{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T01:11:45Z","timestamp":1726103505360},"publisher-location":"Singapore","reference-count":17,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811596087"},{"type":"electronic","value":"9789811596094"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-9609-4_2","type":"book-chapter","created":{"date-parts":[[2020,11,1]],"date-time":"2020-11-01T16:03:18Z","timestamp":1604246598000},"page":"13-22","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["EAP-Based Bootstrapping for Secondary Service Authentication to Integrate IoT into 5G Networks"],"prefix":"10.1007","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-0803-1672","authenticated-orcid":false,"given":"Dan","family":"Garcia-Carrillo","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0003-2673-3790","authenticated-orcid":false,"given":"Jesus","family":"Sanchez-Gomez","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-8521-1864","authenticated-orcid":false,"given":"Rafael","family":"Marin-Perez","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-5525-1259","authenticated-orcid":false,"given":"Antonio","family":"Skarmeta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,2]]},"reference":[{"key":"2_CR1","unstructured":"3GPP: Security architecture and procedures for 5G System. Technical Specification (TS) 33.501, 3rd Generation Partnership Project (3GPP) (2018). \nhttp:\/\/www.3gpp.org\/DynaReport\/33501.htm\n\n. version 15.5.0"},{"key":"2_CR2","unstructured":"3GPP: Procedures for the 5G System (5GS). Technical Specification (TS) 23.502, 3rd Generation Partnership Project (3GPP) (2019). \nhttp:\/\/www.3gpp.org\/DynaReport\/23502.htm\n\n. version 16.1.1"},{"key":"2_CR3","unstructured":"3GPP: System architecture for the 5G System (5GS). Technical Specification (TS) 23.501, 3rd Generation Partnership Project (3GPP) (2019). \nhttp:\/\/www.3gpp.org\/DynaReport\/23501.htm\n\n. version 16.1.0"},{"key":"2_CR4","doi-asserted-by":"publisher","unstructured":"Bormann, C., Ersue, M., Ker\u00e4nen, A.: Terminology for Constrained-Node Networks. RFC 7228, May 2014. \nhttps:\/\/doi.org\/10.17487\/RFC7228\n\n, \nhttps:\/\/rfc-editor.org\/rfc\/rfc7228.txt","DOI":"10.17487\/RFC7228"},{"key":"2_CR5","doi-asserted-by":"publisher","DOI":"10.1002\/9781119247111","volume-title":"5G for the Connected World","author":"D Chandramouli","year":"2019","unstructured":"Chandramouli, D., Liebhart, R., Pirskanen, J.: 5G for the Connected World. Wiley, Hoboken (2019)"},{"issue":"1","key":"2_CR6","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/MWC.2016.7422406","volume":"23","author":"M Condoluci","year":"2016","unstructured":"Condoluci, M., Dohler, M., Araniti, G., Molinaro, A., Sachs, J.: Enhanced radio access and data transmission procedures facilitating industry-compliant machine-type communications over LTE-based 5G networks. IEEE Wirel. Commun. 23(1), 56\u201363 (2016). \nhttps:\/\/doi.org\/10.1109\/MWC.2016.7422406","journal-title":"IEEE Wirel. Commun."},{"issue":"3","key":"2_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.22667\/JISIS.2018.08.31.001","volume":"8","author":"GP Fabio Arena","year":"2018","unstructured":"Fabio Arena, G.P., Collotta, M.: A survey on driverless vehicles: from their diffusion to security features. J. Internet Serv. Inf. Secur. (JISIS) 8(3), 1\u201319 (2018). \nhttps:\/\/doi.org\/10.22667\/JISIS.2018.08.31.001","journal-title":"J. Internet Serv. Inf. Secur. (JISIS)"},{"key":"2_CR8","doi-asserted-by":"publisher","unstructured":"Galinina, O., Andreev, S., Komarov, M., Maltseva, S.: Leveraging heterogeneous device connectivity in a converged 5G-IoT ecosystem. Comput. Netw. 128, 123\u2013132 (2017). \nhttps:\/\/doi.org\/10.1016\/j.comnet.2017.04.051\n\n, \nhttp:\/\/www.sciencedirect.com\/science\/article\/pii\/S1389128617301822\n\n. survivability Strategies for Emerging Wireless Networks","DOI":"10.1016\/j.comnet.2017.04.051"},{"key":"2_CR9","doi-asserted-by":"publisher","unstructured":"Garcia-Carrillo, D., Marin-Lopez, R., Kandasamy, A., Pelov, A.: A CoAP-based network access authentication service for low-power wide area networks: LO-CoAP-EAP. Sensors 17(11), 2646 (2017). \nhttps:\/\/doi.org\/10.3390\/s17112646\n\n, \nhttps:\/\/www.mdpi.com\/1424-8220\/17\/11\/2646","DOI":"10.3390\/s17112646"},{"issue":"4","key":"2_CR10","first-page":"41","volume":"9","author":"JK Gaurav Choudhary","year":"2018","unstructured":"Gaurav Choudhary, J.K., Sharma, V.: Security of 5G-mobile backhaul networks: a survey. J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. (JoWUA) 9(4), 41\u201370 (2018)","journal-title":"J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. (JoWUA)"},{"key":"2_CR11","unstructured":"Ho\u0161ek, J.: Enabling Technologies and User Perception Within Integrated 5G-IoT Ecosystem. Vysok\u00e9 u\u010den\u00ed technick\u00e9 v Brn\u011b, nakladatelstv\u00ed VUTIUM (2016)"},{"key":"2_CR12","doi-asserted-by":"publisher","unstructured":"Kapassa, E., Touloupou, M., Stavrianos, P., Kyriazis, D.: Dynamic 5G slices for IoT applications with diverse requirements. In: 2018 Fifth International Conference on Internet of Things: Systems, Management and Security, pp. 195\u2013199, October 2018. \nhttps:\/\/doi.org\/10.1109\/IoTSMS.2018.8554386","DOI":"10.1109\/IoTSMS.2018.8554386"},{"issue":"2","key":"2_CR13","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1109\/MCOM.2018.1700625","volume":"56","author":"J Navarro-Ortiz","year":"2018","unstructured":"Navarro-Ortiz, J., Sendra, S., Ameigeiras, P., Lopez-Soler, J.M.: Integration of LoRaWAN and 4G\/5G for the industrial internet of things. IEEE Commun. Mag. 56(2), 60\u201367 (2018). \nhttps:\/\/doi.org\/10.1109\/MCOM.2018.1700625","journal-title":"IEEE Commun. Mag."},{"issue":"3","key":"2_CR14","doi-asserted-by":"publisher","first-page":"510","DOI":"10.1109\/JSAC.2016.2525418","volume":"34","author":"MR Palattella","year":"2016","unstructured":"Palattella, M.R., et al.: Internet of things in the 5G era: enablers, architecture, and business models. IEEE J. Sel. Areas Commun. 34(3), 510\u2013527 (2016)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"2_CR15","doi-asserted-by":"publisher","unstructured":"Storck, C.R., Duarte-Figueiredo, F.: A 5G V2X ecosystem providing internet of vehicles. Sensors 19(3), 550 (2019). \nhttps:\/\/doi.org\/10.3390\/s19030550\n\n, \nhttps:\/\/www.mdpi.com\/1424-8220\/19\/3\/550","DOI":"10.3390\/s19030550"},{"issue":"10","key":"2_CR16","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1109\/MCOM.2018.1701310","volume":"56","author":"D Wang","year":"2018","unstructured":"Wang, D., Chen, D., Song, B., Guizani, N., Yu, X., Du, X.: From IoT to 5G I-IoT: the next generation IoT-based intelligent algorithms and 5G technologies. IEEE Commun. Mag. 56(10), 114\u2013120 (2018). \nhttps:\/\/doi.org\/10.1109\/MCOM.2018.1701310","journal-title":"IEEE Commun. Mag."},{"key":"2_CR17","doi-asserted-by":"publisher","unstructured":"Yasmin, R., Pet\u00e4j\u00e4j\u00e4rvi, J., Mikhaylov, K., Pouttu, A.: On the integration of LoRaWAN with the 5G test network. In: 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), pp. 1\u20136, October 2017. \nhttps:\/\/doi.org\/10.1109\/PIMRC.2017.8292557","DOI":"10.1109\/PIMRC.2017.8292557"}],"container-title":["Communications in Computer and Information Science","Mobile Internet Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-9609-4_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,1]],"date-time":"2020-11-01T16:04:19Z","timestamp":1604246659000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-9609-4_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789811596087","9789811596094"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-9609-4_2","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"2 November 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MobiSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Mobile Internet Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taichung","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taiwan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 October 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mobisecsymposium2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/isyou.info\/conf\/mobisec19\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"44","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"13","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"30% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}