{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T07:51:29Z","timestamp":1767858689413,"version":"3.49.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1109\/isias.2015.7492741","type":"proceedings-article","created":{"date-parts":[[2016,6,16]],"date-time":"2016-06-16T20:14:55Z","timestamp":1466108095000},"page":"32-37","source":"Crossref","is-referenced-by-count":10,"title":["Introduction to the Internet of Things security: Standardization and research challenges"],"prefix":"10.1109","author":[{"given":"Salim","family":"Elbouanani","sequence":"first","affiliation":[]},{"given":"My Ahmed El","family":"Kiram","sequence":"additional","affiliation":[]},{"given":"Omar","family":"Achbarou","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","first-page":"1","article-title":"DNS Security","author":"lioy","year":"2000","journal-title":"Informatica"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"ref11","article-title":"50 Sensor Applications for a Smarter World: Libelium white paper","author":"as\u00edn","year":"2012","journal-title":"Libelium"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2011.291"},{"key":"ref13","article-title":"International Telecommunication Union (ITU)","year":"2012"},{"key":"ref14","article-title":"IEEE Computer Society","year":"2011"},{"key":"ref15","author":"montenegro","year":"2007","journal-title":"Rfc 4944 Transmission of ipv6 Packets over Ieee 802 15 4 Networks"},{"key":"ref16","article-title":"RFC4919 IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals","author":"kushalnagar","year":"2007"},{"key":"ref17","article-title":"RFC6550 RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks","author":"winter","year":"2012"},{"key":"ref18","article-title":"RFC 7252 The Constrained Application Protocol (CoAP)","author":"shelby","year":"2014"},{"key":"ref19","article-title":"Request for Comments: 6347 - Datagram Transport Layer Security Version 1.2","author":"rescorla","year":"2012"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-009-9697-0"},{"key":"ref4","article-title":"ITU Internet Reports 2005: The Internet of Things","year":"0"},{"key":"ref27","first-page":"40","article-title":"ID layer for internet of things based on name-oriented networking","volume":"2013","author":"batalla","year":"2013","journal-title":"J Telecommun Inf Technol"},{"key":"ref3","article-title":"That &#x2018;Internet of Things&#x2019; Thing - RFID Journal","author":"ashton","year":"2009","journal-title":"RFID Journal"},{"key":"ref6","first-page":"1","article-title":"Internet of Things: Strategic Research Roadmap","author":"vermesan","year":"2009","journal-title":"Internet of Things Strategic Research Roadmap"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.05.007"},{"key":"ref5","article-title":"Institut de l'audiovisuel et des t&#x00E9;l&#x00E9;communications en Europe (France)","year":"2013","journal-title":"Internet of Things Outlook for the Top 8 Vertical Markets"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2011.5772059"},{"key":"ref7","article-title":"International Telecommunication Union (ITU)","year":"2012"},{"key":"ref2","first-page":"1","article-title":"The Internet of Things - How the Next Evolution of the Internet is Changing Everything","author":"evans","year":"2011","journal-title":"Cisco white paper"},{"key":"ref9","year":"0"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.01.010"},{"key":"ref20","first-page":"2","article-title":"DTLS & COAP Based Security For Internet of Things Enabled Devices","volume":"2","author":"sinthan","year":"2013","journal-title":"Ijesrt Com"},{"key":"ref22","article-title":"GS1 Object Name Service (ONS)","author":"january","year":"2013"},{"key":"ref21","article-title":"Gsl","year":"2014"},{"key":"ref24","first-page":"487","article-title":"Software platforms for internet of things and M2M","volume":"93","author":"balamuralidhar","year":"2013","journal-title":"Journal of the Indian Institute of Science"},{"key":"ref23","year":"0","journal-title":"MQTT org"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2312291"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2517968.2517976"}],"event":{"name":"2015 11th International Conference on Information Assurance and Security (IAS)","location":"Marrakech, Morocco","start":{"date-parts":[[2015,12,14]]},"end":{"date-parts":[[2015,12,16]]}},"container-title":["2015 11th International Conference on Information Assurance and Security (IAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7484378\/7492733\/07492741.pdf?arnumber=7492741","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T17:17:19Z","timestamp":1489771039000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7492741\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/isias.2015.7492741","relation":{},"subject":[],"published":{"date-parts":[[2015,12]]}}}