{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T15:37:51Z","timestamp":1763480271138,"version":"3.37.3"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2019,3,12]],"date-time":"2019-03-12T00:00:00Z","timestamp":1552348800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["NRF-2017R1D1A1B03032777"],"award-info":[{"award-number":["NRF-2017R1D1A1B03032777"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002560","name":"Soonchunhyang University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002560","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2020,3]]},"DOI":"10.1007\/s12083-019-00737-z","type":"journal-article","created":{"date-parts":[[2019,3,12]],"date-time":"2019-03-12T00:41:15Z","timestamp":1552351275000},"page":"601-609","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["P2P computing for trusted networking of personalized IoT services"],"prefix":"10.1007","volume":"13","author":[{"given":"Dae-Young","family":"Kim","sequence":"first","affiliation":[]},{"given":"Ahyoung","family":"Lee","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7919-6557","authenticated-orcid":false,"given":"Seokhoon","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,12]]},"reference":[{"issue":"15","key":"737_CR1","doi-asserted-by":"publisher","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L Atzori","year":"2010","unstructured":"Atzori L, Iera A, Morabito G (2010) The internet of things: A survey. Comput Netw 54(15):2787\u20132805","journal-title":"Comput Netw"},{"issue":"7","key":"737_CR2","doi-asserted-by":"publisher","first-page":"1645","DOI":"10.1016\/j.future.2013.01.010","volume":"29","author":"J Gubbi","year":"2013","unstructured":"Gubbi J, Buyya R, Marusic S, Palaniswami M (2013) Internet of things (IoT): A vision, architectural elements, and future directions. Futur Gener Comput Syst 29(7):1645\u20131660","journal-title":"Futur Gener Comput Syst"},{"issue":"4","key":"737_CR3","doi-asserted-by":"publisher","first-page":"7172","DOI":"10.3390\/s150407172","volume":"15","author":"S Ali","year":"2015","unstructured":"Ali S, Qaisar SB, Saeed H, Khan MF, Naeem M, Anpalagan A (2015) Network challenges for cyber physical systems with tiny wireless devices: A case study on reliable pipeline condition monitoring. MDPI Sensors 15(4):7172\u20137205","journal-title":"MDPI Sensors"},{"issue":"9","key":"737_CR4","first-page":"4103","volume":"12","author":"W Jing","year":"2018","unstructured":"Jing W, Miao Q, Chen G (2018) An open scheduling framework for QoS resource management in the internet of things. KSII Trans Internet Inf Syst 12(9):4103\u20134121","journal-title":"KSII Trans Internet Inf Syst"},{"issue":"4","key":"737_CR5","doi-asserted-by":"publisher","first-page":"2347","DOI":"10.1109\/COMST.2015.2444095","volume":"17","author":"A Al-Fuqaha","year":"2015","unstructured":"Al-Fuqaha A, Guizani M, Mohammadi M, aledhari M, Ayyash M (2015) Internet of things: A survey on enabling technologies, protocols, and applications. IEEE Commun Surv Tutorials 17(4):2347\u20132376","journal-title":"IEEE Commun Surv Tutorials"},{"issue":"11","key":"737_CR6","first-page":"5182","volume":"11","author":"SK Kim","year":"2017","unstructured":"Kim SK, Sahu N, Preda M (2017) Beginning of a new standard: Internet of media things. KSII Trans Internet Inf Syst 11(11):5182\u20135199","journal-title":"KSII Trans Internet Inf Syst"},{"issue":"1","key":"737_CR7","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/j.icte.2017.03.004","volume":"3","author":"RS Sinha","year":"2017","unstructured":"Sinha RS, Wei Y, Hwang SH (2017) A survey on LPWA technology: LoRa and NB-IoT. ICT Express 3(1):14\u201321","journal-title":"ICT Express"},{"issue":"1","key":"737_CR8","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1007\/s12083-016-0516-6","volume":"11","author":"I Sohn","year":"2018","unstructured":"Sohn I, Yoon SW, Lee SH (2018) Distributed scheduling using belief propagation for internet-of-things (IoT) networks. Peer-to-Peer Netw Appl 11(1):152\u2013161","journal-title":"Peer-to-Peer Netw Appl"},{"key":"737_CR9","first-page":"48","volume-title":"Proc. of international conference on advances in future internet (AFIN)","author":"MT Beck","year":"2014","unstructured":"Beck MT, Werner M, Feld S, Schimper T (2014) Mobile edge computing: A taxonomy. In: Proc. of international conference on advances in future internet (AFIN), pp 48\u201354"},{"key":"737_CR10","unstructured":"Hu YC, Patel M, Sabella D, Sprecher N, Young V (2015) Mobile edge computing - a key technology towards 5G. ETSI White Paper (11)"},{"key":"737_CR11","volume-title":"Proc of IEEE International Conference on Intelligent Systems and Control (ISCO)","author":"A Ahmed","year":"2016","unstructured":"Ahmed A, Ahmed E (2016) A survey on mobile edge computing. In: Proc of IEEE International Conference on Intelligent Systems and Control (ISCO)"},{"issue":"3","key":"737_CR12","doi-asserted-by":"publisher","first-page":"1628","DOI":"10.1109\/COMST.2017.2682318","volume":"19","author":"P Mach","year":"2017","unstructured":"Mach P, Becvar Z (2017) Mobile edge computing: A survey on architecture and computation offloading. IEEE Commun Surv Tutorials 19(3):1628\u20131656","journal-title":"IEEE Commun Surv Tutorials"},{"issue":"4","key":"737_CR13","doi-asserted-by":"publisher","first-page":"766","DOI":"10.1007\/s12083-017-0562-8","volume":"11","author":"K Fan","year":"2018","unstructured":"Fan K, Wang J, Wang X, Li H, Yang Y (2018) Secure, efficient and revocable data sharing scheme for vehicular fogs. Peer-to-Peer Netw Appl 11(4):766\u2013777","journal-title":"Peer-to-Peer Netw Appl"},{"key":"737_CR14","doi-asserted-by":"publisher","first-page":"66831","DOI":"10.1109\/ACCESS.2017.2774239","volume":"6","author":"DY Kim","year":"2017","unstructured":"Kim DY, Kim S, Park JH (2017) Remote software update in trusted connection of long range IoT networking integrated with mobile edge cloud. IEEE Access 6:66831\u201366840. \nhttps:\/\/doi.org\/10.1109\/ACCESS.2017.2774239","journal-title":"IEEE Access"},{"key":"737_CR15","doi-asserted-by":"publisher","unstructured":"Kim DY, Kim S, Park JH (2017) A combined network control approach for the edge cloud and LPWAN-based IoT services. Concurrency and Computation: Practice and Experience. \nhttps:\/\/doi.org\/10.1002\/cpe.4406","DOI":"10.1002\/cpe.4406"},{"issue":"12","key":"737_CR16","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/MCOM.2016.1600492CM","volume":"54","author":"X Sun","year":"2016","unstructured":"Sun X, Ansari N (2016) Edge IoT: Mobile edge computing for the internet of things. IEEE Commun Mag 54(12):22\u201329","journal-title":"IEEE Commun Mag"},{"key":"737_CR17","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1016\/j.jocs.2017.04.014","volume":"22","author":"DY Kim","year":"2017","unstructured":"Kim DY, Kim S, Hassan H, Park JH (2017) Adaptive data rate control in low power wide area networks for long range IoT service. J Comput Sci 22:171\u2013178","journal-title":"J Comput Sci"},{"issue":"1","key":"737_CR18","doi-asserted-by":"publisher","first-page":"16","DOI":"10.3390\/sym9010016","volume":"9","author":"Dae-Young Kim","year":"2017","unstructured":"D.Y. Kim, Y.S. Jeong, S. Kim, \u201cData-filtering system to avoid total data distortion in IoT networking. Symmetry Journal, Vol.9, No.1, ID 16, 2017","journal-title":"Symmetry"},{"issue":"4","key":"737_CR19","first-page":"1799","volume":"12","author":"Z Lin","year":"2018","unstructured":"Lin Z, Xiao F, Sun Y, Ma Y, Xing CC, Huang J (2018) A secure encryption-based malware detection system. KSII Trans Internet Inf Syst 12(4):1799\u20131818","journal-title":"KSII Trans Internet Inf Syst"},{"issue":"4","key":"737_CR20","doi-asserted-by":"publisher","first-page":"1996","DOI":"10.1109\/COMST.2014.2320099","volume":"16","author":"MA Alsheikh","year":"2014","unstructured":"Alsheikh MA, Lin S, Niyato D, Tan HP (2014) Machine learning in wireless sensor networks: Algorithms, strategies, and applications. IEEE Commun Surv Tutorials 16(4):1996\u20132018","journal-title":"IEEE Commun Surv Tutorials"},{"key":"737_CR21","volume-title":"Proc of International Conference on Information, Communications & Signal Processing","author":"M Di","year":"2007","unstructured":"Di M, Joo EM (2007) A survey of machine learning in wireless sensor networks form networking and application perspectives. In: Proc of International Conference on Information, Communications & Signal Processing"},{"key":"737_CR22","unstructured":"Goodfellow I, Bengio Y, Courville A (2016) Deep learning. The MIT press, Cambridge"},{"issue":"6","key":"737_CR23","doi-asserted-by":"publisher","first-page":"1176","DOI":"10.1007\/s12083-017-0614-0","volume":"11","author":"Seokhoon Kim","year":"2017","unstructured":"Kim S, Kim DY (2018) Efficient data-forwarding method in delay-tolerant P2P networking for IoT services. Peer-to-Peer Netw Appl 11(6):1176\u20131185","journal-title":"Peer-to-Peer Networking and Applications"},{"issue":"9","key":"737_CR24","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/S1361-3723(15)30084-1","volume":"2015","author":"C Tankard","year":"2015","unstructured":"Tankard C (2015) The security issues of the internet of things. Computer Fraud & Security 2015(9):11\u201314","journal-title":"Computer Fraud & Security"},{"key":"737_CR25","unstructured":"C.Y. Chen, M. Hasan, S. Mohan, \u201cSecuring real-time internet of things. arXiv preprint arXiv:1705.08489, pp.1-10, 2017, 2018"},{"key":"737_CR26","volume-title":"Probability models for computer science","author":"SM Ross","year":"2002","unstructured":"Ross SM (2002) Probability models for computer science. Harcourt\/Academic Press, Orlando"},{"key":"737_CR27","volume-title":"Probability and statistics with reliability, queuing and computer science applications","author":"KS Trivedi","year":"2001","unstructured":"Trivedi KS (2001) Probability and statistics with reliability, queuing and computer science applications. Wiley, Chichester"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-019-00737-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12083-019-00737-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-019-00737-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,10]],"date-time":"2020-03-10T20:31:58Z","timestamp":1583872318000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12083-019-00737-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,12]]},"references-count":27,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,3]]}},"alternative-id":["737"],"URL":"https:\/\/doi.org\/10.1007\/s12083-019-00737-z","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2019,3,12]]},"assertion":[{"value":"15 October 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 February 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 March 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}