{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,27]],"date-time":"2024-07-27T22:30:57Z","timestamp":1722119457536},"reference-count":9,"publisher":"SAGE Publications","issue":"8","license":[{"start":{"date-parts":[[2015,8,1]],"date-time":"2015-08-01T00:00:00Z","timestamp":1438387200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"DOI":"10.13039\/501100003621","name":"Ministry of Science, ICT and Future Planning","doi-asserted-by":"publisher","award":["IITP-2015-H8501-15-1008","2014R1A1A2056961"],"id":[{"id":"10.13039\/501100003621","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2015,8,1]]},"abstract":" The dramatically increasing number of connected things based on Internet protocol is leading to a new concept called the Internet of Things (IoT). The Internet-integrated wireless sensor network has recently become one of the most important service targets in IoT field. To provide secure IoT services, the IETF proposed using Datagram Transport Layer Security (DTLS) as a de facto security protocol. In this paper, we examine problems that can happen when applying the DTLS protocol to the IoT, which comprises constrained devices and constrained networks. To solve the problems at hand, we separate the DTLS protocol into a handshake phase (i.e., establishment phase) and an encryption phase (i.e., transmission phase). Our approach enhances the performance of both device and network by using a way to delegate the DTLS handshake phase. The proposed scheme supports secure end-to-end communication despite using delegation. <\/jats:p>","DOI":"10.1155\/2015\/393754","type":"journal-article","created":{"date-parts":[[2015,8,26]],"date-time":"2015-08-26T21:22:16Z","timestamp":1440624136000},"page":"393754","update-policy":"http:\/\/dx.doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":16,"title":["ESSE: Efficient Secure Session Establishment for Internet-Integrated Wireless Sensor Networks"],"prefix":"10.1177","volume":"11","author":[{"given":"Namhi","family":"Kang","sequence":"first","affiliation":[{"name":"Duksung Women's University, Seoul 132-714, Republic of Korea"}]},{"given":"Jiye","family":"Park","sequence":"additional","affiliation":[{"name":"Duksung Women's University, Seoul 132-714, Republic of Korea"}]},{"given":"Hyeokjin","family":"Kwon","sequence":"additional","affiliation":[{"name":"Duksung Women's University, Seoul 132-714, Republic of Korea"}]},{"given":"Souhwan","family":"Jung","sequence":"additional","affiliation":[{"name":"Soongsil University, Seoul 156-743, Republic of Korea"}]}],"member":"179","published-online":{"date-parts":[[2015,8,26]]},"reference":[{"key":"B1-2015-393754","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.01.010"},{"key":"B4-2015-393754","doi-asserted-by":"publisher","DOI":"10.1145\/2462096.2462107"},{"key":"B9-2015-393754","first-page":"28","volume-title":"Proceeding of the Information and Communication Technology Convergence (ICTC \u203214)","author":"Park J."},{"key":"B11-2015-393754","volume-title":"Proceedings of the Workshop on Smart Object Security","author":"Bergamann O."},{"key":"B13-2015-393754","doi-asserted-by":"publisher","DOI":"10.1145\/2463183.2463193"},{"key":"B14-2015-393754","series-title":"Internet Draft","volume-title":"Delegated CoAP Authentication and Authorization Framework (DCAF)","author":"Gerdes S.","year":"2014"},{"key":"B16-2015-393754","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-011-0385-5"},{"key":"B8-2015-393754","doi-asserted-by":"publisher","DOI":"10.1109\/jsen.2013.2277656"},{"key":"B18-2015-393754","doi-asserted-by":"publisher","DOI":"10.1109\/lcn.2004.38"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2015\/393754","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1155\/2015\/393754","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2015\/393754","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,5]],"date-time":"2021-05-05T11:42:21Z","timestamp":1620214941000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1155\/2015\/393754"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8,1]]},"references-count":9,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2015,8,1]]}},"alternative-id":["10.1155\/2015\/393754"],"URL":"https:\/\/doi.org\/10.1155\/2015\/393754","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"value":"1550-1477","type":"print"},{"value":"1550-1477","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,8,1]]}}}