{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:20:04Z","timestamp":1742912404984,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030415921"},{"type":"electronic","value":"9783030415938"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-41593-8_2","type":"book-chapter","created":{"date-parts":[[2020,2,13]],"date-time":"2020-02-13T08:03:13Z","timestamp":1581580993000},"page":"15-29","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["On the Relevance of Using Multi-layered Security in the Opportunistic Internet-of-Things"],"prefix":"10.1007","author":[{"given":"Antoine","family":"Bagula","sequence":"first","affiliation":[]},{"given":"Lutando","family":"Ngaqwazai","sequence":"additional","affiliation":[]},{"given":"Claude Lubamba","family":"Kakoko","sequence":"additional","affiliation":[]},{"given":"Olasupo","family":"Ajayi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,2,14]]},"reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"Pelusi, L., Passarella, A., Conti, M.: Opportunistic networking: data forwarding in disconnected mobile ad hoc networks. IEEE Commun. Mag. 44(11), 134\u2013141 (2006)","DOI":"10.1109\/MCOM.2006.248176"},{"key":"2_CR2","unstructured":"Kaps, J.-P.: Cryptography for ultra-low power devices, Ph.D. thesis, Worcester Polytechnic Institute (2006)"},{"issue":"2","key":"2_CR3","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1007\/s00145-012-9125-6","volume":"26","author":"JP Aumasson","year":"2013","unstructured":"Aumasson, J.P., Henzen, L., Meier, W., Naya-Plasencia, M.: Quark: a lightweight hash. J. Cryptol. 26(2), 313\u2013339 (2013)","journal-title":"J. Cryptol."},{"issue":"1","key":"2_CR4","first-page":"1","volume":"4","author":"G Padmavathi","year":"2009","unstructured":"Padmavathi, G.: A survey of attacks, security mechanisms and challenges in wireless sensor. Networks 4(1), 1\u20139 (2009)","journal-title":"Networks"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Mandava, M., Lubamba, C., Ismail, A., Bagula, H., Bagula, A.: Cyber-healthcare for public healthcare in the developing world. In: Proceedings of the 2016 IEEE Symposium on Computers and Communication (ISCC), Messina-Italy, 27\u201330 June 2016, pp. 14\u201319 (2016)","DOI":"10.1109\/ISCC.2016.7543707"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Bagula, M., Bagula, H., Mandava, M., Kakoko, C., Bagula, A.: Cyber-healthcare kiosks for healthcare support in developing countries. In: Proceedings of the AFRICOMM 2018, Dakar-Senegal, 29\u201330 November 2018","DOI":"10.1007\/978-3-030-16042-5_18"},{"issue":"1","key":"2_CR7","doi-asserted-by":"publisher","first-page":"7","DOI":"10.3390\/jsan8010007","volume":"8","author":"A Celesti","year":"2019","unstructured":"Celesti, A., et al.: How to develop IoT cloud e-health systems based on FIWARE: a lesson learnt. J. Sens. Actuator Netw. 8(1), 7 (2019)","journal-title":"J. Sens. Actuator Netw."},{"key":"2_CR8","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.jnca.2018.06.010","volume":"120","author":"A Bagula","year":"2018","unstructured":"Bagula, A., Mandava, M., Bagula, H.: A framework for healthcare support in the rural and low income areas of the developing world. J. Netw. Comput. Appl. 120, 17\u201329 (2018). \nhttps:\/\/doi.org\/10.1016\/j.jnca.2018.06.010","journal-title":"J. Netw. Comput. Appl."},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Bagula, A., Lubamba, C., Mandava, M., Bagula, H., Zennaro, M., Pietrosemoli, E.: Cloud based patient prioritization as service in public health care. In: 2016 ITU Kaleidoscope: ICTs for a Sustainable World (ITU WT), pp. 1\u20138. IEEE (2016)","DOI":"10.1109\/ITU-WT.2016.7805709"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Lubamba, C., Bagula, A.: Cyber-healthcare cloud computing interoperability using the HL7-CDA standard. In: 2017 IEEE Symposium on Computers and Communications (ISCC), pp. 105\u2013110. IEEE, July 2017","DOI":"10.1109\/ISCC.2017.8024513"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Murillo, M.J., Aukin, M.: Application of wireless sensor nodes to a delay-tolerant health and environmental data communication system in remote communities. In: Proceedings of the 2011 IEEE Global Humanitarian Technology Conference, pp. 383\u2013392, October 2011","DOI":"10.1109\/GHTC.2011.97"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Kate, A., Zaverucha, G.M., Hengartner, U.: Anonymity and security in delay tolerant networks. In: Proceedings of the 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007, pp. 504\u2013513 (2007)","DOI":"10.1109\/SECCOM.2007.4550373"},{"key":"2_CR13","unstructured":"Seth, A., Keshav, S.: Practical security for disconnected nodes. In: Proceedings of the 1st IEEE ICNP Workshop on Secure Network Protocols, pp. 31\u201336 (2005)"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Sastry, N., Wagner, D.: Security considerations for IEEE 802.15.4 networks. In: Proceedings of the 2004 ACM Workshop on Wireless security - WiSe 2004 (2004)","DOI":"10.1145\/1023646.1023654"},{"key":"2_CR15","unstructured":"Bagula, A.B.: Modelling and implementation of QoS in wireless sensor networks: a multi-constrained traffic engineering model. EURASIP J. Wirel. Commun. Netw. 1, 1\u201314 (2010)"},{"key":"2_CR16","unstructured":"Bagula, A.B.: Hybrid traffic engineering: the least path interference algorithm. In: Proceedings of the 2004 Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists on IT Research in Developing Countries, pp. 89\u201396, South African Institute of Computer Scientists and Information Technologists (2004)"},{"issue":"7","key":"2_CR17","doi-asserted-by":"publisher","first-page":"879","DOI":"10.1016\/j.comcom.2005.08.009","volume":"29","author":"AB Bagula","year":"2006","unstructured":"Bagula, A.B.: Hybrid routing in next generation IP networks. Comput. Commun. 29(7), 879\u2013892 (2006)","journal-title":"Comput. Commun."},{"key":"2_CR18","doi-asserted-by":"publisher","first-page":"987","DOI":"10.1109\/JSAC.2007.070611","volume":"25","author":"AB Bagula","year":"2007","unstructured":"Bagula, A.B.: On achieveing bandwidth-aware LSP\/LambdaSP multiplexing\/separation in multi-layer networks. IEEE J. Sel. Areas Commun. 25, 987\u20131000 (2007)","journal-title":"IEEE J. Sel. Areas Commun."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","e-Infrastructure and e-Services for Developing Countries"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-41593-8_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,13]],"date-time":"2020-02-13T19:14:37Z","timestamp":1581621277000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-41593-8_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030415921","9783030415938"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-41593-8_2","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"14 February 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AFRICOMM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on e-Infrastructure and e-Services for Developing Countries","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Porto-Novo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Benin","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 December 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 December 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"africom2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/africommconference.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confy+","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"46","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"41% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}