{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T18:35:12Z","timestamp":1761676512759,"version":"3.44.0"},"reference-count":16,"publisher":"IEEE","license":[{"start":{"date-parts":[[2016,12,1]],"date-time":"2016-12-01T00:00:00Z","timestamp":1480550400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2016,12,1]],"date-time":"2016-12-01T00:00:00Z","timestamp":1480550400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/wf-iot.2016.7845504","type":"proceedings-article","created":{"date-parts":[[2017,2,9]],"date-time":"2017-02-09T16:42:54Z","timestamp":1486658574000},"page":"553-558","source":"Crossref","is-referenced-by-count":4,"title":["ARMOUR: Large-scale experiments for IoT security &amp; trust"],"prefix":"10.1109","author":[{"given":"Salvador","family":"P\u00e9rez","sequence":"first","affiliation":[{"name":"Dept. Information and Communication Engineering, Computer Science Faculty, University of Murcia"}]},{"given":"Juan A.","family":"Mart\u00ednez","sequence":"additional","affiliation":[{"name":"Dept. Information and Communication Engineering, Computer Science Faculty, University of Murcia"}]},{"given":"Antonio F.","family":"Skarmeta","sequence":"additional","affiliation":[{"name":"Odin Solutions S.L. Murcia, Spain"}]},{"given":"M\u00e1rcio","family":"Mateus","sequence":"additional","affiliation":[{"name":"UNPARALLEL Innovation, Lda, Caparica, Portugal"}]},{"given":"Bruno","family":"Almeida","sequence":"additional","affiliation":[{"name":"UNPARALLEL Innovation, Lda, Caparica, Portugal"}]},{"given":"Pedro","family":"Mal\u00f3","sequence":"additional","affiliation":[{"name":"CTS, DEE, FCT, Universidade Nova de Lisboa, Caparica, Portugal"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7252"},{"journal-title":"Datagram Transport Layer Security Version 1 2","year":"2012","author":"rescorla","key":"ref11"},{"journal-title":"Transmission of IPv6 Packets over IEEE 802 15 4 Networks","year":"2007","author":"deloche","key":"ref12"},{"journal-title":"RFC 5191 Protocol for Carrying Authentication for Network Access (PANA)","year":"2008","author":"forsberg","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"journal-title":"Extensible Authentication Protocol (EAP)","year":"2004","author":"aboba","key":"ref15"},{"year":"2012","author":"rissanen","key":"ref16"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2009.11.008"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2014.6845045"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2013.145"},{"key":"ref5","first-page":"420","article-title":"Proposed security model and threat taxonomy for the Internet of Things (IoT)","author":"babar","year":"2010","journal-title":"The International Conference Application and Network Security"},{"journal-title":"Analysis of Security Solutions for oneM2M System","year":"2013","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/DCOSS.2013.78"},{"journal-title":"Predicts 2015 The Internet of Things","year":"2015","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"journal-title":"FIT IoT-LAB tutorial hands-on practice with a very large scale testbed tool for the Internet of Thing","year":"2014","author":"fambon","key":"ref9"}],"event":{"name":"2016 IEEE 3rd World Forum on Internet of Things (WF-IoT)","start":{"date-parts":[[2016,12,12]]},"location":"Reston, VA, USA","end":{"date-parts":[[2016,12,14]]}},"container-title":["2016 IEEE 3rd World Forum on Internet of Things (WF-IoT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7831562\/7845389\/07845504.pdf?arnumber=7845504","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,14]],"date-time":"2025-08-14T18:43:37Z","timestamp":1755197017000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7845504\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/wf-iot.2016.7845504","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}