{"id":"https://openalex.org/W2155100177","doi":"https://doi.org/10.1109/fgct.2013.6767217","title":"Security analysis of the constrained application protocol in the Internet of Things","display_name":"Security analysis of the constrained application protocol in the Internet of Things","publication_year":2013,"publication_date":"2013-11-01","ids":{"openalex":"https://openalex.org/W2155100177","doi":"https://doi.org/10.1109/fgct.2013.6767217","mag":"2155100177"},"language":"en","primary_location":{"id":"doi:10.1109/fgct.2013.6767217","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fgct.2013.6767217","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Second International Conference on Future Generation Communication Technologies (FGCT 2013)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5026758797","display_name":"Thamer A. Alghamdi","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Thamer A. Alghamdi","raw_affiliation_strings":["Middlesex University, London, London, GB"],"affiliations":[{"raw_affiliation_string":"Middlesex University, London, London, GB","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081189407","display_name":"Aboubaker Lasebae","orcid":"https://orcid.org/0000-0003-2312-9694"},"institutions":[{"id":"https://openalex.org/I60488453","display_name":"Middlesex University","ror":"https://ror.org/01rv4p989","country_code":"GB","type":"education","lineage":["https://openalex.org/I60488453"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Aboubaker Lasebae","raw_affiliation_strings":["Dept. of Computer & Communication Engineering, Middlesex University, London, UK"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer & Communication Engineering, Middlesex University, London, UK","institution_ids":["https://openalex.org/I60488453"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5084985541","display_name":"Mahdi Aiash","orcid":"https://orcid.org/0000-0002-3984-6244"},"institutions":[{"id":"https://openalex.org/I60488453","display_name":"Middlesex University","ror":"https://ror.org/01rv4p989","country_code":"GB","type":"education","lineage":["https://openalex.org/I60488453"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Mahdi Aiash","raw_affiliation_strings":["Dept. of Computer & Communication Engineering, Middlesex University, London, UK"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer & Communication Engineering, Middlesex University, London, UK","institution_ids":["https://openalex.org/I60488453"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5026758797"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":3.987,"has_fulltext":false,"cited_by_count":75,"citation_normalized_percentile":{"value":0.94462515,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"163","last_page":"168"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9923999905586243,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ipsec","display_name":"IPsec","score":0.8849302530288696},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8288290500640869},{"id":"https://openalex.org/keywords/protocol-stack","display_name":"Protocol stack","score":0.7640106678009033},{"id":"https://openalex.org/keywords/internet-layer","display_name":"Internet layer","score":0.7450510859489441},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6728042364120483},{"id":"https://openalex.org/keywords/wireless-transport-layer-security","display_name":"Wireless Transport Layer Security","score":0.5763649940490723},{"id":"https://openalex.org/keywords/application-layer","display_name":"Application layer","score":0.5288000702857971},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5239099264144897},{"id":"https://openalex.org/keywords/internet-security","display_name":"Internet security","score":0.5074805617332458},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5053175091743469},{"id":"https://openalex.org/keywords/internet-protocol-suite","display_name":"Internet protocol suite","score":0.4961105287075043},{"id":"https://openalex.org/keywords/security-association","display_name":"Security association","score":0.45064812898635864},{"id":"https://openalex.org/keywords/internet-protocol","display_name":"Internet Protocol","score":0.4480767250061035},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.42587757110595703},{"id":"https://openalex.org/keywords/communications-protocol","display_name":"Communications protocol","score":0.41015905141830444},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3727896809577942},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.36911094188690186},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.28673475980758667},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.25360405445098877},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.25320637226104736},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.20735952258110046},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.17422151565551758},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.14571064710617065},{"id":"https://openalex.org/keywords/network-access-control","display_name":"Network Access Control","score":0.1330970823764801},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.10134994983673096},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.09813904762268066},{"id":"https://openalex.org/keywords/wi-fi","display_name":"Wi-Fi","score":0.0947745144367218}],"concepts":[{"id":"https://openalex.org/C67396069","wikidata":"https://www.wikidata.org/wiki/Q210214","display_name":"IPsec","level":3,"score":0.8849302530288696},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8288290500640869},{"id":"https://openalex.org/C38601921","wikidata":"https://www.wikidata.org/wiki/Q1757693","display_name":"Protocol stack","level":3,"score":0.7640106678009033},{"id":"https://openalex.org/C146739243","wikidata":"https://www.wikidata.org/wiki/Q2910948","display_name":"Internet layer","level":4,"score":0.7450510859489441},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6728042364120483},{"id":"https://openalex.org/C173104861","wikidata":"https://www.wikidata.org/wiki/Q1476032","display_name":"Wireless Transport Layer Security","level":5,"score":0.5763649940490723},{"id":"https://openalex.org/C190793597","wikidata":"https://www.wikidata.org/wiki/Q189768","display_name":"Application layer","level":3,"score":0.5288000702857971},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5239099264144897},{"id":"https://openalex.org/C22111027","wikidata":"https://www.wikidata.org/wiki/Q1070427","display_name":"Internet security","level":4,"score":0.5074805617332458},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5053175091743469},{"id":"https://openalex.org/C65567647","wikidata":"https://www.wikidata.org/wiki/Q81414","display_name":"Internet protocol suite","level":3,"score":0.4961105287075043},{"id":"https://openalex.org/C130881749","wikidata":"https://www.wikidata.org/wiki/Q586894","display_name":"Security association","level":5,"score":0.45064812898635864},{"id":"https://openalex.org/C35341882","wikidata":"https://www.wikidata.org/wiki/Q8795","display_name":"Internet Protocol","level":3,"score":0.4480767250061035},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.42587757110595703},{"id":"https://openalex.org/C12269588","wikidata":"https://www.wikidata.org/wiki/Q132364","display_name":"Communications protocol","level":2,"score":0.41015905141830444},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3727896809577942},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.36911094188690186},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.28673475980758667},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.25360405445098877},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.25320637226104736},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.20735952258110046},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.17422151565551758},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.14571064710617065},{"id":"https://openalex.org/C14982408","wikidata":"https://www.wikidata.org/wiki/Q11006334","display_name":"Network Access Control","level":4,"score":0.1330970823764801},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.10134994983673096},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.09813904762268066},{"id":"https://openalex.org/C508800617","wikidata":"https://www.wikidata.org/wiki/Q29643","display_name":"Wi-Fi","level":4,"score":0.0947745144367218},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/fgct.2013.6767217","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fgct.2013.6767217","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Second International Conference on Future Generation Communication Technologies (FGCT 2013)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","display_name":"Partnerships for the goals","score":0.49000000953674316}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W40509694","https://openalex.org/W1505561515","https://openalex.org/W1963971487","https://openalex.org/W1984685140","https://openalex.org/W2105479013","https://openalex.org/W2170780561","https://openalex.org/W2197056051","https://openalex.org/W2202860973","https://openalex.org/W2234639732","https://openalex.org/W2954412673","https://openalex.org/W2968827223","https://openalex.org/W2986179470","https://openalex.org/W6601621358","https://openalex.org/W6689456376","https://openalex.org/W6765153018","https://openalex.org/W6766632104"],"related_works":["https://openalex.org/W1728437086","https://openalex.org/W2525022008","https://openalex.org/W2351878711","https://openalex.org/W2359362913","https://openalex.org/W2368720182","https://openalex.org/W1998737366","https://openalex.org/W2571955537","https://openalex.org/W2102887765","https://openalex.org/W2155100177","https://openalex.org/W94274036"],"abstract_inverted_index":{"The":[0,99,142],"concept":[1],"of":[2,4,9,55,115,124,139,152],"Internet":[3],"Things":[5],"involves":[6],"huge":[7],"number":[8],"constrained":[10,72,94],"devices":[11,95],"such":[12,27,36,59,125,140],"as":[13,37,60],"wireless":[14],"sensors":[15],"to":[16,107,120,134],"communicate":[17],"in":[18,96],"a":[19,33,126,156],"machine-to-machine":[20],"pattern.":[21],"Based":[22],"on":[23,43],"the":[24,38,44,61,75,84,97,109,116,122,130,136,145,153],"implementation":[25],"scenario,":[26],"communication":[28,111],"might":[29,67],"take":[30],"place":[31],"over":[32],"public":[34],"network":[35],"Internet,":[39],"which":[40],"is":[41],"based":[42],"TCP/IP":[45],"stack.":[46,118],"However,":[47,119],"different":[48,113],"research":[49],"working":[50],"groups":[51],"argue":[52],"that":[53],"some":[54],"these":[56],"stack":[57],"protocols":[58],"Hyper":[62],"Text":[63],"Transfer":[64],"Protocol":[65,87],"(HTTP)":[66],"not":[68],"be":[69],"suitable":[70],"for":[71,93,155],"devices.":[73],"Therefore,":[74],"IETF":[76],"Constrained":[77,85],"RESTful":[78],"Environments":[79],"(CoRE)":[80],"WG":[81,101],"has":[82],"proposed":[83,102],"Application":[86],"(CoAP);":[88],"an":[89],"application":[90],"layer":[91],"protocol":[92,117],"IoTs.":[98],"CoRE":[100],"using":[103],"IPSec":[104],"or":[105],"DTLS":[106],"secure":[108],"CoAP":[110],"at":[112],"levels":[114],"investigate":[121],"feasibility":[123],"proposal,":[127],"we":[128],"use":[129],"X.805":[131],"security":[132,137,147,159],"standard":[133],"analyze":[135],"aspects":[138],"implementation.":[141],"analysis":[143],"highlights":[144],"main":[146],"drawbacks":[148],"and":[149],"hence":[150],"argues":[151],"need":[154],"new":[157],"integrated":[158],"solution.":[160]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":12},{"year":2020,"cited_by_count":12},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":14},{"year":2017,"cited_by_count":10},{"year":2016,"cited_by_count":5},{"year":2015,"cited_by_count":4},{"year":2014,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
