{"id":"https://openalex.org/W4414539634","doi":"https://doi.org/10.1109/icc52391.2025.11160831","title":"Analysis of Robust and Secure DNS Protocols for IoT Devices","display_name":"Analysis of Robust and Secure DNS Protocols for IoT Devices","publication_year":2025,"publication_date":"2025-06-08","ids":{"openalex":"https://openalex.org/W4414539634","doi":"https://doi.org/10.1109/icc52391.2025.11160831"},"language":"en","primary_location":{"id":"doi:10.1109/icc52391.2025.11160831","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc52391.2025.11160831","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2025 - IEEE International Conference on Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.1109/ICC52391.2025.11160831","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5077560490","display_name":"Abdullah Aydeger","orcid":"https://orcid.org/0000-0003-3333-1941"},"institutions":[{"id":"https://openalex.org/I106959904","display_name":"Florida Institute of Technology","ror":"https://ror.org/04atsbb87","country_code":"US","type":"education","lineage":["https://openalex.org/I106959904"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Abdullah Aydeger","raw_affiliation_strings":["Florida Institute of Technology,Melbourne,FL,USA,32901"],"affiliations":[{"raw_affiliation_string":"Florida Institute of Technology,Melbourne,FL,USA,32901","institution_ids":["https://openalex.org/I106959904"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044858527","display_name":"Sanzida Hoque","orcid":"https://orcid.org/0009-0007-4441-823X"},"institutions":[{"id":"https://openalex.org/I106959904","display_name":"Florida Institute of Technology","ror":"https://ror.org/04atsbb87","country_code":"US","type":"education","lineage":["https://openalex.org/I106959904"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sanzida Hoque","raw_affiliation_strings":["Florida Institute of Technology,Melbourne,FL,USA,32901"],"affiliations":[{"raw_affiliation_string":"Florida Institute of Technology,Melbourne,FL,USA,32901","institution_ids":["https://openalex.org/I106959904"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047991903","display_name":"Engin Zeydan","orcid":"https://orcid.org/0000-0003-3329-0588"},"institutions":[{"id":"https://openalex.org/I4210087295","display_name":"Centre Tecnologic de Telecomunicacions de Catalunya","ror":"https://ror.org/001cwea56","country_code":"ES","type":"nonprofit","lineage":["https://openalex.org/I4210087295","https://openalex.org/I4387153040"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Engin Zeydan","raw_affiliation_strings":["Centre Tecnol&#x00F2;gic de Telecomunicacions de Catalunya (CTTC),Barcelona,Spain,08860"],"affiliations":[{"raw_affiliation_string":"Centre Tecnol&#x00F2;gic de Telecomunicacions de Catalunya (CTTC),Barcelona,Spain,08860","institution_ids":["https://openalex.org/I4210087295"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5064768354","display_name":"Kapal Dev","orcid":"https://orcid.org/0000-0003-1262-8594"},"institutions":[{"id":"https://openalex.org/I4210100923","display_name":"Munster Technological University","ror":"https://ror.org/013xpqh61","country_code":"IE","type":"facility","lineage":["https://openalex.org/I4210100923"]}],"countries":["IE"],"is_corresponding":false,"raw_author_name":"Kapal Dev","raw_affiliation_strings":["Munster Technological University,Cork,Ireland"],"affiliations":[{"raw_affiliation_string":"Munster Technological University,Cork,Ireland","institution_ids":["https://openalex.org/I4210100923"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5077560490"],"corresponding_institution_ids":["https://openalex.org/I106959904"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.32501325,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"3156","last_page":"3161"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9865000247955322,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9865000247955322,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9861000180244446,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9848999977111816,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/domain-name-system","display_name":"Domain Name System","score":0.8098999857902527},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.47920000553131104},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4108000099658966},{"id":"https://openalex.org/keywords/security-association","display_name":"Security association","score":0.3944000005722046},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.3926999866962433},{"id":"https://openalex.org/keywords/transport-layer-security","display_name":"Transport Layer Security","score":0.3379000127315521},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.33660000562667847},{"id":"https://openalex.org/keywords/round-robin-dns","display_name":"Round-robin DNS","score":0.32739999890327454}],"concepts":[{"id":"https://openalex.org/C35026560","wikidata":"https://www.wikidata.org/wiki/Q8767","display_name":"Domain Name System","level":3,"score":0.8098999857902527},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7293000221252441},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6556000113487244},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5577999949455261},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.47920000553131104},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4108000099658966},{"id":"https://openalex.org/C130881749","wikidata":"https://www.wikidata.org/wiki/Q586894","display_name":"Security association","level":5,"score":0.3944000005722046},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3926999866962433},{"id":"https://openalex.org/C148176105","wikidata":"https://www.wikidata.org/wiki/Q206494","display_name":"Transport Layer Security","level":3,"score":0.3379000127315521},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.33660000562667847},{"id":"https://openalex.org/C102359118","wikidata":"https://www.wikidata.org/wiki/Q178163","display_name":"Round-robin DNS","level":4,"score":0.32739999890327454},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.32510000467300415},{"id":"https://openalex.org/C22111027","wikidata":"https://www.wikidata.org/wiki/Q1070427","display_name":"Internet security","level":4,"score":0.32010000944137573},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.3093000054359436},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.3009999990463257},{"id":"https://openalex.org/C2779173999","wikidata":"https://www.wikidata.org/wiki/Q680296","display_name":"Network administrator","level":2,"score":0.29649999737739563},{"id":"https://openalex.org/C178086212","wikidata":"https://www.wikidata.org/wiki/Q11155","display_name":"Border Gateway Protocol","level":5,"score":0.29159998893737793},{"id":"https://openalex.org/C190793597","wikidata":"https://www.wikidata.org/wiki/Q189768","display_name":"Application layer","level":3,"score":0.290800005197525},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.2838999927043915},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.28189998865127563},{"id":"https://openalex.org/C138236772","wikidata":"https://www.wikidata.org/wiki/Q25098575","display_name":"Edge device","level":3,"score":0.28040000796318054},{"id":"https://openalex.org/C80156102","wikidata":"https://www.wikidata.org/wiki/Q788036","display_name":"Resolver","level":3,"score":0.27970001101493835},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.2565000057220459}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/icc52391.2025.11160831","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc52391.2025.11160831","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2025 - IEEE International Conference on Communications","raw_type":"proceedings-article"},{"id":"pmh:oai:zenodo.org:18063035","is_oa":true,"landing_page_url":"https://doi.org/10.1109/ICC52391.2025.11160831","pdf_url":null,"source":{"id":"https://openalex.org/S4306400562","display_name":"Zenodo (CERN European Organization for Nuclear Research)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67311998","host_organization_name":"European Organization for Nuclear Research","host_organization_lineage":["https://openalex.org/I67311998"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"2025 IEEE International Conference on Communications, ICC 2025, Montreal, 8-12 June 2025","raw_type":"info:eu-repo/semantics/conferencePaper"}],"best_oa_location":{"id":"pmh:oai:zenodo.org:18063035","is_oa":true,"landing_page_url":"https://doi.org/10.1109/ICC52391.2025.11160831","pdf_url":null,"source":{"id":"https://openalex.org/S4306400562","display_name":"Zenodo (CERN European Organization for Nuclear Research)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67311998","host_organization_name":"European Organization for Nuclear Research","host_organization_lineage":["https://openalex.org/I67311998"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"2025 IEEE International Conference on Communications, ICC 2025, Montreal, 8-12 June 2025","raw_type":"info:eu-repo/semantics/conferencePaper"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"The":[0],"DNS":[1,18,88,94,153,168],"(Domain":[2,42],"Name":[3,43],"System)":[4],"protocol":[5,24,109],"has":[6],"been":[7,35],"in":[8,29],"use":[9],"since":[10],"the":[11,15,105,108,132,146,157],"early":[12,31],"days":[13],"of":[14,107],"Internet.":[16],"Although":[17],"as":[19,40,97],"a":[20,98],"de":[21],"facto":[22],"networking":[23],"had":[25],"no":[26],"security":[27,37,65,89,134],"considerations":[28],"its":[30],"years,":[32],"there":[33],"have":[34],"many":[36],"enhancements,":[38],"such":[39],"DNSSec":[41],"System":[44],"Security":[45],"Extensions),":[46],"DoT":[47],"(DNS":[48,54,59],"over":[49,55,60],"Transport":[50],"Layer":[51],"Security),":[52],"DoH":[53],"HTTPS)":[56],"and":[57,114,127,130,138,145,150,162],"DoQ":[58],"QUIC).":[61],"With":[62],"all":[63],"these":[64],"improvements,":[66],"it":[67],"is":[68],"not":[69],"yet":[70],"clear":[71],"what":[72],"resource-constrained":[73],"Internet-of-Things":[74],"(IoT)":[75],"devices":[76],"should":[77],"be":[78],"used":[79],"for":[80,125,169],"robustness.":[81],"In":[82],"this":[83],"paper,":[84],"we":[85],"investigate":[86],"different":[87,119,170],"approaches":[90],"using":[91],"an":[92,111],"edge":[93],"resolver":[95],"implemented":[96],"Virtual":[99],"Network":[100],"Function":[101],"(VNF)":[102],"to":[103],"replicate":[104],"impact":[106],"from":[110],"IoT":[112],"perspective":[113],"compare":[115],"their":[116,152],"performances":[117],"under":[118],"conditions.":[120],"We":[121],"present":[122],"our":[123],"results":[124,137],"cache-based":[126],"non-cached":[128],"responses":[129],"evaluate":[131],"corresponding":[133],"benefits.":[135],"Our":[136],"framework":[139],"can":[140],"greatly":[141],"help":[142],"consumers,":[143],"manufacturers,":[144],"research":[147],"community":[148],"decide":[149],"implement":[151],"protocols":[154],"depending":[155],"on":[156],"given":[158],"dynamic":[159],"network":[160],"conditions":[161],"enable":[163],"robust":[164],"Internet":[165],"access":[166],"via":[167],"devices.":[171]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-10T00:00:00"}
