{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T17:35:01Z","timestamp":1730223301114,"version":"3.28.0"},"reference-count":34,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1109\/giots.2019.8766390","type":"proceedings-article","created":{"date-parts":[[2019,7,22]],"date-time":"2019-07-22T23:46:38Z","timestamp":1563839198000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Enabling Dynamic IoT Security Domains : Cellular Core Network and Device Management Meet Authentication Framework"],"prefix":"10.1109","author":[{"given":"Andreea Ancuta","family":"Corici","sequence":"first","affiliation":[]},{"given":"Yatindra","family":"Shashi","sequence":"additional","affiliation":[]},{"given":"Marius","family":"Corici","sequence":"additional","affiliation":[]},{"given":"Ranjan","family":"Shrestha","sequence":"additional","affiliation":[]},{"given":"David","family":"Guzman","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.3390\/s16030358"},{"key":"ref32","article-title":"Enhancing IoT security through network softwarization and virtual security appliances","author":"zarca","year":"2018","journal-title":"International Journal of Network Management"},{"journal-title":"Photonics PPP project ELIOT","year":"0","key":"ref31"},{"journal-title":"eSIM Architecture Technical Specification","year":"2015","key":"ref30"},{"key":"ref34","article-title":"Secure IoT Bootstraping: A Survey","author":"sarikaya","year":"0","journal-title":"IETF Draft dymo-05"},{"journal-title":"The Oauth 2 0 Authorization Framework","year":"2012","key":"ref10"},{"journal-title":"IETF RFC 7744","article-title":"Use Cases for Authentication and Authorization in Constrained Environments","year":"2016","key":"ref11"},{"journal-title":"IETF Draft","article-title":"Authentication and Authorization for Constrained Environments (ACE)","year":"2016","key":"ref12"},{"journal-title":"toolkit for M2M connectivity","year":"0","key":"ref13"},{"journal-title":"The Next Mobile Core Network Testbed Platform","article-title":"Fraunhofer FOKUS","year":"0","key":"ref14"},{"key":"ref15","article-title":"System Review of Identity Access Management Information Security. &#x201C;Munima Udin, David Preston","volume":"3","year":"2015","journal-title":"Journal of Advances in Computer Networks"},{"journal-title":"RFC7642 System for Cross-domain Identity Management Definitions Overview Concepts and Requirements","year":"2015","key":"ref16"},{"journal-title":"RFC 7049 Concise Binary Object Representation (CBOR)","year":"2013","key":"ref17"},{"journal-title":"CBOR Object Signing and Encryption (COSE) RFC 8152","year":"2017","key":"ref18"},{"journal-title":"3GPP TR 23 799","article-title":"Study On Architecture For Next Generation System [Internet]","year":"2016","key":"ref19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICITCS.2015.7292918"},{"journal-title":"NGMN Alliance","article-title":"NGMN Alliance 5G White Paper [Internet]","year":"2015","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE-TW.2016.7520962"},{"journal-title":"3GPP TR 23 799","article-title":"Study On Architecture For Next Generation System [Internet]","year":"2016","key":"ref3"},{"journal-title":"OMA Lightweight M2M (LWM2M) protocol overview","year":"0","key":"ref6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/LCNW.2012.6424077"},{"journal-title":"oneM2M Security Solutions","year":"0","key":"ref5"},{"journal-title":"IETF RFC 6347","article-title":"Datagram Transport Layer Security Version 1.2","year":"2012","key":"ref8"},{"journal-title":"IETF RFC 7252","year":"2014","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2016.7845443"},{"journal-title":"OMA LWM2M Object and Resource Registry","year":"0","key":"ref9"},{"journal-title":"Defining the Security Domain [Internet]","year":"2015","author":"marilu goodyear","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/COMCAS.2017.8244805"},{"journal-title":"Cryptography and SSL\/TLS Toolkit","year":"0","key":"ref22"},{"journal-title":"C-implementation of CoAP","year":"0","key":"ref21"},{"journal-title":"COSE implementation in C","year":"0","key":"ref24"},{"journal-title":"CBOR implementation in C","year":"0","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14478-3_43"},{"journal-title":"libcurl - the multiprotocol file transfer library","year":"0","key":"ref25"}],"event":{"name":"2019 Global IoT Summit (GIoTS)","start":{"date-parts":[[2019,6,17]]},"location":"Aarhus, Denmark","end":{"date-parts":[[2019,6,21]]}},"container-title":["2019 Global IoT Summit (GIoTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8764050\/8766345\/08766390.pdf?arnumber=8766390","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,19]],"date-time":"2022-07-19T20:25:13Z","timestamp":1658262313000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8766390\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/giots.2019.8766390","relation":{},"subject":[],"published":{"date-parts":[[2019,6]]}}}