{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T09:35:05Z","timestamp":1743068105696,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031105418"},{"type":"electronic","value":"9783031105425"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-10542-5_28","type":"book-chapter","created":{"date-parts":[[2022,7,22]],"date-time":"2022-07-22T06:03:02Z","timestamp":1658469782000},"page":"401-418","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["On IoT Localization Architectures Comparison and Privacy Concerns in the Healthcare Sector"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4354-3916","authenticated-orcid":false,"given":"Antonio","family":"Scarf\u00f2","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,23]]},"reference":[{"key":"28_CR1","unstructured":"Mckinsey Digital: Unlocking the potential of the Internet of Things, 1 June 2015|Report. https:\/\/www.mckinsey.com\/business-functions\/mckinsey-digital\/our-insights\/the-internet-of-things-the-value-of-digitizing-the-physical-world. Accessed 15 May 2022"},{"key":"28_CR2","doi-asserted-by":"publisher","unstructured":"Zafari, F., Gkelias, A., Leung, K.K.: A survey of indoor localization systems and technologies. IEEE Commun. Surv. Tutor. 21(3), 2568\u20132599 (2019). https:\/\/doi.org\/10.1109\/COMST.2019.2911558","DOI":"10.1109\/COMST.2019.2911558"},{"issue":"6","key":"28_CR3","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1109\/JIOT.2015.2417684","volume":"2","author":"L Catarinucci","year":"2015","unstructured":"Catarinucci, L., et al.: An IoT-aware architecture for smart healthcare systems. IEEE Internet Things J. 2(6), 515\u2013526 (2015). https:\/\/doi.org\/10.1109\/JIOT.2015.2417684","journal-title":"IEEE Internet Things J."},{"key":"28_CR4","doi-asserted-by":"publisher","unstructured":"Nguyen, Q.H., Johnson, P., Nguyen, T.T., Randles, M.: A novel architecture using iBeacons for localization and tracking of people within healthcare environment. In: Global IoT Summit (GIoTS), pp. 1\u20136 (2019). https:\/\/doi.org\/10.1109\/GIOTS.2019.8766368","DOI":"10.1109\/GIOTS.2019.8766368"},{"key":"28_CR5","doi-asserted-by":"publisher","unstructured":"Salman, A., El-Tawab, S., Yorio, Z., Hilal, A.: Indoor localization using 802.11 WiFi and IoT edge nodes. In: IEEE Global Conference on Internet of Things (GCIoT), pp. 1\u20135 (2018). https:\/\/doi.org\/10.1109\/GCIoT.2018.8620162","DOI":"10.1109\/GCIoT.2018.8620162"},{"issue":"9","key":"28_CR6","doi-asserted-by":"publisher","first-page":"8822","DOI":"10.1109\/TVT.2018.2850842","volume":"67","author":"L Zhang","year":"2018","unstructured":"Zhang, L., Gao, Q., Ma, X., Wang, J., Yang, T., Wang, H.: DeFi: robust training-free device-free wireless localization with WiFi. IEEE Trans. Veh. Technol. 67(9), 8822\u20138831 (2018). https:\/\/doi.org\/10.1109\/TVT.2018.2850842","journal-title":"IEEE Trans. Veh. Technol."},{"key":"28_CR7","doi-asserted-by":"publisher","unstructured":"Zhang, L., Wang, H.: 3D-WiFi: 3D localization with commodity WiFi. IEEE Sens. J. 19(13), 5141\u20135152 (2019). https:\/\/doi.org\/10.1109\/JSEN.2019.2900511","DOI":"10.1109\/JSEN.2019.2900511"},{"key":"28_CR8","doi-asserted-by":"crossref","unstructured":"Mainetti, L., Patrono, L., Sergi, I.: A survey on indoor positioning systems. In: 22nd International Conference on Software Telecommunications and Computer Networks (SoftCOM) (2014)","DOI":"10.1109\/SOFTCOM.2014.7039067"},{"key":"28_CR9","doi-asserted-by":"crossref","unstructured":"Van Haute, T., et al.: Performance analysis of multiple Indoor Positioning Systems in a healthcare environment. Int. J. Health Geogr. 15(1), 13\u201315 (2016)","DOI":"10.1186\/s12942-016-0034-z"},{"key":"28_CR10","first-page":"57","volume":"13","author":"D Stojanovic","year":"2014","unstructured":"Stojanovic, D., Stojanovic, N.: Indoor localization and tracking: methods, technologies and research challenges. Facta Universitatis Ser. Autom. Control Robot. 13, 57\u201372 (2014)","journal-title":"Facta Universitatis Ser. Autom. Control Robot."},{"key":"28_CR11","unstructured":"Homepage page Regulation EU. https:\/\/www.privacy-regulation.eu\/. Accessed 14 May 2022"},{"key":"28_CR12","unstructured":"Homepage CNIL PIA. https:\/\/www.cnil.fr\/sites\/default\/files\/atoms\/files\/cnil-pia-3-en-knowledgebases.pdf. Accessed 14 May 2022"},{"key":"28_CR13","doi-asserted-by":"publisher","first-page":"108712","DOI":"10.1016\/j.comnet.2021.108712","volume":"205","author":"M C\u00e4sar","year":"2022","unstructured":"C\u00e4sar, M., Pawelke, T., Steffan, J., Terhorst, G.: A survey on Bluetooth Low Energy security and privacy. In Computer Networks 205, 108712 (2022). https:\/\/doi.org\/10.1016\/j.comnet.2021.108712. ISSN 1389-1286","journal-title":"In Computer Networks"},{"key":"28_CR14","doi-asserted-by":"publisher","unstructured":"Ahmadi, P., Islam, K., Maco, T., Katam, M.: Survey on internet of things security issues and applications. In: International Conference on Computational Science and Computational Intelligence (CSCI), pp. 925\u2013934 (2018). https:\/\/doi.org\/10.1109\/CSCI46756.2018.00182","DOI":"10.1109\/CSCI46756.2018.00182"},{"key":"28_CR15","doi-asserted-by":"publisher","unstructured":"Reziouk, A., Laurent, E., Demay, J.: Practical security overview of IEEE 802.15.4. In: International Conference on Engineering & MIS (ICEMIS), pp. 1\u20139 (2016). https:\/\/doi.org\/10.1109\/ICEMIS.2016.7745382","DOI":"10.1109\/ICEMIS.2016.7745382"},{"key":"28_CR16","series-title":"Studies in Computational Intelligence","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/978-3-319-09885-2_17","volume-title":"Advanced Research in Data Privacy","author":"J Garcia-Alfaro","year":"2015","unstructured":"Garcia-Alfaro, J., Herrera-Joancomart\u00ed, J., Meli\u00e0-Segu\u00ed, J.: Security and privacy concerns about the RFID layer of EPC Gen2 networks. In: Navarro-Arribas, G., Torra, V. (eds.) Advanced Research in Data Privacy. SCI, vol. 567, pp. 303\u2013324. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-09885-2_17"},{"key":"28_CR17","doi-asserted-by":"publisher","unstructured":"Zahariev, P., Hristov, G., Kinaneva, D., Chaisricharoen, R., Georgiev, G., Stoilov, P.: A review on the main characteristics and security vulnerabilities of the wireless communication technologies in the Industry 4.0 domain. In: Joint International Conference on Digital Arts, Media and Technology with ECTI Northern Section Conference on Electrical, Electronics, Computer and Telecommunications Engineering (ECTI DAMT & NCON), pp. 514\u2013517 (2022). https:\/\/doi.org\/10.1109\/ECTIDAMTNCON53731.2022.9720331","DOI":"10.1109\/ECTIDAMTNCON53731.2022.9720331"},{"key":"28_CR18","doi-asserted-by":"publisher","first-page":"22","DOI":"10.3390\/jsan8020022","volume":"8","author":"HA Abdul-Ghani","year":"2019","unstructured":"Abdul-Ghani, H.A., Konstantas, D.: A comprehensive study of security and privacy guidelines, threats, and countermeasures. J. Sens. Actuator Netw. 8, 22 (2019). https:\/\/doi.org\/10.3390\/jsan8020022","journal-title":"J. Sens. Actuator Netw."},{"key":"28_CR19","doi-asserted-by":"publisher","unstructured":"Sainz Raso, J., Martin, S., Diaz, G., Castro, M.: Security vulnerabilities in Raspberry Pi\u2013analysis of the system weaknesses. IEEE Consum. Electron. Mag. 8, 47\u201352. https:\/\/doi.org\/10.1109\/MCE.2019.2941347","DOI":"10.1109\/MCE.2019.2941347"},{"issue":"7","key":"28_CR20","doi-asserted-by":"publisher","first-page":"1321","DOI":"10.1109\/TMC.2012.106","volume":"12","author":"M Seifeldin","year":"2013","unstructured":"Seifeldin, M., Saeed, A., Kosba, A.E., El-Keyi, A., Youssef, M.: Nuzzer: a large-scale device-free passive localization system for wireless environments. IEEE Trans. Mob. Comput. 12(7), 1321\u20131334 (2013). https:\/\/doi.org\/10.1109\/TMC.2012.106","journal-title":"IEEE Trans. Mob. Comput."},{"key":"28_CR21","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"847","DOI":"10.1007\/978-3-030-22354-0_78","volume-title":"Complex, Intelligent, and Software Intensive Systems","author":"B Di Martino","year":"2020","unstructured":"Di Martino, B., Mastroianni, M., Campaiola, M., Morelli, G., Sparaco, E.: Semantic techniques for validation of GDPR compliance of business processes. In: Barolli, L., Hussain, F.K., Ikeda, M. (eds.) CISIS 2019. AISC, vol. 993, pp. 847\u2013855. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-22354-0_78"},{"key":"28_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-87010-2_1","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2021","author":"L Campanile","year":"2021","unstructured":"Campanile, L., Cantiello, P., Iacono, M., Marulli, F., Mastroianni, M.: Risk analysis of a GDPR-compliant deletion technique for consortium blockchains based on pseudonymization. In: Gervasi, O., et al. (eds.) ICCSA 2021. LNCS, vol. 12956, pp. 3\u201314. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-87010-2_1"},{"key":"28_CR23","doi-asserted-by":"publisher","first-page":"9","DOI":"10.5923\/j.ijit.20170601.02","volume":"6","author":"O Kazeem","year":"2017","unstructured":"Kazeem, O., Akintade, O., Kehinde, L.: Comparative study of communication interfaces for sensors and actuators in the cloud of internet of things. Int. J. Internet Things 6, 9\u201313 (2017). https:\/\/doi.org\/10.5923\/j.ijit.20170601.02","journal-title":"Int. J. Internet Things"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2022 Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-10542-5_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,22]],"date-time":"2022-07-22T06:06:49Z","timestamp":1658470009000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-10542-5_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031105418","9783031105425"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-10542-5_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"23 July 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Science and Its Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Malaga","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 July 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 July 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccsa2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iccsa.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CyberChair 4","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"279","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"57","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.6","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8.7","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"285 Workshop submission accepted out of 815 submissions","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}