{"id":"https://openalex.org/W2974622192","doi":"https://doi.org/10.1109/jiot.2019.2942085","title":"Exploiting the Remote Server Access Support of CoAP Protocol","display_name":"Exploiting the Remote Server Access Support of CoAP Protocol","publication_year":2019,"publication_date":"2019-09-18","ids":{"openalex":"https://openalex.org/W2974622192","doi":"https://doi.org/10.1109/jiot.2019.2942085","mag":"2974622192"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2019.2942085","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2019.2942085","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://opus.lib.uts.edu.au/bitstream/10453/136040/6/Binder1.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5112619440","display_name":"Annie Gilda Roselin","orcid":null},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]},{"id":"https://openalex.org/I1292875679","display_name":"Commonwealth Scientific and Industrial Research Organisation","ror":"https://ror.org/03qn8fb07","country_code":"AU","type":"government","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I4387156119"]},{"id":"https://openalex.org/I42894916","display_name":"Data61","ror":"https://ror.org/03q397159","country_code":"AU","type":"other","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I42894916","https://openalex.org/I4387156119"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Annie Gilda Roselin","raw_affiliation_strings":["Data61, Commonwealth Scientific and Industrial Research Organisation, Marsfield, Australia","Department of Electrical and Data Engineering, University of Technology Sydney, Ultimo, Australia"],"affiliations":[{"raw_affiliation_string":"Data61, Commonwealth Scientific and Industrial Research Organisation, Marsfield, Australia","institution_ids":["https://openalex.org/I1292875679","https://openalex.org/I42894916"]},{"raw_affiliation_string":"Department of Electrical and Data Engineering, University of Technology Sydney, Ultimo, Australia","institution_ids":["https://openalex.org/I114017466"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045431254","display_name":"Priyadarsi Nanda","orcid":"https://orcid.org/0000-0002-5748-155X"},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Priyadarsi Nanda","raw_affiliation_strings":["Department of Electrical and Data Engineering, University of Technology Sydney, Ultimo, Australia"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Data Engineering, University of Technology Sydney, Ultimo, Australia","institution_ids":["https://openalex.org/I114017466"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082256444","display_name":"\u202aSurya Nepal\u202c","orcid":"https://orcid.org/0000-0002-3289-6599"},"institutions":[{"id":"https://openalex.org/I1292875679","display_name":"Commonwealth Scientific and Industrial Research Organisation","ror":"https://ror.org/03qn8fb07","country_code":"AU","type":"government","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I4387156119"]},{"id":"https://openalex.org/I42894916","display_name":"Data61","ror":"https://ror.org/03q397159","country_code":"AU","type":"other","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I42894916","https://openalex.org/I4387156119"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Surya Nepal","raw_affiliation_strings":["Data61, Commonwealth Scientific and Industrial Research Organisation, Marsfield, Australia"],"affiliations":[{"raw_affiliation_string":"Data61, Commonwealth Scientific and Industrial Research Organisation, Marsfield, Australia","institution_ids":["https://openalex.org/I1292875679","https://openalex.org/I42894916"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006921134","display_name":"Xiangjian He","orcid":"https://orcid.org/0000-0001-8962-540X"},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Xiangjian He","raw_affiliation_strings":["Department of Electrical and Data Engineering, University of Technology Sydney, Ultimo, Australia"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Data Engineering, University of Technology Sydney, Ultimo, Australia","institution_ids":["https://openalex.org/I114017466"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5049750745","display_name":"Jarod Wright","orcid":null},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jarod Wright","raw_affiliation_strings":["University of Wollongong, Wollongong, Australia"],"affiliations":[{"raw_affiliation_string":"University of Wollongong, Wollongong, Australia","institution_ids":["https://openalex.org/I204824540"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5112619440"],"corresponding_institution_ids":["https://openalex.org/I114017466","https://openalex.org/I1292875679","https://openalex.org/I42894916"],"apc_list":null,"apc_paid":null,"fwci":1.8566,"has_fulltext":true,"cited_by_count":14,"citation_normalized_percentile":{"value":0.87142752,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"6","issue":"6","first_page":"9338","last_page":"9349"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8601362109184265},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.769942045211792},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.6930750608444214},{"id":"https://openalex.org/keywords/arp-spoofing","display_name":"ARP spoofing","score":0.6562212109565735},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.610292911529541},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5241672992706299},{"id":"https://openalex.org/keywords/6lowpan","display_name":"6LoWPAN","score":0.48542627692222595},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.4832044839859009},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.47423216700553894},{"id":"https://openalex.org/keywords/address-resolution-protocol","display_name":"Address Resolution Protocol","score":0.4624367654323578},{"id":"https://openalex.org/keywords/network-address-translation","display_name":"Network address translation","score":0.2657660245895386},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.20375409722328186},{"id":"https://openalex.org/keywords/internet-protocol","display_name":"Internet Protocol","score":0.1934419870376587},{"id":"https://openalex.org/keywords/ipv6","display_name":"IPv6","score":0.17919322848320007},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.16503512859344482}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8601362109184265},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.769942045211792},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.6930750608444214},{"id":"https://openalex.org/C86255107","wikidata":"https://www.wikidata.org/wiki/Q296847","display_name":"ARP spoofing","level":5,"score":0.6562212109565735},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.610292911529541},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5241672992706299},{"id":"https://openalex.org/C99400001","wikidata":"https://www.wikidata.org/wiki/Q109775","display_name":"6LoWPAN","level":4,"score":0.48542627692222595},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.4832044839859009},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.47423216700553894},{"id":"https://openalex.org/C153339134","wikidata":"https://www.wikidata.org/wiki/Q15171","display_name":"Address Resolution Protocol","level":4,"score":0.4624367654323578},{"id":"https://openalex.org/C147873670","wikidata":"https://www.wikidata.org/wiki/Q11182","display_name":"Network address translation","level":4,"score":0.2657660245895386},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.20375409722328186},{"id":"https://openalex.org/C35341882","wikidata":"https://www.wikidata.org/wiki/Q8795","display_name":"Internet Protocol","level":3,"score":0.1934419870376587},{"id":"https://openalex.org/C84555802","wikidata":"https://www.wikidata.org/wiki/Q2551624","display_name":"IPv6","level":3,"score":0.17919322848320007},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.16503512859344482}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/jiot.2019.2942085","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2019.2942085","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},{"id":"pmh:oai:opus.lib.uts.edu.au:10453/136040","is_oa":true,"landing_page_url":"http://hdl.handle.net/10453/136040","pdf_url":"https://opus.lib.uts.edu.au/bitstream/10453/136040/6/Binder1.pdf","source":{"id":"https://openalex.org/S4306401357","display_name":"UTS ePRESS (University of Technology Sydney)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I114017466","host_organization_name":"University of Technology Sydney","host_organization_lineage":["https://openalex.org/I114017466"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Journal Article"},{"id":"pmh:oai:ro.uow.edu.au:eispapers1-4618","is_oa":false,"landing_page_url":"https://ro.uow.edu.au/eispapers1/3594","pdf_url":null,"source":{"id":"https://openalex.org/S4306400510","display_name":"Research Online (University of Wollongong)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I204824540","host_organization_name":"University of Wollongong","host_organization_lineage":["https://openalex.org/I204824540"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Faculty of Engineering and Information Sciences - Papers: Part B","raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:opus.lib.uts.edu.au:10453/136040","is_oa":true,"landing_page_url":"http://hdl.handle.net/10453/136040","pdf_url":"https://opus.lib.uts.edu.au/bitstream/10453/136040/6/Binder1.pdf","source":{"id":"https://openalex.org/S4306401357","display_name":"UTS ePRESS (University of Technology Sydney)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I114017466","host_organization_name":"University of Technology Sydney","host_organization_lineage":["https://openalex.org/I114017466"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Journal Article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.5400000214576721,"id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G5379229330","display_name":null,"funder_award_id":"1032350","funder_id":"https://openalex.org/F4320320386","funder_display_name":"Commonwealth Scientific and Industrial Research Organisation"}],"funders":[{"id":"https://openalex.org/F4320320386","display_name":"Commonwealth Scientific and Industrial Research Organisation","ror":"https://ror.org/03qn8fb07"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2974622192.pdf","grobid_xml":"https://content.openalex.org/works/W2974622192.grobid-xml"},"referenced_works_count":56,"referenced_works":["https://openalex.org/W1481292844","https://openalex.org/W1504694836","https://openalex.org/W1570448133","https://openalex.org/W1590544288","https://openalex.org/W1591370845","https://openalex.org/W1679846099","https://openalex.org/W1963971487","https://openalex.org/W1968729698","https://openalex.org/W1972012147","https://openalex.org/W1988941656","https://openalex.org/W1997212977","https://openalex.org/W2026245849","https://openalex.org/W2029601165","https://openalex.org/W2031926216","https://openalex.org/W2041188073","https://openalex.org/W2070670160","https://openalex.org/W2081464537","https://openalex.org/W2096904182","https://openalex.org/W2105103777","https://openalex.org/W2106243315","https://openalex.org/W2125055259","https://openalex.org/W2134295053","https://openalex.org/W2161251616","https://openalex.org/W2234639732","https://openalex.org/W2246340276","https://openalex.org/W2254700249","https://openalex.org/W2255369088","https://openalex.org/W2263365646","https://openalex.org/W2285158837","https://openalex.org/W2292529361","https://openalex.org/W2327320248","https://openalex.org/W2478216767","https://openalex.org/W2487770199","https://openalex.org/W2493306725","https://openalex.org/W2508433864","https://openalex.org/W2509214171","https://openalex.org/W2509397601","https://openalex.org/W2515817174","https://openalex.org/W2582312183","https://openalex.org/W2621148797","https://openalex.org/W2686848947","https://openalex.org/W2733157779","https://openalex.org/W2754621962","https://openalex.org/W2754804809","https://openalex.org/W2800509541","https://openalex.org/W2889301827","https://openalex.org/W2911964244","https://openalex.org/W6635475863","https://openalex.org/W6676169051","https://openalex.org/W6691594928","https://openalex.org/W6696021567","https://openalex.org/W6697129633","https://openalex.org/W6721429836","https://openalex.org/W6725051432","https://openalex.org/W6744392808","https://openalex.org/W6754321760"],"related_works":["https://openalex.org/W2385617053","https://openalex.org/W2368739197","https://openalex.org/W2351377832","https://openalex.org/W2013203675","https://openalex.org/W2010913363","https://openalex.org/W2904172073","https://openalex.org/W2767137164","https://openalex.org/W4220855953","https://openalex.org/W4407042978","https://openalex.org/W2361101593"],"abstract_inverted_index":{"The":[0,20,75,136],"constrained":[1,15,85],"application":[2],"protocol":[3,11],"(CoAP)":[4],"is":[5,56,78,129,217],"a":[6,37,68,71,80,84,90,139,157,198],"specially":[7],"designed":[8],"Web":[9],"transfer":[10],"for":[12,70],"use":[13],"with":[14,44],"nodes":[16],"and":[17,63,87,121,163,229,240],"low-power":[18],"networks.":[19],"widely":[21],"available":[22],"CoAP":[23,31,34,46,128,225,234],"implementations":[24,54],"have":[25],"failed":[26],"to":[27,58,130,143,169,173,203,221,235,249],"validate":[28],"the":[29,45,60,64,94,98,115,122,145,148,164,174,181,184,188,208,218,223],"remote":[30,123,224],"clients.":[32],"Each":[33],"client":[35],"generates":[36],"random":[38],"source":[39],"port":[40],"number":[41],"when":[42],"communicating":[43],"server.":[47],"However,":[48,97],"we":[49,113,179,213],"observe":[50],"that":[51,215],"in":[52,108,161],"such":[53,102,205,251],"it":[55],"difficult":[57],"distinguish":[59],"regular":[61],"packet":[62],"malicious":[65],"packet,":[66],"opening":[67],"door":[69,151,193],"potential":[72],"off-path":[73,76,134,238],"attack.":[74,135],"attack":[77,82,104,185,239],"considered":[79],"weak":[81],"on":[83,187],"network":[86,190],"has":[88],"received":[89],"less":[91],"attention":[92],"from":[93,101],"research":[95],"community.":[96],"consequences":[99],"resulting":[100],"an":[103,133,237,243],"cannot":[105],"be":[106,131,247],"ignored":[107],"practice.":[109],"In":[110],"this":[111,167,216],"article,":[112],"exploit":[114],"combination":[116],"of":[117,127,147,183,210,233],"IP":[118],"spoofing":[119,159,231],"vulnerability":[120,160,168,232],"server":[124,226],"access":[125,172,227],"support":[126,228],"launch":[132,236],"attacker":[137,165],"injects":[138],"fake":[140],"request":[141,158,230],"message":[142],"change":[144],"credentials":[146],"6LoWPAN":[149],"smart":[150,192],"keypad":[152,194],"lock":[153],"system.":[154,175],"This":[155],"creates":[156],"CoAP,":[162],"exploits":[166],"gain":[170],"full":[171],"Through":[176],"our":[177,211],"implementation,":[178],"demonstrated":[180],"feasibility":[182],"scenario":[186],"6LoWPAN-CoAP":[189],"using":[191],"lock.":[195],"We":[196],"proposed":[197],"machine":[199],"learning":[200],"(ML)-based":[201],"approach":[202,245],"mitigate":[204],"attacks.":[206,252],"To":[207],"best":[209],"knowledge,":[212],"believe":[214],"first":[219],"article":[220],"analyze":[222],"demonstrate":[241],"how":[242],"ML-based":[244],"can":[246],"deployed":[248],"prevent":[250]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
