{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T08:35:13Z","timestamp":1758875713380},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2016,8,30]],"date-time":"2016-08-30T00:00:00Z","timestamp":1472515200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100011581","name":"Indian Institute of Technology Indore","doi-asserted-by":"crossref","award":["CPDA 2013-2016"],"award-info":[{"award-number":["CPDA 2013-2016"]}],"id":[{"id":"10.13039\/501100011581","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Indian Institute of Technology Indore (IN)","award":["PRIUS Scheme 2015-16","PRIUS 2015-16"],"award-info":[{"award-number":["PRIUS Scheme 2015-16","PRIUS 2015-16"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Reliable Intell Environ"],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1007\/s40860-016-0027-5","type":"journal-article","created":{"date-parts":[[2016,8,30]],"date-time":"2016-08-30T11:21:36Z","timestamp":1472556096000},"page":"131-144","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["One IoT: an IoT protocol and framework for OEMs to make IoT-enabled devices forward compatible"],"prefix":"10.1007","volume":"2","author":[{"given":"Gourinath","family":"Banda","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Chaitanya Krishna","family":"Bommakanti","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Harsh","family":"Mohan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2016,8,30]]},"reference":[{"key":"27_CR1","unstructured":"Harbor Research (2014) What exactly is the \u2019internet of things\u2019?. http:\/\/harborresearch.com\/wp-content\/uploads\/2014\/03\/Harbor-Postscapes-Infographic_March-2014.pdf"},{"key":"27_CR2","unstructured":"Evans PC, Annunziata M (2012) Industrial internet: pushing the boundaries of minds and machines. http:\/\/www.ge.com\/sites\/default\/files\/Industrial_Internet.pdf"},{"key":"27_CR3","unstructured":"IEEE: Towards a definition of the Internet of Things (IoT) (2015)"},{"key":"27_CR4","doi-asserted-by":"publisher","unstructured":"Bonomi F, Milito R, Zhu J, Addepalli S (2012) Fog computing and its role in the internet of things. In: Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, MCC \u201912, pp 13\u201316. ACM, New York, NY, USA. doi: 10.1145\/2342509.2342513","DOI":"10.1145\/2342509.2342513"},{"key":"27_CR5","unstructured":"Thingworx Platform. http:\/\/www.thingworx.com"},{"key":"27_CR6","unstructured":"Open Interconnect Consortium: The Open Interconnect Consortium and IoTivity (2015). http:\/\/openinterconnect.org\/wp-content\/uploads\/2015\/07\/OIC-IoTivity_White-Paper_Final.pdf"},{"key":"27_CR7","unstructured":"Industrial Internet Consortium: Industrial internet reference architecture. Tech. rep., Industrial Internet Consortium (2015). http:\/\/www.iiconsortium.org\/IIRA-1-7-ajs.pdf"},{"key":"27_CR8","unstructured":"Ministry of Communication and Information Technology India D.: Draft policy on internet of things. Tech. rep., Government of India (2015)"},{"key":"27_CR9","unstructured":"EU 2012 (2012) The artemis embedded computing systems initiative. http:\/\/www.artemis-ju.eu\/"},{"key":"27_CR10","unstructured":"Information and Communications (ICT) Services businesses and technologies: Internet of Things Strategic Research Agenda (IoT-SRA) (2011)"},{"key":"27_CR11","doi-asserted-by":"crossref","unstructured":"Shelby Z, Bormann C (2009) 6lowpan\u2014the wireless embedded internet","DOI":"10.1002\/9780470686218"},{"issue":"2","key":"27_CR12","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/MIC.2009.46","volume":"13","author":"F Thiesse","year":"2009","unstructured":"Thiesse F, Floerkemeier C, Harrison M, Michahelles F, Roduner C (2009) Technology, standards, and real-world deployments of the EPC network. IEEE Internet Comput 13(2):36","journal-title":"IEEE Internet Comput"},{"key":"27_CR13","unstructured":"Bluetooth-SIG (2007) Bluetooth core specification version 2.1+ edr. Specification of the Bluetooth system"},{"key":"27_CR14","unstructured":"Baddeley D (1999) Identification cards\u2013contactless integrated circuit (s) cards\u2013proximity cards\u2013part 2: radio frequency power and signal interface. ISO\/IEC, pp 14443\u20132"},{"key":"27_CR15","unstructured":"Oltsik J (2014) The internet of things: a ciso and network security perspective. Tech. rep, Cisco Systems"},{"key":"27_CR16","unstructured":"Wind River (2015) Security in the internet of things. Tech. rep, Wind River Systems"},{"key":"27_CR17","doi-asserted-by":"crossref","unstructured":"Morris R, Thompson K (1979) Password security: a case history. Commun ACM 22(11):594\u2013597","DOI":"10.1145\/359168.359172"},{"key":"27_CR18","doi-asserted-by":"crossref","unstructured":"Mirkovi\u0107 J., Prier G, Reiher P (2002) Attacking ddos at the source. In: 10th IEEE International Conference on Network Protocols, 2002. Proceedings. IEEE, pp. 312\u2013321","DOI":"10.1109\/ICNP.2002.1181418"},{"key":"27_CR19","unstructured":"Wood AD, Stankovic JA (2004) A taxonomy for denial-of-service attacks in wireless sensor networks. Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems, pp 739\u2013763"},{"key":"27_CR20","unstructured":"Yogesh DS, Rajendra K, Neminath H (2015) An experience report on scalable implementation of ddos attack detection. In: Advanced Information Systems Engineering Workshops. Springer, Berlin, pp 518\u2013529"},{"key":"27_CR21","unstructured":"Rossum GV (1995) Python Tutorial. Technical Report CS-R9526, Centrum voor Wiskunde en Informatica"},{"issue":"131","key":"27_CR22","first-page":"6","volume":"2005","author":"K Kinder","year":"2005","unstructured":"Kinder K (2005) Event-driven programming with twisted and python. Linux J 2005(131):6","journal-title":"Linux J"},{"key":"27_CR23","unstructured":"IETF: The constrained application protocol (coap) (2014). https:\/\/tools.ietf.org\/html\/rfc7252"},{"key":"27_CR24","unstructured":"AllJoyn. https:\/\/allseenalliance.org\/framework\/documentation\/learn . Accessed 21 Oct 2015"},{"key":"27_CR25","unstructured":"Wigwag IoT Platform. URL http:\/\/www.wigwag.com . Accessed 23 Sep 2015"},{"key":"27_CR26","unstructured":"Industrial Internet Consortium: Industrial internet reference architecture (2015). http:\/\/www.iiconsortium.org\/IIRA-1-7-AJS.pdf"},{"key":"27_CR27","unstructured":"Open Internet Consortium: Reference implementation of the internet of things (2015). URL http:\/\/www.openinterconnect.org\/developer-resources-specs.pdf"},{"key":"27_CR28","unstructured":"Orlandi B, Scahill F (2012) Wi-fi roaming\u2013building on andsf and hotspot 2.0. Alcatel-Lucent and British Telecommunications, Tech. Rep"},{"key":"27_CR29","doi-asserted-by":"publisher","unstructured":"Banda G, Gallagher JP (2010) Constraint-based abstract semantics for temporal logic: A direct approach to design and implementation. In: Logic for Programming, Artificial Intelligence, and Reasoning\u201416th International Conference, LPAR-16, Dakar, Senegal, April 25\u2013May 1, 2010, Revised Selected Papers, pp 27\u201345. doi: 10.1007\/978-3-642-17511-4-3","DOI":"10.1007\/978-3-642-17511-4-3"}],"container-title":["Journal of Reliable Intelligent Environments"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s40860-016-0027-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s40860-016-0027-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s40860-016-0027-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,17]],"date-time":"2020-05-17T04:15:55Z","timestamp":1589688955000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s40860-016-0027-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8,30]]},"references-count":29,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2016,11]]}},"alternative-id":["27"],"URL":"https:\/\/doi.org\/10.1007\/s40860-016-0027-5","relation":{},"ISSN":["2199-4668","2199-4676"],"issn-type":[{"value":"2199-4668","type":"print"},{"value":"2199-4676","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,8,30]]}}}