{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:11:54Z","timestamp":1750306314333,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,3,4]],"date-time":"2016-03-04T00:00:00Z","timestamp":1457049600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,3,4]]},"DOI":"10.1145\/2905055.2905057","type":"proceedings-article","created":{"date-parts":[[2016,8,29]],"date-time":"2016-08-29T12:17:16Z","timestamp":1472473036000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["A Survey on IoT Privacy Issues and Mitigation Techniques"],"prefix":"10.1145","author":[{"given":"Birju","family":"Tank","sequence":"first","affiliation":[{"name":"GTU PG School, Ahmedabad, India"}]},{"given":"Hardik","family":"Upadhyay","sequence":"additional","affiliation":[{"name":"GPERI, Mehsana, India"}]},{"given":"Hirenc","family":"Patel","sequence":"additional","affiliation":[{"name":"SPCE, Visnagar, India"}]}],"member":"320","published-online":{"date-parts":[[2016,3,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASEA.2014.15"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"J. Granjal E. Monteiro and J. S Silva Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues IEEE Communication Surveys & Tutorials VOL. 17 NO. 3 2015.  J. Granjal E. Monteiro and J. S Silva Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues IEEE Communication Surveys & Tutorials VOL. 17 NO. 3 2015.","DOI":"10.1109\/COMST.2015.2388550"},{"key":"e_1_3_2_1_3_1","first-page":"1","article-title":"Palattella, Standardized protocol stack for the internet of (important) things","author":"Accettura N.","year":"2012","unstructured":"N. Accettura , X. Vilajosana , T. Watteyne , L. Grieco , G. Boggia , and M. Dohler M . Palattella, Standardized protocol stack for the internet of (important) things , Proceedings of IEEE, ( 2012 ) 1 -- 18 N. Accettura, X. Vilajosana, T. Watteyne, L. Grieco, G. Boggia, and M. Dohler M. Palattella, Standardized protocol stack for the internet of (important) things, Proceedings of IEEE, (2012) 1--18","journal-title":"Proceedings of IEEE, ("},{"key":"e_1_3_2_1_4_1","unstructured":"Zigbee and the Internet of Things {Online}. Available: http:\/\/www.telegesis.com\/our-markets\/internet-of-things\/  Zigbee and the Internet of Things {Online}. Available: http:\/\/www.telegesis.com\/our-markets\/internet-of-things\/"},{"key":"e_1_3_2_1_5_1","unstructured":"6LowPAN: Adaptation Layer Technical Overview {Online}. Available: https:\/\/communities.cisco.com\/servlet\/JiveServlet\/downloadBody\/52715-102-1-88316\/FAN002 6lowpan.p 1  6LowPAN: Adaptation Layer Technical Overview {Online}. Available: https:\/\/communities.cisco.com\/servlet\/JiveServlet\/downloadBody\/52715-102-1-88316\/FAN002 6lowpan.p 1"},{"key":"e_1_3_2_1_6_1","volume-title":"Constrained Application Protocol for internet of Things","author":"Chen Xi","year":"2014","unstructured":"Xi Chen , Constrained Application Protocol for internet of Things April 2014 . {Online}. Available: http:\/\/www.cse.wustl.edu\/ Xi Chen, Constrained Application Protocol for internet of Things April 2014. {Online}. Available: http:\/\/www.cse.wustl.edu\/"},{"key":"e_1_3_2_1_7_1","unstructured":"Shelby Z. (2013 June) Constrained Application Protocol (CoAP). Document. {Online} Available: https:\/\/tools.ietf.org\/html\/draft-ietf-corecoap-18  Shelby Z. (2013 June) Constrained Application Protocol (CoAP). Document. {Online} Available: https:\/\/tools.ietf.org\/html\/draft-ietf-corecoap-18"},{"key":"e_1_3_2_1_8_1","first-page":"4799","volume":"978","author":"Alghamdi T.","year":"2013","unstructured":"T. Alghamdi , A. Lasebae , M. Aiash , Security Analysis of the Constrained Application Protocol in the Internet of Things , 978-1 - 4799 - 2975 -7\/13\/ 2013 IEEE T. Alghamdi, A. Lasebae, M. Aiash, Security Analysis of the Constrained Application Protocol in the Internet of Things, 978-1-4799- 2975-7\/13\/2013 IEEE","journal-title":"Security Analysis of the Constrained Application Protocol in the Internet of Things"},{"key":"e_1_3_2_1_9_1","volume-title":"2014 International Conference on. IEEE","author":"Koien Geir M.","year":"2014","unstructured":"Abomhara, Mohamed, and Geir M. Koien . \"Security and privacy in the Internet of Things: Current status and open issues.\" Privacy and Security in Mobile Systems (PRISMS) , 2014 International Conference on. IEEE , 2014 . Abomhara, Mohamed, and Geir M. Koien. \"Security and privacy in the Internet of Things: Current status and open issues.\" Privacy and Security in Mobile Systems (PRISMS), 2014 International Conference on. IEEE, 2014."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2323395"},{"key":"e_1_3_2_1_11_1","volume-title":"Issues and solution approaches.\" GI\/ITG KuVS Fachgesprch Sensornetze (FGSN). Universitt Stuttgart","author":"Garcia-Morchon Oscar","year":"2011","unstructured":"Brachmann, Martina, Oscar Garcia-Morchon , and Michael Kirsche . \" Security for practical coap applications : Issues and solution approaches.\" GI\/ITG KuVS Fachgesprch Sensornetze (FGSN). Universitt Stuttgart ( 2011 ). Brachmann, Martina, Oscar Garcia-Morchon, and Michael Kirsche. \"Security for practical coap applications: Issues and solution approaches.\" GI\/ITG KuVS Fachgesprch Sensornetze (FGSN). Universitt Stuttgart (2011)."},{"key":"e_1_3_2_1_12_1","first-page":"372","article-title":"Lightweight security scheme for IoT applications using CoAP","volume":"4","year":"2014","unstructured":"Ukil, Arijit, \" Lightweight security scheme for IoT applications using CoAP .\" International Journal of Pervasive Computing and Communications10 . 4 ( 2014 ): 372 --- 392 . Ukil, Arijit, et al. \"Lightweight security scheme for IoT applications using CoAP.\" International Journal of Pervasive Computing and Communications10.4 (2014): 372---392.","journal-title":"International Journal of Pervasive Computing and Communications10"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2015.52"},{"key":"e_1_3_2_1_14_1","volume-title":"2014 International Conference on. IEEE","author":"Kang Namhi","year":"2014","unstructured":"Park, Jiye, and Namhi Kang . \"Lightweight secure communication for CoAP-enabled Internet of Things using delegated DTLS handshake.\" Information and Communication Technology Convergence (ICTC) , 2014 International Conference on. IEEE , 2014 . Park, Jiye, and Namhi Kang. \"Lightweight secure communication for CoAP-enabled Internet of Things using delegated DTLS handshake.\" Information and Communication Technology Convergence (ICTC), 2014 International Conference on. IEEE, 2014."},{"key":"e_1_3_2_1_15_1","first-page":"3711","article-title":"Lithe: Lightweight secure CoAP for the internet of things","volume":"10","year":"2013","unstructured":"Raza, Shahid, \" Lithe: Lightweight secure CoAP for the internet of things .\" Sensors Journal, IEEE13 . 10 ( 2013 ): 3711 -- 3720 . Raza, Shahid, et al. \"Lithe: Lightweight secure CoAP for the internet of things.\" Sensors Journal, IEEE13.10 (2013): 3711--3720.","journal-title":"Sensors Journal, IEEE13"},{"key":"e_1_3_2_1_16_1","unstructured":"G. Baldini D. Rotondi IoT Governance Privacy and Security Issues European Research Cluster on the internet of things {Online}.Available:http:\/\/www.researchgate.net\/publication\/275540220  G. Baldini D. Rotondi IoT Governance Privacy and Security Issues European Research Cluster on the internet of things {Online}.Available:http:\/\/www.researchgate.net\/publication\/275540220"},{"key":"e_1_3_2_1_17_1","unstructured":"A. Rahman and E. Dijk. Group Communication for CoAP (draft-ietfcore-groupcomm 25).  A. Rahman and E. Dijk. Group Communication for CoAP (draft-ietfcore-groupcomm 25)."},{"key":"e_1_3_2_1_18_1","volume-title":"DICE Internet-Draft","author":"Hartke K.","year":"2014","unstructured":"K. Hartke , Practical Issues with Datagram Transport LayerSecurity in Constrained Environments draft-hartke-dice-practicalissues-01 , DICE Internet-Draft , April 2014 . {Online}. Available: http:\/\/tools.ietf.org\/html\/draft-hartke-dice-practical-issues-01 K. Hartke, Practical Issues with Datagram Transport LayerSecurity in Constrained Environments draft-hartke-dice-practicalissues-01, DICE Internet-Draft, April 2014. {Online}. Available: http:\/\/tools.ietf.org\/html\/draft-hartke-dice-practical-issues-01"},{"key":"e_1_3_2_1_19_1","volume-title":"Internet-Draft","author":"Keoh S.","year":"2013","unstructured":"S. Keoh , S. Kumar , and Z. Shelby , Proling of DTLS for CoAP-based IoT Applications draft-keoh-dice-dtls-prole-iot-00 , Internet-Draft November 2013 . {Online}. Available: http:\/\/tools.ietf.org\/html\/draft-keoh-dice-dtlsprole-iot-00 S. Keoh, S. Kumar, and Z. Shelby, Proling of DTLS for CoAP-based IoT Applications draft-keoh-dice-dtls-prole-iot-00, Internet-Draft November 2013. {Online}. Available: http:\/\/tools.ietf.org\/html\/draft-keoh-dice-dtlsprole-iot-00"},{"volume-title":"Security as a CoAP resource: an optimized DTLS implementation for the IoT.\" Proceedings of ICC","year":"2015","key":"e_1_3_2_1_20_1","unstructured":"Capossele, Angelo, \" Security as a CoAP resource: an optimized DTLS implementation for the IoT.\" Proceedings of ICC 2015 , IEEE ( 2015). Capossele, Angelo, et al. \"Security as a CoAP resource: an optimized DTLS implementation for the IoT.\" Proceedings of ICC 2015, IEEE (2015)."},{"key":"e_1_3_2_1_21_1","volume-title":"Masters thesis","author":"Kothmayr T.","year":"2011","unstructured":"T. Kothmayr , A Security Architecture for Wireless Sensor Networks based on DTLS , Masters thesis , Universitat Augsburg , December 2011 . T. Kothmayr, A Security Architecture for Wireless Sensor Networks based on DTLS, Masters thesis, Universitat Augsburg, December 2011."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2013.05.003"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/GreenCom.2012.23"},{"key":"e_1_3_2_1_24_1","first-page":"2013","article-title":"End-to-end transport-layer security for Internet-integrated sensing applications with mutual and delegated ECC public-key authentication","author":"Monteiro Edmundo","year":"2013","unstructured":"Granjal, Jorge, Edmundo Monteiro , and Jorge Sa Silva . \" End-to-end transport-layer security for Internet-integrated sensing applications with mutual and delegated ECC public-key authentication .\" IFIP Networking Conference , 2013 . IEEE, 2013 . Granjal, Jorge, Edmundo Monteiro, and Jorge Sa Silva. \"End-to-end transport-layer security for Internet-integrated sensing applications with mutual and delegated ECC public-key authentication.\" IFIP Networking Conference, 2013. IEEE, 2013.","journal-title":"IFIP Networking Conference"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/DCOSS.2012.55"}],"event":{"name":"ICTCS '16: Second International Conference on Information and Communication Technology for Competitive Strategies","acronym":"ICTCS '16","location":"Udaipur India"},"container-title":["Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905057","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2905055.2905057","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:54:02Z","timestamp":1750222442000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905057"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,4]]},"references-count":25,"alternative-id":["10.1145\/2905055.2905057","10.1145\/2905055"],"URL":"https:\/\/doi.org\/10.1145\/2905055.2905057","relation":{},"subject":[],"published":{"date-parts":[[2016,3,4]]},"assertion":[{"value":"2016-03-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}