Security analysis of the constrained application protocol in the Internet of Things | IEEE Conference Publication | IEEE Xplore