{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T04:31:32Z","timestamp":1754109092575,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,5,15]],"date-time":"2019-05-15T00:00:00Z","timestamp":1557878400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001858","name":"VINNOVA","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001858","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Svenska Forskningsr\u00e5det Formas"},{"DOI":"10.13039\/501100004527","name":"Energimyndigheten","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004527","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,5,15]]},"DOI":"10.1145\/3317549.3323408","type":"proceedings-article","created":{"date-parts":[[2019,5,17]],"date-time":"2019-05-17T12:52:21Z","timestamp":1558097541000},"page":"117-127","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Indraj"],"prefix":"10.1145","author":[{"given":"Zhitao","family":"He","sequence":"first","affiliation":[{"name":"RISE Research Institutes of Sweden, Assa Abloy AB, Sweden"}]},{"given":"Martin","family":"Furuhed","sequence":"additional","affiliation":[{"name":"Technology Nexus Secured, Sweden"}]},{"given":"Shahid","family":"Raza","sequence":"additional","affiliation":[{"name":"RISE Research Institutes of Sweden, Sweden"}]}],"member":"320","published-online":{"date-parts":[[2019,5,15]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"{n. d.}. Bouncy Castle Crypto Library. https:\/\/bouncycastle.org\/. {Online; accessed 11-August-2017}.  {n. d.}. Bouncy Castle Crypto Library. https:\/\/bouncycastle.org\/. {Online; accessed 11-August-2017}."},{"key":"e_1_3_2_1_2_1","unstructured":"{n. d.}. Californium CoAP Framework. https:\/\/eclipse.org\/californium\/. {Online; accessed 11-August-2017}.  {n. d.}. Californium CoAP Framework. https:\/\/eclipse.org\/californium\/. {Online; accessed 11-August-2017}."},{"key":"e_1_3_2_1_3_1","unstructured":"{n. d.}. Contiki: The Open Source OS for the Internet of Things. http:\/\/www.contiki-os.org\/. Accessed: 2015-05-27.  {n. d.}. Contiki: The Open Source OS for the Internet of Things. http:\/\/www.contiki-os.org\/. Accessed: 2015-05-27."},{"key":"e_1_3_2_1_4_1","unstructured":"{n. d.}. Java Security Package. https:\/\/docs.oracle.com\/javase\/8\/docs\/api\/java\/security\/package-summary.html. {Online; accessed 11-August-2017}.  {n. d.}. Java Security Package. https:\/\/docs.oracle.com\/javase\/8\/docs\/api\/java\/security\/package-summary.html. {Online; accessed 11-August-2017}."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Carlisle Adams Stephen Farrell Tomi Kause and Tero Mononen. 2005. Internet X.509 public key infrastructure certificate management protocol (CMP). RFC 4210. IETF.  Carlisle Adams Stephen Farrell Tomi Kause and Tero Mononen. 2005. Internet X.509 public key infrastructure certificate management protocol (CMP). RFC 4210. IETF.","DOI":"10.17487\/rfc4210"},{"key":"e_1_3_2_1_6_1","unstructured":"Anonymous. 2016. EST compared to SCEP CMC and CMP. White paper. CISCO.  Anonymous. 2016. EST compared to SCEP CMC and CMP. White paper. CISCO."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"C. Bormann and Z. Shelby. 2016. Block-Wise Transfers in the Constrained Application Protocol (CoAP). RFC 7959.  C. Bormann and Z. Shelby. 2016. Block-Wise Transfers in the Constrained Application Protocol (CoAP). RFC 7959.","DOI":"10.17487\/RFC7959"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"D Cooper S Santesson S Farrell S Boeyen R Housley and W Polk. 2008. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 5280. IETF.  D Cooper S Santesson S Farrell S Boeyen R Housley and W Polk. 2008. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 5280. IETF.","DOI":"10.17487\/rfc5280"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Donald Eastlake 3rd. 2011. Transport layer security (TLS) extensions: Extension definitions. RFC 6960. IETF.  Donald Eastlake 3rd. 2011. Transport layer security (TLS) extensions: Extension definitions. RFC 6960. IETF.","DOI":"10.17487\/rfc6066"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Pasi Eronen and Hannes Tschofenig. 2005. Pre-Shared Key Ciphersuites for Transport Layer Security (TLS). RFC 4279. IETF. http:\/\/www.ietf.org\/rfc\/rfc4279.txt.  Pasi Eronen and Hannes Tschofenig. 2005. Pre-Shared Key Ciphersuites for Transport Layer Security (TLS). RFC 4279. IETF. http:\/\/www.ietf.org\/rfc\/rfc4279.txt.","DOI":"10.17487\/rfc4279"},{"volume-title":"Interoperability, Safety and Security in IoT","author":"Forsby Filip","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","unstructured":"T. Fossati. 2013. Multipart Content-Format Encoding for CoAP. IETF draft. https:\/\/tools.ietf.org\/html\/draft-fossati-core-multipart-ct-03.  T. Fossati. 2013. Multipart Content-Format Encoding for CoAP. IETF draft. https:\/\/tools.ietf.org\/html\/draft-fossati-core-multipart-ct-03."},{"key":"e_1_3_2_1_14_1","unstructured":"Peter Gutmann. 2017. Simple Certificate Enrolment Protocol. Internet-Draft draft-gutmann-scep-06. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-gutmann-scep-06 Work in Progress.  Peter Gutmann. 2017. Simple Certificate Enrolment Protocol. Internet-Draft draft-gutmann-scep-06. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-gutmann-scep-06 Work in Progress."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"R Housley. 2009. Cryptographic Message Syntax (CMS). RFC 5652. IETF.  R Housley. 2009. Cryptographic Message Syntax (CMS). RFC 5652. IETF.","DOI":"10.17487\/rfc5652"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"J. Hui and P. Thubert. 2011. Compression Format for IPv6 Datagrams over IEEE 802.15.4-Based Networks. RFC 6282. IETF.  J. Hui and P. Thubert. 2011. Compression Format for IPv6 Datagrams over IEEE 802.15.4-Based Networks. RFC 6282. IETF.","DOI":"10.17487\/rfc6282"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/IOT.2014.7030106"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"David McGrew and Daniel Bailey. 2012. AES-CCM Cipher Suites for Transport Layer Security (TLS). RFC 6655. IETF.  David McGrew and Daniel Bailey. 2012. AES-CCM Cipher Suites for Transport Layer Security (TLS). RFC 6655. IETF.","DOI":"10.17487\/rfc6655"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"D McGrew D Bailey M Campagna and R Dugal. 2014. AES-CCM Elliptic Curve Cryptography (ECC) Cipher Suites for TLS. RFC 7251. IETF.  D McGrew D Bailey M Campagna and R Dugal. 2014. AES-CCM Elliptic Curve Cryptography (ECC) Cipher Suites for TLS. RFC 7251. IETF.","DOI":"10.17487\/rfc7251"},{"key":"e_1_3_2_1_20_1","unstructured":"Michael Myers Rich Ankney Ambarish Malpani Slava Galperin and Carlisle Adams. 2013. X. 509 Internet public key infrastructure online certificate status protocol-OCSP. RFC 6960. IETF.  Michael Myers Rich Ankney Ambarish Malpani Slava Galperin and Carlisle Adams. 2013. X. 509 Internet public key infrastructure online certificate status protocol-OCSP. RFC 6960. IETF."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC2986"},{"key":"e_1_3_2_1_22_1","unstructured":"Open Mobile Alliance. 2013. Ligthweight Machine to Machine Technical Specification. Technical Specification OMA-TS-LightweightM2M-V1_020131105-D. Open Mobile Alliance.  Open Mobile Alliance. 2013. Ligthweight Machine to Machine Technical Specification. Technical Specification OMA-TS-LightweightM2M-V1_020131105-D. Open Mobile Alliance."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Maria Rita Palattella Nicola Accettura Xavier Vilajosana Thomas Watteyne Luigi Alfredo Grieco Gennaro Boggia and Mischa Dohler. 2013. Standardized protocol stack for the internet of (important) things. IEEE communications surveys & tutorials 15 3 (2013) 1389--1406.  Maria Rita Palattella Nicola Accettura Xavier Vilajosana Thomas Watteyne Luigi Alfredo Grieco Gennaro Boggia and Mischa Dohler. 2013. Standardized protocol stack for the internet of (important) things. IEEE communications surveys & tutorials 15 3 (2013) 1389--1406.","DOI":"10.1109\/SURV.2012.111412.00158"},{"volume-title":"Mobility and Security (NTMS), 2015 7th International Conference on. IEEE, 1--5.","year":"2015","author":"Pinol Oriol Pinol","key":"e_1_3_2_1_24_1"},{"key":"e_1_3_2_1_25_1","unstructured":"Max Pritikin Andrew Nourse and J Vilhuber. 2011. Simple Certificate Enrollment Protocol. Internet-Draft draft-nourse-scep-23. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-nourse-scep-23 Work in Progress.  Max Pritikin Andrew Nourse and J Vilhuber. 2011. Simple Certificate Enrollment Protocol. Internet-Draft draft-nourse-scep-23. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-nourse-scep-23 Work in Progress."},{"key":"e_1_3_2_1_26_1","unstructured":"M. Pritikin M. Richardson M. Behringer S. Bjarnason and K. Watsen. 2019. Bootstrapping Remote Secure Key Infrastructures (BRSKI). IETF draft. https:\/\/tools.ietf.org\/html\/draft-ietf-anima-bootstrapping-keyinfra-19.  M. Pritikin M. Richardson M. Behringer S. Bjarnason and K. Watsen. 2019. Bootstrapping Remote Secure Key Infrastructures (BRSKI). IETF draft. https:\/\/tools.ietf.org\/html\/draft-ietf-anima-bootstrapping-keyinfra-19."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Max Pritikin Peter Yee and Dan Harkins. 2013. Enrollment over Secure Transport. RFC 7030. IETF.  Max Pritikin Peter Yee and Dan Harkins. 2013. Enrollment over Secure Transport. RFC 7030. IETF.","DOI":"10.17487\/rfc7030"},{"key":"e_1_3_2_1_28_1","first-page":"12","article-title":"Secure Communication for the Internet of Things - A Comparison of Link-Layer Security and IPsec for 6LoWPAN. Security and Communication Networks","volume":"7","author":"Raza Shahid","year":"2014","journal-title":"Wiley"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.06.008"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2013.2277656"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Eric Rescorla and Nagendra Modadugu. 2012. Datagram Transport Layer Security Version 1.2. RFC 6347. IETF. http:\/\/www.ietf.org\/rfc\/rfc6347.txt.  Eric Rescorla and Nagendra Modadugu. 2012. Datagram Transport Layer Security Version 1.2. RFC 6347. IETF. http:\/\/www.ietf.org\/rfc\/rfc6347.txt.","DOI":"10.17487\/rfc6347"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"J Schaad and M Myers. 2008. Certificate management over CMS (CMC). RFC 5272. IETF.  J Schaad and M Myers. 2008. Certificate management over CMS (CMC). RFC 5272. IETF.","DOI":"10.17487\/rfc5272"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"J Schaad and M Myers. 2008. Certificate Management over CMS (CMC): Transport Protocols. RFC 5272. IETF.  J Schaad and M Myers. 2008. Certificate Management over CMS (CMC): Transport Protocols. RFC 5272. IETF.","DOI":"10.17487\/rfc5273"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"Zach Shelby Klaus Hartke and Carsten Bormann. 2014. The constrained application protocol (CoAP). RFC 7252. IETF.  Zach Shelby Klaus Hartke and Carsten Bormann. 2014. The constrained application protocol (CoAP). RFC 7252. IETF.","DOI":"10.17487\/rfc7252"},{"key":"e_1_3_2_1_35_1","unstructured":"H. Tschofenig and T. Fossati. 2016. Transport Layer Security (TLS)\/Datagram Transport Layer Security (DTLS) Profiles for the Internet of Things. RFC 7925.  H. Tschofenig and T. Fossati. 2016. Transport Layer Security (TLS)\/Datagram Transport Layer Security (DTLS) Profiles for the Internet of Things. RFC 7925."},{"volume-title":"Information Processing in Sensor Networks, 2009. IPSN 2009. International Conference on. IEEE, 349--360","year":"2009","author":"Tsiftes Nicolas","key":"e_1_3_2_1_36_1"},{"key":"e_1_3_2_1_37_1","unstructured":"P. van der Stok P. Kampanakis M. Richardson and S. Raza. 2019. EST over secure CoAP (EST-coaps). IETF draft. https:\/\/tools.ietf.org\/html\/draft-ietf-ace-coap-est-10.  P. van der Stok P. Kampanakis M. Richardson and S. Raza. 2019. EST over secure CoAP (EST-coaps). IETF draft. https:\/\/tools.ietf.org\/html\/draft-ietf-ace-coap-est-10."},{"volume-title":"RPL: IPv6 routing protocol for low-power and lossy networks. RFC 6550. IETF.","year":"2012","author":"Winter Tim","key":"e_1_3_2_1_38_1"}],"event":{"name":"WiSec '19: 12th ACM Conference on Security and Privacy in Wireless and Mobile Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Miami Florida","acronym":"WiSec '19"},"container-title":["Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3317549.3323408","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3317549.3323408","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:01:18Z","timestamp":1750276878000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3317549.3323408"}},"subtitle":["digital certificate enrollment for battery-powered wireless devices"],"short-title":[],"issued":{"date-parts":[[2019,5,15]]},"references-count":37,"alternative-id":["10.1145\/3317549.3323408","10.1145\/3317549"],"URL":"https:\/\/doi.org\/10.1145\/3317549.3323408","relation":{},"subject":[],"published":{"date-parts":[[2019,5,15]]},"assertion":[{"value":"2019-05-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}