_10"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00027"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4941"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/98457.98523"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6238"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5246"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.17487\/RFC7707"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2459"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26362-5_21"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3756"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIC.2014.7238437"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.17487\/RFC7721"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2462"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6494"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.27"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8200"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1883"},{"key":"ref20","author":"tomanson","year":"2007","journal-title":"IPv6 Stateless Address Autoconfiguration"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4291"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8415"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3315"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7217"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1321"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.17487\/RFC7844"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4193"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3954"},{"key":"ref59","author":"parr","year":"2012","journal-title":"Understanding Cryptography A Textbook for Students and Practitioners"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/s102070100002"},{"key":"ref57","first-page":"36","article-title":"The digital signature standard","year":"1992","journal-title":"Proc Commun ACM"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/358027.358052"},{"key":"ref55","article-title":"AES proposal: Rijndael","author":"daemen","year":"1998"},{"key":"ref54","year":"1977","journal-title":"Data encryption standard"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3174"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2818"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/DCOSS.2011.5982177"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/s130101210"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2015.48"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7252"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2013.2277656"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6347"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2342509.2342513"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3390\/s19163612"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3390\/s18051554"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ITNG.2015.32"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-019-01975-y"},{"key":"ref4","first-page":"1","article-title":"Towards a definition of the Internet of Things (IoT)","volume":"1","author":"minerva","year":"2015","journal-title":"The Internet-II initiative"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4861"},{"key":"ref6","author":"seo","year":"2008","journal-title":"Security architecture for the Internet protocol"},{"key":"ref5","first-page":"605","article-title":"ZMap: Fast Internet-wide scanning and its security applications","author":"durumeric","year":"2013","journal-title":"Proc 22nd USENIX Secur Symp"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4919"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2732209.2732216"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8273"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2018.01.013"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3098954.3098975"},{"key":"ref45","article-title":"KIP: A measured approach to IPv6 address anonymization","author":"plonka","year":"2017","journal-title":"arXiv 1707 03900"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3633"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.28"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131405"},{"key":"ref41","first-page":"7","article-title":"Prediction algorithm of active IPv6 address prefix","volume":"39","author":"zuo","year":"2018","journal-title":"Journal on Communications[J]"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278553"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.03.010"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/09091075.pdf?arnumber=9091075","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T19:51:59Z","timestamp":1639770719000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9091075\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":71,"URL":"https:\/\/doi.org\/10.1109\/access.2020.2993700","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}