{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T17:11:24Z","timestamp":1730221884345,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,11]]},"DOI":"10.1109\/fgct.2013.6767216","type":"proceedings-article","created":{"date-parts":[[2014,3,20]],"date-time":"2014-03-20T15:25:36Z","timestamp":1395329136000},"page":"143-147","source":"Crossref","is-referenced-by-count":3,"title":["Supporting communications in the IoTs using the location\/ID split protocol: A security analysis"],"prefix":"10.1109","author":[{"given":"Ali","family":"Raheem","sequence":"first","affiliation":[]},{"given":"Aboubaker","family":"Lasebae","sequence":"additional","affiliation":[]},{"given":"Mahdi","family":"Aiash","sequence":"additional","affiliation":[]},{"given":"Jonathan","family":"Loo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","first-page":"68","article-title":"A novel security protocol for resolvingaddresses in the location\/id split architecture'","author":"aiash","year":"0","journal-title":"Network and System security 2013 International Conference Volume"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38401-1_10"},{"journal-title":"Internet draft","year":"0","author":"fuller","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2461"},{"journal-title":"Locator\/ID Separation Protocol Revolutionary Network Architecture to Power the Network'","year":"0","key":"11"},{"journal-title":"Locator\/ID separation protocol (LISP)","year":"0","author":"farinacci","key":"12"},{"key":"3","first-page":"376","article-title":"Future internet: The internet of things","volume":"5","author":"tan","year":"0","journal-title":"Advanced Computer Theory and Engineering (ICACTE)"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/ICEBEG.2011.5881892"},{"key":"1","first-page":"8","article-title":"Investigation of security and defense system for home based on internet of things","author":"yangand","year":"0","journal-title":"Web Information Systems and Mining (WISM) 2010 International Conference on"},{"journal-title":"The Bell Labs Security Framework Making the Case for End-To-End Wi-Fi Security'","year":"0","key":"10"},{"journal-title":"Locator\/ID Separation Protocol Security","year":"0","key":"7"},{"key":"6","article-title":"An ID\/locator split architecture forfuture networks'","author":"kafle","year":"0","journal-title":"IEEE Communications Magazine 2010"},{"journal-title":"The Internet of Things","year":"0","key":"5"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"journal-title":"ITU-T RecommendationX 805and ItsApplication to NGN","year":"2012","author":"zeltsan","key":"9"},{"journal-title":"LISP-Security (LISP-SEC","year":"0","author":"maino","key":"8"}],"event":{"name":"2013 Second International Conference on Future Generation Communication Technology (FGCT)","start":{"date-parts":[[2013,11,12]]},"location":"London, United Kingdom","end":{"date-parts":[[2013,11,14]]}},"container-title":["Second International Conference on Future Generation Communication Technologies (FGCT 2013)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6766332\/6767177\/06767216.pdf?arnumber=6767216","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T16:02:24Z","timestamp":1490284944000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6767216\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/fgct.2013.6767216","relation":{},"subject":[],"published":{"date-parts":[[2013,11]]}}}