{"id":"https://openalex.org/W2006943941","doi":"https://doi.org/10.1109/dcoss.2011.5982177","title":"Securing communication in 6LoWPAN with compressed IPsec","display_name":"Securing communication in 6LoWPAN with compressed IPsec","publication_year":2011,"publication_date":"2011-06-01","ids":{"openalex":"https://openalex.org/W2006943941","doi":"https://doi.org/10.1109/dcoss.2011.5982177","mag":"2006943941"},"language":"en","primary_location":{"id":"doi:10.1109/dcoss.2011.5982177","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dcoss.2011.5982177","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://eprints.lancs.ac.uk/id/eprint/49456/1/raza11securing.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5001344842","display_name":"Shahid Raza","orcid":"https://orcid.org/0000-0001-8192-0893"},"institutions":[{"id":"https://openalex.org/I2800780207","display_name":"Swedish Institute","ror":"https://ror.org/022w3f533","country_code":"SE","type":"government","lineage":["https://openalex.org/I2800780207"]}],"countries":["SE"],"is_corresponding":true,"raw_author_name":"Shahid Raza","raw_affiliation_strings":["Swedish Institute of Computer Science, Kista, Sweden","[Swedish Inst. of Comput. Sci., Kista, Sweden]"],"affiliations":[{"raw_affiliation_string":"Swedish Institute of Computer Science, Kista, Sweden","institution_ids":["https://openalex.org/I2800780207"]},{"raw_affiliation_string":"[Swedish Inst. of Comput. Sci., Kista, Sweden]","institution_ids":["https://openalex.org/I2800780207"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027188782","display_name":"Simon Duquennoy","orcid":"https://orcid.org/0000-0003-1051-7292"},"institutions":[{"id":"https://openalex.org/I2800780207","display_name":"Swedish Institute","ror":"https://ror.org/022w3f533","country_code":"SE","type":"government","lineage":["https://openalex.org/I2800780207"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Simon Duquennoy","raw_affiliation_strings":["Swedish Institute of Computer Science, Kista, Sweden","[Swedish Inst. of Comput. Sci., Kista, Sweden]"],"affiliations":[{"raw_affiliation_string":"Swedish Institute of Computer Science, Kista, Sweden","institution_ids":["https://openalex.org/I2800780207"]},{"raw_affiliation_string":"[Swedish Inst. of Comput. Sci., Kista, Sweden]","institution_ids":["https://openalex.org/I2800780207"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109045298","display_name":"Tony Chung","orcid":null},"institutions":[{"id":"https://openalex.org/I67415387","display_name":"Lancaster University","ror":"https://ror.org/04f2nsd36","country_code":"GB","type":"education","lineage":["https://openalex.org/I67415387"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Tony Chung","raw_affiliation_strings":["Lancaster University School of Computing and Communications, Lancaster, UK","Lancaster University School of Computing and Communications Lancaster UK"],"affiliations":[{"raw_affiliation_string":"Lancaster University School of Computing and Communications, Lancaster, UK","institution_ids":["https://openalex.org/I67415387"]},{"raw_affiliation_string":"Lancaster University School of Computing and Communications Lancaster UK","institution_ids":["https://openalex.org/I67415387"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084928681","display_name":"Dogan Yazar","orcid":null},"institutions":[{"id":"https://openalex.org/I2800780207","display_name":"Swedish Institute","ror":"https://ror.org/022w3f533","country_code":"SE","type":"government","lineage":["https://openalex.org/I2800780207"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Dogan Yazar","raw_affiliation_strings":["Swedish Institute of Computer Science, Kista, Sweden","[Swedish Inst. of Comput. Sci., Kista, Sweden]"],"affiliations":[{"raw_affiliation_string":"Swedish Institute of Computer Science, Kista, Sweden","institution_ids":["https://openalex.org/I2800780207"]},{"raw_affiliation_string":"[Swedish Inst. of Comput. Sci., Kista, Sweden]","institution_ids":["https://openalex.org/I2800780207"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071943253","display_name":"Thiemo Voigt","orcid":"https://orcid.org/0000-0002-2586-8573"},"institutions":[{"id":"https://openalex.org/I2800780207","display_name":"Swedish Institute","ror":"https://ror.org/022w3f533","country_code":"SE","type":"government","lineage":["https://openalex.org/I2800780207"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Thiemo Voigt","raw_affiliation_strings":["Swedish Institute of Computer Science, Kista, Sweden","[Swedish Inst. of Comput. Sci., Kista, Sweden]"],"affiliations":[{"raw_affiliation_string":"Swedish Institute of Computer Science, Kista, Sweden","institution_ids":["https://openalex.org/I2800780207"]},{"raw_affiliation_string":"[Swedish Inst. of Comput. Sci., Kista, Sweden]","institution_ids":["https://openalex.org/I2800780207"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5036442254","display_name":"Utz Roedig","orcid":"https://orcid.org/0000-0002-4020-0889"},"institutions":[{"id":"https://openalex.org/I67415387","display_name":"Lancaster University","ror":"https://ror.org/04f2nsd36","country_code":"GB","type":"education","lineage":["https://openalex.org/I67415387"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Utz Roedig","raw_affiliation_strings":["Lancaster University School of Computing and Communications, Lancaster, UK","Lancaster University School of Computing and Communications Lancaster UK"],"affiliations":[{"raw_affiliation_string":"Lancaster University School of Computing and Communications, Lancaster, UK","institution_ids":["https://openalex.org/I67415387"]},{"raw_affiliation_string":"Lancaster University School of Computing and Communications Lancaster UK","institution_ids":["https://openalex.org/I67415387"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5001344842"],"corresponding_institution_ids":["https://openalex.org/I2800780207"],"apc_list":null,"apc_paid":null,"fwci":20.4043,"has_fulltext":true,"cited_by_count":222,"citation_normalized_percentile":{"value":0.99551901,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":100},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11932","display_name":"Wireless Body Area Networks","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ipsec","display_name":"IPsec","score":0.9060617685317993},{"id":"https://openalex.org/keywords/6lowpan","display_name":"6LoWPAN","score":0.8731602430343628},{"id":"https://openalex.org/keywords/ipv6","display_name":"IPv6","score":0.7756210565567017},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7412493228912354},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7405626177787781},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.5587871670722961},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.520398736000061},{"id":"https://openalex.org/keywords/secure-communication","display_name":"Secure communication","score":0.5174549221992493},{"id":"https://openalex.org/keywords/internetworking","display_name":"Internetworking","score":0.440633088350296},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.43141481280326843},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3223051428794861},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.3027060627937317},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1537826955318451}],"concepts":[{"id":"https://openalex.org/C67396069","wikidata":"https://www.wikidata.org/wiki/Q210214","display_name":"IPsec","level":3,"score":0.9060617685317993},{"id":"https://openalex.org/C99400001","wikidata":"https://www.wikidata.org/wiki/Q109775","display_name":"6LoWPAN","level":4,"score":0.8731602430343628},{"id":"https://openalex.org/C84555802","wikidata":"https://www.wikidata.org/wiki/Q2551624","display_name":"IPv6","level":3,"score":0.7756210565567017},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7412493228912354},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7405626177787781},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.5587871670722961},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.520398736000061},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.5174549221992493},{"id":"https://openalex.org/C2780405328","wikidata":"https://www.wikidata.org/wiki/Q1067099","display_name":"Internetworking","level":3,"score":0.440633088350296},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.43141481280326843},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3223051428794861},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3027060627937317},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1537826955318451}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1109/dcoss.2011.5982177","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dcoss.2011.5982177","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS)","raw_type":"proceedings-article"},{"id":"pmh:oai:eprints.lancs.ac.uk:49456","is_oa":true,"landing_page_url":null,"pdf_url":"https://eprints.lancs.ac.uk/id/eprint/49456/1/raza11securing.pdf","source":{"id":"https://openalex.org/S4306401916","display_name":"Lancaster EPrints (Lancaster University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67415387","host_organization_name":"Lancaster University","host_organization_lineage":["https://openalex.org/I67415387"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"},{"id":"pmh:oai:DiVA.org:mdh-12285","is_oa":true,"landing_page_url":"http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-12285","pdf_url":null,"source":{"id":"https://openalex.org/S4306402234","display_name":"DiVA (M\u00e4lardalen University College)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I82509713","host_organization_name":"M\u00e4lardalen University","host_organization_lineage":["https://openalex.org/I82509713"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"pmh:oai:DiVA.org:ri-23872","is_oa":true,"landing_page_url":"http://urn.kb.se/resolve?urn=urn:nbn:se:ri:diva-23872","pdf_url":null,"source":{"id":"https://openalex.org/S4306401559","display_name":"KTH Publication Database DiVA (KTH Royal Institute of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:eprints.lancs.ac.uk:49456","is_oa":true,"landing_page_url":null,"pdf_url":"https://eprints.lancs.ac.uk/id/eprint/49456/1/raza11securing.pdf","source":{"id":"https://openalex.org/S4306401916","display_name":"Lancaster EPrints (Lancaster University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67415387","host_organization_name":"Lancaster University","host_organization_lineage":["https://openalex.org/I67415387"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2006943941.pdf","grobid_xml":"https://content.openalex.org/works/W2006943941.grobid-xml"},"referenced_works_count":37,"referenced_works":["https://openalex.org/W119353802","https://openalex.org/W174668443","https://openalex.org/W183369512","https://openalex.org/W1511530643","https://openalex.org/W1601461406","https://openalex.org/W1923289336","https://openalex.org/W2002054891","https://openalex.org/W2011057665","https://openalex.org/W2055562493","https://openalex.org/W2113728917","https://openalex.org/W2117520883","https://openalex.org/W2125555950","https://openalex.org/W2134585683","https://openalex.org/W2139928097","https://openalex.org/W2140471436","https://openalex.org/W2148053701","https://openalex.org/W2170780561","https://openalex.org/W2232887944","https://openalex.org/W2254691854","https://openalex.org/W2265581977","https://openalex.org/W2270780164","https://openalex.org/W2469388144","https://openalex.org/W2505630732","https://openalex.org/W2737058386","https://openalex.org/W3215152605","https://openalex.org/W4230622395","https://openalex.org/W4232271737","https://openalex.org/W4245685877","https://openalex.org/W4300591638","https://openalex.org/W6607154373","https://openalex.org/W6607389942","https://openalex.org/W6670984045","https://openalex.org/W6684742708","https://openalex.org/W6692002590","https://openalex.org/W6693275594","https://openalex.org/W6694118467","https://openalex.org/W6814336774"],"related_works":["https://openalex.org/W4254092637","https://openalex.org/W2091917851","https://openalex.org/W2066947438","https://openalex.org/W2914063152","https://openalex.org/W3038603970","https://openalex.org/W4225146420","https://openalex.org/W2096279182","https://openalex.org/W2941353246","https://openalex.org/W3099995967","https://openalex.org/W2127305011"],"abstract_inverted_index":{"Real-world":[0],"deployments":[1],"of":[2,150,180],"wireless":[3],"sensor":[4,21,35,134],"networks":[5,44,135],"(WSNs)":[6],"require":[7],"secure":[8,61,129],"communication.":[9],"It":[10,28,80],"is":[11,16,66,78,81,111,120,141],"important":[12],"that":[13,20,72],"a":[14,117],"receiver":[15],"able":[17,172],"to":[18,33,60,68,83,96,99,173],"verify":[19],"data":[22,36,62],"was":[23],"generated":[24],"by":[25],"trusted":[26],"nodes.":[27],"may":[29],"also":[30],"be":[31,97],"necessary":[32],"encrypt":[34,175],"in":[37],"transit.":[38],"Recently,":[39],"WSNs":[40],"and":[41,51,113,136,148,163,176,184],"traditional":[42,138],"IP":[43,132],"are":[45,171],"more":[46],"tightly":[47],"integrated":[48],"using":[49,106,182],"IPv6":[50,54,76,186],"6LoWPAN.":[52],"Available":[53],"protocol":[55],"stacks":[56],"can":[57],"use":[58,84],"IPsec":[59,73,85],"exchange.":[63],"Thus,":[64,168],"it":[65],"desirable":[67],"extend":[69],"6LoWPAN":[70,151],"such":[71],"communication":[74,130,169],"with":[75,102],"nodes":[77],"possible.":[79],"beneficial":[82],"because":[86],"the":[87,91,103,114,137,142,178],"existing":[88],"end-points":[89],"on":[90],"Internet":[92],"do":[93],"not":[94],"need":[95,115],"modified":[98],"communicate":[100],"securely":[101],"WSN.":[104],"Moreover,":[105],"IPsec,":[107],"true":[108],"end-to-end":[109],"security":[110],"implemented":[112],"for":[116,153],"trustworthy":[118],"gateway":[119],"removed.":[121],"In":[122],"this":[123],"paper":[124],"we":[125],"provide":[126],"End-to-End":[127],"(E2E)":[128],"between":[131],"enabled":[133],"Internet.":[139],"This":[140],"first":[143],"compressed":[144],"lightweight":[145],"design,":[146],"implementation,":[147],"evaluation":[149],"extension":[152,156],"IPsec.":[154],"Our":[155],"supports":[157],"both":[158],"IPsec's":[159],"Authentication":[160],"Header":[161],"(AH)":[162],"Encapsulation":[164],"Security":[165],"Payload":[166],"(ESP).":[167],"endpoints":[170],"authenticate,":[174],"check":[177],"integrity":[179],"messages":[181],"standardized":[183],"established":[185],"mechanisms.":[187]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":10},{"year":2021,"cited_by_count":7},{"year":2020,"cited_by_count":22},{"year":2019,"cited_by_count":11},{"year":2018,"cited_by_count":26},{"year":2017,"cited_by_count":43},{"year":2016,"cited_by_count":16},{"year":2015,"cited_by_count":22},{"year":2014,"cited_by_count":21},{"year":2013,"cited_by_count":22},{"year":2012,"cited_by_count":10}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
