{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,11]],"date-time":"2024-07-11T17:21:23Z","timestamp":1720718483844},"reference-count":13,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2017,6,27]],"date-time":"2017-06-27T00:00:00Z","timestamp":1498521600000},"content-version":"vor","delay-in-days":177,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100004085","name":"Ministry of Education, Science and Technology","doi-asserted-by":"publisher","award":["2017R1A2B4006086"],"id":[{"id":"10.13039\/501100004085","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Procedia Computer Science"],"published-print":{"date-parts":[[2017]]},"DOI":"10.1016\/j.procs.2017.06.097","type":"journal-article","created":{"date-parts":[[2017,7,12]],"date-time":"2017-07-12T11:21:36Z","timestamp":1499858496000},"page":"290-296","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":9,"special_numbering":"C","title":["Software-defined Naming, Discovery and Session Control for IoT Devices and Smart Phones in the Constraint Networks"],"prefix":"10.1016","volume":"110","author":[{"given":"Younchan","family":"Jung","sequence":"first","affiliation":[]},{"given":"Marnel","family":"Peradilla","sequence":"additional","affiliation":[]},{"given":"Akanksha","family":"Saini","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.procs.2017.06.097_bib0001","doi-asserted-by":"crossref","first-page":"235","DOI":"10.3390\/jsan2020235","article-title":"IETF standardization in the field of the internet of things (IoT): a survey","volume":"2","author":"Ishaq","year":"2013","journal-title":"J. Sens. Actuator Netw"},{"key":"10.1016\/j.procs.2017.06.097_bib0002","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1109\/MWC.2013.6704479","article-title":"A survey on the ietf protocol suite for the internet of things: Standards, challenges, and opportunities","volume":"20","author":"Sheng","year":"2013","journal-title":"IEEE Wireless Communications"},{"key":"10.1016\/j.procs.2017.06.097_bib0003","doi-asserted-by":"crossref","unstructured":"Shelby Z. Constrained REST ful Environments (CoRE) Link Format, RFC 6690 (Proposed Standard), Internet Engineering Task Force, August 2012.","DOI":"10.17487\/rfc6690"},{"key":"10.1016\/j.procs.2017.06.097_bib0004","doi-asserted-by":"crossref","unstructured":"Shelby Z, Hartke K, and Bormann C. The Constrained Application Protocol (CoAP), RFC 7252 (Proposed Standard), Internet Engineering Task Force, June 2014.","DOI":"10.17487\/rfc7252"},{"key":"10.1016\/j.procs.2017.06.097_bib0005","doi-asserted-by":"crossref","unstructured":"Datta SK, Da Costa RPF, and Bonnet C. Resource discovery in Internet of Things: Current trends and future standardization aspects. IEEE 2nd World Forum on Internet of Things (WF-IoT); Dec 2015;542\u2013547.","DOI":"10.1109\/WF-IoT.2015.7389112"},{"key":"10.1016\/j.procs.2017.06.097_bib0006","first-page":"410","article-title":"DNSNA: DNS name autoconfiguration for Internet of Things devices","author":"Lee","year":"2016","journal-title":"18th International Conference on Advanced Communication Technology (ICACT)"},{"key":"10.1016\/j.procs.2017.06.097_bib0007","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1109\/MVT.2013.2269187","article-title":"5G on the Horizon: Key Challenges for the Radio-Access Network","volume":"8","author":"Demestichas","year":"2013","journal-title":"IEEE Vehicular Technology Magazine"},{"key":"10.1016\/j.procs.2017.06.097_bib0008","first-page":"1375","article-title":"Secure mobility management application capable of fast layer 3 handovers for mipv6-non-aware mobile hosts","volume":"97","author":"Younchan","year":"2014","journal-title":"IEICE Transactions on Communications"},{"key":"10.1016\/j.procs.2017.06.097_bib0009","doi-asserted-by":"crossref","unstructured":"Jung Y, Peradilla M, and Atwood W. Securing domain name system combined with mipv6 for mobile hosts. in: Trust, Security and Privacy in Computing and Communications (TrustCom). 12th IEEE International Conference on. IEEE 2013;172-179.","DOI":"10.1109\/TrustCom.2013.26"},{"key":"10.1016\/j.procs.2017.06.097_bib00010","doi-asserted-by":"crossref","first-page":"1407","DOI":"10.1109\/SURV.2012.110112.00200","article-title":"Transition from IPv4 to IPv6: A state-of-the-art survey","volume":"15","author":"Wu","year":"2013","journal-title":"IEEE Communications Surveys and Tutorials"},{"key":"10.1016\/j.procs.2017.06.097_bib00011","first-page":"187","article-title":"Design the DNS-Like Smart Switch for Heterogeneous Network Base on SDN Architecture","author":"Chiu","year":"2016","journal-title":"International Computer Symposium (ICS)"},{"key":"10.1016\/j.procs.2017.06.097_bib00012","first-page":"131","article-title":"DNS Name Autoconfiguration for IoT Home Devices","author":"Lee","year":"2015","journal-title":"29th International Conference on Advanced Information Networking and Applications Workshops"},{"key":"10.1016\/j.procs.2017.06.097_bib00013","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1109\/JIOT.2014.2306328","article-title":"Internet of Things for Smart Cities","volume":"1","author":"Zanella","year":"2014","journal-title":"IEEE Internet of Things journal"}],"container-title":["Procedia Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050917312759?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050917312759?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T11:49:49Z","timestamp":1658058589000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1877050917312759"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"references-count":13,"alternative-id":["S1877050917312759"],"URL":"https:\/\/doi.org\/10.1016\/j.procs.2017.06.097","relation":{},"ISSN":["1877-0509"],"issn-type":[{"value":"1877-0509","type":"print"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Software-defined Naming, Discovery and Session Control for IoT Devices and Smart Phones in the Constraint Networks","name":"articletitle","label":"Article Title"},{"value":"Procedia Computer Science","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.procs.2017.06.097","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2017 The Author(s). Published by Elsevier B.V.","name":"copyright","label":"Copyright"}]}}