{"id":"https://openalex.org/W2789958590","doi":"https://doi.org/10.1145/3131672.3136960","title":"Enabling En-Route Filtering for End-to-End Encrypted CoAP Messages","display_name":"Enabling En-Route Filtering for End-to-End Encrypted CoAP Messages","publication_year":2017,"publication_date":"2017-11-06","ids":{"openalex":"https://openalex.org/W2789958590","doi":"https://doi.org/10.1145/3131672.3136960","mag":"2789958590"},"language":"en","primary_location":{"id":"doi:10.1145/3131672.3136960","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3131672.3136960","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 15th ACM Conference on Embedded Network Sensor Systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5039187393","display_name":"Klara Seitz","orcid":null},"institutions":[{"id":"https://openalex.org/I176453806","display_name":"University of Potsdam","ror":"https://ror.org/03bnmw459","country_code":"DE","type":"education","lineage":["https://openalex.org/I176453806"]},{"id":"https://openalex.org/I143288331","display_name":"Hasso Plattner Institute","ror":"https://ror.org/058rn5r42","country_code":"DE","type":"facility","lineage":["https://openalex.org/I143288331","https://openalex.org/I176453806"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Klara Seitz","raw_affiliation_strings":["Hasso Plattner Institute, University of Potsdam, Potsdam, Germany"],"affiliations":[{"raw_affiliation_string":"Hasso Plattner Institute, University of Potsdam, Potsdam, Germany","institution_ids":["https://openalex.org/I143288331","https://openalex.org/I176453806"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004735343","display_name":"Sebastian Serth","orcid":"https://orcid.org/0000-0003-1236-6600"},"institutions":[{"id":"https://openalex.org/I176453806","display_name":"University of Potsdam","ror":"https://ror.org/03bnmw459","country_code":"DE","type":"education","lineage":["https://openalex.org/I176453806"]},{"id":"https://openalex.org/I143288331","display_name":"Hasso Plattner Institute","ror":"https://ror.org/058rn5r42","country_code":"DE","type":"facility","lineage":["https://openalex.org/I143288331","https://openalex.org/I176453806"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Sebastian Serth","raw_affiliation_strings":["Hasso Plattner Institute, University of Potsdam, Potsdam, Germany"],"affiliations":[{"raw_affiliation_string":"Hasso Plattner Institute, University of Potsdam, Potsdam, Germany","institution_ids":["https://openalex.org/I143288331","https://openalex.org/I176453806"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032464442","display_name":"Konrad-Felix Krentz","orcid":"https://orcid.org/0000-0002-3798-1733"},"institutions":[{"id":"https://openalex.org/I143288331","display_name":"Hasso Plattner Institute","ror":"https://ror.org/058rn5r42","country_code":"DE","type":"facility","lineage":["https://openalex.org/I143288331","https://openalex.org/I176453806"]},{"id":"https://openalex.org/I176453806","display_name":"University of Potsdam","ror":"https://ror.org/03bnmw459","country_code":"DE","type":"education","lineage":["https://openalex.org/I176453806"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Konrad-Felix Krentz","raw_affiliation_strings":["Hasso Plattner Institute, University of Potsdam, Potsdam, Germany"],"affiliations":[{"raw_affiliation_string":"Hasso Plattner Institute, University of Potsdam, Potsdam, Germany","institution_ids":["https://openalex.org/I143288331","https://openalex.org/I176453806"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102919398","display_name":"Christoph Meinel","orcid":"https://orcid.org/0000-0002-3410-3193"},"institutions":[{"id":"https://openalex.org/I143288331","display_name":"Hasso Plattner Institute","ror":"https://ror.org/058rn5r42","country_code":"DE","type":"facility","lineage":["https://openalex.org/I143288331","https://openalex.org/I176453806"]},{"id":"https://openalex.org/I176453806","display_name":"University of Potsdam","ror":"https://ror.org/03bnmw459","country_code":"DE","type":"education","lineage":["https://openalex.org/I176453806"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Christoph Meinel","raw_affiliation_strings":["Hasso Plattner Institute, University of Potsdam, Potsdam, Germany"],"affiliations":[{"raw_affiliation_string":"Hasso Plattner Institute, University of Potsdam, Potsdam, Germany","institution_ids":["https://openalex.org/I143288331","https://openalex.org/I176453806"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5039187393"],"corresponding_institution_ids":["https://openalex.org/I143288331","https://openalex.org/I176453806"],"apc_list":null,"apc_paid":null,"fwci":0.4144,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.68815878,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"2"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.8228333592414856},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.8116613030433655},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7966803312301636},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6542859673500061},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5809149146080017},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.5787197351455688},{"id":"https://openalex.org/keywords/path","display_name":"Path (computing)","score":0.5757885575294495},{"id":"https://openalex.org/keywords/end-to-end-principle","display_name":"End-to-end principle","score":0.4545856714248657},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4265441298484802},{"id":"https://openalex.org/keywords/bloom-filter","display_name":"Bloom filter","score":0.4250968396663666},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.40646204352378845},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09342679381370544}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.8228333592414856},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.8116613030433655},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7966803312301636},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6542859673500061},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5809149146080017},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.5787197351455688},{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.5757885575294495},{"id":"https://openalex.org/C74296488","wikidata":"https://www.wikidata.org/wiki/Q2527392","display_name":"End-to-end principle","level":2,"score":0.4545856714248657},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4265441298484802},{"id":"https://openalex.org/C147224247","wikidata":"https://www.wikidata.org/wiki/Q885373","display_name":"Bloom filter","level":2,"score":0.4250968396663666},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.40646204352378845},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09342679381370544}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3131672.3136960","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3131672.3136960","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 15th ACM Conference on Embedded Network Sensor Systems","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.46000000834465027,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":4,"referenced_works":["https://openalex.org/W1844226267","https://openalex.org/W2006943941","https://openalex.org/W2045069080","https://openalex.org/W2610149683"],"related_works":["https://openalex.org/W2086572746","https://openalex.org/W2604468458","https://openalex.org/W2157216338","https://openalex.org/W1662107788","https://openalex.org/W121740227","https://openalex.org/W2135966669","https://openalex.org/W2732769800","https://openalex.org/W3082379938","https://openalex.org/W2030773053","https://openalex.org/W2924589531"],"abstract_inverted_index":{"IoT":[0,38,43,121],"devices":[1,122],"usually":[2],"are":[3],"battery-powered":[4],"and":[5],"directly":[6],"connected":[7],"to":[8,15,48,65,85,97,111],"the":[9,46,99,112,124],"Internet.":[10],"This":[11,80],"makes":[12],"them":[13],"vulnerable":[14],"so-called":[16],"path-based":[17,127],"denial-of-service":[18,128],"(PDoS)":[19],"attacks.":[20],"For":[21],"example,":[22],"in":[23,123],"a":[24,90,106],"PDoS":[25],"attack":[26],"an":[27,37,83],"adversary":[28],"sends":[29],"multiple":[30],"Constrained":[31],"Application":[32],"Protocol":[33],"(CoAP)":[34],"messages":[35,76],"towards":[36],"device,":[39],"thereby":[40],"causing":[41],"each":[42],"device":[44],"along":[45],"path":[47],"expend":[49],"energy":[50],"for":[51],"forwarding":[52,109],"this":[53],"message.":[54],"Current":[55],"end-to-end":[56],"security":[57],"solutions,":[58],"such":[59,67],"as":[60],"DTLS":[61],"or":[62],"IPsec,":[63],"fail":[64],"prevent":[66],"attacks":[68,129],"since":[69],"they":[70],"only":[71],"filter":[72],"out":[73],"inauthentic":[74],"CoAP":[75],"at":[77],"their":[78],"destination.":[79],"demonstration":[81],"shows":[82],"approach":[84,116],"allow":[86],"en-route":[87],"filtering":[88],"where":[89],"trusted":[91],"gateway":[92],"has":[93],"all":[94],"necessary":[95],"information":[96],"check":[98],"integrity,":[100],"decrypt":[101],"and,":[102],"if":[103],"necessary,":[104],"drop":[105],"message":[107],"before":[108],"it":[110],"constrained":[113],"mote.":[114],"Our":[115],"preserves":[117],"precious":[118],"resources":[119],"of":[120,126],"face":[125],"by":[130],"remote":[131],"attackers.":[132]},"counts_by_year":[{"year":2023,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
