{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T19:40:10Z","timestamp":1750966810952,"version":"3.41.0"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319676357"},{"type":"electronic","value":"9783319676364"}],"license":[{"start":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T00:00:00Z","timestamp":1509062400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-67636-4_25","type":"book-chapter","created":{"date-parts":[[2017,10,26]],"date-time":"2017-10-26T14:13:20Z","timestamp":1509027200000},"page":"243-252","source":"Crossref","is-referenced-by-count":6,"title":["IoT and Big Data: An Architecture with Data Flow and Security Issues"],"prefix":"10.1007","author":[{"given":"Deepak","family":"Puthal","sequence":"first","affiliation":[]},{"given":"Rajiv","family":"Ranjan","sequence":"additional","affiliation":[]},{"given":"Surya","family":"Nepal","sequence":"additional","affiliation":[]},{"given":"Jinjun","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,27]]},"reference":[{"issue":"1","key":"25_CR1","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1016\/j.jcss.2016.02.005","volume":"83","author":"D Puthal","year":"2017","unstructured":"Puthal, D., Nepal, S., Ranjan, R., Chen, J.: A dynamic prime number based efficient security mechanism for big sensing data streams. J. Comput. Syst. Sci. 83(1), 22\u201342 (2017)","journal-title":"J. Comput. Syst. Sci."},{"issue":"2","key":"25_CR2","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1145\/2937755","volume":"16","author":"D Puthal","year":"2016","unstructured":"Puthal, D., Nepal, S., Ranjan, R., Chen, J.: DLSeF: a dynamic key length based efficient real-time security verification model for big data stream. ACM Trans. Embedded Comput. Syst. 16(2), 51 (2016)","journal-title":"ACM Trans. Embedded Comput. Syst."},{"issue":"3","key":"25_CR3","doi-asserted-by":"crossref","first-page":"1294","DOI":"10.1109\/COMST.2015.2388550","volume":"17","author":"J Granjal","year":"2015","unstructured":"Granjal, J., Monteiro, E., S\u00e1 Silva, J.: Security for the internet of things: a survey of existing protocols and open research issues. IEEE Commun. Surv. Tutor. 17(3), 1294\u20131312 (2015)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"2","key":"25_CR4","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1007\/s11518-013-5219-4","volume":"22","author":"J Tien","year":"2013","unstructured":"Tien, J.: Big data: unleashing information. J. Syst. Sci. Syst. Eng. 22(2), 127\u2013151 (2013)","journal-title":"J. Syst. Sci. Syst. Eng."},{"key":"25_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"458","DOI":"10.1007\/978-3-540-71677-8_30","volume-title":"Public Key Cryptography \u2013 PKC 2007","author":"A Boldyreva","year":"2007","unstructured":"Boldyreva, A., Fischlin, M., Palacio, A., Warinschi, B.: A closer look at PKI: security and efficiency. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp. 458\u2013475. Springer, Heidelberg (2007). doi: 10.1007\/978-3-540-71677-8_30"},{"key":"25_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/978-3-319-26187-4_7","volume-title":"Web Information Systems Engineering \u2013 WISE 2015","author":"D Puthal","year":"2015","unstructured":"Puthal, D., Nepal, S., Ranjan, R., Chen, J.: A dynamic key length based approach for real-time security verification of big sensing data stream. In: Wang, J., Cellary, W., Wang, D., Wang, H., Chen, S.-C., Li, T., Zhang, Y. (eds.) WISE 2015. LNCS, vol. 9419, pp. 93\u2013108. Springer, Cham (2015). doi: 10.1007\/978-3-319-26187-4_7"},{"key":"25_CR7","doi-asserted-by":"crossref","unstructured":"Puthal, D., Nepal, S., Ranjan, R., Chen, J.: DPBSV- an efficient and secure scheme for big sensing data stream. In: 14th\u00a0IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 246\u2013253 (2015)","DOI":"10.1109\/Trustcom.2015.381"},{"issue":"1","key":"25_CR8","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1016\/j.clsr.2009.11.008","volume":"26","author":"R Weber","year":"2010","unstructured":"Weber, R.: Internet of things-new security and privacy challenges. Comput. Law Secur. Rev. 26(1), 23\u201330 (2010)","journal-title":"Comput. Law Secur. Rev."},{"key":"25_CR9","doi-asserted-by":"publisher","unstructured":"Kopetz, H.: Internet of things. In: Kopetz, H. (ed.) Real-Time Systems. Real-Time Systems Series. Springer, Boston (2011). doi: 10.1007\/978-1-4419-8237-7_13","DOI":"10.1007\/978-1-4419-8237-7_13"},{"issue":"4","key":"25_CR10","doi-asserted-by":"crossref","first-page":"2347","DOI":"10.1109\/COMST.2015.2444095","volume":"17","author":"A Al-Fuqaha","year":"2015","unstructured":"Al-Fuqaha, A., et al.: Internet of things: a survey on enabling technologies, protocols, and applications. IEEE Commun. Surv. Tutor. 17(4), 2347\u20132376 (2015)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"2","key":"25_CR11","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1007\/s10796-014-9492-7","volume":"17","author":"S Li","year":"2015","unstructured":"Li, S., Xu, L., Zhao, S.: The internet of things: a survey. Inf. Syst. Front. 17(2), 243\u2013259 (2015)","journal-title":"Inf. Syst. Front."},{"issue":"4","key":"25_CR12","doi-asserted-by":"crossref","first-page":"2233","DOI":"10.1109\/TII.2014.2300753","volume":"10","author":"L Xu","year":"2014","unstructured":"Xu, L., He, W., Li, S.: Internet of things in industries: a survey. IEEE Trans. Industr. Inf. 10(4), 2233\u20132243 (2014)","journal-title":"IEEE Trans. Industr. Inf."},{"issue":"3","key":"25_CR13","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1016\/j.compind.2010.10.004","volume":"62","author":"E Ilie-Zudor","year":"2011","unstructured":"Ilie-Zudor, E., et al.: A survey of applications and requirements of unique identification systems and RFID techniques. Comput. Ind. 62(3), 227\u2013252 (2011)","journal-title":"Comput. Ind."},{"issue":"2","key":"25_CR14","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1109\/COMST.2006.315852","volume":"8","author":"Y Wang","year":"2006","unstructured":"Wang, Y., Attebury, G., Ramamurthy, B.: A survey of security issues in wireless sensor networks. IEEE Commun. Surv. Tutor. 8(2), 2\u201323 (2006)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"25_CR15","unstructured":"IEEE Standard for Local and Metropolitan Area Networks\u2014Part 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs) Amendment 1: MAC Sublayer, IEEE Std. 802.15.4e-2012 (Amendment to IEEE Std. 802.15.4\u20132011), (2011), pp. 1\u2013225 (2012)"},{"key":"25_CR16","doi-asserted-by":"crossref","unstructured":"Thubert, P.: Objective function zero for the routing protocol for low-power and lossy networks (RPL). RFC 6550 (2012)","DOI":"10.17487\/rfc6552"},{"issue":"2","key":"25_CR17","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1109\/MIC.2012.29","volume":"16","author":"C Bormann","year":"2012","unstructured":"Bormann, C., Castellani, A., Shelby, Z.: Coap: an application protocol for billions of tiny internet nodes. IEEE Internet Comput. 16(2), 62 (2012)","journal-title":"IEEE Internet Comput."},{"key":"25_CR18","doi-asserted-by":"crossref","unstructured":"Zheng, T., Ayadi, A., Jiang, X.: TCP over 6LoWPAN for industrial applications: an experimental study. In: 4th IFIP International Conference on New Technologies, Mobility and Security (NTMS), pp. 1\u20134 (2011)","DOI":"10.1109\/NTMS.2011.5720612"},{"key":"25_CR19","doi-asserted-by":"crossref","unstructured":"Conzon, D., Bolognesi, T., Brizzi, P., Lotito, A., Tomasi, R., Spirito, M.: The virtus middleware: an XMPP based architecture for secure IoT communications. In: 21st International Conference on Computer Communications and Networks, pp. 1\u20136 (2012)","DOI":"10.1109\/ICCCN.2012.6289309"},{"key":"25_CR20","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1016\/j.comnet.2014.11.008","volume":"76","author":"S Sicari","year":"2015","unstructured":"Sicari, S., Rizzardi, A., Grieco, L., Coen-Porisini, A.: Security, privacy and trust in internet of things: the road ahead. Comput. Netw. 76, 146\u2013164 (2015)","journal-title":"Comput. Netw."},{"key":"25_CR21","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1007\/978-3-642-21937-5_27","volume-title":"Recent Trends in Wireless and Mobile Networks","author":"S Bandyopadhyay","year":"2011","unstructured":"Bandyopadhyay, S., Sengupta, M., Maiti, S., Dutta, S.: A survey of middleware for internet of things. In: \u00d6zcan, A., Zizka, J., Nagamalai, D. (eds.) CoNeCo\/WiMo -2011. CCIS, vol. 162, pp. 288\u2013296. Springer, Heidelberg (2011). doi: 10.1007\/978-3-642-21937-5_27"},{"key":"25_CR22","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1016\/j.comnet.2014.07.011","volume":"73","author":"G Colistra","year":"2014","unstructured":"Colistra, G., Pilloni, V., Atzori, L.: The problem of task allocation in the internet of things and the consensus-based approach. Comput. Netw. 73, 98\u2013111 (2014)","journal-title":"Comput. Netw."},{"key":"25_CR23","unstructured":"Fox, G., et al.: High performance data streaming in service architecture. Technical report, Indiana University and University of Illinois at Chicago (2004)"},{"key":"25_CR24","doi-asserted-by":"crossref","unstructured":"Nehme, R., Lim, H., Bertino, E., Rundensteiner, E.: StreamShield: a stream-centric approach towards security and privacy in data stream environments. In: ACM SIGMOD International Conference on Management of data, pp. 1027\u20131030 (2009)","DOI":"10.1145\/1559845.1559972"},{"key":"25_CR25","doi-asserted-by":"crossref","unstructured":"Chen, P., Wang, X., Wu, Y., Su, J., Zhou, H.: POSTER: iPKI: identity-based private key infrastructure for securing BGP protocol. In: ACM CCS, pp. 1632\u20131634 (2015)","DOI":"10.1145\/2810103.2810116"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Cloud Infrastructures, Services, and IoT Systems for Smart Cities"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-67636-4_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T19:13:09Z","timestamp":1750965189000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-67636-4_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,27]]},"ISBN":["9783319676357","9783319676364"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-67636-4_25","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2017,10,27]]}}}