{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T16:23:06Z","timestamp":1778170986771,"version":"3.51.4"},"reference-count":90,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Surv. Tutorials"],"published-print":{"date-parts":[[2015]]},"DOI":"10.1109\/comst.2015.2388550","type":"journal-article","created":{"date-parts":[[2015,1,9]],"date-time":"2015-01-09T19:44:38Z","timestamp":1420832678000},"page":"1294-1312","source":"Crossref","is-referenced-by-count":901,"title":["Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues"],"prefix":"10.1109","volume":"17","author":[{"given":"Jorge","family":"Granjal","sequence":"first","affiliation":[]},{"given":"Edmundo","family":"Monteiro","sequence":"additional","affiliation":[]},{"given":"Jorge","family":"Sa Silva","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","author":"garcia-morchon","year":"2013","journal-title":"Security Considerations in the IP-based Internet of Things"},{"key":"ref72","year":"0","journal-title":"6LoWPAN Plugtests 27&#x2013;28 July 2013"},{"key":"ref71","year":"0","journal-title":"IoT CoAP Plugtests 28&#x2013;30 November 2012"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2012.6459948"},{"key":"ref76","author":"hartke","year":"2014","journal-title":"Practical Issues with Datagram Transport Layer Security in Constrained Environments"},{"key":"ref77","first-page":"287","article-title":"6LoWPAN compressed DTLS for COAP","author":"shahid","year":"0","journal-title":"Proc 8th IEEE Int Conf DCOSS"},{"key":"ref74","first-page":"1","article-title":"Security considerations around end-to-end security in the IP-based Internet of things","author":"brachmann","year":"0","journal-title":"Proc Workshop Smart Object Security Conjunction IETF83"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5826"},{"key":"ref75","author":"keoh","year":"2014","journal-title":"DTLS-Based Multicast Security for Low-Power and Lossy Networks (LLNs)"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5673"},{"key":"ref78","author":"keoh","year":"2013","journal-title":"Profiling of DTLS for CoAP-based IoT Applications"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2012.6289292"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"1619","DOI":"10.1016\/j.adhoc.2013.02.005","article-title":"Lightweight protocols and privacy for all-in-silicon objects","volume":"11","author":"tr?ek","year":"2013","journal-title":"Ad Hoc Netw"},{"key":"ref32","author":"hong","year":"2014","journal-title":"Transmission of IPv6 Packets Over Near Field Communication"},{"key":"ref31","year":"0","journal-title":"G 9959 Short Range Narrow-Band Digital Radiocommunication Transceivers&#x2014;PHY and MAC Layer Specifications"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.3390\/jsan2020235"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5548"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3972"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3971"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4861"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1002\/sec.406"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/2462096.2462107"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/ICHIT.2008.261"},{"key":"ref63","first-page":"1","article-title":"Tailoring end-to-end IP security protocols to the Internet of things","author":"ren\u00e9","year":"0","journal-title":"Proc Of 21st IEEE ICNP"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2008.79"},{"key":"ref64","first-page":"1","article-title":"Lightweight IKEv2: A key management solution for both the compressed IPsec and the IEEE 802.15. 4 security","author":"shahid","year":"0","journal-title":"Proceedings of the IETF Workshop on Smart Object Security"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6775"},{"key":"ref65","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1016\/j.compeleceng.2011.01.009","article-title":"Key management systems for sensor networks in the context of the Internet of things","volume":"37","author":"rodrigo","year":"2011","journal-title":"Comput Elect Eng"},{"key":"ref66","author":"tsao","year":"0","journal-title":"A Security Threat Analysis for Routing over Low Power and Lossy Networks"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"11734","DOI":"10.3390\/s120911734","article-title":"Overview and evaluation of bluetooth low energy: An emerging low-power wireless technology","volume":"12","author":"carles","year":"2012","journal-title":"SENSORS"},{"key":"ref67","year":"1988"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2013.2266399"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/MASS.2011.76"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ITAP.2011.6006307"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.111412.00158"},{"key":"ref20","year":"2013"},{"key":"ref22","year":"0","journal-title":"Cc2420 single-chip 2 4 ghz ieee 802 15 4 compliant and zigbee(tm) ready rf transceiver"},{"key":"ref21","first-page":"391","article-title":"TSMP: Time synchronized mesh protocol","author":"pister","year":"0","journal-title":"IASTED Distrib Sensor Netw"},{"key":"ref24","author":"miller","year":"2009","journal-title":"Advanced Encryption Standard"},{"key":"ref23","year":"0","journal-title":"TelosB mote platform"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6606"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6568"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4492"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4301"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6066"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/DCOSS.2011.5982177"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2444"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2010.5684293"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/MAHSS.2008.4660130"},{"key":"ref55","volume":"43","author":"shelby","year":"2011","journal-title":"6LoWPAN The Wireless Embedded Internet"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ISADS.2009.5207373"},{"key":"ref53","author":"kent","year":"1998","journal-title":"Encapsulating Security Protocol"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2402"},{"key":"ref10","author":"hui","year":"2011","journal-title":"Compression Format for IPv6 Datagrams over IEEE 802 15 4-Based Networks"},{"key":"ref11","author":"thubert","year":"2012","journal-title":"RPL IPv6 Routing Protocol for Low-Power and Lossy Networks"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5867"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2012.29"},{"key":"ref13","year":"2007"},{"key":"ref14","year":"2009"},{"key":"ref15","year":"2009"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2013.05.003"},{"key":"ref16","year":"2006","journal-title":"ZigBee specification"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/LCNW.2012.6424088"},{"key":"ref17","year":"2007","journal-title":"ZigBee PRO Specification"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1145\/2463183.2463193"},{"key":"ref18","year":"2009","journal-title":"The International Society of Automation Wireless Systems for Industrial Automation Process Control and Related Applications ISA 100 11a"},{"key":"ref83","first-page":"1","article-title":"End-to-end transport-layer security for Internet-integrated sensing applications with mutual and delegated ECC public-key authentication","author":"granjal","year":"0","journal-title":"Proc IFIP Netw"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2008.4638503"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/LCNW.2012.6424089"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2560"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2009.11.008"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-1674-7_38"},{"key":"ref6","year":"2011"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1109\/SURV.2009.090205","article-title":"Sensor network security: A survey","volume":"11","author":"xiangqian","year":"2009","journal-title":"IEEE Commun Surveys Tuts"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38401-1_11"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4919"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.050113.00191"},{"key":"ref7","year":"2012"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6655"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.041311.00156"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.121912.00006"},{"key":"ref9","author":"montenegro","year":"2007","journal-title":"Transmission of IPv6 Packets over IEEE 802 15 4 Networks"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4346"},{"key":"ref45","author":"rescorla","year":"2006","journal-title":"DTLS Datagram Transport Layer Security"},{"key":"ref48","year":"0","journal-title":"SECG-Elliptic Curve Cryptography-SEC 1"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7250"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4443"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6551"},{"key":"ref44","first-page":"1","article-title":"TCP over 6LoWPAN for industrial applications: An experimental study","author":"zheng","year":"0","journal-title":"Proc IEEE 4th IFIP Int Conf NTMS"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.17487\/rfc0793"}],"container-title":["IEEE Communications Surveys &amp; Tutorials"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9739\/7214344\/07005393.pdf?arnumber=7005393","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:03:24Z","timestamp":1642003404000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7005393\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"references-count":90,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/comst.2015.2388550","relation":{},"ISSN":["1553-877X"],"issn-type":[{"value":"1553-877X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]}}}