{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T15:16:05Z","timestamp":1730301365081,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,7,26]],"date-time":"2021-07-26T00:00:00Z","timestamp":1627257600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,7,26]],"date-time":"2021-07-26T00:00:00Z","timestamp":1627257600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,7,26]]},"DOI":"10.1109\/tsp52935.2021.9522638","type":"proceedings-article","created":{"date-parts":[[2021,8,30]],"date-time":"2021-08-30T19:12:50Z","timestamp":1630350770000},"page":"42-47","source":"Crossref","is-referenced-by-count":1,"title":["Security vulnerability analysis of OpenHIP and E-HIP protocols"],"prefix":"10.1109","author":[{"given":"Adam","family":"Gajdosik","sequence":"first","affiliation":[{"name":"Slovak University of Technology,Faculty of Informatics and Information Technologies,Bratislava,Slovakia"}]},{"given":"Peter","family":"Kanuch","sequence":"additional","affiliation":[{"name":"Slovak University of Technology,Faculty of Informatics and Information Technologies,Bratislava,Slovakia"}]}],"member":"263","reference":[{"journal-title":"Host Identity Protocol Certificates","year":"2016","key":"ref10"},{"journal-title":"IETF","article-title":"Host Identity Protocol Version 2 (HIPv2)","year":"2015","key":"ref11"},{"key":"ref12","article-title":"Security aspects of Internet of Things aided smart grids: A bibliometric survey","author":"sakhnini","year":"0","journal-title":"Internet of Things"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ITNAC46935.2019.9077977"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"4921","DOI":"10.3390\/s19224921","article-title":"E-HIP: An Energy-Efficient OpenHIP-Based Security in Internet of Things Networks","volume":"19","author":"ka?uch","year":"2019","journal-title":"SENSORS"},{"journal-title":"HIP-Based Security in IoT Networks A comparison","year":"2020","author":"ka?uch","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1023646.1023654"},{"key":"ref17","article-title":"Internet of Things-IOT: Definition, Characteristics, Architecture, Enabling Technologies, Application & Future Challenges","author":"patel","year":"2016","journal-title":"International Journal of Computational Engineering Science"},{"key":"ref18","article-title":"Host Identity Protocol (HIP) Architecture","author":"moskowits","year":"2006","journal-title":"Network"},{"article-title":"Host Identity Protocol: A state of the art research","year":"2006","author":"wilterdink","key":"ref19"},{"journal-title":"Cyber Situation Comprehension for IoT Systems based on APT Alerts and Logs","year":"2019","author":"cheng","key":"ref4"},{"journal-title":"internet of things and the man-in-the-middle attacks &#x2013; security and economic","year":"2017","author":"cekerevac","key":"ref3"},{"key":"ref6","article-title":"Datagram Transport Layer Security (DTLS)","author":"rescorla","year":"2006","journal-title":"Sp Technol"},{"article-title":"What&#x2019;s in a Downgrade? A Taxonomy of Downgrade Attacks in the TLS Protocol and Application Protocols Using TLS","year":"0","author":"alashwali","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31957-3_79"},{"key":"ref7","article-title":"Computer Networks","author":"tanenbaum","year":"2011","journal-title":"World Wide Web Internet and Web Information Systems"},{"key":"ref2","article-title":"IoT and HIP&#x2019;s Opportunistic Mode","author":"fuchs","year":"0","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"ref9","first-page":"1","article-title":"IEEE Standard for Low-Rate Wireless Networks","year":"2016","journal-title":"IEEE Std 802 15 4-2015 (Revision of IEEE Std 802 15 4-2011)"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2015.7405513"},{"journal-title":"Secure communication for the Internet of Things-a comparison of link-layer security and IPsec for 6LoWPAN","year":"0","author":"raza","key":"ref20"},{"journal-title":"Innovations in Ethernet Encryption (802 1AE -MACsec) for Securing High Speed(1-100GE) WAN Deployments","year":"0","author":"hill","key":"ref22"},{"journal-title":"RFC6071 IP Security (IPsec) and Internet Key Exchange (IKE) Document Roadmap IETF","year":"2011","author":"frankel","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1063\/1.4977403"},{"journal-title":"The Transport Layer Security (TLS) Protocol Version 1 2 [RFC5246]","year":"2008","author":"dierks","key":"ref23"},{"article-title":"Summarizing Known Attacks on Transport Layer Security (TLS) and Datagram TLS (DTLS)","year":"0","author":"sheffer","key":"ref25"}],"event":{"name":"2021 44th International Conference on Telecommunications and Signal Processing (TSP)","start":{"date-parts":[[2021,7,26]]},"location":"Brno, Czech Republic","end":{"date-parts":[[2021,7,28]]}},"container-title":["2021 44th International Conference on Telecommunications and Signal Processing (TSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9522010\/9522587\/09522638.pdf?arnumber=9522638","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,2]],"date-time":"2022-08-02T20:16:04Z","timestamp":1659471364000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9522638\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,26]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/tsp52935.2021.9522638","relation":{},"subject":[],"published":{"date-parts":[[2021,7,26]]}}}