{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T13:00:54Z","timestamp":1771333254034,"version":"3.50.1"},"reference-count":56,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,11,10]],"date-time":"2021-11-10T00:00:00Z","timestamp":1636502400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,11,10]],"date-time":"2021-11-10T00:00:00Z","timestamp":1636502400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61802006"],"award-info":[{"award-number":["61802006"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2022,2]]},"DOI":"10.1007\/s11036-021-01841-2","type":"journal-article","created":{"date-parts":[[2021,11,10]],"date-time":"2021-11-10T03:04:32Z","timestamp":1636513472000},"page":"392-403","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Security Standards and Measures for Massive IoT in the 5G Era"],"prefix":"10.1007","volume":"27","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3923-523X","authenticated-orcid":false,"given":"Qin","family":"Qiu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1667-2237","authenticated-orcid":false,"given":"Ding","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xuetao","family":"Du","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6110-6413","authenticated-orcid":false,"given":"Shengquan","family":"Yu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4101-6933","authenticated-orcid":false,"given":"Shenglan","family":"Liu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2080-1564","authenticated-orcid":false,"given":"Bei","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,11,10]]},"reference":[{"issue":"2","key":"1841_CR1","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1109\/MCOM.2017.1600435CM","volume":"55","author":"P Schulz","year":"2017","unstructured":"Schulz P, Matthe M, Klessig H (2017) Latency critical IoT applications in 5G: perspective on the Design of Radio Interface and Network Architecture. IEEE Commun Mag 55(2):70\u201378","journal-title":"IEEE Commun Mag"},{"key":"1841_CR2","doi-asserted-by":"crossref","unstructured":"Qiu Q, Du XT, Yu SQ et al (2020) Research on IoT security technology and standardization in the 5G era. International conference on security and privacy in new computing environments, pp. 77\u201390","DOI":"10.1007\/978-3-030-66922-5_5"},{"issue":"1","key":"1841_CR3","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/MCOMSTD.2018.1700063","volume":"2","author":"I Ahmad","year":"2018","unstructured":"Ahmad I, Kumar T, Liyanage M et al (2018) Overview of 5G security challenges and solutions. IEEE Commun Std Mag 2(1):36\u201343","journal-title":"IEEE Commun Std Mag"},{"key":"1841_CR4","doi-asserted-by":"crossref","unstructured":"Ahmad I, Kumar T, Liyanage M et al (2017) 5G security: analysis of threats and solutions. In: IEEE conference on standards for communications and networking (CSCN). IEEE Press","DOI":"10.1109\/CSCN.2017.8088621"},{"key":"1841_CR5","unstructured":"Huang Q, Yang C (2011) A lightweight RFID authenticate protocol based on smart SIM card. In: Proceedings of the 1st international conference on logistics, informatics and service science, pp 647\u2013650. IEEE Press"},{"issue":"4","key":"1841_CR6","doi-asserted-by":"crossref","first-page":"629","DOI":"10.1016\/j.csi.2008.06.011","volume":"31","author":"R He","year":"2009","unstructured":"He R, Zhao G, Chang C et al (2009) A PK-SIM card based end-to-end security framework for SMS. Comput Std Interfaces 31(4):629\u2013641","journal-title":"Comput Std Interfaces"},{"key":"1841_CR7","unstructured":"Liu SL, Qiu Q, Zhao B et al (2020) 5G-based IoT security technology. In: Proceedings of 5G network innovation seminar, pp 119\u2013123"},{"key":"1841_CR8","unstructured":"TC 260 (2019) Communication security standards working group. White paper on Internet of Things security standardization"},{"key":"1841_CR9","doi-asserted-by":"crossref","unstructured":"Neisse R, Steri G, Baldini G (2014) Enforcement of security policy rules for the Internet of Things. In: The 3rd international workshop on internet of things communications and technologies (IoT-CT), IEEE Press","DOI":"10.1109\/WiMOB.2014.6962166"},{"key":"1841_CR10","unstructured":"Ministry of industry and information technology: accelerate the development of 5G and Internet of Things related industries, http:\/\/www.sohu.com\/a\/339209778_166680"},{"issue":"2","key":"1841_CR11","doi-asserted-by":"crossref","first-page":"1561","DOI":"10.1109\/JIOT.2018.2846803","volume":"6","author":"J Cao","year":"2019","unstructured":"Cao J, Yu P, Ma M et al (2019) Fast authentication and data transfer scheme for massive NB-IoT devices in 3GPP 5G network. IEEE Internet Things J 6(2):1561\u20131575","journal-title":"IEEE Internet Things J"},{"key":"1841_CR12","doi-asserted-by":"crossref","first-page":"55765","DOI":"10.1109\/ACCESS.2018.2872781","volume":"6","author":"P Popovski","year":"2018","unstructured":"Popovski P, Trillingsgaard KF, Simeone O et al (2018) 5G wireless network slicing for eMBB, URLLC, and mMTC: a communication-theoretic view. IEEE Access 6:55765\u201355779","journal-title":"IEEE Access"},{"key":"1841_CR13","doi-asserted-by":"crossref","first-page":"28969","DOI":"10.1109\/ACCESS.2018.2837382","volume":"6","author":"C Bockelmann","year":"2018","unstructured":"Bockelmann C, Pratas NK, Wunder G et al (2018) Towards massive connectivity support for scalable mMTC communications in 5G networks. IEEE Access 6:28969\u201328992","journal-title":"IEEE Access"},{"key":"1841_CR14","doi-asserted-by":"crossref","unstructured":"Chakrapani A (2017) Efficient resource scheduling for eMTC\/NB-IoT communications in LTE Rel. 13. In: IEEE conference on standards for communications and networking (CSCN), pp 66\u201371. IEEE Press","DOI":"10.1109\/CSCN.2017.8088600"},{"key":"1841_CR15","unstructured":"ISO\/IEC (2012) ISO\/IEC 29192 Information Technology - Security Techniques - Lightweight Cryptography"},{"key":"1841_CR16","unstructured":"ISO\/IEC (2018) ISO\/IEC 30141 Information Technology - Internet of Things Reference Architecture"},{"issue":"9","key":"1841_CR17","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1109\/MCOM.2016.7565271","volume":"54","author":"V Kafle","year":"2016","unstructured":"Kafle V, Fukushima Y, Harai H (2016) Internet of Things standardization in ITU and prospective networking technologies. IEEE Commun Mag 54(9):43\u201349","journal-title":"IEEE Commun Mag"},{"key":"1841_CR18","unstructured":"ETSI (2019) ETSI releases first globally applicable standard for consumer IoT security. China Standardization"},{"issue":"6","key":"1841_CR19","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1109\/MWC.2013.6704479","volume":"20","author":"Z Sheng","year":"2016","unstructured":"Sheng Z, Yang S, Yu Y et al (2016) A survey on the IETF protocol suite for the Internet of Things: standards, challenges, and opportunities. IEEE Wirel Commun 20(6):91\u201398","journal-title":"IEEE Wirel Commun"},{"key":"1841_CR20","unstructured":"GB\/T (2018) GB\/T 37044-2018. Information Security Technology- Security Reference Model and Generic Requirements for Internet of Things"},{"key":"1841_CR21","unstructured":"GB\/T (2019) GB\/T 22239\u20132019. Information Security Technology - Baseline for Classified Protection of Cybersecurity"},{"key":"1841_CR22","unstructured":"YD\/T (2012) YD\/T 2437-2012. General Framework and Technical Requirements of IoT (Internet of Things)"},{"key":"1841_CR23","unstructured":"YD\/T (2018) YD\/T 3331-2018. General Requirement for Cellular Narrowband Radio Access for Internet of Things (NB-IoT)"},{"issue":"3","key":"1841_CR24","first-page":"487","volume":"55","author":"H Lu","year":"2018","unstructured":"Lu H, Chen D, Fan B, Wang Y, Wu Y (2018) Standardization progress and case analysis of edge computing. J Comput Res Dev 55(3):487\u2013511","journal-title":"J Comput Res Dev"},{"key":"1841_CR25","unstructured":"ISO\/IEC (2018) ISO\/IEC 30141:2018. Internet of Things (IoT) - Reference Architecture"},{"key":"1841_CR26","doi-asserted-by":"publisher","DOI":"10.1145\/3325130(2019)","author":"D Wang","year":"2019","unstructured":"Wang D, Wang P, Wang C (2019) Efficient multi-factor user authentication protocol with forward secrecy for real-time data access in WSNs. ACM Trans Cyber-Phys Syst. https:\/\/doi.org\/10.1145\/3325130(2019)","journal-title":"ACM Trans Cyber-Phys Syst"},{"key":"1841_CR27","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.2974220","author":"C Wang","year":"2020","unstructured":"Wang C, Wang D, Tu Y, Xu G, Wang H (2020) Understanding node capture attacks in user authentication schemes for wireless sensor networks. IEEE Trans Depend Secure Comput. https:\/\/doi.org\/10.1109\/TDSC.2020.2974220","journal-title":"IEEE Trans Depend Secure Comput"},{"issue":"9","key":"1841_CR28","doi-asserted-by":"crossref","first-page":"4081","DOI":"10.1109\/TII.2018.2834351","volume":"14","author":"D Wang","year":"2018","unstructured":"Wang D, Li W, Wang P (2018) Measuring two-factor authentication schemes for real-time data access in industrial wireless sensor networks. IEEE Trans Ind Inf 14(9):4081\u20134092","journal-title":"IEEE Trans Ind Inf"},{"issue":"3","key":"1841_CR29","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1109\/MWC.2018.1700327","volume":"25","author":"Z Xi","year":"2018","unstructured":"Xi Z, Qixuan Z (2018) Hierarchical caching for statistical QoS guaranteed multimedia transmissions over 5G edge computing mobile wireless networks. IEEE Wirel Commun 25(3):12\u201320","journal-title":"IEEE Wirel Commun"},{"issue":"10","key":"1841_CR30","doi-asserted-by":"crossref","first-page":"6101","DOI":"10.1109\/TIT.2019.2924621","volume":"65","author":"F Li","year":"2019","unstructured":"Li F, Chen J, Wang Z (2019) Wireless map reduce distributed computing. IEEE Trans Inf Theory 65(10):6101\u20136114","journal-title":"IEEE Trans Inf Theory"},{"key":"1841_CR31","doi-asserted-by":"crossref","unstructured":"Cordelli E, Pennazza G, Sabatini M et al (2018) An open-source smart sensor architecture for edge computing in IoT applications","DOI":"10.3390\/proceedings2130955"},{"issue":"1","key":"1841_CR32","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/JPROC.2017.2780172","volume":"106","author":"A Burg","year":"2018","unstructured":"Burg A, Chattopadhyay A, Lam K (2018) Wireless communication and security issues for cyber-physical systems and the Internet-of-Things. Proc IEEE 106(1):38\u201360","journal-title":"Proc IEEE"},{"key":"1841_CR33","volume-title":"Security for the Internet of Things: A survey of existing protocols and open research issues IEEE Communications Surveys & Tutorials","author":"J Granjal","year":"2015","unstructured":"Granjal J, Monteiro E, Silva J (2015) Security for the Internet of Things: A survey of existing protocols and open research issues IEEE Communications Surveys & Tutorials. IEEE Press"},{"key":"1841_CR34","first-page":"1","volume":"99","author":"A Alnoman","year":"2019","unstructured":"Alnoman A, Sharma SK, Ejaz W et al (2019) Emerging edge computing technologies for distributed IoT systems. IEEE Netw 99:1\u20138","journal-title":"IEEE Netw"},{"issue":"2","key":"1841_CR35","doi-asserted-by":"crossref","first-page":"1558","DOI":"10.1109\/TII.2014.2306391","volume":"10","author":"H Cai","year":"2014","unstructured":"Cai H, Xu L, Xu B et al (2014) IoT-Based configurable information service platform for product lifecycle management. IEEE Trans Ind Inf 10(2):1558\u20131567","journal-title":"IEEE Trans Ind Inf"},{"issue":"1","key":"1841_CR36","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1109\/MCOM.2017.1600267CM","volume":"55","author":"K Zhang","year":"2017","unstructured":"Zhang K, Ni J, Yang K et al (2017) Security and privacy in smart city applications: challenges and solutions. IEEE Commun Mag 55(1):122\u2013129","journal-title":"IEEE Commun Mag"},{"key":"1841_CR37","doi-asserted-by":"crossref","unstructured":"Song Y, Yau S, Yu R et al (2017) An approach to QoS-based task distribution in edge computing networks for IoT applications. In: IEEE international conference on edge computing. IEEE","DOI":"10.1109\/IEEE.EDGE.2017.50"},{"key":"1841_CR38","volume-title":"Industrial Internet: A Survey on the enabling technologies, applications, and challenges. IEEE Communications Surveys & Tutorials","author":"J Li","year":"2017","unstructured":"Li J, Yu F, Deng G et al (2017) Industrial Internet: A Survey on the enabling technologies, applications, and challenges. IEEE Communications Surveys & Tutorials. IEEE Press"},{"key":"1841_CR39","doi-asserted-by":"crossref","unstructured":"Joy J, Gerla M (2017) Internet of vehicles and autonomous connected car - privacy and security issues. In: International conference on computer communication & networks. IEEE Press","DOI":"10.1109\/ICCCN.2017.8038391"},{"issue":"1","key":"1841_CR40","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1109\/MNET.2018.1700202","volume":"32","author":"H Li","year":"2018","unstructured":"Li H, Ota K, Dong M (2018) Learning IoT in edge: deep learning for the internet of things with edge computing. IEEE Netw 32(1):96\u2013101","journal-title":"IEEE Netw"},{"issue":"2","key":"1841_CR41","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1109\/MIC.2018.022021657","volume":"22","author":"M Gusev","year":"2018","unstructured":"Gusev M, Dustdar S (2018) Going back to the roots\u2014the evolution of edge computing. An IoT perspective. IEEE Internet Comput 22(2):5\u201315","journal-title":"IEEE Internet Comput"},{"key":"1841_CR42","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1016\/j.jnca.2016.06.009","volume":"72","author":"T Qiu","year":"2016","unstructured":"Qiu T, Lu Y, Xia F et al (2016) ERGID: an efficient routing protocol for emergency response Internet of Things. J Netw Comput Appl 72:104","journal-title":"J Netw Comput Appl"},{"issue":"2","key":"1841_CR43","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1049\/iet-ifs.2018.5189","volume":"13","author":"X Rongrong","year":"2019","unstructured":"Rongrong X, Xiaochun Y, Zhiyu H (2019) Framework for risk assessment in cyber situational awareness. IET Inf Secur 13(2):149\u2013156","journal-title":"IET Inf Secur"},{"key":"1841_CR44","doi-asserted-by":"crossref","unstructured":"Norrman K, Dubrova E (2016) Protecting IMSI and user privacy in 5G networks. In: EAI international conference on mobile multimedia communications. ICST","DOI":"10.4108\/eai.18-6-2016.2264114"},{"key":"1841_CR45","first-page":"1","volume":"10","author":"S Li","year":"2018","unstructured":"Li S, Xu L, Zhao S (2018) 5G internet of things: a survey. J Ind Inf Integr 10:1\u20139","journal-title":"J Ind Inf Integr"},{"key":"1841_CR46","first-page":"1","volume":"4","author":"S Singh","year":"2017","unstructured":"Singh S, Sharma PK, Moon SY et al (2017) Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions. J Ambient Intell Hum Comput 4:1\u201318","journal-title":"J Ambient Intell Hum Comput"},{"key":"1841_CR47","first-page":"65","volume":"4","author":"M Alizadeh","year":"2013","unstructured":"Alizadeh M, Hassan WH, Zamani M et al (2013) Implementation and evaluation of lightweight encryption algorithms suitable for RFID. J Next Gen Inf Technol 4:65","journal-title":"J Next Gen Inf Technol"},{"key":"1841_CR48","unstructured":"An-Ping L, Ji-Min Y, Feng LI et al (2014) A comparative study of several lightweight encryption algorithms. Mod Electron Tech"},{"issue":"4","key":"1841_CR49","first-page":"708","volume":"15","author":"D Wang","year":"2018","unstructured":"Wang D, Wang P (2018) Two birds with one stone: two-factor authentication with security beyond conventional bound. IEEE Trans Depend Secure Comput 15(4):708\u2013722","journal-title":"IEEE Trans Depend Secure Comput"},{"issue":"1","key":"1841_CR50","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1109\/TNSM.2020.2971213","volume":"17","author":"A Sivanathan","year":"2020","unstructured":"Sivanathan A, Gharakheili H, Sivaraman V (2020) Managing IoT cyber-security using programmable telemetry and machine learning. IEEE Trans Netw Serv Manage 17(1):60\u201374","journal-title":"IEEE Trans Netw Serv Manage"},{"key":"1841_CR51","doi-asserted-by":"crossref","unstructured":"Bertino E (2020) IoT security a comprehensive life cycle framework. In: 2019 IEEE 5th international conference on collaboration and internet computing (CIC)","DOI":"10.1109\/CIC48465.2019.00033"},{"issue":"12","key":"1841_CR52","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1007\/s10916-016-0647-6","volume":"40","author":"M Rathore","year":"2016","unstructured":"Rathore M, Ahmad A, Paul A et al (2016) Real-time medical emergency response system: exploiting IoT and big data for public health. J Med Syst 40(12):283","journal-title":"J Med Syst"},{"issue":"2","key":"1841_CR53","doi-asserted-by":"crossref","first-page":"680","DOI":"10.1016\/j.future.2016.11.009","volume":"78","author":"R Roman","year":"2018","unstructured":"Roman R, Lopez J, Mambo M (2018) Mobile edge computing, Fog et al. A survey and analysis of security threats and challenges. Fut Gen Comput Syst 78(2):680-698.","journal-title":"Fut Gen Comput Syst"},{"key":"1841_CR54","doi-asserted-by":"crossref","unstructured":"Pahl C, Ioini NE, Helmer S (2018) A decision framework for blockchain platforms for IoT and edge computing. In: International confernce on internet of things, big data & security","DOI":"10.5220\/0006688601050113"},{"key":"1841_CR55","first-page":"1","volume":"99","author":"R Li","year":"2019","unstructured":"Li R, Zhou Z, Chen X et al (2019) Resource price-aware offloading for edge-cloud collaboration: a two-timescale online control approach. IEEE Trans Cloud Comput 99:1\u20131","journal-title":"IEEE Trans Cloud Comput"},{"issue":"5","key":"1841_CR56","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1109\/MCOM.001.1900594","volume":"58","author":"Q Han","year":"2020","unstructured":"Han Q, Yang S, Ren X et al (2020) Online learning for edge-cloud collaborative learning on heterogeneous edges with resource constraints. IEEE Commun Mag 58(5):49\u201355","journal-title":"IEEE Commun Mag"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-021-01841-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11036-021-01841-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-021-01841-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,25]],"date-time":"2022-03-25T18:06:44Z","timestamp":1648231604000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11036-021-01841-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,10]]},"references-count":56,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,2]]}},"alternative-id":["1841"],"URL":"https:\/\/doi.org\/10.1007\/s11036-021-01841-2","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"value":"1383-469X","type":"print"},{"value":"1572-8153","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,11,10]]},"assertion":[{"value":"6 February 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 November 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}