{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T15:49:30Z","timestamp":1761061770566,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,1,4]],"date-time":"2023-01-04T00:00:00Z","timestamp":1672790400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"DST-SERB, Govt. of India","award":["SRG\/2019\/002042"],"award-info":[{"award-number":["SRG\/2019\/002042"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,1,4]]},"DOI":"10.1145\/3571306.3571407","type":"proceedings-article","created":{"date-parts":[[2023,1,3]],"date-time":"2023-01-03T16:17:12Z","timestamp":1672762632000},"page":"227-236","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["HessianAuth: An ECC-based Distributed and Efficient Authentication Mechanism for 6LoWPAN Networked IoT Devices"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9327-6545","authenticated-orcid":false,"given":"Debasmita","family":"Dey","sequence":"first","affiliation":[{"name":"Computer Science and Technology, Indian Institute of Engineering Science and Technology Shibpur, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3181-6937","authenticated-orcid":false,"given":"Saket","family":"Chandra","sequence":"additional","affiliation":[{"name":"Singapore University of Technology and Design, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4079-8259","authenticated-orcid":false,"given":"Nirnay","family":"Ghosh","sequence":"additional","affiliation":[{"name":"Computer Science and Technology, Indian Institute Engineering Science and Technology Shibpur, India"}]}],"member":"320","published-online":{"date-parts":[[2023,1,4]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Mishall Al-Zubaidie Zhongwei Zhang and Ji Zhang. 2019. Efficient and secure ECDSA algorithm and its applications: a survey. arXiv preprint arXiv:1902.10313(2019).  Mishall Al-Zubaidie Zhongwei Zhang and Ji Zhang. 2019. Efficient and secure ECDSA algorithm and its applications: a survey. arXiv preprint arXiv:1902.10313(2019)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"A. Armando D. Basin Y. Boichut Y. Chevalier L. Compagna J. Cuellar P.\u00a0Hankes Drielsma P.\u00a0C. He\u00e1m O. Kouchnarenko J. Mantovani S. M\u00f6dersheim D. von Oheimb M. Rusinowitch J. Santiago M. Turuani L. Vigan\u00f2 and L. Vigneron. 2005. The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications. In Computer Aided Verification Kousha Etessami and Sriram\u00a0K. Rajamani (Eds.). Springer Berlin Heidelberg Berlin Heidelberg 281\u2013285.  A. Armando D. Basin Y. Boichut Y. Chevalier L. Compagna J. Cuellar P.\u00a0Hankes Drielsma P.\u00a0C. He\u00e1m O. Kouchnarenko J. Mantovani S. M\u00f6dersheim D. von Oheimb M. Rusinowitch J. Santiago M. Turuani L. Vigan\u00f2 and L. Vigneron. 2005. The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications. In Computer Aided Verification Kousha Etessami and Sriram\u00a0K. Rajamani (Eds.). Springer Berlin Heidelberg Berlin Heidelberg 281\u2013285.","DOI":"10.1007\/11513988_27"},{"key":"e_1_3_2_1_3_1","volume-title":"International Journal of Emerging Trends & Technology in Computer Science 6 (04","author":"Badugu Sobhanbabu","year":"2017","unstructured":"Sobhanbabu Badugu . 2017. Role of COOJA Simulator in IoT . International Journal of Emerging Trends & Technology in Computer Science 6 (04 2017 ), 139. Sobhanbabu Badugu. 2017. Role of COOJA Simulator in IoT. International Journal of Emerging Trends & Technology in Computer Science 6 (04 2017), 139."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-50011-9_1"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Jorge\u00a0Bernal Bernabe Jose\u00a0L Hernandez-Ramos and Antonio F\u00a0Skarmeta Gomez. 2017. Holistic Privacy-Preserving Identity Management System for the Internet of Things.Mobile Information Systems(2017).  Jorge\u00a0Bernal Bernabe Jose\u00a0L Hernandez-Ramos and Antonio F\u00a0Skarmeta Gomez. 2017. Holistic Privacy-Preserving Identity Management System for the Internet of Things.Mobile Information Systems(2017).","DOI":"10.1155\/2017\/6384186"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-015-1705-6"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCAA.2015.7148500"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/LISAT.2016.7494140"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"D Eastlake\u00a03rd and Paul Jones. 2001. Rfc3174: Us secure hash algorithm 1 (sha1).  D Eastlake\u00a03rd and Paul Jones. 2001. Rfc3174: Us secure hash algorithm 1 (sha1).","DOI":"10.17487\/rfc3174"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSD.2006.40"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2015.2393436"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICUFN.2013.6614820"},{"key":"e_1_3_2_1_14_1","volume-title":"Elliptic curve cryptosystems. Mathematics of computation 48, 177","author":"Koblitz Neal","year":"1987","unstructured":"Neal Koblitz . 1987. Elliptic curve cryptosystems. Mathematics of computation 48, 177 ( 1987 ), 203\u2013209. Neal Koblitz. 1987. Elliptic curve cryptosystems. Mathematics of computation 48, 177 (1987), 203\u2013209."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.3390\/su13169463"},{"key":"e_1_3_2_1_16_1","volume-title":"The Internet of Things: Insights into the building blocks, component interactions, and architecture layers. Procedia computer science 132","author":"Kumar Nallapaneni\u00a0Manoj","year":"2018","unstructured":"Nallapaneni\u00a0Manoj Kumar and Pradeep\u00a0Kumar Mallick . 2018. The Internet of Things: Insights into the building blocks, component interactions, and architecture layers. Procedia computer science 132 ( 2018 ), 109\u2013117. Nallapaneni\u00a0Manoj Kumar and Pradeep\u00a0Kumar Mallick. 2018. The Internet of Things: Insights into the building blocks, component interactions, and architecture layers. Procedia computer science 132 (2018), 109\u2013117."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSCloud\/EdgeCom.2019.00022"},{"key":"e_1_3_2_1_18_1","volume-title":"IoT security, challenges, and solutions: a review. Progress in Advanced Computing and Intelligent Engineering","author":"Mohanty Jayashree","year":"2021","unstructured":"Jayashree Mohanty , Sushree Mishra , Sibani Patra , Bibudhendu Pati , and Chhabi\u00a0Rani Panigrahi . 2021. IoT security, challenges, and solutions: a review. Progress in Advanced Computing and Intelligent Engineering ( 2021 ), 493\u2013504. Jayashree Mohanty, Sushree Mishra, Sibani Patra, Bibudhendu Pati, and Chhabi\u00a0Rani Panigrahi. 2021. IoT security, challenges, and solutions: a review. Progress in Advanced Computing and Intelligent Engineering (2021), 493\u2013504."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-021-08657-z"},{"key":"e_1_3_2_1_20_1","unstructured":"Fahad\u00a0Bin Muhaya Qasem\u00a0Abu Al-Haija and Lo\u2019ai\u00a0A Tawalbeh. 2010. Applying hessian curves in parallel to improve elliptic curve scalar multiplication hardware. (2010).  Fahad\u00a0Bin Muhaya Qasem\u00a0Abu Al-Haija and Lo\u2019ai\u00a0A Tawalbeh. 2010. Applying hessian curves in parallel to improve elliptic curve scalar multiplication hardware. (2010)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1278972.1278992"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00247-3_11"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2016.2604681"},{"key":"e_1_3_2_1_24_1","unstructured":"Phillip Rogaway and David Wagner. 2003. A critique of CCM. Cryptology ePrint Archive(2003).  Phillip Rogaway and David Wagner. 2003. A critique of CCM. Cryptology ePrint Archive(2003)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC7252"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44709-1_11"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/B978-159749112-9"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.3390\/smartcities4020024"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2020.100264"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCTET.2014.6966347"},{"key":"e_1_3_2_1_31_1","volume-title":"Proceedings of APPSEM 2005 workshop. APPSEM\u201905","author":"Von\u00a0Oheimb David","year":"2005","unstructured":"David Von\u00a0Oheimb . 2005 . The high-level protocol specification language HLPSL developed in the EU project AVISPA . In Proceedings of APPSEM 2005 workshop. APPSEM\u201905 , Tallinn, Estonia, 1\u201317. David Von\u00a0Oheimb. 2005. The high-level protocol specification language HLPSL developed in the EU project AVISPA. In Proceedings of APPSEM 2005 workshop. APPSEM\u201905, Tallinn, Estonia, 1\u201317."}],"event":{"name":"ICDCN 2023: 24th International Conference on Distributed Computing and Networking","acronym":"ICDCN 2023","location":"Kharagpur India"},"container-title":["Proceedings of the 24th International Conference on Distributed Computing and Networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3571306.3571407","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3571306.3571407","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:07:53Z","timestamp":1750183673000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3571306.3571407"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,4]]},"references-count":30,"alternative-id":["10.1145\/3571306.3571407","10.1145\/3571306"],"URL":"https:\/\/doi.org\/10.1145\/3571306.3571407","relation":{},"subject":[],"published":{"date-parts":[[2023,1,4]]},"assertion":[{"value":"2023-01-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}