{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T03:16:37Z","timestamp":1761621397453},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.1109\/cns.2018.8433209","type":"proceedings-article","created":{"date-parts":[[2018,8,13]],"date-time":"2018-08-13T22:09:06Z","timestamp":1534198146000},"page":"1-9","source":"Crossref","is-referenced-by-count":7,"title":["ACE of Spades in the IoT Security Game: A Flexible IPsec Security Profile for Access Control"],"prefix":"10.1109","author":[{"given":"Santiago","family":"Aragon","sequence":"first","affiliation":[]},{"given":"Marco","family":"Tiloca","sequence":"additional","affiliation":[]},{"given":"Max","family":"Maass","sequence":"additional","affiliation":[]},{"given":"Matthias","family":"Hollick","sequence":"additional","affiliation":[]},{"given":"Shahid","family":"Raza","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Low-power interoperability for the ipv6-based internet of things","year":"2012","author":"dunkels","key":"ref30"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4302"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4303"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7296"},{"key":"ref13","article-title":"IPsec profile of ACE","author":"aragon","year":"0","journal-title":"Internet Engineering Task Force Internet-Draft draft-aragon-aceipsec-profile-01 Oct 2017 work in Progress"},{"journal-title":"Contiki the Open Source Os for the Internet of Things","year":"0","key":"ref14"},{"journal-title":"Zolertia Firefly","year":"0","key":"ref15"},{"journal-title":"Ipsec profile implementation for contiki","year":"0","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7252"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8152"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7049"},{"key":"ref28","article-title":"RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks","author":"alexander","year":"2012","journal-title":"RFC 6550"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6749"},{"key":"ref27","article-title":"Using HMAC-SHA-256, HMAC-SHA384, and HMAC-SHA-512 with IPsec","author":"frankel","year":"2007","journal-title":"RFC 4868"},{"key":"ref3","article-title":"Authentication and Authorization for Constrained Environments (ACE)","author":"seitz","year":"0","journal-title":"Internet Engineering Task Force Internet-Draft draft-ietface-oauth-authz-10 Feb 2018 work in Progress"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6347"},{"journal-title":"Powertrace Network-level Power Profiling for Low-power Wireless Networks","year":"2011","author":"dunkels","key":"ref29"},{"key":"ref5","article-title":"Datagram Transport Layer Security (DTLS) Profile for Authentication and Authorization for Constrained Environments (ACE)","author":"gerdes","year":"0","journal-title":"Internet Engineering Task Force Internet-Draft draft-ietf-acedtls-authorize-03 Mar 2018 work in Progress"},{"key":"ref8","article-title":"Object Security for Constrained RESTful Environments (OSCORE)","author":"selander","year":"0","journal-title":"Internet Engineering Task Force Internet-Draft draft-ietf-core-objectsecurity-09 Mar 2018 work in Progress"},{"key":"ref7","article-title":"OSCORE profile of the Authentication and Authorization for Constrained Environments Framework","author":"seitz","year":"0","journal-title":"Internet Engineering Task Force Internet-Draft draft-ietf-ace-oscore-profile-01 Mar 2018 work in Progress"},{"journal-title":"Securing Internet of Things with Lightweight IPsec","year":"2011","author":"raza","key":"ref2"},{"key":"ref9","article-title":"Security Architecture for the Internet Protocol","author":"seo","year":"2005","journal-title":"RFC 4301"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2013.2277656"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2017.8024606"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7231"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4949"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MASS.2011.100"},{"key":"ref23","article-title":"The JavaScript Object Notation (JSON) Data Interchange Format","author":"bray","year":"2014","journal-title":"RFC 7159"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4894"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5114"}],"event":{"name":"2018 IEEE Conference on Communications and Network Security (CNS)","start":{"date-parts":[[2018,5,30]]},"location":"Beijing, China","end":{"date-parts":[[2018,6,1]]}},"container-title":["2018 IEEE Conference on Communications and Network Security (CNS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8410986\/8433121\/08433209.pdf?arnumber=8433209","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T15:54:05Z","timestamp":1643212445000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8433209\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/cns.2018.8433209","relation":{},"subject":[],"published":{"date-parts":[[2018,5]]}}}