{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T11:27:45Z","timestamp":1769167665947,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":63,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,9,22]],"date-time":"2020-09-22T00:00:00Z","timestamp":1600732800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Bundesministerium f\u00fcr Bildung und Forschung","award":["16KIS0551"],"award-info":[{"award-number":["16KIS0551"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,9,22]]},"DOI":"10.1145\/3405656.3418718","type":"proceedings-article","created":{"date-parts":[[2020,9,22]],"date-time":"2020-09-22T21:17:38Z","timestamp":1600809458000},"page":"77-88","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Toward a RESTful Information-Centric Web of Things"],"prefix":"10.1145","author":[{"given":"Cenk","family":"G\u00fcndo\u011fan","sequence":"first","affiliation":[{"name":"HAW Hamburg"}]},{"given":"Christian","family":"Ams\u00fcss","sequence":"additional","affiliation":[]},{"given":"Thomas C.","family":"Schmidt","sequence":"additional","affiliation":[{"name":"HAW Hamburg"}]},{"given":"Matthias","family":"W\u00e4hlisch","sequence":"additional","affiliation":[{"name":"Freie Universit\u00e4t Berlin"}]}],"member":"320","published-online":{"date-parts":[[2020,9,22]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"ACM. Jan. 2017. Result and Artifact Review and Badging. http:\/\/acm.org\/publications\/policies\/artifact-review-badging.  ACM. Jan. 2017. Result and Artifact Review and Badging. http:\/\/acm.org\/publications\/policies\/artifact-review-badging."},{"key":"e_1_3_2_2_2_1","volume-title":"FIT IoT-LAB: A large scale open experimental IoT testbed. In 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT). 459--464","author":"Adjih Cedric"},{"key":"e_1_3_2_2_3_1","volume-title":"Proc. of IFIP Networking","author":"Afanasyev Alexander"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1544012.1544078"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6231276"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2984356.2985232"},{"key":"e_1_3_2_2_7_1","volume-title":"2014 European Conference on Networks and Communications (EuCNC). IEEE","author":"Amadeo M."},{"key":"e_1_3_2_2_8_1","unstructured":"Christian Amsuess John Mattsson and Goeran Selander. 2020. CoAP: Echo Request-Tag and Token Processing. Internet-Draft - work in progress 10. IETF.  Christian Amsuess John Mattsson and Goeran Selander. 2020. CoAP: Echo Request-Tag and Token Processing. Internet-Draft - work in progress 10. IETF."},{"key":"e_1_3_2_2_9_1","first-page":"15","article-title":"Low Power 2.4 GHz Transceiver for ZigBee","volume":"802","year":"2009","journal-title":"IEEE"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2815038"},{"key":"e_1_3_2_2_11_1","volume-title":"Schmidt","author":"Baccelli Emmanuel","year":"2013"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660129.2660144"},{"key":"e_1_3_2_2_13_1","unstructured":"Andrew Banks and Rahul Gupta (Eds.). 2014. MQTT Version 3.1.1. OASIS Standard. OASIS. http:\/\/docs.oasis-open.org\/mqtt\/mqtt\/v3.1.1\/os\/mqtt-v3.1.1-os.html  Andrew Banks and Rahul Gupta (Eds.). 2014. MQTT Version 3.1.1. OASIS Standard. OASIS. http:\/\/docs.oasis-open.org\/mqtt\/mqtt\/v3.1.1\/os\/mqtt-v3.1.1-os.html"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"crossref","unstructured":"C. Bormann M. Ersue and A. Keranen. 2014. Terminology for Constrained-Node Networks. RFC 7228. IETF.  C. Bormann M. Ersue and A. Keranen. 2014. Terminology for Constrained-Node Networks. RFC 7228. IETF.","DOI":"10.17487\/rfc7228"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/78952.78953"},{"key":"e_1_3_2_2_16_1","unstructured":"Esko Dijk Chonggang Wang and Marco Tiloca. 2020. Group Communication for the Constrained Application Protocol (CoAP). Internet-Draft - work in progress 01. IETF.  Esko Dijk Chonggang Wang and Marco Tiloca. 2020. Group Communication for the Constrained Application Protocol (CoAP). Internet-Draft - work in progress 01. IETF."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292674"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2004.38"},{"key":"e_1_3_2_2_19_1","volume-title":"Proc. of IFIP NTMS. IEEE","author":"Fotiou Nikos"},{"key":"e_1_3_2_2_20_1","unstructured":"Paul Gauthier Josh Cohen Martin Dunsmuir and Charles Perkins. 1999. Web Proxy Auto-Discovery Protocol. Internet-Draft - work in progress 01. IETF.  Paul Gauthier Josh Cohen Martin Dunsmuir and Charles Perkins. 1999. Web Proxy Auto-Discovery Protocol. Internet-Draft - work in progress 01. IETF."},{"key":"e_1_3_2_2_21_1","volume-title":"Cheriton","author":"Gritter Mark","year":"2001"},{"key":"e_1_3_2_2_22_1","volume-title":"Proc. of 19th IFIP Networking Conference","author":"G\u00fcndogan Cenk","year":"2020"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3267955.3267967"},{"key":"e_1_3_2_2_24_1","volume-title":"Proc. of 18th IFIP Networking Conference","author":"G\u00fcndogan Cenk","year":"2019"},{"key":"e_1_3_2_2_25_1","volume-title":"Wireless Networks and Industrial IoT","author":"G\u00fcndogan Cenk"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3125719.3125732"},{"key":"e_1_3_2_2_27_1","volume-title":"Proc. of 15th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN). IEEE","author":"Bo Chen Huan","year":"2019"},{"key":"e_1_3_2_2_28_1","volume-title":"Networking Named Content. In 5th Int. Conf. on emerging Networking Experiments and Technologies (ACM CoNEXT'09)","author":"Jacobson Van"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3267955.3267956"},{"key":"e_1_3_2_2_30_1","unstructured":"D. Kutscher S. Eum K. Pentikousis I. Psaras D. Corujo D. Saucez T. Schmidt and M. Waehlisch. 2016. Information-Centric Networking (ICN) Research Challenges. RFC 7927. IETF.  D. Kutscher S. Eum K. Pentikousis I. Psaras D. Corujo D. Saucez T. Schmidt and M. Waehlisch. 2016. Information-Centric Networking (ICN) Research Challenges. RFC 7927. IETF."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2378956.2378966"},{"key":"e_1_3_2_2_32_1","volume-title":"Internet of Things (IoT) in 5G Mobile Technologies","author":"Mathieu Bertrand"},{"key":"e_1_3_2_2_33_1","unstructured":"John Mattsson John Fornehed Goeran Selander Francesca Palombini and Christian Amsuess. 2018. Controlling Actuators with CoAP. Internet-Draft - work in progress 06. IETF.  John Mattsson John Fornehed Goeran Selander Francesca Palombini and Christian Amsuess. 2018. Controlling Actuators with CoAP. Internet-Draft - work in progress 06. IETF."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810156.2810160"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"crossref","unstructured":"G. Montenegro N. Kushalnagar J. Hui and D. Culler. 2007. Transmission of IPv6 Packets over IEEE 802.15.4 Networks. RFC 4944. IETF.  G. Montenegro N. Kushalnagar J. Hui and D. Culler. 2007. Transmission of IPv6 Packets over IEEE 802.15.4 Networks. RFC 4944. IETF.","DOI":"10.17487\/rfc4944"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"crossref","unstructured":"M. Mosko I. Solis and C. Wood. 2019. Content-Centric Networking (CCNx) Semantics. RFC 8569. IETF.  M. Mosko I. Solis and C. Wood. 2019. Content-Centric Networking (CCNx) Semantics. RFC 8569. IETF.","DOI":"10.17487\/RFC8569"},{"key":"e_1_3_2_2_37_1","unstructured":"S. Y. Oh D. Lau and M. Gerla. 2010. Content Centric Networking in tactical and emergency MANETs. In 2010 IFIP Wireless Days. IEEE Piscataway NJ USA 1--5.  S. Y. Oh D. Lau and M. Gerla. 2010. Content Centric Networking in tactical and emergency MANETs. In 2010 IFIP Wireless Days. IEEE Piscataway NJ USA 1--5."},{"key":"e_1_3_2_2_38_1","unstructured":"K. Pentikousis B. Ohlman E. Davies S. Spirou and G. Boggia. 2016. Information-Centric Networking: Evaluation and Security Considerations. RFC 7945. IETF.  K. Pentikousis B. Ohlman E. Davies S. Spirou and G. Boggia. 2016. Information-Centric Networking: Evaluation and Security Considerations. RFC 7945. IETF."},{"key":"e_1_3_2_2_39_1","volume-title":"Proceedings of the 6th ACM Conference on Information-Centric Networking","author":"Pfender Jakob"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342488.2342501"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"crossref","unstructured":"A. Rahman and E. Dijk. 2014. Group Communication for the Constrained Application Protocol (CoAP). RFC 7390. IETF.  A. Rahman and E. Dijk. 2014. Group Communication for the Constrained Application Protocol (CoAP). RFC 7390. IETF.","DOI":"10.17487\/rfc7390"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"crossref","unstructured":"E. Rescorla and N. Modadugu. 2012. Datagram Transport Layer Security Version 1.2. RFC 6347. IETF.  E. Rescorla and N. Modadugu. 2012. Datagram Transport Layer Security Version 1.2. RFC 6347. IETF.","DOI":"10.17487\/rfc6347"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/357401.357402"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"crossref","unstructured":"J. Schaad. 2017. CBOR Object Signing and Encryption (COSE). RFC 8152. IETF.  J. Schaad. 2017. CBOR Object Signing and Encryption (COSE). RFC 8152. IETF.","DOI":"10.17487\/RFC8152"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097766.3097768"},{"key":"e_1_3_2_2_46_1","unstructured":"T. Schmidt S. Gao H. Zhang and M. Waehlisch. 2014. Mobile Multicast Sender Support in Proxy Mobile IPv6 (PMIPv6) Domains. RFC 7287. IETF.  T. Schmidt S. Gao H. Zhang and M. Waehlisch. 2014. Mobile Multicast Sender Support in Proxy Mobile IPv6 (PMIPv6) Domains. RFC 7287. IETF."},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"crossref","unstructured":"T. Schmidt M. Waehlisch and G. Fairhurst. 2010. Multicast Mobility in Mobile IP Version 6 (MIPv6): Problem Statement and Brief Survey. RFC 5757. IETF.  T. Schmidt M. Waehlisch and G. Fairhurst. 2010. Multicast Mobility in Mobile IP Version 6 (MIPv6): Problem Statement and Brief Survey. RFC 5757. IETF.","DOI":"10.17487\/rfc5757"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"crossref","unstructured":"T. Schmidt M. Waehlisch and S. Krishnan. 2011. Base Deployment for Multicast Listener Support in Proxy Mobile IPv6 (PMIPv6) Domains. RFC 6224. IETF.  T. Schmidt M. Waehlisch and S. Krishnan. 2011. Base Deployment for Multicast Listener Support in Proxy Mobile IPv6 (PMIPv6) Domains. RFC 6224. IETF.","DOI":"10.17487\/rfc6224"},{"key":"e_1_3_2_2_49_1","volume-title":"Trust and Clouds. In IEEE 37th Intern. Conference on Distributed Computing Systems (ICDCS). IEEE","author":"Schooler E. M."},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"crossref","unstructured":"G. Selander J. Mattsson F. Palombini and L. Seitz. 2019. Object Security for Constrained RESTful Environments (OSCORE). RFC 8613. IETF.  G. Selander J. Mattsson F. Palombini and L. Seitz. 2019. Object Security for Constrained RESTful Environments (OSCORE). RFC 8613. IETF.","DOI":"10.17487\/RFC8613"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2016.7849061"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"crossref","unstructured":"Z. Shelby K. Hartke and C. Bormann. 2014. The Constrained Application Protocol (CoAP). RFC 7252. IETF.  Z. Shelby K. Hartke and C. Bormann. 2014. The Constrained Application Protocol (CoAP). RFC 7252. IETF.","DOI":"10.17487\/rfc7252"},{"key":"e_1_3_2_2_53_1","unstructured":"Junxiao Shi and Beichuan Zhang. 2012. NDNLP:A Link Protocol for NDN. NDN Technical Report NDN-0006. NDN Team.  Junxiao Shi and Beichuan Zhang. 2012. NDNLP:A Link Protocol for NDN. NDN Technical Report NDN-0006. NDN Team."},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660129.2660150"},{"key":"e_1_3_2_2_55_1","unstructured":"Marco Tiloca and Esko Dijk. 2020. Proxy Operations for CoAP Group Communication. Internet-Draft - work in progress 01. IETF.  Marco Tiloca and Esko Dijk. 2020. Proxy Operations for CoAP Group Communication. Internet-Draft - work in progress 01. IETF."},{"key":"e_1_3_2_2_56_1","unstructured":"Marco Tiloca Goeran Selander Francesca Palombini and Jiye Park. 2020. Group OSCORE - Secure Group Communication for CoAP. Internet-Draft - work in progress 09. IETF.  Marco Tiloca Goeran Selander Francesca Palombini and Jiye Park. 2020. Group OSCORE - Secure Group Communication for CoAP. Internet-Draft - work in progress 09. IETF."},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2500501"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342356.2342379"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2013.07.009"},{"key":"e_1_3_2_2_60_1","volume-title":"RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks. RFC 6550. IETF.","author":"Winter T.","year":"2012"},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.070813.00063"},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656887"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2016.7562050"}],"event":{"name":"ICN '20: 7th ACM Conference on Information-Centric Networking","location":"Virtual Event Canada","acronym":"ICN '20","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the 7th ACM Conference on Information-Centric Networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3405656.3418718","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3405656.3418718","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:32:09Z","timestamp":1750195929000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3405656.3418718"}},"subtitle":["A Deeper Look at Data Orientation in CoAP"],"short-title":[],"issued":{"date-parts":[[2020,9,22]]},"references-count":63,"alternative-id":["10.1145\/3405656.3418718","10.1145\/3405656"],"URL":"https:\/\/doi.org\/10.1145\/3405656.3418718","relation":{},"subject":[],"published":{"date-parts":[[2020,9,22]]},"assertion":[{"value":"2020-09-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}