{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T01:43:25Z","timestamp":1725759805068},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T00:00:00Z","timestamp":1676851200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T00:00:00Z","timestamp":1676851200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,2,20]]},"DOI":"10.1109\/icnc57223.2023.10074323","type":"proceedings-article","created":{"date-parts":[[2023,3,23]],"date-time":"2023-03-23T13:39:46Z","timestamp":1679578786000},"page":"426-430","source":"Crossref","is-referenced-by-count":1,"title":["Towards Secure Communications in Heterogeneous Internet of Things"],"prefix":"10.1109","author":[{"given":"James H.","family":"Nguyen","sequence":"first","affiliation":[{"name":"Towson University,Dept. of Computer and Information Sciences,Towson,MD,USA"}]},{"given":"Weixian","family":"Liao","sequence":"additional","affiliation":[{"name":"Towson University,Dept. of Computer and Information Sciences,Towson,MD,USA"}]},{"given":"Wei","family":"Yu","sequence":"additional","affiliation":[{"name":"Towson University,Dept. of Computer and Information Sciences,Towson,MD,USA"}]}],"member":"263","reference":[{"key":"ref1","first-page":"3505","article-title":"The circle of life: A Large-Scale study of the IoT malware lifecycle","volume-title":"30th USENIX Security Symposium (USENIX Security 21). USENIX Association","author":"Alrawi"},{"key":"ref2","first-page":"1133","article-title":"Discovering and understanding the security hazards in the interactions between IoT devices, mobile apps, and clouds on smart home platforms","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Zhou"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2920763"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2948912"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SAS48726.2020.9220033"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SOSE.2019.00022"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2018.8319245"},{"key":"ref8","article-title":"Constrained application protocol (coap)","author":"Shelby","year":"2014","journal-title":"Internet Requests for Comments, RFC Editor, RFC 7252"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2717386"},{"key":"ref10","article-title":"The transport layer security (tls) protocol version 1.2","author":"Dierks","year":"2008","journal-title":"Internet Requests for Comments, RFC Editor, RFC 5246"},{"key":"ref11","article-title":"Datagram transport layer security version 1.2","author":"Rescorla","year":"2012","journal-title":"Internet Requests for Comments, RFC Editor, RFC 6347"},{"journal-title":"Californium (cf) - coap for java","year":"2022","author":"Foundation","key":"ref12"},{"journal-title":"Lcvpn - light decentralized vpn in golang","year":"2019","author":"Skorochod","key":"ref13"},{"journal-title":"Decentrailized vpn","year":"2019","author":"Rad","key":"ref14"},{"key":"ref15","article-title":"The babel routing protocol","author":"Chroboczek","year":"2021","journal-title":"Internet Requests for Comments, RFC Editor, RFC 8966"},{"journal-title":"The babel routing protocol","year":"2021","author":"Chroboczek","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2008.4753614"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2018.8390374"}],"event":{"name":"2023 International Conference on Computing, Networking and Communications (ICNC)","start":{"date-parts":[[2023,2,20]]},"location":"Honolulu, HI, USA","end":{"date-parts":[[2023,2,22]]}},"container-title":["2023 International Conference on Computing, Networking and Communications (ICNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10073968\/10073976\/10074323.pdf?arnumber=10074323","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T02:12:26Z","timestamp":1710382346000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10074323\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,20]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/icnc57223.2023.10074323","relation":{},"subject":[],"published":{"date-parts":[[2023,2,20]]}}}