{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T07:19:30Z","timestamp":1760080770821,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031235818"},{"type":"electronic","value":"9783031235825"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-23582-5_6","type":"book-chapter","created":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:29:01Z","timestamp":1672532941000},"page":"77-91","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["An IoT Simulator Tool for\u00a0Provisioning Secure and Dynamic User-centric Services"],"prefix":"10.1007","author":[{"given":"Damilola","family":"Alao","sequence":"first","affiliation":[]},{"given":"Emily","family":"Hamrick","sequence":"additional","affiliation":[]},{"given":"Saman","family":"Bhat","sequence":"additional","affiliation":[]},{"given":"Amartya","family":"Sen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8850-8594","authenticated-orcid":false,"given":"Kenneth","family":"Fletcher","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,1]]},"reference":[{"key":"6_CR1","first-page":"511","volume":"2017","author":"A Biryukov","year":"2017","unstructured":"Biryukov, A., Perrin, L.: State of the art in lightweight symmetric cryptography. IACR Cryptol. ePrint Arch. 2017, 511 (2017)","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"6_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1007\/978-3-540-74735-2_31","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"A Bogdanov","year":"2007","unstructured":"Bogdanov, A., et al.: PRESENT: an ultra-lightweight block cipher. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 450\u2013466. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-74735-2_31"},{"doi-asserted-by":"crossref","unstructured":"Chernyshev, M., Baig, Z., Bello, O., Zeadally, S.: Internet of Things (IoT): research, simulators, and testbeds. IEEE Internet Things J. 5(3), 1637\u20131647 (2018)","key":"6_CR3","DOI":"10.1109\/JIOT.2017.2786639"},{"unstructured":"Dinu, D., Biryukov, A., Groszsch\u00e4dl, J., Khovratovich, D., Corre, Y.L., Perrin, L.: FELICS - fair evaluation of lightweight cryptographic systems. In: NIST Workshop on Lightweight Cryptography (2015)","key":"6_CR4"},{"issue":"3","key":"6_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s00145-021-09398-9","volume":"34","author":"C Dobraunig","year":"2021","unstructured":"Dobraunig, C., Eichlseder, M., Mendel, F., Schl\u00e4ffer, M.: Ascon v1.2: lightweight Authenticated Encryption and Hashing. J. Cryptol. 34(3), 1\u201342 (2021). https:\/\/doi.org\/10.1007\/s00145-021-09398-9","journal-title":"J. Cryptol."},{"doi-asserted-by":"crossref","unstructured":"Goyal, T.K., Sahula, V.: Lightweight security algorithm for low power IoT devices. In: 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 1725\u20131729 (2016)","key":"6_CR6","DOI":"10.1109\/ICACCI.2016.7732296"},{"doi-asserted-by":"crossref","unstructured":"Gupta, H., Vahid Dastjerdi, A., Ghosh, S.K., Buyya, R.: iFogSim: A toolkit for modeling and simulation of resource management techniques in the Internet of Things, Edge and Fog computing environments. Softw.: Pract. Exp. 47(9), 1275\u20131296 (2017)","key":"6_CR7","DOI":"10.1002\/spe.2509"},{"doi-asserted-by":"crossref","unstructured":"Han, S.N., et al.: DPWSim: a simulation toolkit for IoT applications using devices profile for web services. In: 2014 IEEE World Forum on Internet of Things (WF-IoT), pp. 544\u2013547 (2014)","key":"6_CR8","DOI":"10.1109\/WF-IoT.2014.6803226"},{"unstructured":"Homma, N., et al.: Cryptographic technology guideline (lightweight cryptography). Cryptographic Technology Guideline, pp. 1\u2013112 (2017)","key":"6_CR9"},{"issue":"1","key":"6_CR10","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/MCC.2017.18","volume":"4","author":"G Kecskemeti","year":"2017","unstructured":"Kecskemeti, G., Casale, G., Jha, D.N., Lyon, J., Ranjan, R.: Modelling and simulation challenges in Internet of Things. IEEE Cloud Comput. 4(1), 62\u201369 (2017)","journal-title":"IEEE Cloud Comput."},{"key":"6_CR11","first-page":"718","volume":"2013","author":"X Lei","year":"2013","unstructured":"Lei, X., Liao, X.: Ntru-ke: A lattice-based public key exchange protocol. IACR Cryptol. ePrint Arch. 2013, 718 (2013)","journal-title":"IACR Cryptol. ePrint Arch."},{"doi-asserted-by":"crossref","unstructured":"Mehdi, K., Lounis, M., Bounceur, A., Kechadi, T.: CupCarbon: a multi-agent and discrete event wireless sensor network design and simulation tool. In: Proceedings of the 7th International ICST Conference on Simulation Tools and Techniques (2014)","key":"6_CR12","DOI":"10.4108\/icst.simutools.2014.254811"},{"doi-asserted-by":"crossref","unstructured":"Osterlind, F., Dunkels, A., Eriksson, J., Finne, N., Voigt, T.: Cross-level sensor network simulation with cooja. In: Proceedings. 2006 31st IEEE Conference on Local Computer Networks, pp. 641\u2013648 (2006)","key":"6_CR13","DOI":"10.1109\/LCN.2006.322172"},{"doi-asserted-by":"crossref","unstructured":"Philip, M., Vaithiyanathan: A survey on lightweight ciphers for IoT devices. In: 2017 International Conference on Technological Advancements in Power and Energy (TAP Energy), pp. 1\u20134 (12 2017)","key":"6_CR14","DOI":"10.1109\/TAPENERGY.2017.8397271"},{"doi-asserted-by":"crossref","unstructured":"Sen, A., Fletcher, K., Madria, S.: A secure user-centric framework for dynamic service provisioning in IoT environments. In: 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications\/13th IEEE International Conference on Big Data Science and Engineering (TrustCom\/BigDataSE), pp. 334\u2013341 (2019)","key":"6_CR15","DOI":"10.1109\/TrustCom\/BigDataSE.2019.00052"},{"key":"6_CR16","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1016\/j.sysarc.2016.06.008","volume":"72","author":"X Zeng","year":"2017","unstructured":"Zeng, X., Garg, S.K., Strazdins, P., Jayaraman, P.P., Georgakopoulos, D., Ranjan, R.: IOTSim: a simulator for analysing IoT applications. J. Syst. Architect. 72, 93\u2013107 (2017)","journal-title":"J. Syst. Architect."}],"container-title":["Lecture Notes in Computer Science","Internet of Things \u2013 ICIOT 2022"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-23582-5_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:32:53Z","timestamp":1672533173000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-23582-5_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031235818","9783031235825"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-23582-5_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"1 January 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICIOT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Internet of Things","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Honolulu, HI","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 December 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 December 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iciot2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.servicessociety.org\/iciot","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EDAS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"17","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"9","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"53% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}