{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T05:55:58Z","timestamp":1770443758777,"version":"3.49.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,5]]},"DOI":"10.1109\/ifipnetworking.2016.7497235","type":"proceedings-article","created":{"date-parts":[[2016,6,25]],"date-time":"2016-06-25T11:39:03Z","timestamp":1466854743000},"page":"306-314","source":"Crossref","is-referenced-by-count":8,"title":["End-to-end transparent transport-layer security for Internet-integrated mobile sensing devices"],"prefix":"10.1109","author":[{"given":"Jorge","family":"Granjal","sequence":"first","affiliation":[]},{"given":"Edmundo","family":"Monteiro","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","author":"dierks","year":"2008","journal-title":"The transport layer security (TLS) protocol ver 1 2 IETF RFC 5246"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/35.312841"},{"key":"ref12","article-title":"Neighbor Discovery Optimization for IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs)","author":"shelby","year":"2012","journal-title":"RFC 6775"},{"key":"ref13","year":"0","journal-title":"TinyOS Operating System"},{"key":"ref14","year":"0","journal-title":"Standalone Hardware AES Encryption Using CC2420"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2008.47"},{"key":"ref16","year":"0","journal-title":"LibCoAP"},{"key":"ref17","article-title":"On the energy cost of communication and cryptography in wireless sensor networks. Networking and Communications, 2008. WIMOB'08","author":"de meulenaer","year":"2008","journal-title":"IEEE International Conference on Wireless And Mobile Computing"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2013.6613880"},{"key":"ref19","first-page":"2654","article-title":"Secure communication for the Internet of Things-a comparison of link-layer security and IPsec for 6LoWPAN","volume":"7 12","author":"shahid","year":"2014","journal-title":"Security and Communication Networks"},{"key":"ref4","article-title":"Constrained Application Protocol (CoAP)","author":"shelby","year":"2012","journal-title":"draft-ietf-core-coap-13"},{"key":"ref3","article-title":"Compression Format for IPv6 Datagrams over IEEE 802.15.4-Based Networks","author":"hui","year":"2011","journal-title":"RFC 6282"},{"key":"ref6","article-title":"Datagram Transport Layer Security Version 1.2","author":"rescorla","year":"0","journal-title":"RFC 6347 2012"},{"key":"ref5","article-title":"Constrained RESTful Environment (CoRE) Link Format","author":"shelby","year":"2012","journal-title":"RFC 6690"},{"key":"ref8","article-title":"End-to-end transport-layer security for Internet-integrated sensing applications with mutual and delegated ECC public-key authentication","author":"granjal","year":"2013","journal-title":"IFIP Networking Conference 2013"},{"key":"ref7","year":"0","journal-title":"TelosB mote platform"},{"key":"ref2","author":"montenegro","year":"2007","journal-title":"Transmission of IPv6 Packets over IEEE 802 15 4 Networks RFC 4944"},{"key":"ref1","article-title":"IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals","author":"kushalnagar","year":"2007","journal-title":"RFC 4919"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2014.08.001"},{"key":"ref20","article-title":"TLS\/DTLS Profiles for the Internet of Things. Constrained Application Protocol (CoAP)","author":"tschofenig","year":"2015","journal-title":"draft-ietf-dice-profile-17 txt"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2012.6289292"},{"key":"ref21","first-page":"287","article-title":"6LoWPAN compressed DTLS for COAP","author":"shahid","year":"2012","journal-title":"8th IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS)"},{"key":"ref24","first-page":"2710","article-title":"DTLS based Security and Two-Way Authentication for the Internet of Things, Ad Hoc Networks","volume":"11","author":"kothmayr","year":"2013"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/LCNW.2012.6424089"}],"event":{"name":"2016 IFIP Networking Conference (IFIP Networking) and Workshops","location":"Vienna, Austria","start":{"date-parts":[[2016,5,17]]},"end":{"date-parts":[[2016,5,19]]}},"container-title":["2016 IFIP Networking Conference (IFIP Networking) and Workshops"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7493812\/7497194\/07497235.pdf?arnumber=7497235","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,9,29]],"date-time":"2016-09-29T17:52:18Z","timestamp":1475171538000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7497235\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/ifipnetworking.2016.7497235","relation":{},"subject":[],"published":{"date-parts":[[2016,5]]}}}