{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T15:13:39Z","timestamp":1776870819549,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,3,13]],"date-time":"2018-03-13T00:00:00Z","timestamp":1520899200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Science Foundation CAREER Award","award":["CNS-1351038 and ACI-1642078"],"award-info":[{"award-number":["CNS-1351038 and ACI-1642078"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,3,13]]},"DOI":"10.1145\/3176258.3176326","type":"proceedings-article","created":{"date-parts":[[2018,3,15]],"date-time":"2018-03-15T13:22:14Z","timestamp":1521120134000},"page":"307-318","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["SecuPAN"],"prefix":"10.1145","author":[{"given":"Mahmud","family":"Hossain","sequence":"first","affiliation":[{"name":"University of Alabama at Birmingham, Birmingham, AL, USA"}]},{"given":"Yasser","family":"Karim","sequence":"additional","affiliation":[{"name":"University of Alabama at Birmingham, Birmingham, AL, USA"}]},{"given":"Ragib","family":"Hasan","sequence":"additional","affiliation":[{"name":"University of Alabama at Birmingham, Birmingham, AL, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,3,13]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"IEEE Aerospace Conference. IEEE.","author":"Adams Jon T","year":"2006","unstructured":"Jon T Adams . 2006 . An introduction to IEEE STD 802.15. 4 . In IEEE Aerospace Conference. IEEE. Jon T Adams. 2006. An introduction to IEEE STD 802.15. 4. In IEEE Aerospace Conference. IEEE."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2416657"},{"key":"e_1_3_2_1_3_1","volume-title":"RFC","author":"Aura Tuomas","year":"2005","unstructured":"Tuomas Aura . 2005. Cryptographically generated addresses (CGA). IETF , RFC ( 2005 ). Tuomas Aura. 2005. Cryptographically generated addresses (CGA). IETF, RFC (2005)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/11734666_9"},{"key":"e_1_3_2_1_5_1","volume-title":"RFC","author":"Bormann Carsten","year":"2013","unstructured":"Carsten Bormann . 2013. Guidance for light-weight implementations of the internet protocol suite. IETF , RFC ( 2013 ). Carsten Bormann. 2013. Guidance for light-weight implementations of the internet protocol suite. IETF, RFC (2013)."},{"key":"e_1_3_2_1_6_1","unstructured":"CERT Coordination Center. 1997. CERT Advisory CA-1997--28 IP Denial-of-Service Attacks. (1997).  CERT Coordination Center. 1997. CERT Advisory CA-1997--28 IP Denial-of-Service Attacks. (1997)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/26.618290"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1582379.1582643"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1127777.1127822"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1127777.1127826"},{"key":"e_1_3_2_1_12_1","volume-title":"RFC","author":"Frankel Sheila","year":"2011","unstructured":"Sheila Frankel and Suresh Krishnan . 2011. IP security (IPsec) and internet key exchange (IKE) document roadmap. IETF , RFC ( 2011 ). Sheila Frankel and Suresh Krishnan. 2011. IP security (IPsec) and internet key exchange (IKE) document roadmap. IETF, RFC (2011)."},{"key":"e_1_3_2_1_13_1","volume-title":"Fragmentation considered vulnerable: blindly intercepting and discarding fragments Proceedings of the 5th USENIX conference on Offensive technologies","author":"Gilad Yossi","unstructured":"Yossi Gilad and Amir Herzberg . 2011. Fragmentation considered vulnerable: blindly intercepting and discarding fragments Proceedings of the 5th USENIX conference on Offensive technologies . USENIX Association , 2--2. Yossi Gilad and Amir Herzberg. 2011. Fragmentation considered vulnerable: blindly intercepting and discarding fragments Proceedings of the 5th USENIX conference on Offensive technologies. USENIX Association, 2--2."},{"key":"e_1_3_2_1_14_1","first-page":"57","article-title":"A security framework for a 6LoWPAN based industrial wireless sensor network","volume":"78","author":"Halcu Ionela","year":"2016","unstructured":"Ionela Halcu , Grigore Stamatescu , and Valentin Sgarciu . 2016 . A security framework for a 6LoWPAN based industrial wireless sensor network . University Politehnica of Bucharest Scientific Bulletin Series , Vol. 78 , 4 (2016), 57 -- 68 . Ionela Halcu, Grigore Stamatescu, and Valentin Sgarciu. 2016. A security framework for a 6LoWPAN based industrial wireless sensor network. University Politehnica of Bucharest Scientific Bulletin Series, Vol. 78, 4 (2016), 57--68.","journal-title":"University Politehnica of Bucharest Scientific Bulletin Series"},{"key":"e_1_3_2_1_15_1","unstructured":"Klaus Hartke and Olaf Bergmann. 2012. Datagram transport layer security in constrained environments. (2012).  Klaus Hartke and Olaf Bergmann. 2012. Datagram transport layer security in constrained environments. (2012)."},{"key":"e_1_3_2_1_16_1","volume-title":"Node compromise in sensor networks: The need for secure systems","author":"Hartung Carl","year":"2005","unstructured":"Carl Hartung , James Balasalle , and Richard Han . 2005. Node compromise in sensor networks: The need for secure systems . Department of Computer Science University of Colorado at Boulder ( 2005 ). Carl Hartung, James Balasalle, and Richard Han. 2005. Node compromise in sensor networks: The need for secure systems. Department of Computer Science University of Colorado at Boulder (2005)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462096.2462107"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2463183.2463193"},{"key":"e_1_3_2_1_19_1","volume-title":"Secure Seamless Bluetooth Low Energy Connection Migration for Unmodified IoT Devices","author":"Hussain Syed Rafiul","year":"2017","unstructured":"Syed Rafiul Hussain , Shagufta Mehnaz , Shahriar Nirjon , and Elisa Bertino . 2017. Secure Seamless Bluetooth Low Energy Connection Migration for Unmodified IoT Devices . IEEE Transactions on Mobile Computing ( 2017 ). Syed Rafiul Hussain, Shagufta Mehnaz, Shahriar Nirjon, and Elisa Bertino. 2017. Secure Seamless Bluetooth Low Energy Connection Migration for Unmodified IoT Devices. IEEE Transactions on Mobile Computing (2017)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2008.12"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICHIT.2008.261"},{"key":"e_1_3_2_1_22_1","volume-title":"Yves Le Traon, and Arkady Zaslavsky. 2017 a. Towards semantic interoperability in an open IoT ecosystem for connected vehicle services Global Internet of Things Summit (GIoTS)","author":"Kolbe Niklas","year":"2017","unstructured":"Niklas Kolbe , Sylvain Kubler , J\u00e9r\u00e9my Robert , Yves Le Traon, and Arkady Zaslavsky. 2017 a. Towards semantic interoperability in an open IoT ecosystem for connected vehicle services Global Internet of Things Summit (GIoTS) , 2017 . IEEE , 1--5. Niklas Kolbe, Sylvain Kubler, J\u00e9r\u00e9my Robert, Yves Le Traon, and Arkady Zaslavsky. 2017 a. Towards semantic interoperability in an open IoT ecosystem for connected vehicle services Global Internet of Things Summit (GIoTS), 2017. IEEE, 1--5."},{"key":"e_1_3_2_1_23_1","volume-title":"2017 b. Enriching a Situation Awareness Framework for IoT with Knowledge Base and Reasoning Components International and Interdisciplinary Conference on Modeling and Using Context","author":"Kolbe Niklas","unstructured":"Niklas Kolbe , Arkady Zaslavsky , Sylvain Kubler , J\u00e9r\u00e9my Robert , and Yves Le Traon . 2017 b. Enriching a Situation Awareness Framework for IoT with Knowledge Base and Reasoning Components International and Interdisciplinary Conference on Modeling and Using Context . Springer , 41--54. Niklas Kolbe, Arkady Zaslavsky, Sylvain Kubler, J\u00e9r\u00e9my Robert, and Yves Le Traon. 2017 b. Enriching a Situation Awareness Framework for IoT with Knowledge Base and Reasoning Components International and Interdisciplinary Conference on Modeling and Using Context. Springer, 41--54."},{"key":"e_1_3_2_1_24_1","volume-title":"RFC","author":"Kushalnagar Nandakishore","year":"2007","unstructured":"Nandakishore Kushalnagar , Gabriel Montenegro , David E Culler , and Jonathan W Hui . 2007 b. Transmission of ipv6 packets over ieee 802.15. 4 networks. IETF , RFC ( 2007 ). Nandakishore Kushalnagar, Gabriel Montenegro, David E Culler, and Jonathan W Hui. 2007 b. Transmission of ipv6 packets over ieee 802.15. 4 networks. IETF, RFC (2007)."},{"key":"e_1_3_2_1_25_1","volume-title":"Problem Statement, and Goals","author":"Kushalnagar N","year":"2007","unstructured":"N Kushalnagar , G Montenegro , and C Schumacher . 2007 a. Rfc 4919: Ipv6 over low-power wireless personal area networks (6lowpans): overview. Assumptions , Problem Statement, and Goals ( 2007 ). N Kushalnagar, G Montenegro, and C Schumacher. 2007 a. Rfc 4919: Ipv6 over low-power wireless personal area networks (6lowpans): overview. Assumptions, Problem Statement, and Goals (2007)."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2006.77"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2356"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"G. Lee H. Seo T. Park and H. Kim. 2017. Optimized implementation of chaskey MAC on 16-bit MSP430 Ninth International Conference on Ubiquitous and Future Networks (ICUFN).  G. Lee H. Seo T. Park and H. Kim. 2017. Optimized implementation of chaskey MAC on 16-bit MSP430 Ninth International Conference on Ubiquitous and Future Networks (ICUFN).","DOI":"10.1109\/ICUFN.2017.7993930"},{"key":"e_1_3_2_1_29_1","unstructured":"Clock Library. 2017 a. Contiki APIs for Accessing Realtime Clock. (2017). http:\/\/www.eistec.se\/docs\/contiki\/a02184.html  Clock Library. 2017 a. Contiki APIs for Accessing Realtime Clock. (2017). http:\/\/www.eistec.se\/docs\/contiki\/a02184.html"},{"key":"e_1_3_2_1_30_1","unstructured":"Energy Library. 2017 b. Contiki APIs for Measuring Energy Consumption. (2017). http:\/\/contiki.sourceforge.net\/docs\/2.6\/a00452_source.html  Energy Library. 2017 b. Contiki APIs for Measuring Energy Consumption. (2017). http:\/\/contiki.sourceforge.net\/docs\/2.6\/a00452_source.html"},{"key":"e_1_3_2_1_31_1","unstructured":"Contiki OS . 2016. An open source operating system for the Internet of Things. (2016). http:\/\/www.contiki-os.org\/  Contiki OS . 2016. An open source operating system for the Internet of Things. (2016). http:\/\/www.contiki-os.org\/"},{"key":"e_1_3_2_1_32_1","volume-title":"World Congress on Information and Communication Technologies.","author":"Yogesh Patil R.","unstructured":"R. Yogesh Patil and L. Ragha . 2011. A rate limiting mechanism for defending against flooding based distributed denial of service attack . In World Congress on Information and Communication Technologies. R. Yogesh Patil and L. Ragha. 2011. A rate limiting mechanism for defending against flooding based distributed denial of service attack. In World Congress on Information and Communication Technologies."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1016598314198"},{"key":"e_1_3_2_1_35_1","unstructured":"ReMote. 2017. A 6LoWPAN IoT device. http:\/\/zolertia.io\/z1. (2017).  ReMote. 2017. A 6LoWPAN IoT device. http:\/\/zolertia.io\/z1. (2017)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.382154"},{"key":"e_1_3_2_1_37_1","volume-title":"Shortfall-Based Optimal Placement of Security Resources for Mobile IoT Scenarios European Symposium on Research in Computer Security. Springer, 419--436","author":"Rullo Antonino","year":"2017","unstructured":"Antonino Rullo , Edoardo Serra , Elisa Bertino , and Jorge Lobo . 2017 . Shortfall-Based Optimal Placement of Security Resources for Mobile IoT Scenarios European Symposium on Research in Computer Security. Springer, 419--436 . Antonino Rullo, Edoardo Serra, Elisa Bertino, and Jorge Lobo. 2017. Shortfall-Based Optimal Placement of Security Resources for Mobile IoT Scenarios European Symposium on Research in Computer Security. Springer, 419--436."},{"key":"e_1_3_2_1_38_1","unstructured":"SecLists. 2004. The Rose Attack. http:\/\/seclists.org\/bugtraq\/2004\/Mar\/351. (2004).  SecLists. 2004. The Rose Attack. http:\/\/seclists.org\/bugtraq\/2004\/Mar\/351. (2004)."},{"key":"e_1_3_2_1_39_1","volume-title":"LoWPAN fragment Forwarding and Recovery. Internet Draft draft-thubert-6lowpan-simple-fragment-recovery-07, work in progress","author":"Thubert P","year":"2010","unstructured":"P Thubert and J Hui . 2010. LoWPAN fragment Forwarding and Recovery. Internet Draft draft-thubert-6lowpan-simple-fragment-recovery-07, work in progress ( 2010 ). P Thubert and J Hui. 2010. LoWPAN fragment Forwarding and Recovery. Internet Draft draft-thubert-6lowpan-simple-fragment-recovery-07, work in progress (2010)."},{"key":"e_1_3_2_1_40_1","unstructured":"Weptech. 2017. A 6LoWPan Border Router. https:\/\/www.weptech.de\/6LoWPAN_IoT_Gateway_EN.html. (2017).  Weptech. 2017. A 6LoWPan Border Router. https:\/\/www.weptech.de\/6LoWPAN_IoT_Gateway_EN.html. (2017)."},{"key":"e_1_3_2_1_41_1","volume-title":"RPL: IPv6 routing protocol for low-power and lossy networks. IETF, RFC","author":"Winter Tim","year":"2012","unstructured":"Tim Winter . 2012 . RPL: IPv6 routing protocol for low-power and lossy networks. IETF, RFC (2012). Tim Winter. 2012. RPL: IPv6 routing protocol for low-power and lossy networks. IETF, RFC (2012)."},{"key":"e_1_3_2_1_42_1","unstructured":"www.gartner.com. 2014. The Internet of Things will transform the Data Center. (2014). http:\/\/www.gartner.com\/newsroom\/id\/2684616  www.gartner.com. 2014. The Internet of Things will transform the Data Center. (2014). http:\/\/www.gartner.com\/newsroom\/id\/2684616"},{"key":"e_1_3_2_1_43_1","volume-title":"Security considerations for IP fragment filtering. RFC 1858","author":"Ziemba G","year":"1995","unstructured":"G Ziemba , P Traina , and D Reed . 1995. Security considerations for IP fragment filtering. RFC 1858 ( 1995 ). G Ziemba, P Traina, and D Reed. 1995. Security considerations for IP fragment filtering. RFC 1858 (1995)."}],"event":{"name":"CODASPY '18: Eighth ACM Conference on Data and Application Security and Privacy","location":"Tempe AZ USA","acronym":"CODASPY '18","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3176258.3176326","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3176258.3176326","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:26:40Z","timestamp":1750213600000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3176258.3176326"}},"subtitle":["A Security Scheme to Mitigate Fragmentation-Based Network Attacks in 6LoWPAN"],"short-title":[],"issued":{"date-parts":[[2018,3,13]]},"references-count":41,"alternative-id":["10.1145\/3176258.3176326","10.1145\/3176258"],"URL":"https:\/\/doi.org\/10.1145\/3176258.3176326","relation":{},"subject":[],"published":{"date-parts":[[2018,3,13]]},"assertion":[{"value":"2018-03-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}