{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T21:07:56Z","timestamp":1774127276851,"version":"3.50.1"},"reference-count":59,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2020,8,7]],"date-time":"2020-08-07T00:00:00Z","timestamp":1596758400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2020,8,7]],"date-time":"2020-08-07T00:00:00Z","timestamp":1596758400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100000842","name":"British Telecommunications","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000842","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100013360","name":"Invest Northern Ireland","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100013360","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["CCF Trans. Pervasive Comp. Interact."],"published-print":{"date-parts":[[2020,10]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>The Internet of Things (IoT) is rapidly changing the way in which we engage with technology on a daily basis. The IoT paradigm enables low-resource devices to intercommunicate in a fully flexible and pervasive manner, and the data from these devices is used for decision-making in critical applications such as; traffic infrastructure, health-care and home security, to name but a few. Due to the scarce resources available in these IoT devices, being able to quantify the reliability of them is a critical function. This report presents a detailed evolution of the area of reliability measurement, followed by an in-depth review of the state-of-the-art for quantification of reliability in the IoT, revealing the many challenges associated with this task. From this in-depth review, a set of key research directions for IoT reliability is determined. Despite the critical nature of the research area, at this current moment, this study is the first detailed review available in the area of assessing IoT reliability.<\/jats:p>","DOI":"10.1007\/s42486-020-00037-z","type":"journal-article","created":{"date-parts":[[2020,8,7]],"date-time":"2020-08-07T11:05:16Z","timestamp":1596798316000},"page":"147-163","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":86,"title":["IoT reliability: a review leading to 5 key research directions"],"prefix":"10.1007","volume":"2","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3205-3310","authenticated-orcid":false,"given":"Samuel J.","family":"Moore","sequence":"first","affiliation":[]},{"given":"Chris D.","family":"Nugent","sequence":"additional","affiliation":[]},{"given":"Shuai","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Ian","family":"Cleland","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,7]]},"reference":[{"issue":"2","key":"37_CR1","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1109\/MCOM.2018.1700332","volume":"56","author":"A Abeshu","year":"2018","unstructured":"Abeshu, A., Chilamkurti, N.: Deep learning: the Frontier for distributed attack detection in fog-to-things computing. IEEE Commun. Mag. 56(2), 169\u2013175 (2018)","journal-title":"IEEE Commun. Mag."},{"key":"37_CR2","doi-asserted-by":"crossref","unstructured":"Ahmed, I., Saleel, A.P., Beheshti, B., Khan, Z.A., Ahmad, I.: Security in the Internet of Things (IoT). In: 2017 Fourth HCT Information Technology Trends (ITT), pp. 84\u201390. IEEE, New York (2017)","DOI":"10.1109\/CTIT.2017.8259572"},{"issue":"March","key":"37_CR3","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.jnca.2017.04.002","volume":"88","author":"FA Alaba","year":"2017","unstructured":"Alaba, F.A., Othman, M., Hashem, I.A.T., Alotaibi, F.: Internet of Things security: a survey. J. Netw. Comput. Appl. 88(March), 10\u201328 (2017)","journal-title":"J. Netw. Comput. Appl."},{"issue":"10","key":"37_CR4","first-page":"450","volume":"5","author":"T Alam","year":"2018","unstructured":"Alam, T.: A reliable communication framework and its use in Internet of Things (IoT). Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol. 5(10), 450\u2013456 (2018)","journal-title":"Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol."},{"issue":"4","key":"37_CR5","doi-asserted-by":"publisher","first-page":"2347","DOI":"10.1109\/COMST.2015.2444095","volume":"17","author":"A Al-Fuqaha","year":"2015","unstructured":"Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., Ayyash, M.: Internet of Things: a survey on enabling technologies, protocols, and applications. IEEE Commun. Surv. Tutor. 17(4), 2347\u20132376 (2015)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"37_CR6","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/j.iot.2018.08.005","volume":"1\u20132","author":"F Allhoff","year":"2018","unstructured":"Allhoff, F., Henschke, A.: The Internet of Things: foundational ethical issues. Internet Things 1\u20132, 55\u201366 (2018)","journal-title":"Internet Things"},{"key":"37_CR7","doi-asserted-by":"crossref","unstructured":"Al-Masri, E.: QoS-aware IIoT microservices architecture. In: 2018 IEEE International Conference on Industrial Internet (ICII), pp. 171\u2013172 (2018)","DOI":"10.1109\/ICII.2018.00030"},{"key":"37_CR8","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1016\/j.adhoc.2016.12.004","volume":"56","author":"L Atzori","year":"2017","unstructured":"Atzori, L., Iera, A., Morabito, G.: Understanding the Internet of Things: definition, potentials, and societal role of a fast evolving paradigm. Ad Hoc Netw. 56, 122\u2013140 (2017)","journal-title":"Ad Hoc Netw."},{"key":"37_CR9","doi-asserted-by":"crossref","unstructured":"Behera, R.K., Reddy, K.H.K., Roy, D.S.: Reliability modelling of service oriented Internet of Things. In: 2015 4th International Conference on Reliability, Infocom Technologies and Optimization: Trends and Future Directions, ICRITO 2015, pp. 1\u20136 (2015)","DOI":"10.1109\/ICRITO.2015.7359216"},{"key":"37_CR10","doi-asserted-by":"publisher","DOI":"10.1201\/9781315367422","volume-title":"Reliability Engineering: A Life Cycle Approach","author":"E Bradley","year":"2016","unstructured":"Bradley, E.: Reliability Engineering: A Life Cycle Approach, 1st edn. CRC Press, Boca Raton (2016)","edition":"1"},{"issue":"5","key":"37_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/JIOT.2017.2701408","volume":"4","author":"A Brogi","year":"2017","unstructured":"Brogi, A., Forti, S.: QoS-aware deployment of IoT applications through the fog. IEEE Internet Things J. 4(5), 1\u20138 (2017)","journal-title":"IEEE Internet Things J."},{"issue":"6","key":"37_CR12","doi-asserted-by":"publisher","first-page":"854","DOI":"10.1109\/JIOT.2016.2584538","volume":"3","author":"M Chiang","year":"2016","unstructured":"Chiang, M., Zhang, T.: Fog and IoT: an overview of research opportunities. IEEE Internet Things J. 3(6), 854\u2013864 (2016)","journal-title":"IEEE Internet Things J."},{"key":"37_CR13","doi-asserted-by":"crossref","unstructured":"Cook, A., Misirli, G., Fan, Z.: Anomaly detection for IoT time-series data: a survey. IEEE Internet Things J.\u00a0l, 7(7), 6481\u20136494 (2020)","DOI":"10.1109\/JIOT.2019.2958185"},{"key":"37_CR14","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.comnet.2019.01.023","volume":"151","author":"KAP da Costa","year":"2019","unstructured":"da Costa, K.A.P., Papa, J.P., Lisboa, C.O., Munoz, R., de Albuquerque, V.H.C.: Internet of Things: a survey on machine learning-based intrusion detection approaches. Comput. Netw. 151, 147\u2013157 (2019)","journal-title":"Comput. Netw."},{"issue":"4","key":"37_CR15","doi-asserted-by":"publisher","first-page":"2233","DOI":"10.1109\/TII.2014.2338740","volume":"10","author":"X Da Li","year":"2014","unstructured":"Da Li, X., He, W., Li, S.: Internet of Things in industries: a survey. IEEE Trans. Ind. Inform. 10(4), 2233\u20132243 (2014)","journal-title":"IEEE Trans. Ind. Inform."},{"key":"37_CR16","unstructured":"DDCMS: Code of practice for consumer IoT security (2018). https:\/\/assets.publishing.service.gov.uk\/government\/uploads\/system\/uploads\/attachment_data\/file\/773867\/Code_of_Practice_for_Consumer_IoT_Security_October_2018.pdf"},{"key":"37_CR17","doi-asserted-by":"crossref","unstructured":"Desnitsky, V.A., Kotenko, I.V., Nogin, S.B.: Detection of anomalies in data for monitoring of security components in the Internet of Things. In: Proceedings of International Conference on Soft Computing and Measurements, SCM 2015, pp. 189\u2013192 (2015)","DOI":"10.1109\/SCM.2015.7190452"},{"key":"37_CR18","unstructured":"Evans, D.: The Internet of Things\u2014how the next evolution of the internet is changing everything. CISCO white paper, pp 1\u201311 (2011)"},{"issue":"4","key":"37_CR19","doi-asserted-by":"publisher","first-page":"2282","DOI":"10.1109\/JIOT.2017.2730360","volume":"5","author":"B Fekade","year":"2017","unstructured":"Fekade, B., Maksymyuk, T., Kyryk, M., Jo, M.: Probabilistic recovery of incomplete sensed data in IoT. IEEE Internet Things J. 5(4), 2282\u20132292 (2017)","journal-title":"IEEE Internet Things J."},{"key":"37_CR20","unstructured":"Fries, R.C.: Reliable Design of Medical Devices, 2nd edn, 3rd edn, Number 2. Taylor and Francis Group\/CRC Press, London (2006)"},{"key":"37_CR21","doi-asserted-by":"crossref","unstructured":"Ghorbani, H.R., Ahmadzadegan, M.H.: Security challenges in Internet of Things: survey. In: 2017 IEEE Conference on Wireless Sensors (ICWiSe), pp. 1\u20136. IEEE, New York (2017)","DOI":"10.1109\/ICWISE.2017.8267153"},{"key":"37_CR22","doi-asserted-by":"crossref","unstructured":"Gonzalez-Vidal, A., Cuenca-Jara, J., Skarmeta, A.F.: IoT for water management: towards intelligent anomaly detection. In: IEEE 5th World Forum on Internet of Things, WF-IoT 2019\u2014Conference Proceedings, pp. 858\u2013863 (2019)","DOI":"10.1109\/WF-IoT.2019.8767190"},{"key":"37_CR23","unstructured":"ISO, P., 9000: 2015 Ouality management systems-Fundamentals and vocabulary.\u00a0International Organization for Standardization (ISO), Geneva: ISO (2015)"},{"key":"37_CR24","doi-asserted-by":"crossref","unstructured":"Kamyod, C.: End-to-end reliability analysis of an IoT based smart agriculture. In: 3rd International Conference on Digital Arts, Media and Technology, ICDAMT 2018, pp. 258\u2013261 (2018)","DOI":"10.1109\/ICDAMT.2018.8376535"},{"key":"37_CR26","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.jnca.2016.08.002","volume":"73","author":"A Karkouch","year":"2016","unstructured":"Karkouch, A., Mousannif, H., Al\u00a0Moatassime, H., Noel, T.: Data quality in Internet of Things: a state-of-the-art survey. J. Netw. Comput. Appl. 73, 57\u201381 (2016)","journal-title":"J. Netw. Comput. Appl."},{"key":"37_CR25","doi-asserted-by":"crossref","unstructured":"Karkouch, A., Mousannif, H., Al Moatassime, H., Noel, T.: A model-driven architecture-based data quality management framework for the Internet of Things. In: Proceedings of 2016 International Conference on Cloud Computing Technologies and Applications, CloudTech 2016, pp. 252\u2013259 (2017)","DOI":"10.1109\/CloudTech.2016.7847707"},{"key":"37_CR27","doi-asserted-by":"crossref","unstructured":"Kharchenko, V., Kolisnyk, M., Piskachova, I., Bardis, N.: Reliability and security issues for IoT-based smart business center: architecture and Markov model. In: Proceedings\u20142016 3rd International Conference on Mathematics and Computers in Sciences and in Industry, MCSI 2016, pp. 313\u2013318 (2017)","DOI":"10.1109\/MCSI.2016.064"},{"issue":"1","key":"37_CR28","doi-asserted-by":"publisher","first-page":"66","DOI":"10.17706\/IJCEE.2016.8.1.66-76","volume":"8","author":"M Kim","year":"2016","unstructured":"Kim, M.: A quality model for evaluating IoT applications. Int. J. Comput. Electr. Eng. 8(1), 66\u201376 (2016)","journal-title":"Int. J. Comput. Electr. Eng."},{"key":"37_CR29","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1016\/j.comnet.2018.03.012","volume":"141","author":"DE Kouicem","year":"2018","unstructured":"Kouicem, D.E., Bouabdallah, A., Lakhlef, H.: Internet of Things security: a top-down survey. Comput. Netw. 141, 199\u2013221 (2018)","journal-title":"Comput. Netw."},{"key":"37_CR30","doi-asserted-by":"crossref","unstructured":"Kushalnagar N.,  Gabriel M., Christian S.:  \"IPv6 over low-power wireless personal area networks (6LoWPANs): overview, assumptions, problem statement, and goals.\" 1\u201311 (2007)","DOI":"10.17487\/rfc4919"},{"key":"37_CR31","doi-asserted-by":"crossref","unstructured":"Li, S., Huang, J.: GSPN-based reliability-aware performance evaluation of IoT services. In: Proceedings\u20142017 IEEE 14th International Conference on Services Computing, SCC 2017, pp. 483\u2013486 (2017)","DOI":"10.1109\/SCC.2017.70"},{"key":"37_CR32","doi-asserted-by":"crossref","unstructured":"Li, F., Nastic, S., Dustdar, S.: Data quality observation in pervasive environments. In: Proceedings\u201415th IEEE International Conference on Computational Science and Engineering, CSE 2012 and 10th IEEE\/IFIP International Conference on Embedded and Ubiquitous Computing, EUC 2012, pp. 602\u2013609 (2012)","DOI":"10.1109\/ICCSE.2012.88"},{"key":"37_CR33","doi-asserted-by":"crossref","unstructured":"Maalel, N., Natalizio, E., Bouabdallah, A., Roux, P., Kellil, M.: Reliability for emergency applications in Internet of Things. In: Proceedings\u2014IEEE International Conference on Distributed Computing in Sensor Systems, DCoSS 2013, pp. 361\u2013366 (2013)","DOI":"10.1109\/DCOSS.2013.40"},{"key":"37_CR34","doi-asserted-by":"crossref","unstructured":"Mavrogiorgou, A., Kiourtis, A., Symvoulidis, C., Kyriazis, D.: Capturing the reliability of unknown devices in the IoT world. In: 2018 5th International Conference on Internet of Things: Systems, Management and Security, IoTSMS 2018, pp. 62\u201369 (2018)","DOI":"10.1109\/IoTSMS.2018.8554720"},{"key":"37_CR35","doi-asserted-by":"crossref","unstructured":"Moore, S.J., Nugent, C.D., Cleland, I., Zhang, S.: Impact analysis of erroneous data on IoT reliability. In: Proceedings of the 2019 IEEE SmartWorld Smart City Innovation Conference, pp. 1908\u20131915 (2019)","DOI":"10.1109\/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00335"},{"issue":"October 2018","key":"37_CR36","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.jnca.2018.12.006","volume":"128","author":"N Moustafa","year":"2019","unstructured":"Moustafa, N., Hu, J., Slay, J.: A holistic review of Network Anomaly Detection Systems: a comprehensive survey. J. Netw. Comput. Appl. 128(October 2018), 33\u201355 (2019)","journal-title":"J. Netw. Comput. Appl."},{"key":"37_CR37","doi-asserted-by":"crossref","unstructured":"Nomm, S., Bahsi, H.: Unsupervised anomaly based botnet detection in IoT networks. In: Proceedings\u201417th IEEE International Conference on Machine Learning and Applications, ICMLA 2018, pp. 1048\u20131053 (2019)","DOI":"10.1109\/ICMLA.2018.00171"},{"key":"37_CR38","doi-asserted-by":"publisher","first-page":"45473","DOI":"10.1109\/ACCESS.2018.2852656","volume":"6","author":"J Rafferty","year":"2018","unstructured":"Rafferty, J., Synnott, J., Nugent, C.D., Ennis, A., Catherwood, P.A., Mcchesney, I., Cleland, I., Mcclean, S.: A scalable, research oriented, generic, sensor data platform. IEEE Access 6, 45473\u201345484 (2018)","journal-title":"IEEE Access"},{"key":"37_CR39","volume-title":"Internet of Things-from Hype to Reality: The Road to Digitization","author":"A Rayes","year":"2016","unstructured":"Rayes, A., Salam, S.: Internet of Things-from Hype to Reality: The Road to Digitization, 1st edn. Springer, Cham (2016)","edition":"1"},{"key":"37_CR40","first-page":"28","volume":"170","author":"A Rizzardi","year":"2016","unstructured":"Rizzardi, A., Miorandi, D., Sicari, S., Cappiello, C., Coen-Porisini, A.: Networked smart objects: moving data processing closer to the source. Lect. Notes Inst. Comput. Sci. Soc. Inform. Telecommun. Eng. LNICST 170, 28\u201335 (2016)","journal-title":"Lect. Notes Inst. Comput. Sci. Soc. Inform. Telecommun. Eng. LNICST"},{"key":"37_CR41","doi-asserted-by":"crossref","unstructured":"Saini, N.K.: Trust factor and reliability-over-a-period-of-time as key differentiators in IoT enabled services. In: 2016 International Conference on Internet of Things and Applications, IOTA 2016, pp. 411\u2013414 (2016)","DOI":"10.1109\/IOTA.2016.7562762"},{"key":"37_CR42","doi-asserted-by":"crossref","unstructured":"Sato, H., Kanai, A., Tanimoto, S., Kobayashi, T.: Establishing trust in the emerging era of IoT. In: Proceedings\u20142016 IEEE Symposium on Service-Oriented System Engineering, SOSE 2016, pp. 398\u2013406 (2016)","DOI":"10.1109\/SOSE.2016.50"},{"key":"37_CR43","doi-asserted-by":"crossref","unstructured":"Sedjelmaci, H., Senouci, S.M., Al-Bahri, M.: A lightweight anomaly detection technique for low-resource IoT devices: a game-theoretic methodology. In: 2016 IEEE International Conference on Communications, ICC 2016, pp. 1\u20136 (2016)","DOI":"10.1109\/ICC.2016.7510811"},{"issue":"5","key":"37_CR44","doi-asserted-by":"publisher","first-page":"637","DOI":"10.1109\/JIOT.2016.2579198","volume":"3","author":"W Shi","year":"2016","unstructured":"Shi, W., Cao, J., Zhang, Q., Li, Y., Lanyu, X.: Edge computing: vision and challenges. IEEE Internet Things J. 3(5), 637\u2013646 (2016)","journal-title":"IEEE Internet Things J."},{"key":"37_CR45","doi-asserted-by":"crossref","unstructured":"Sicari, S., Cappiello, C., De\u00a0Pellegrini, F., Miorandi, D., Coen-Porisini, A.: A security-and quality-aware system architecture for Internet of Things. Inf Syst Front. 18(4) 665\u2013677 (2014)","DOI":"10.1007\/s10796-014-9538-x"},{"key":"37_CR46","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.is.2016.02.003","volume":"58","author":"S Sicari","year":"2016","unstructured":"Sicari, S., Rizzardi, A., Miorandi, D., Cappiello, C., Coen-Porisini, A.: A secure and quality-aware prototypical architecture for the Internet of Things. Inf. Syst. 58, 43\u201355 (2016)","journal-title":"Inf. Syst."},{"key":"37_CR47","doi-asserted-by":"crossref","unstructured":"Sinche, S., Polo, O., Raposo, D., Femandes, M., Boavida, F., Rodrigues, A., Pereira, V., Sa Silva, J.: Assessing redundancy models for IoT reliability. In: 19th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2018, pp. 14\u201315 (2018)","DOI":"10.1109\/WoWMoM.2018.8449816"},{"key":"37_CR48","doi-asserted-by":"crossref","unstructured":"Singh, D., Tripathi, G., Jara, A.J.: A survey of Internet-of-Things: future vision, architecture, challenges and services. In: 2014 IEEE World Forum on Internet of Things, WF-IoT 2014, pp. 287\u2013292 (2014)","DOI":"10.1109\/WF-IoT.2014.6803174"},{"key":"37_CR49","doi-asserted-by":"crossref","unstructured":"Spanos, G., Giannoutakis, K.M., Votis, K., Tzovaras, D.: Combining statistical and machine learning techniques in IoT anomaly detection for smart homes. In: IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, CAMAD, 2019 Sept., pp. 1\u20136 (2019)","DOI":"10.1109\/CAMAD.2019.8858490"},{"issue":"c","key":"37_CR50","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1109\/JIOT.2014.2312291","volume":"1","author":"JA Stankovic","year":"2014","unstructured":"Stankovic, J.A.: Research directions for the Internet of Things. IEEE Internet Things J. 1(c), 3\u20139 (2014)","journal-title":"IEEE Internet Things J."},{"key":"37_CR51","doi-asserted-by":"crossref","unstructured":"Stiawan, D., Idris, M.Y., Malik, R.F., Nurmaini, S., Budiarto, R.: Anomaly detection and monitoring in Internet of Things communication. In: Proceedings of 2016 8th International Conference on Information Technology and Electrical Engineering: Empowering Technology for Better Future, ICITEE 2016, pp. 1\u20134 (2017)","DOI":"10.1109\/ICITEED.2016.7863271"},{"issue":"4","key":"37_CR52","doi-asserted-by":"publisher","first-page":"3492","DOI":"10.1016\/j.eswa.2010.08.137","volume":"38","author":"MY Su","year":"2011","unstructured":"Su, M.Y.: Real-time anomaly detection systems for Denial-of-Service attacks by weighted k-nearest-neighbor classifiers. Expert Syst. Appl. 38(4), 3492\u20133498 (2011)","journal-title":"Expert Syst. Appl."},{"key":"37_CR53","doi-asserted-by":"crossref","unstructured":"Thanigaivelan, N.K., Nigussie, E., Kanth, R.K., Virtanen, S., Isoaho, J.: Distributed internal anomaly detection system for Internet-of-Things. In: 2016 13th IEEE Annual Consumer Communications and Networking Conference, CCNC 2016, pp. 319\u2013320 (2016)","DOI":"10.1109\/CCNC.2016.7444797"},{"issue":"8","key":"37_CR54","doi-asserted-by":"publisher","first-page":"2201","DOI":"10.1007\/s11276-014-0731-0","volume":"20","author":"CW Tsai","year":"2014","unstructured":"Tsai, C.W., Lai, C.F., Vasilakos, A.V.: Future Internet of Things: open issues and challenges. Wirel. Netw. 20(8), 2201\u20132217 (2014)","journal-title":"Wirel. Netw."},{"issue":"3","key":"37_CR55","doi-asserted-by":"publisher","first-page":"2055","DOI":"10.1109\/JIOT.2018.2822677","volume":"5","author":"Y Wang","year":"2018","unstructured":"Wang, Y.: Trust quantification for networked cyber-physical systems. IEEE Internet Things J. 5(3), 2055\u20132070 (2018)","journal-title":"IEEE Internet Things J."},{"key":"37_CR56","unstructured":"Xie, M., Dai, Y.-S., Poh, K.-L.:\u00a0Computing system reliability: models and analysis. Springer Science & Business Media (2004)"},{"issue":"3","key":"37_CR57","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/MWC.2017.1600421","volume":"24","author":"I Yaqoob","year":"2017","unstructured":"Yaqoob, I., Ahmed, E., Hashem, I.A.T., Ahmed, A.I.A., Gani, A., Imran, M., Guizani, M.: Internet of things architecture: Recent advances, taxonomy, requirements, and open challenges.\u00a0IEEE wireless commun.\u00a024(3), 10\u201316 (2017)","journal-title":"IEEE wireless commun"},{"issue":"February","key":"37_CR58","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.jnca.2017.02.009","volume":"84","author":"BB Zarpel\u00e3o","year":"2017","unstructured":"Zarpel\u00e3o, B.B., Miani, R.S., Kawakani, C.T., de Alvarenga, S.C.: A survey of intrusion detection in Internet of Things. J. Netw. Comput. Appl. 84(February), 25\u201337 (2017)","journal-title":"J. Netw. Comput. Appl."},{"key":"37_CR59","doi-asserted-by":"crossref","unstructured":"Zin, T.T., Tin, P., Hama, H.: Reliability and availability measures for Internet of Things consumer world perspectives. In: 2016 IEEE 5th Global Conference on Consumer Electronics, GCCE 2016, pp. 1\u20132 (2016)","DOI":"10.1109\/GCCE.2016.7800446"}],"container-title":["CCF Transactions on Pervasive Computing and Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42486-020-00037-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42486-020-00037-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42486-020-00037-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,6]],"date-time":"2021-08-06T23:13:09Z","timestamp":1628291589000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42486-020-00037-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,7]]},"references-count":59,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,10]]}},"alternative-id":["37"],"URL":"https:\/\/doi.org\/10.1007\/s42486-020-00037-z","relation":{},"ISSN":["2524-521X","2524-5228"],"issn-type":[{"value":"2524-521X","type":"print"},{"value":"2524-5228","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,8,7]]},"assertion":[{"value":"27 February 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 July 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 August 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}