{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:11:54Z","timestamp":1750306314690,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,3,4]],"date-time":"2016-03-04T00:00:00Z","timestamp":1457049600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,3,4]]},"DOI":"10.1145\/2905055.2905085","type":"proceedings-article","created":{"date-parts":[[2016,8,29]],"date-time":"2016-08-29T12:17:16Z","timestamp":1472473036000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["An Analysis of Types of Protocol Implemented in Internet of Things Based on Packet Loss Ratio"],"prefix":"10.1145","author":[{"given":"M.","family":"Prakash","sequence":"first","affiliation":[{"name":"Department of Information Technology, Jeppiaar Institute of Technology, Chennai, Tamil Nadu. India"}]},{"given":"C. J.","family":"KavithaPriya","sequence":"additional","affiliation":[{"name":"Department of Information Technology, Jeppiaar Institute of Technology, Chennai, Tamil Nadu. India"}]}],"member":"320","published-online":{"date-parts":[[2016,3,4]]},"reference":[{"volume-title":"Securing the internet of things: A standardization perspective. Internet of Things Journal","author":"Keoh S. L.","key":"e_1_3_2_1_1_1","unstructured":"Keoh , S. L. , Kumar , S. S., & Tschofenig , H. 2014. Securing the internet of things: A standardization perspective. Internet of Things Journal , IEEE , 1(3), 265--275. DOI: 10.1109\/JIOT.2014.2323395. 10.1109\/JIOT.2014.2323395 Keoh, S. L., Kumar, S. S., & Tschofenig, H. 2014. Securing the internet of things: A standardization perspective. Internet of Things Journal, IEEE, 1(3), 265--275. DOI: 10.1109\/JIOT.2014.2323395."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2323395"},{"key":"e_1_3_2_1_3_1","volume-title":"A Internet of Things Framework for Smart Energy in Buildings: Designs, Prototype, and Experiments","author":"Pan Jianli","year":"2015","unstructured":"Pan , Jianli , et al. \" A Internet of Things Framework for Smart Energy in Buildings: Designs, Prototype, and Experiments .\" ( 2015 ). DOI = 10.1109\/JIOT.2015.2413397 Pan, Jianli, et al. \"A Internet of Things Framework for Smart Energy in Buildings: Designs, Prototype, and Experiments.\" (2015). DOI = 10.1109\/JIOT.2015.2413397"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.01.010"},{"issue":"2","key":"e_1_3_2_1_5_1","article-title":"Application Protocol for constrained nodes in the Internet Of Things","volume":"10","author":"Koz\u00e1k Jozef","year":"2012","unstructured":"Koz\u00e1k , Jozef , and Martin VACU L\u00cdK . \" Application Protocol for constrained nodes in the Internet Of Things .\" Journal of Information, Control and Management Systems 10 . 2 ( 2012 ). Koz\u00e1k, Jozef, and Martin VACUL\u00cdK. \"Application Protocol for constrained nodes in the Internet Of Things.\" Journal of Information, Control and Management Systems 10.2 (2012).","journal-title":"Journal of Information, Control and Management Systems"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Blake-Wilson S. Moeller B. Gupta V. Hawk C. & Bolyard N. 2006. Elliptic curve cryptography (ECC) cipher suites for transport layer security (TLS).  Blake-Wilson S. Moeller B. Gupta V. Hawk C. & Bolyard N. 2006. Elliptic curve cryptography (ECC) cipher suites for transport layer security (TLS).","DOI":"10.17487\/rfc4492"},{"key":"e_1_3_2_1_7_1","first-page":"14","article-title":"The internet of things: How the next evolution of the internet is changing everything","volume":"1","author":"Evans Dave","year":"2011","unstructured":"Evans , Dave . \" The internet of things: How the next evolution of the internet is changing everything .\" CISCO white paper 1 ( 2011 ): 14 . Evans, Dave. \"The internet of things: How the next evolution of the internet is changing everything.\" CISCO white paper 1 (2011): 14.","journal-title":"CISCO white paper"},{"key":"e_1_3_2_1_8_1","volume-title":"2013 IEEE 24th International Symposium on. IEEE, 2013","author":"Iova Oana","year":"2013","unstructured":"Iova , Oana , Fabrice Theoleyre , and Thomas Noel . \" Stability and efficiency of RPL under realistic conditions in wireless sensor networks.\" Personal Indoor and Mobile Radio Communications (PIMRC) , 2013 IEEE 24th International Symposium on. IEEE, 2013 . DOI=10.1109\/PIMRC. 2013 .6666490 Iova, Oana, Fabrice Theoleyre, and Thomas Noel. \"Stability and efficiency of RPL under realistic conditions in wireless sensor networks.\" Personal Indoor and Mobile Radio Communications (PIMRC), 2013 IEEE 24th International Symposium on. IEEE, 2013. DOI=10.1109\/PIMRC.2013.6666490"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/470349"},{"key":"e_1_3_2_1_10_1","first-page":"2013","article-title":"Routing Attacks and Countermeasures in the RPL-based Internet of Things","author":"Wallgren Linus","year":"2013","unstructured":"Wallgren , Linus , Shahid Raza , and Thiemo Voigt . \" Routing Attacks and Countermeasures in the RPL-based Internet of Things .\" International Journal of Distributed Sensor Networks 2013 ( 2013 ). DOI= 10.1155\/2013\/794326 Wallgren, Linus, Shahid Raza, and Thiemo Voigt. \"Routing Attacks and Countermeasures in the RPL-based Internet of Things.\" International Journal of Distributed Sensor Networks 2013 (2013). DOI= 10.1155\/2013\/794326","journal-title":"International Journal of Distributed Sensor Networks"},{"key":"e_1_3_2_1_11_1","first-page":"2016","article-title":"Toward Improved RPL: A Congestion Avoidance Multipath Routing Protocol with Time Factor for Wireless Sensor Networks","author":"Tang Weisheng","year":"2015","unstructured":"Tang , Weisheng , et al. \" Toward Improved RPL: A Congestion Avoidance Multipath Routing Protocol with Time Factor for Wireless Sensor Networks .\" Journal of Sensors 2016 ( 2015 ). DOI= 10.1155\/2016\/8128651 Tang, Weisheng, et al. \"Toward Improved RPL: A Congestion Avoidance Multipath Routing Protocol with Time Factor for Wireless Sensor Networks.\" Journal of Sensors 2016 (2015). DOI= 10.1155\/2016\/8128651","journal-title":"Journal of Sensors"},{"key":"e_1_3_2_1_12_1","volume-title":"2012 5th International Conference on. IEEE, 2012","author":"Potsch Thomas","year":"2012","unstructured":"Potsch , Thomas , et al. \" Performance Evaluation of CoAP using RPL and LPL in TinyOS.\" New Technologies , Mobility and Security (NTMS) , 2012 5th International Conference on. IEEE, 2012 . DOI= 10.1109\/NTMS. 2012 .6208761. Potsch, Thomas, et al. \"Performance Evaluation of CoAP using RPL and LPL in TinyOS.\" New Technologies, Mobility and Security (NTMS), 2012 5th International Conference on. IEEE, 2012. DOI= 10.1109\/NTMS.2012.6208761."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Indian Journal of Science and Technology 2016 9 6 A Smart Device Integrated with an Android for Alerting a Persons Health Condition: Internet of Things 10.17485\/ijst","DOI":"10.17485\/ijst\/2016\/v9i6\/69545"}],"event":{"name":"ICTCS '16: Second International Conference on Information and Communication Technology for Competitive Strategies","acronym":"ICTCS '16","location":"Udaipur India"},"container-title":["Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905085","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2905055.2905085","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:54:02Z","timestamp":1750222442000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905085"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,4]]},"references-count":13,"alternative-id":["10.1145\/2905055.2905085","10.1145\/2905055"],"URL":"https:\/\/doi.org\/10.1145\/2905055.2905085","relation":{},"subject":[],"published":{"date-parts":[[2016,3,4]]},"assertion":[{"value":"2016-03-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}