{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T15:01:37Z","timestamp":1764687697533},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1109\/iot.2015.7356544","type":"proceedings-article","created":{"date-parts":[[2015,12,17]],"date-time":"2015-12-17T16:55:14Z","timestamp":1450371314000},"page":"22-29","source":"Crossref","is-referenced-by-count":14,"title":["Practical security analysis for the constrained node networks: Focusing on the DTLS protocol"],"prefix":"10.1109","author":[{"given":"Jiyong","family":"Han","sequence":"first","affiliation":[]},{"given":"Minkeun","family":"Ha","sequence":"additional","affiliation":[]},{"given":"Daeyoung","family":"Kim","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Side-Channel Attacks: Ten years after its publication and the impacts on cryptographic module security testing","author":"zhou","year":"2005","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref11","article-title":"The Transport Layer Security (TLS) Protocol Version 1.2","author":"dierks","year":"2008","journal-title":"IETF RFC 5246"},{"key":"ref12","article-title":"Compression Format for IPv6 Datagrams over IEEE 802.15.4-Based Networks","author":"hui","year":"2011","journal-title":"RFC 6282 IETF"},{"key":"ref13","article-title":"RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks","author":"winter","year":"2012","journal-title":"IETF RFC 6550"},{"key":"ref14","article-title":"The Constrained Application Protocol (CoAP)","author":"shelby","year":"2014","journal-title":"IETF RFC 7252"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.11.008"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2011.291"},{"key":"ref17","article-title":"Security Considerations in the IP-based Internet of Things","author":"gracia-morchon","year":"2013","journal-title":"Internet Draft draft-garcia-core-security-06 IETF"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2323395"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2013.2277656"},{"key":"ref4","article-title":"A TLS\/DTLS Profile for the Internet of Things","author":"tschofenig","year":"2015","journal-title":"Internet Draft draft-ietf-dice-profile-14"},{"key":"ref3","article-title":"Datagram Transport Layer Security 1.2","author":"rescorla","year":"2012","journal-title":"IETF RFC 6347"},{"key":"ref6","article-title":"A new lightweight hybrid cryptographic algorithm for the internet of things","author":"shemaili","year":"2012","journal-title":"Internet Technology and Secured Transactions 2012 International Conference for IEEE"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37949-9_54"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2462096.2462117"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2010.5675776"},{"key":"ref2","article-title":"Terminology for Constrained-Node Networks","author":"bormann","year":"2014","journal-title":"RFC 7228 IETF"},{"year":"2015","key":"ref1","article-title":"Internet of Things: Pricacy & Security in a Connected World"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2012.6263790"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2013.05.003"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6384464"}],"event":{"name":"2015 5th International Conference on the Internet of Things (IOT)","start":{"date-parts":[[2015,10,26]]},"location":"Seoul, South Korea","end":{"date-parts":[[2015,10,28]]}},"container-title":["2015 5th International Conference on the Internet of Things (IOT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7347045\/7356538\/07356544.pdf?arnumber=7356544","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T10:16:34Z","timestamp":1602670594000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7356544"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/iot.2015.7356544","relation":{},"subject":[],"published":{"date-parts":[[2015,10]]}}}