{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T15:48:43Z","timestamp":1762876123396,"version":"3.37.3"},"reference-count":52,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2020,3,1]],"date-time":"2020-03-01T00:00:00Z","timestamp":1583020800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,3,1]],"date-time":"2020-03-01T00:00:00Z","timestamp":1583020800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,3,1]],"date-time":"2020-03-01T00:00:00Z","timestamp":1583020800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100000780","name":"European Commission","doi-asserted-by":"publisher","award":["H2020-779852","H2020-830929"],"award-info":[{"award-number":["H2020-779852","H2020-830929"]}],"id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]},{"name":"PERSEIDES Project through the Ministry of Economy and Competitiveness of Spain","award":["TIN2017-86885-R"],"award-info":[{"award-number":["TIN2017-86885-R"]}]},{"name":"PEANA","award":["UNMU13-2E-2536"],"award-info":[{"award-number":["UNMU13-2E-2536"]}]},{"name":"FEDER funds"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2020,3]]},"DOI":"10.1109\/jiot.2019.2959428","type":"journal-article","created":{"date-parts":[[2019,12,13]],"date-time":"2019-12-13T21:24:45Z","timestamp":1576272285000},"page":"2117-2128","source":"Crossref","is-referenced-by-count":34,"title":["Application Layer Key Establishment for End-to-End Security in IoT"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6390-9586","authenticated-orcid":false,"given":"Salvador","family":"Perez","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7697-116X","authenticated-orcid":false,"given":"Jose L.","family":"Hernandez-Ramos","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8192-0893","authenticated-orcid":false,"given":"Shahid","family":"Raza","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5525-1259","authenticated-orcid":false,"given":"Antonio","family":"Skarmeta","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6090"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45146-4_24"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8446"},{"journal-title":"The datagram transport layer security (DTLS) protocol version 1 3","year":"2019","author":"rescorla","key":"ref32"},{"journal-title":"Ephemeral Diffie&#x2013;Hellman over COSE (EDHOC)","year":"2018","author":"selander","key":"ref31"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-57pt1r4"},{"journal-title":"Comparison of CoAP security protocols","year":"2019","author":"mattsson","key":"ref37"},{"journal-title":"ECDHE-PSK AES-CCM Cipher Suites With Forward Secrecy for Transport Layer Security (TLS)","year":"2014","author":"schmertmann","key":"ref36"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.17487\/RFC7925"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5246"},{"journal-title":"Evaluation of Certificate Enrollment Over Application Layer Security","year":"2018","author":"krontiris","key":"ref28"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6749"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.3390\/s18061833"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2323395"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2694844"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2862942"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38401-1_11"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7296"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7049"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2014.12.005"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SIoT.2017.00006"},{"journal-title":"Requirements for a Lightweight AKE for OSCORE","year":"2019","author":"selander","key":"ref25"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2006.322172"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.01.038"},{"article-title":"The ContikiMAC radio duty cycling protocol","year":"2011","author":"dunkels","key":"ref52"},{"journal-title":"Ephemeral Diffie&#x2013;Hellman over COSE (EDHOC)","year":"2019","author":"selander","key":"ref10"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"921","DOI":"10.1007\/978-1-4419-5906-5_90","article-title":"Perfect forward secrecy","author":"krawczyk","year":"2011","journal-title":"Encyclopedia of Cryptography and Security"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8032"},{"journal-title":"CoRE Resource Directory","year":"2019","author":"bormann","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2013.05.003"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2462096.2462117"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2463183.2463193"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC.2014.6983078"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2015.7248379"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2013.2277656"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.06.008"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6347"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7252"},{"journal-title":"Object security for constrained RESTful environments (OSCORE)","year":"8613","author":"selander","key":"ref6"},{"journal-title":"Requirements for COAP end-to-end security","year":"2017","author":"selander","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2017.12.005"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8152"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5869"},{"journal-title":"LoRaWAN specification version 1 0","year":"2017","key":"ref9"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2870984"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2018.08.010"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/s102070100002"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5116"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8520"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.3390\/s16030358"},{"journal-title":"Authentication and authorization for constrained environments using the OAuth 2 0 framework (ACE-OAuth)","year":"2018","author":"seitz","key":"ref44"},{"journal-title":"Secure IoT Bootstrapping A Survey","year":"2019","author":"sarikaya","key":"ref43"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/9034528\/08932424.pdf?arnumber=8932424","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T17:26:06Z","timestamp":1651080366000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8932424\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3]]},"references-count":52,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2019.2959428","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"type":"electronic","value":"2327-4662"},{"type":"electronic","value":"2372-2541"}],"subject":[],"published":{"date-parts":[[2020,3]]}}}