{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:21:58Z","timestamp":1750220518991,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":54,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,9,22]],"date-time":"2021-09-22T00:00:00Z","timestamp":1632268800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100002347","name":"Bundesministerium f\u00fcr Bildung und Forschung","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002347","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,9,22]]},"DOI":"10.1145\/3460417.3482974","type":"proceedings-article","created":{"date-parts":[[2021,9,13]],"date-time":"2021-09-13T16:05:51Z","timestamp":1631549151000},"page":"59-70","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Reliable firmware updates for the information-centric internet of things"],"prefix":"10.1145","author":[{"given":"Cenk","family":"G\u00fcndo\u011fan","sequence":"first","affiliation":[{"name":"HAW Hamburg"}]},{"given":"Christian","family":"Ams\u00fcss","sequence":"additional","affiliation":[]},{"given":"Thomas C.","family":"Schmidt","sequence":"additional","affiliation":[{"name":"HAW Hamburg"}]},{"given":"Matthias","family":"W\u00e4hlisch","sequence":"additional","affiliation":[{"name":"Freie Universit\u00e4t Berlin"}]}],"member":"320","published-online":{"date-parts":[[2021,9,22]]},"reference":[{"key":"e_1_3_2_1_1_1","article-title":"A Realistic Deployment of Named Data Networking in the Internet of Things","volume":"9","author":"Abane Amar","year":"2020","unstructured":"Amar Abane , Mehammed Daoui , Samia Bouzefrane , Soumya Banerjee , and Paul Muhlethaler . 2020 . A Realistic Deployment of Named Data Networking in the Internet of Things . Journal of Cyber Security and Mobility 9 , 1 (2020), 1&ndash;46. Amar Abane, Mehammed Daoui, Samia Bouzefrane, Soumya Banerjee, and Paul Muhlethaler. 2020. A Realistic Deployment of Named Data Networking in the Internet of Things. Journal of Cyber Security and Mobility 9, 1 (2020), 1&ndash;46.","journal-title":"Journal of Cyber Security and Mobility"},{"unstructured":"ACM. Jan. 2017. Result and Artifact Review and Badging. http:\/\/acm.org\/publications\/policies\/artifact-review-badging.  ACM. Jan. 2017. Result and Artifact Review and Badging. http:\/\/acm.org\/publications\/policies\/artifact-review-badging.","key":"e_1_3_2_1_2_1"},{"volume-title":"FIT IoT-LAB: A large scale open experimental IoT testbed. In 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT). 459&ndash;464","author":"Adjih Cedric","unstructured":"Cedric Adjih , Emmanuel Baccelli , Eric Fleury , Gaetan Harter , Nathalie Mitton , Thomas Noel , Roger Pissard-Gibollet , Frederic Saint-Marcel , Guillaume Schreiner , Julien Vandaele , and Thomas Watteyne . 2015. FIT IoT-LAB: A large scale open experimental IoT testbed. In 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT). 459&ndash;464 . Cedric Adjih, Emmanuel Baccelli, Eric Fleury, Gaetan Harter, Nathalie Mitton, Thomas Noel, Roger Pissard-Gibollet, Frederic Saint-Marcel, Guillaume Schreiner, Julien Vandaele, and Thomas Watteyne. 2015. FIT IoT-LAB: A large scale open experimental IoT testbed. In 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT). 459&ndash;464.","key":"e_1_3_2_1_3_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1109\/MCOM.2012.6231276"},{"volume-title":"Proc. of IEEE International Conference on Communications (ICC). IEEE","author":"Amadeo M.","unstructured":"M. Amadeo , C. Campolo , A. Iera , and A. Molinaro . 2015. Information Centric Networking in IoT scenarios: The case of a smart home . In Proc. of IEEE International Conference on Communications (ICC). IEEE , Piscataway, NJ, USA, 648&ndash;653. M. Amadeo, C. Campolo, A. Iera, and A. Molinaro. 2015. Information Centric Networking in IoT scenarios: The case of a smart home. In Proc. of IEEE International Conference on Communications (ICC). IEEE, Piscataway, NJ, USA, 648&ndash;653.","key":"e_1_3_2_1_5_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1109\/JIOT.2018.2873343"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1145\/3125719.3125733"},{"key":"e_1_3_2_1_8_1","first-page":"15","article-title":"Low Power 2.4 GHz Transceiver for ZigBee","volume":"802","year":"2009","unstructured":"Atmel. 2009 . Low Power 2.4 GHz Transceiver for ZigBee , IEEE 802 . 15 .4, 6LoWPAN, RF4CE, SP100, WirelessHART, and ISM Applications. Atmel Corporation. http:\/\/www.atmel.com\/images\/doc8111.pdf Atmel. 2009. Low Power 2.4 GHz Transceiver for ZigBee, IEEE 802.15.4, 6LoWPAN, RF4CE, SP100, WirelessHART, and ISM Applications. Atmel Corporation. http:\/\/www.atmel.com\/images\/doc8111.pdf","journal-title":"IEEE"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1109\/JIOT.2018.2815038"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1145\/2660129.2660144"},{"doi-asserted-by":"crossref","unstructured":"C. Bormann M. Ersue and A. Keranen. 2014. Terminology for Constrained-Node Networks. RFC 7228. IETF.  C. Bormann M. Ersue and A. Keranen. 2014. Terminology for Constrained-Node Networks . RFC 7228. IETF.","key":"e_1_3_2_1_11_1","DOI":"10.17487\/rfc7228"},{"doi-asserted-by":"crossref","unstructured":"C. Bormann and Z. Shelby. 2016. Block-Wise Transfers in the Constrained Application Protocol (CoAP). RFC 7959. IETF.  C. Bormann and Z. Shelby. 2016. Block-Wise Transfers in the Constrained Application Protocol (CoAP) . RFC 7959. IETF.","key":"e_1_3_2_1_12_1","DOI":"10.17487\/RFC7959"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1109\/INFCOMW.2013.6970725"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1145\/3267955.3269017"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1145\/3405656.3418718"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1109\/TNSM.2021.3099902"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1145\/3267955.3267967"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1016\/j.comcom.2020.10.002"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1145\/2810156.2810176"},{"key":"e_1_3_2_1_20_1","volume-title":"NLSR: Named-data Link State Routing Protocol. In 3rd ACM SIGCOMM Workshop on Information-centric Networking (ICN '13)","author":"Hoque Mahmudul","year":"2013","unstructured":"Mahmudul Hoque , Syed Obaid Amin , Adam Alyyan , Beichuan Zhang , Lixia Zhang , and Lan Wang . 2013 . NLSR: Named-data Link State Routing Protocol. In 3rd ACM SIGCOMM Workshop on Information-centric Networking (ICN '13) . ACM, New York, NY, USA, 15&ndash;20. Mahmudul Hoque, Syed Obaid Amin, Adam Alyyan, Beichuan Zhang, Lixia Zhang, and Lan Wang. 2013. NLSR: Named-data Link State Routing Protocol. In 3rd ACM SIGCOMM Workshop on Information-centric Networking (ICN '13). ACM, New York, NY, USA, 15&ndash;20."},{"volume-title":"Proc. of the 2nd Int. Conf. on Embedded Networked Sensor Systems (SenSys'04)","author":"Hui J.W.","unstructured":"J.W. Hui and D. Culler . 2004. The dynamic behavior of a data dissemination protocol for network programming at scale . In Proc. of the 2nd Int. Conf. on Embedded Networked Sensor Systems (SenSys'04) . ACM, New York, NY, USA, 81&ndash;94. J.W. Hui and D. Culler. 2004. The dynamic behavior of a data dissemination protocol for network programming at scale. In Proc. of the 2nd Int. Conf. on Embedded Networked Sensor Systems (SenSys'04). ACM, New York, NY, USA, 81&ndash;94.","key":"e_1_3_2_1_21_1"},{"volume-title":"Networking Named Content. In 5th Int. Conf. on emerging Networking Experiments and Technologies (ACM CoNEXT'09)","author":"Jacobson Van","unstructured":"Van Jacobson , Diana K. Smetters , James D. Thornton , and Michael F. Plass . 2009 . Networking Named Content. In 5th Int. Conf. on emerging Networking Experiments and Technologies (ACM CoNEXT'09) (Rome). ACM, New York, NY, USA, 1&ndash;12. Van Jacobson, Diana K. Smetters, James D. Thornton, and Michael F. Plass. 2009. Networking Named Content. In 5th Int. Conf. on emerging Networking Experiments and Technologies (ACM CoNEXT'09) (Rome). ACM, New York, NY, USA, 1&ndash;12.","key":"e_1_3_2_1_22_1"},{"doi-asserted-by":"crossref","unstructured":"S. Josefsson and I. Liusvaara. 2017. Edwards-Curve Digital Signature Algorithm (EdDSA). RFC 8032. IETF.  S. Josefsson and I. Liusvaara. 2017. Edwards-Curve Digital Signature Algorithm (EdDSA) . RFC 8032. IETF.","key":"e_1_3_2_1_23_1","DOI":"10.17487\/RFC8032"},{"key":"e_1_3_2_1_24_1","volume-title":"International Conference on Embedded Wireless Systems and Networks (EWSN) (Delft, NL). ACM","author":"Kietzmann Peter","year":"2021","unstructured":"Peter Kietzmann , Lena Boeckmann , Leandro Lanzieri , Thomas C. Schmidt , and Matthias W&auml;hlisch. 2021 . A Performance Study of Crypto-Hardware in the Low-end IoT . In International Conference on Embedded Wireless Systems and Networks (EWSN) (Delft, NL). ACM , New York, USA, 12. Peter Kietzmann, Lena Boeckmann, Leandro Lanzieri, Thomas C. Schmidt, and Matthias W&auml;hlisch. 2021. A Performance Study of Crypto-Hardware in the Low-end IoT. In International Conference on Embedded Wireless Systems and Networks (EWSN) (Delft, NL). ACM, New York, USA, 12."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_25_1","DOI":"10.1109\/EWSN.2005.1462027"},{"key":"e_1_3_2_1_26_1","volume-title":"HMAC: Keyed-Hashing for Message Authentication. RFC 2104. IETF.","author":"Krawczyk H.","year":"1997","unstructured":"H. Krawczyk , M. Bellare , and R. Canetti . 1997 . HMAC: Keyed-Hashing for Message Authentication. RFC 2104. IETF. H. Krawczyk, M. Bellare, and R. Canetti. 1997. HMAC: Keyed-Hashing for Message Authentication. RFC 2104. IETF."},{"key":"e_1_3_2_1_27_1","volume-title":"Negotiation-Based Protocols for Disseminating Information in Wireless Sensor Networks. Wireless Networks 8","author":"Kulik Joanna","year":"2002","unstructured":"Joanna Kulik , Wendi Heinzelman , and Hari Balakrishnan . 2002. Negotiation-Based Protocols for Disseminating Information in Wireless Sensor Networks. Wireless Networks 8 ( 2002 ), 169&ndash;185. Joanna Kulik, Wendi Heinzelman, and Hari Balakrishnan. 2002. Negotiation-Based Protocols for Disseminating Information in Wireless Sensor Networks. Wireless Networks 8 (2002), 169&ndash;185."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_28_1","DOI":"10.1145\/1644893.1644904"},{"key":"e_1_3_2_1_29_1","volume-title":"Proceedings of the 3rd European Conference on Wireless Sensor Networks","author":"Jos Pedro","year":"2006","unstructured":"Pedro Jos &eacute; Marr&oacute;n, Matthias Gauger , Andreas Lachenmann , Daniel Minder , Olga Saukh , and Kurt Rothermel . 2006 . FlexCup: A Flexible and Efficient Code Update Mechanism for Sensor Networks . In Proceedings of the 3rd European Conference on Wireless Sensor Networks ( Zurich, Switzerland) (EWSN'06). Springer-Verlag, Berlin, Heidelberg, 212&ndash;227. Pedro Jos&eacute; Marr&oacute;n, Matthias Gauger, Andreas Lachenmann, Daniel Minder, Olga Saukh, and Kurt Rothermel. 2006. FlexCup: A Flexible and Efficient Code Update Mechanism for Sensor Networks. In Proceedings of the 3rd European Conference on Wireless Sensor Networks (Zurich, Switzerland) (EWSN'06). Springer-Verlag, Berlin, Heidelberg, 212&ndash;227."},{"volume-title":"Internet of Things (IoT) in 5G Mobile Technologies","author":"Mathieu Bertrand","unstructured":"Bertrand Mathieu , Cedric Westphal , and Patrick Truong . 2016. Towards the Usage of CCN for IoT Networks . In Internet of Things (IoT) in 5G Mobile Technologies . Springer, Cham , Switzerland , 3&ndash;24. Bertrand Mathieu, Cedric Westphal, and Patrick Truong. 2016. Towards the Usage of CCN for IoT Networks. In Internet of Things (IoT) in 5G Mobile Technologies. Springer, Cham, Switzerland, 3&ndash;24.","key":"e_1_3_2_1_30_1"},{"doi-asserted-by":"crossref","unstructured":"G. Montenegro N. Kushalnagar J. Hui and D. Culler. 2007. Transmission of IPv6 Packets over IEEE 802.15.4 Networks. RFC 4944. IETF.  G. Montenegro N. Kushalnagar J. Hui and D. Culler. 2007. Transmission of IPv6 Packets over IEEE 802.15.4 Networks . RFC 4944. IETF.","key":"e_1_3_2_1_31_1","DOI":"10.17487\/rfc4944"},{"volume-title":"An Information Model for Firmware Updates in IoT Devices. Internet-Draft &ndash","author":"Moran Brendan","unstructured":"Brendan Moran , Hannes Tschofenig , and Henk Birkholz . 2020a. An Information Model for Firmware Updates in IoT Devices. Internet-Draft &ndash ; work in progress 08. IETF. Brendan Moran, Hannes Tschofenig, and Henk Birkholz. 2020a. An Information Model for Firmware Updates in IoT Devices. Internet-Draft &ndash; work in progress 08. IETF.","key":"e_1_3_2_1_32_1"},{"volume-title":"A Concise Binary Object Representation (CBOR)-based Serialization Format for the Software Updates for Internet of Things (SUIT) Manifest. Internet-Draft &ndash","author":"Moran Brendan","unstructured":"Brendan Moran , Hannes Tschofenig , Henk Birkholz , and Koen Zandberg . 2020b. A Concise Binary Object Representation (CBOR)-based Serialization Format for the Software Updates for Internet of Things (SUIT) Manifest. Internet-Draft &ndash ; work in progress 11. IETF. Brendan Moran, Hannes Tschofenig, Henk Birkholz, and Koen Zandberg. 2020b. A Concise Binary Object Representation (CBOR)-based Serialization Format for the Software Updates for Internet of Things (SUIT) Manifest. Internet-Draft &ndash; work in progress 11. IETF.","key":"e_1_3_2_1_33_1"},{"doi-asserted-by":"crossref","unstructured":"B. Moran H. Tschofenig D. Brown and M. Meriac. 2021. A Firmware Update Architecture for Internet of Things. RFC 9019. IETF.  B. Moran H. Tschofenig D. Brown and M. Meriac. 2021. A Firmware Update Architecture for Internet of Things . RFC 9019. IETF.","key":"e_1_3_2_1_34_1","DOI":"10.17487\/RFC9019"},{"volume-title":"CCNx Content Object Chunking. Internet-Draft &ndash","author":"Mosko Marc","unstructured":"Marc Mosko . 2016. CCNx Content Object Chunking. Internet-Draft &ndash ; work in progress 02. IETF. Marc Mosko. 2016. CCNx Content Object Chunking. Internet-Draft &ndash; work in progress 02. IETF.","key":"e_1_3_2_1_35_1"},{"volume-title":"ICN 'Begin-End' Hop by Hop Fragmentation. Internet-Draft &ndash","author":"Mosko Marc","unstructured":"Marc Mosko and Christian Tschudin . 2016. ICN 'Begin-End' Hop by Hop Fragmentation. Internet-Draft &ndash ; work in progress 02. IETF. Marc Mosko and Christian Tschudin. 2016. ICN 'Begin-End' Hop by Hop Fragmentation. Internet-Draft &ndash; work in progress 02. IETF.","key":"e_1_3_2_1_36_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_37_1","DOI":"10.1109\/MNET.011.2000169"},{"unstructured":"S. Y. Oh D. Lau and M. Gerla. 2010. Content Centric Networking in tactical and emergency MANETs. In 2010 IFIP Wireless Days. IEEE Piscataway NJ USA 1&ndash;5.  S. Y. Oh D. Lau and M. Gerla. 2010. Content Centric Networking in tactical and emergency MANETs. In 2010 IFIP Wireless Days . IEEE Piscataway NJ USA 1&ndash;5.","key":"e_1_3_2_1_38_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_40_1","DOI":"10.1007\/s40860-015-0003-5"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_41_1","DOI":"10.1109\/SP.2017.14"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_42_1","DOI":"10.1145\/3097766.3097768"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_43_1","DOI":"10.1109\/IFIPNetworking.2016.7497240"},{"volume-title":"Trust and Clouds. In IEEE 37th Intern. Conference on Distributed Computing Systems (ICDCS). IEEE","author":"Schooler E. M.","unstructured":"E. M. Schooler , D. Zage , J. Sedayao , H. Moustafa , A. Brown , and M. Ambrosin . 2017. An Architectural Vision for a Data-Centric IoT: Rethinking Things , Trust and Clouds. In IEEE 37th Intern. Conference on Distributed Computing Systems (ICDCS). IEEE , Piscataway, NJ, USA, 1717&ndash;1728. E. M. Schooler, D. Zage, J. Sedayao, H. Moustafa, A. Brown, and M. Ambrosin. 2017. An Architectural Vision for a Data-Centric IoT: Rethinking Things, Trust and Clouds. In IEEE 37th Intern. Conference on Distributed Computing Systems (ICDCS). IEEE, Piscataway, NJ, USA, 1717&ndash;1728.","key":"e_1_3_2_1_44_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_45_1","DOI":"10.1109\/IoTDI.2015.44"},{"doi-asserted-by":"crossref","unstructured":"Z. Shelby K. Hartke and C. Bormann. 2014. The Constrained Application Protocol (CoAP). RFC 7252. IETF.  Z. Shelby K. Hartke and C. Bormann. 2014. The Constrained Application Protocol (CoAP) . RFC 7252. IETF.","key":"e_1_3_2_1_46_1","DOI":"10.17487\/rfc7252"},{"key":"e_1_3_2_1_47_1","volume-title":"NDNLP: A Link Protocol for NDN. NDN, Technical Report NDN-0006. NDN Team.","author":"Shi Junxiao","year":"2012","unstructured":"Junxiao Shi and Beichuan Zhang . 2012 . NDNLP: A Link Protocol for NDN. NDN, Technical Report NDN-0006. NDN Team. Junxiao Shi and Beichuan Zhang. 2012. NDNLP: A Link Protocol for NDN. NDN, Technical Report NDN-0006. NDN Team."},{"unstructured":"Andy Stanford-Clark and Hong Linh Truong. 2013. MQTT For Sensor Networks (MQTT-SN) Version 1.2. Protocol Specification. IBM. http:\/\/mqtt.org\/new\/wp-content\/uploads\/2009\/06\/MQTT-SN_spec_v1.2.pdf  Andy Stanford-Clark and Hong Linh Truong. 2013. MQTT For Sensor Networks (MQTT-SN) Version 1.2 . Protocol Specification. IBM. http:\/\/mqtt.org\/new\/wp-content\/uploads\/2009\/06\/MQTT-SN_spec_v1.2.pdf","key":"e_1_3_2_1_48_1"},{"key":"e_1_3_2_1_49_1","volume-title":"Technical Report 30. Center for Embedded Networked Sensing (CENS)","author":"Stathopoulos T.","year":"2003","unstructured":"T. Stathopoulos , J. Heidemann , and D. Estrin . 2003 . A remote code update mechanism for wireless sensor networks. Technical Report 30. Center for Embedded Networked Sensing (CENS) , Los Angeles, CA, USA . T. Stathopoulos, J. Heidemann, and D. Estrin. 2003. A remote code update mechanism for wireless sensor networks. Technical Report 30. Center for Embedded Networked Sensing (CENS), Los Angeles, CA, USA."},{"key":"e_1_3_2_1_50_1","volume-title":"RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks. RFC 6550. IETF.","author":"Winter T.","year":"2012","unstructured":"T. Winter , P. Thubert , A. Brandt , J. Hui , R. Kelsey , P. Levis , K. Pister , R. Struik , JP. Vasseur , and R. Alexander . 2012 . RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks. RFC 6550. IETF. T. Winter, P. Thubert, A. Brandt, J. Hui, R. Kelsey, P. Levis, K. Pister, R. Struik, JP. Vasseur, and R. Alexander. 2012. RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks. RFC 6550. IETF."},{"key":"e_1_3_2_1_51_1","volume-title":"Polyzos","author":"Xylomenos George","year":"2014","unstructured":"George Xylomenos , Christopher N. Ververidis , Vasilios A. Siris , Nikos Fotiou , Christos Tsilopoulos , Xenofon Vasilakos , Konstantinos V. Katsaros , and George C . Polyzos . 2014 . A Survey of Information-Centric Networking Research. IEEE Communications Surveys and Tutorials 16, 2 (2014), 1024&ndash;1049. George Xylomenos, Christopher N. Ververidis, Vasilios A. Siris, Nikos Fotiou, Christos Tsilopoulos, Xenofon Vasilakos, Konstantinos V. Katsaros, and George C. Polyzos. 2014. A Survey of Information-Centric Networking Research. IEEE Communications Surveys and Tutorials 16, 2 (2014), 1024&ndash;1049."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_52_1","DOI":"10.1145\/3125719.3125724"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_53_1","DOI":"10.1145\/2656877.2656887"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_55_1","DOI":"10.1109\/ICNP.2013.6733578"},{"unstructured":"ZigBee Alliance. 2015. ZigBee Specification. Specification Document 05-3474-21. ZigBee Alliance. https:\/\/zigbeealliance.org\/wp-content\/uploads\/2019\/11\/docs-05-3474-21-0csg-zigbee-specification.pdf  ZigBee Alliance. 2015. ZigBee Specification . Specification Document 05-3474-21. ZigBee Alliance. https:\/\/zigbeealliance.org\/wp-content\/uploads\/2019\/11\/docs-05-3474-21-0csg-zigbee-specification.pdf","key":"e_1_3_2_1_56_1"}],"event":{"sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"acronym":"ICN '21","name":"ICN '21: 8th ACM Conference on Information-Centric Networking","location":"Paris France"},"container-title":["Proceedings of the 8th ACM Conference on Information-Centric Networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460417.3482974","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460417.3482974","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:37Z","timestamp":1750195477000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460417.3482974"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,22]]},"references-count":54,"alternative-id":["10.1145\/3460417.3482974","10.1145\/3460417"],"URL":"https:\/\/doi.org\/10.1145\/3460417.3482974","relation":{},"subject":[],"published":{"date-parts":[[2021,9,22]]},"assertion":[{"value":"2021-09-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}