{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T18:04:42Z","timestamp":1775325882022,"version":"3.50.1"},"reference-count":106,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,4,25]],"date-time":"2025-04-25T00:00:00Z","timestamp":1745539200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,4,25]],"date-time":"2025-04-25T00:00:00Z","timestamp":1745539200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Internet Things"],"DOI":"10.1007\/s43926-025-00150-4","type":"journal-article","created":{"date-parts":[[2025,4,25]],"date-time":"2025-04-25T14:05:37Z","timestamp":1745589937000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["A systematic review on lightweight security algorithms for a sustainable IoT infrastructure"],"prefix":"10.1007","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0206-1475","authenticated-orcid":false,"given":"Kamal Uddin","family":"Sarker","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,25]]},"reference":[{"key":"150_CR1","doi-asserted-by":"publisher","first-page":"854","DOI":"10.3390\/electronics12040854","volume":"12","author":"P Szmeja","year":"2023","unstructured":"Szmeja P, Forn\u00e9s-Leal A, Lacalle I, Palau CE, Ganzha M, Paw\u0142owski W, Paprzycki M, Schabbink J. ASSIST-IoT: a modular implementation of a reference architecture for the next generation internet of things. Electronics. 2023;12:854. https:\/\/doi.org\/10.3390\/electronics12040854.","journal-title":"Electronics"},{"issue":"9","key":"150_CR2","doi-asserted-by":"publisher","first-page":"69","DOI":"10.14569\/IJACSA.2020.0110909","volume":"11","author":"KU Sarker","year":"2020","unstructured":"Sarker KU, Deraman AB, Hasan R, Abbas A. SQ-framework for improving sustainability and quality into software product and process. Int J Adv Comput Sci Appl (IJACSA). 2020;11(9):69\u201378. https:\/\/doi.org\/10.14569\/IJACSA.2020.0110909.","journal-title":"Int J Adv Comput Sci Appl (IJACSA)"},{"issue":"3","key":"150_CR3","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1504\/IJBIS2020.108650","volume":"34","author":"KU Sarker","year":"2020","unstructured":"Sarker KU, Deraman AB, Hasan R. Ontological practice for software quality control. Int J Bus Inf Sys. 2020;34(3):355\u201372. https:\/\/doi.org\/10.1504\/IJBIS2020.108650.","journal-title":"Int J Bus Inf Sys"},{"key":"150_CR4","doi-asserted-by":"publisher","first-page":"995","DOI":"10.3390\/s22030995","volume":"22","author":"O Ali","year":"2022","unstructured":"Ali O, Ishak MK, Bhatti MKL, Khan I, Kim KI. A Comprehensive review of internet of things: technology stack, middlewares, and fog\/edge computing interface. Sensors. 2022;22:995.","journal-title":"Sensors"},{"key":"150_CR5","doi-asserted-by":"publisher","first-page":"20331","DOI":"10.1109\/JIOT.2022.3173912","volume":"9","author":"A Asheralieva","year":"2022","unstructured":"Asheralieva A, Niyato D. Optimizing age of information and security of the next-generation internet of everything systems. IEEE Internet Things J. 2022;9:20331\u201351.","journal-title":"IEEE Internet Things J"},{"key":"150_CR6","doi-asserted-by":"publisher","first-page":"639","DOI":"10.1016\/j.procir.2015.01.026","volume":"29","author":"S Sihvonen","year":"2015","unstructured":"Sihvonen S, Ritola T. Conceptualizing ReX for aggregating end-of-life strategies in product development. Procedia CIRP. 2015;29:639\u201344. https:\/\/doi.org\/10.1016\/j.procir.2015.01.026.","journal-title":"Procedia CIRP"},{"key":"150_CR7","doi-asserted-by":"publisher","first-page":"117662","DOI":"10.1016\/j.jenvman.2023.117662","volume":"336","author":"S Ding","year":"2023","unstructured":"Ding S, Tukker A, Ward H. Opportunities and risks of internet of things (IoT) technologies for circular business models: a literature review. J Environ Manage. 2023;336:117662.","journal-title":"J Environ Manage"},{"key":"150_CR8","doi-asserted-by":"publisher","first-page":"757","DOI":"10.3390\/sym15030757","volume":"15","author":"MH Alsharif","year":"2023","unstructured":"Alsharif MH, Jahid A, Kelechi AH, Kannadasan R. Green IoT: a review and future research directions. Symmetry. 2023;15:757. https:\/\/doi.org\/10.3390\/sym15030757.","journal-title":"Symmetry"},{"key":"150_CR9","doi-asserted-by":"publisher","unstructured":"Chit TW, Ning L, Paliath NA, Long YM, Akhtar H, Shanshan Y. IIoTenabled and data-driven sustainability evaluation framework for textile supply chain. 2021 IEEE 16th Conference on Industrial Electronics and Applications (ICIEA). 2021; 297\u2013304. https:\/\/doi.org\/10.1109\/ICIEA51954.2021.9516314.","DOI":"10.1109\/ICIEA51954.2021.9516314"},{"key":"150_CR10","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1007\/978-981-16-1781-2_18","volume":"216","author":"M Ghoreishi","year":"2022","unstructured":"Ghoreishi M, Happonen A. The case of fabric and textile industry: the emerging role of digitalization, internet-of-things and industry 4.0 for circularity. Proc Sixth Int Congr Inf Commun Technol. 2022;216:189\u2013200. https:\/\/doi.org\/10.1007\/978-981-16-1781-2_18.","journal-title":"Proc Sixth Int Congr Inf Commun Technol"},{"key":"150_CR11","doi-asserted-by":"publisher","first-page":"103397","DOI":"10.1016\/j.compind.2021.103397","volume":"127","author":"S Jagtap","year":"2021","unstructured":"Jagtap S, Garcia-Garcia G, Rahimifard S. Optimisation of the resource efficiency of food manufacturing via the Internet of Things. Comput Ind. 2021;127:103397. https:\/\/doi.org\/10.1016\/j.compind.2021.103397.","journal-title":"Comput Ind"},{"issue":"10","key":"150_CR12","doi-asserted-by":"publisher","first-page":"2781","DOI":"10.3390\/su11102781","volume":"11","author":"W Liao","year":"2019","unstructured":"Liao W, Wang T. A novel collaborative optimization model for job shop production\u2013delivery considering time window and carbon emission. Sustainability. 2019;11(10):2781. https:\/\/doi.org\/10.3390\/su11102781.","journal-title":"Sustainability"},{"key":"150_CR13","doi-asserted-by":"publisher","unstructured":"Al-Masri E, Diabate I, Jain R, Lam MH, Nathala SR. Recycle.io: an IoTenabled framework for urban waste management. In: 2018 IEEE International Conference on Big Data. IEEE. 2018; 5285\u20135287. https:\/\/doi.org\/10.1109\/BigData.2018.8622117.","DOI":"10.1109\/BigData.2018.8622117"},{"key":"150_CR14","doi-asserted-by":"publisher","first-page":"138049","DOI":"10.1016\/j.scitotenv.2020.138049","volume":"731","author":"G Velvizhi","year":"2020","unstructured":"Velvizhi G, Shanthakumar S, Bhaskar D, Pugazhendhi A, Priya TS, Ashok B, Nanthagopal K, Vignesh R, Karthick C. Biodegradable and nonbiodegradable fraction of municipal solid waste for multifaceted applications through a closed loop integrated refinery platform: paving a path towards circular economy. Sci Total Environ. 2020;731:138049. https:\/\/doi.org\/10.1016\/j.scitotenv.2020.138049.","journal-title":"Sci Total Environ"},{"issue":"3","key":"150_CR15","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MVT.2020.2991788","volume":"15","author":"A Miaoudakis","year":"2020","unstructured":"Miaoudakis A, et al. Pairing a circular economy and the 5G-enabled internet of things: creating a class of looping smart assets? IEEE Veh Technol Mag. 2020;15(3):20\u201331. https:\/\/doi.org\/10.1109\/MVT.2020.2991788.","journal-title":"IEEE Veh Technol Mag"},{"key":"150_CR16","doi-asserted-by":"publisher","first-page":"104512","DOI":"10.1016\/j.resconrec.2019.104512","volume":"152","author":"A Zhang","year":"2020","unstructured":"Zhang A, Zhong RY, Farooque M, Kang K, Venkatesh VG. Blockchain-based life cycle assessment: an implementation framework and system architecture. Resour Conserv Recycl. 2020;152:104512. https:\/\/doi.org\/10.1016\/j.resconrec.2019.104512.","journal-title":"Resour Conserv Recycl"},{"key":"150_CR17","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1007\/978-3-319-65151-4_52","volume":"506","author":"SF de Oliveira","year":"2017","unstructured":"de Oliveira SF, Soares AL. A PLM vision for circular economy. IFIP Adv Inf Commun Technol. 2017;506:591\u2013602. https:\/\/doi.org\/10.1007\/978-3-319-65151-4_52.","journal-title":"IFIP Adv Inf Commun Technol"},{"key":"150_CR18","doi-asserted-by":"publisher","first-page":"1680","DOI":"10.1016\/j.promfg.2020.10.234","volume":"51","author":"G Plakas","year":"2020","unstructured":"Plakas G, Ponis ST, Agalianos K, Aretoulaki E. Reverse logistics of end-of-life plastics using industrial IoT and LPWAN technologies \u2013 a proposed solution for the bottled water industry. Procedia Manuf. 2020;51:1680\u20137. https:\/\/doi.org\/10.1016\/j.promfg.2020.10.234.","journal-title":"Procedia Manuf"},{"key":"150_CR19","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1016\/j.jmsy.2021.07.009","volume":"60","author":"C Sassanelli","year":"2021","unstructured":"Sassanelli C, Rosa P, Terzi S. Supporting disassembly processes through simulation tools: a systematic literature review with a focus on printed circuit boards. J Manuf Syst. 2021;60:429\u201348. https:\/\/doi.org\/10.1016\/j.jmsy.2021.07.009.","journal-title":"J Manuf Syst"},{"key":"150_CR20","doi-asserted-by":"publisher","first-page":"105237","DOI":"10.1016\/j.cor.2021.105237","volume":"130","author":"BY Ekren","year":"2021","unstructured":"Ekren BY, Mangla SK, Turhanlar EE, Kazancoglu Y, Li G. Lateral inventory share-based models for IoT-enabled E-commerce sustainable food supply networks. Comput Oper Res. 2021;130:105237. https:\/\/doi.org\/10.1016\/j.cor.2021.105237.","journal-title":"Comput Oper Res"},{"key":"150_CR21","doi-asserted-by":"publisher","DOI":"10.1080\/15567036.2021.1994057","author":"MQ Chau","year":"2021","unstructured":"Chau MQ, Nguyen XP, Huynh TT, Chu VD, Le TH, Nguyen TP, Nguyen DT. Prospects of application of IoT-based advanced technologies in remanufacturing process towards sustainable development and energy-efficient use. Energy Sour Part A Recovery Util Environ Effects. 2021. https:\/\/doi.org\/10.1080\/15567036.2021.1994057.","journal-title":"Energy Sour Part A Recovery Util Environ Effects"},{"key":"150_CR22","doi-asserted-by":"publisher","first-page":"5160","DOI":"10.3390\/s21155160","volume":"21","author":"G Biagetti","year":"2021","unstructured":"Biagetti G, Crippa P, Falaschetti L, Mansour A, Turchetti C. Energy and performance analysis of lossless compression algorithms for wireless EMG sensors. Sensors. 2021;21:5160.","journal-title":"Sensors"},{"key":"150_CR23","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1016\/j.matpr.2021.05.067","volume":"51","author":"K Gulati","year":"2021","unstructured":"Gulati K, Boddu RSK, Kapila D, Bangare SL, Chandnani N, Saravanan G. A review paper on wireless sensor network techniques in Internet of Things (IoT). Mater Today Proc. 2021;51:161\u20135.","journal-title":"Mater Today Proc"},{"key":"150_CR24","first-page":"6059343","volume":"2019","author":"F Al-Turjman","year":"2019","unstructured":"Al-Turjman F, Kamal A, Rehmani MH, Radwan A, Pathan A-SK. The green internet of things (g-iot). Hindawi. 2019;2019:6059343.","journal-title":"Hindawi"},{"key":"150_CR25","doi-asserted-by":"publisher","first-page":"51","DOI":"10.3233\/RFT-140060","volume":"6","author":"E Bottani","year":"2014","unstructured":"Bottani E, Manfredi M, Vignali G, Volpi A. Life cycle assessment of RFID implementation in the fresh food supply chain. Int J Real Ther. 2014;6:51\u201371. https:\/\/doi.org\/10.3233\/RFT-140060.","journal-title":"Int J Real Ther"},{"key":"150_CR26","doi-asserted-by":"publisher","unstructured":"Fazio De et al. Sensors-based treatment system of the organic waste with RFID identification and on-cloud traceability. 2019 IEEE 8th International Workshop on Advances in Sensors and Interfaces (IWASI). 2019; 245\u2013250. https:\/\/doi.org\/10.1109\/IWASI.2019.8791339.","DOI":"10.1109\/IWASI.2019.8791339"},{"key":"150_CR27","doi-asserted-by":"publisher","first-page":"8860598","DOI":"10.1155\/2020\/8860598","volume":"2020","author":"W El Hadj Youssef","year":"2020","unstructured":"El Hadj Youssef W, Abdelli A, Dridi F, Machhout M. Hardware implementation of secure lightweight cryptographic designs for IoT applications. Secur Commun Netw. 2020;2020:8860598.","journal-title":"Secur Commun Netw"},{"key":"150_CR28","doi-asserted-by":"publisher","first-page":"9","DOI":"10.3390\/fi15010009","volume":"15","author":"D-M Ngo","year":"2023","unstructured":"Ngo D-M, Lightbody D, Temko A, Pham-Quoc C, Tran N-T, Murphy CC, Popovici E. HH-NIDS: heterogeneous hardware-based network intrusion detection framework for IoT security. Future Internet. 2023;15:9. https:\/\/doi.org\/10.3390\/fi15010009.","journal-title":"Future Internet"},{"key":"150_CR29","doi-asserted-by":"publisher","first-page":"105047","DOI":"10.1016\/j.resconrec.2020.105047","volume":"162","author":"E Ingemarsdotter","year":"2020","unstructured":"Ingemarsdotter E, Jamsin E, Balkenende R. Opportunities and challenges in IoT-enabled circular business model implementation \u2013 a case study. Resour Conserv Recycl. 2020;162:105047. https:\/\/doi.org\/10.1016\/j.resconrec.2020.105047.","journal-title":"Resour Conserv Recycl"},{"key":"150_CR30","doi-asserted-by":"publisher","first-page":"101896","DOI":"10.1016\/j.rcim.2019.101896","volume":"63","author":"VG Venkatesh","year":"2020","unstructured":"Venkatesh VG, Kang K, Wang B, Zhong RY, Zhang A. System architecture for blockchain based transparency of supply chain social sustainability. Robot Comput Integr Manuf. 2020;63:101896. https:\/\/doi.org\/10.1016\/j.rcim.2019.101896.","journal-title":"Robot Comput Integr Manuf"},{"key":"150_CR31","doi-asserted-by":"publisher","first-page":"121031","DOI":"10.1016\/j.jclepro.2020.121031","volume":"260","author":"HH Feng","year":"2020","unstructured":"Feng HH, Wang X, Duan YQ, Zhang J, Zhang XS. Applying blockchain technology to improve agri-food traceability: a review of development methods, benefits and challenges. J Clean Prod. 2020;260:121031. https:\/\/doi.org\/10.1016\/j.jclepro.2020.121031.","journal-title":"J Clean Prod"},{"key":"150_CR32","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.compind.2017.01.004","volume":"87","author":"M Vanderroost","year":"2017","unstructured":"Vanderroost M, Ragaert P, Verwaeren J, De Meulenaer B, De Baets B, Devlieghere F. The digitization of a food package\u2019s life cycle: existing and emerging computer systems in the pre-logistics phase. Comput Ind. 2017;87:15\u201330. https:\/\/doi.org\/10.1016\/j.compind.2017.01.004.","journal-title":"Comput Ind"},{"key":"150_CR33","doi-asserted-by":"publisher","DOI":"10.3390\/s19030586","author":"N Gligoric","year":"2019","unstructured":"Gligoric N, Krco S, Hakola L, Vehmas K, De S, Moessner K, Jansson K, Polenz I, Van Kranenburg R. Smarttags: IoT product passport for circular economy based on printed sensors and unique item-level identifiers. Sensors. 2019. https:\/\/doi.org\/10.3390\/s19030586.","journal-title":"Sensors"},{"key":"150_CR34","doi-asserted-by":"publisher","first-page":"128944","DOI":"10.1016\/j.jclepro.2021.128944","volume":"321","author":"I Laskurain-Iturbe","year":"2021","unstructured":"Laskurain-Iturbe I, Arana-Land\u00edn G, Landeta-Manzano B, Uriarte-Gallastegi N. Exploring the influence of industry 4.0 technologies on the circular economy. J Clean Prod. 2021;321:128944. https:\/\/doi.org\/10.1016\/j.jclepro.2021.128944.","journal-title":"J Clean Prod"},{"issue":"2","key":"150_CR35","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1109\/EMR.2019.2915961","volume":"47","author":"M Roy","year":"2019","unstructured":"Roy M, Roy A. Nexus of internet of things (IoT) and big data: roadmap for smart management systems (SMgS). IEEE Eng Manag Rev. 2019;47(2):53\u201365. https:\/\/doi.org\/10.1109\/EMR.2019.2915961.","journal-title":"IEEE Eng Manag Rev"},{"key":"150_CR36","doi-asserted-by":"publisher","DOI":"10.3390\/su14127084","author":"U Awan","year":"2022","unstructured":"Awan U, Sroufe R, Bozan K. Designing value chains for industry 4.0 and a circular economy: a review of the literature. Sustainability. 2022. https:\/\/doi.org\/10.3390\/su14127084.","journal-title":"Sustainability"},{"key":"150_CR37","unstructured":"Abbas MT. Improving the Energy Efficiency of Cellular IoT Device. LICENTIATE THESIS, Karlstad University Studies. 2023;8, ISSN 1403\u20138099."},{"key":"150_CR38","unstructured":"Boulogeorgos AAA, Diamantoulakis PD, Karagiannidis GK. Low power wide area networks (LPWANs) for Internet of Things ( IoT) applications: Research challenges and future trends. arXiv preprint arXiv:1611.07449, 2016."},{"key":"150_CR39","doi-asserted-by":"publisher","first-page":"35816","DOI":"10.1109\/ACCESS.2019.2903157","volume":"7","author":"A Lavric","year":"2019","unstructured":"Lavric A, Petrariu AI, Popa V. Long range SigFox communication protocol scalability analysis under large-scale, highdensity conditions. IEEE Access. 2019;7:35816\u201325.","journal-title":"IEEE Access"},{"issue":"1","key":"150_CR40","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13673-019-0190-9","volume":"9","author":"J Park","year":"2019","unstructured":"Park J, Salim MM, Jo JH, Sicato JCS, Rathore S, Park JH. CIoTNet: a scalable cognitive IoT based smart city network architecture. Human-centric Comput Inf Sci. 2019;9(1):1\u201320.","journal-title":"Human-centric Comput Inf Sci"},{"issue":"11","key":"150_CR41","doi-asserted-by":"publisher","first-page":"3995","DOI":"10.3390\/s18113995","volume":"18","author":"J Haxhibeqiri","year":"2018","unstructured":"Haxhibeqiri J, De Poorter E, Moerman I, Hoebeke J. A survey of LoRaWAN for IoT: from technology to application. Sensors. 2018;18(11):3995.","journal-title":"Sensors"},{"issue":"8","key":"150_CR42","doi-asserted-by":"publisher","first-page":"2875","DOI":"10.3390\/s22082875","volume":"22","author":"Wu Tin-Yu","year":"2022","unstructured":"Tin-Yu Wu, Hwang R-H, Vyas A, Lin C-Y, Huang ChiRuei. Persistent periodic uplink scheduling algorithm for massive NB-IoT devices. Sensors. 2022;22(8):2875.","journal-title":"Sensors"},{"key":"150_CR43","doi-asserted-by":"publisher","first-page":"3227","DOI":"10.1016\/j.matpr.2020.11.1027","volume":"49","author":"MS Bali","year":"2022","unstructured":"Bali MS, Gupta K, Bali KK, Singh PK. Towards energy efficient NB-IoT: A survey on evaluating its suitability for smart applications. Mater Today Proc. 2022;49:3227\u201334.","journal-title":"Mater Today Proc"},{"issue":"4","key":"150_CR44","doi-asserted-by":"publisher","first-page":"2408","DOI":"10.1109\/COMST.2020.3022751","volume":"22","author":"M Kanj","year":"2020","unstructured":"Kanj M, Savaux V, Le Guen M. A tutorial on NB-IoT physical layer design. IEEE Commun Surv Tutor. 2020;22(4):2408\u20132446.","journal-title":"IEEE Commun Surv Tutor"},{"issue":"2","key":"150_CR45","first-page":"118","volume":"10","author":"KU Sarker","year":"2022","unstructured":"Sarker KU, Deraman A, Hasan R, Abbas A, Shah B, Ullah A. Monolithic ontological methodology (MOM): an effective software project management approach. J Eng Res (JER). 2022;10(2):118.","journal-title":"J Eng Res (JER)"},{"key":"150_CR46","doi-asserted-by":"crossref","unstructured":"Sarker KU, Deraman AB, Hasan R, Abbas A. A 4-Layered Plan-driven Model (4LPdM) to Improve Software Development. International Journal of Advanced Computer Science and Applications (IJACSA). 2022; 13(8). https:\/\/thesai.org\/Downloads\/Volume13No8\/Paper_68-A_4_Layered_Plan_Driven_Model_4LPdM.pdf.","DOI":"10.14569\/IJACSA.2022.0130868"},{"key":"150_CR47","doi-asserted-by":"publisher","first-page":"158","DOI":"10.3390\/computers11110158","volume":"11","author":"KU Sarker","year":"2022","unstructured":"Sarker KU, Saqib M, Hasan R, Mahmood S, Hussain S, Abbas A, Deraman A. A ranking learning model by k-means clustering technique for web scraped movie data. Computers. 2022;11:158. https:\/\/doi.org\/10.3390\/computers11110158.","journal-title":"Computers"},{"key":"150_CR48","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/s11276-021-02829-2","volume":"28","author":"A Farahzadi","year":"2022","unstructured":"Farahzadi A, Farahsary PS, Rezazadeh J. A survey on IoT fog nano datacenters. Wireless Netw. 2022;28:173\u2013207. https:\/\/doi.org\/10.1007\/s11276-021-02829-2.","journal-title":"Wireless Netw"},{"key":"150_CR49","doi-asserted-by":"publisher","first-page":"3817","DOI":"10.1007\/s00500-022-07578-8","volume":"27","author":"AK Singh","year":"2023","unstructured":"Singh AK, Swain SR, Lee CN. A metaheuristic virtual machine placement framework toward power efficiency of sustainable cloud environment. Soft Comput. 2023;27:3817\u201328. https:\/\/doi.org\/10.1007\/s00500-022-07578-8.","journal-title":"Soft Comput"},{"key":"150_CR50","doi-asserted-by":"publisher","first-page":"54","DOI":"10.3390\/fi15020054","volume":"15","author":"M El-hajj","year":"2023","unstructured":"El-hajj M, Mousawi H, Fadlallah A. Analysis of lightweight cryptographic algorithms on IoT hardware platform. Future Internet. 2023;15:54. https:\/\/doi.org\/10.3390\/fi15020054.","journal-title":"Future Internet"},{"key":"150_CR51","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-023-10383-9","author":"C Silva","year":"2023","unstructured":"Silva C, Cunha VA, Barraca JP, et al. Analysis of the cryptographic algorithms in IoT communications. Inf Syst Front. 2023. https:\/\/doi.org\/10.1007\/s10796-023-10383-9.","journal-title":"Inf Syst Front"},{"issue":"3","key":"150_CR52","doi-asserted-by":"publisher","first-page":"1947","DOI":"10.1007\/s11277-020-07134-3","volume":"112","author":"SS Dhanda","year":"2020","unstructured":"Dhanda SS, Singh B, Jindal P. Lightweight cryptography: a solution to secure IoT. Wireless Pers Commun. 2020;112(3):1947\u201380.","journal-title":"Wireless Pers Commun"},{"issue":"10","key":"150_CR53","doi-asserted-by":"publisher","first-page":"8279","DOI":"10.1109\/JIOT.2020.3044526","volume":"8","author":"A Fotovvat","year":"2020","unstructured":"Fotovvat A, Rahman GM, Vedaei SS, et al. Comparative performance analysis of lightweight cryptography algorithms for IoT sensor nodes. IEEE Internet Things J. 2020;8(10):8279\u201390.","journal-title":"IEEE Internet Things J"},{"key":"150_CR54","doi-asserted-by":"publisher","unstructured":"Haque ME, Zobaed S, Islam MU et al. Performance analysis of cryptographic algorithms for selecting better utilization on resource constraint devices. In: 2018 21st International Conference of Computer and Information Technology (ICCIT). 2018; 1\u20136. https:\/\/doi.org\/10.1109\/ICCITECHN.2018.8631957","DOI":"10.1109\/ICCITECHN.2018.8631957"},{"key":"150_CR55","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/s13389-017-0160-y","volume":"8","author":"G Hatzivallis","year":"2018","unstructured":"Hatzivallis G, Fysarakis K, Papaefstathiou I, Manifavas C. A review of lightweight block ciphers. J Cryptogr Eng. 2018;8:141\u201384.","journal-title":"J Cryptogr Eng"},{"key":"150_CR56","doi-asserted-by":"crossref","unstructured":"Ngo DM, Temko A, Murphy CC, Popovici E. FPGA Hardware Acceleration Framework for Anomaly-based Intrusion Detection System in IoT. In Proceedings of the 2021 31st International Conference on Field-Programmable Logic and Applications (FPL), Dresden, Germany, 30 August\u20133 September 2021; 69\u201375.","DOI":"10.1109\/FPL53798.2021.00020"},{"key":"150_CR57","doi-asserted-by":"crossref","unstructured":"Bovenzi G, Aceto G, Ciuonzo D, Persico V, Pescap\u00e9 A. A hierarchical hybrid intrusion detection approach in IoT scenarios. In Proceedings of the GLOBECOM 2020 IEEE Global Communications Conference, Taipei, Taiwan, 7\u201311 December 2020; 1\u20137.","DOI":"10.1109\/GLOBECOM42002.2020.9348167"},{"key":"150_CR58","doi-asserted-by":"crossref","unstructured":"Kumar, S.; Sahoo, S.; Mahapatra, A.; Swain, A.K.; Mahapatra, K.K. Security enhancements to system on chip devices for IoT perception layer. In Proceedings of the 2017 IEEE International Symposium on Nanoelectronic and Information Systems (iNIS), Bhopal, India, 18\u201320 December 2017; 151\u2013156.","DOI":"10.1109\/iNIS.2017.39"},{"key":"150_CR59","first-page":"150","volume":"4","author":"L d\u2019Orazio","year":"2018","unstructured":"d\u2019Orazio L, Lallet J. Semantic caching framework: An FPGA-based application for IoT security monitoring. Open J Internet Things (OJIoT). 2018;4:150\u20137.","journal-title":"Open J Internet Things (OJIoT)"},{"key":"150_CR60","doi-asserted-by":"crossref","unstructured":"Ch\u00e9our R, Khriji S, Abid M, Kanoun O. Microcontrollers for IoT: Optimizations, computing paradigms, and uture directions.In Proceedings of the 2020 IEEE 6th World Forum on Internet of Things (WF-IoT), New Orleans, LA, USA, 2\u201316 June 2020;pp. 1\u20137.","DOI":"10.1109\/WF-IoT48130.2020.9221219"},{"key":"150_CR61","unstructured":"Van Long NH, Lallet J, Casseau E, d\u2019Orazio L. Mascara (ModulAr semantic caching framework) towards FPGA acceleration for IoT security monitoring. In Proceedings of the International Workshop on Very Large Internet of Things (VLIoT 2020), Tokyo, Japan, 4 September 2020."},{"key":"150_CR62","doi-asserted-by":"crossref","unstructured":"Kalantar A, Zimmerman Z, Brisk P. FA-LAMP: Fpga-accelerated learned approximate matrix profile for time series similarity prediction. In Proceedings of the 2021 IEEE 29th Annual International Symposium on Field-Programmable Custom Computing Machines (FCCM), Orlando, FL, USA, 9\u201312 May 2021; 40\u201349.","DOI":"10.1109\/FCCM51124.2021.00013"},{"key":"150_CR63","doi-asserted-by":"publisher","first-page":"2981","DOI":"10.3390\/s19132981","volume":"19","author":"M Wielgosz","year":"2019","unstructured":"Wielgosz M, Karwatowski M. Mapping neural networks to FPGA-based IoT devices for ultra-low latency processing. Sensors. 2019;19:2981.","journal-title":"Sensors"},{"key":"150_CR64","doi-asserted-by":"crossref","unstructured":"Ioannou L, Fahmy SA. Network intrusion detection using neural networks on FPGA SoCs. In Proceedings of the 2019 29th International Conference on Field Programmable Logic and Applications (FPL), Barcelona, Spain, 9\u201313 September 2019; 232\u2013238.","DOI":"10.1109\/FPL.2019.00043"},{"key":"150_CR65","doi-asserted-by":"publisher","first-page":"102675","DOI":"10.1016\/j.cose.2022.102675","volume":"116","author":"Z Yang","year":"2022","unstructured":"Yang Z, Liu X, Li T, Wu D, Wang J, Zhao Y, Han H. A systematic literature review of methods and datasets for anomaly-based network intrusion detection. Comput Secur. 2022;116:102675.","journal-title":"Comput Secur"},{"key":"150_CR66","doi-asserted-by":"publisher","first-page":"100059","DOI":"10.1016\/j.iot.2019.100059","volume":"7","author":"M Hasan","year":"2019","unstructured":"Hasan M, Islam MM, Zarif MII, Hashem M. Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches. Internet Things. 2019;7:100059.","journal-title":"Internet Things"},{"key":"150_CR67","doi-asserted-by":"publisher","first-page":"8383","DOI":"10.3390\/app11188383","volume":"11","author":"MA Alsoufi","year":"2021","unstructured":"Alsoufi MA, Razak S, Siraj MM, Nafea I, Ghaleb FA, Saeed F, Nasser M. Anomaly-based intrusion detection systems in IoT using deep learning: a systematic literature review. Appl Sci. 2021;11:8383.","journal-title":"Appl Sci"},{"key":"150_CR68","doi-asserted-by":"publisher","first-page":"137","DOI":"10.3103\/S0146411621020085","volume":"55","author":"P Kumar","year":"2021","unstructured":"Kumar P, Gupta GP, Tripathi R. Design of anomaly-based intrusion detection system using fog computing for IoT network. Autom Control Comput Sci. 2021;55:137\u201347.","journal-title":"Autom Control Comput Sci"},{"key":"150_CR69","doi-asserted-by":"publisher","first-page":"41525","DOI":"10.1109\/ACCESS.2019.2895334","volume":"7","author":"R Vinayakumar","year":"2019","unstructured":"Vinayakumar R, Alazab M, Soman K, Poornachandran P, Al-Nemrat A, Venkatraman S. Deep learning approach for intelligent intrusion detection system. IEEE Access. 2019;7:41525\u201350.","journal-title":"IEEE Access"},{"key":"150_CR70","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/s12530-020-09347-0","volume":"12","author":"A Protogerou","year":"2021","unstructured":"Protogerou A, Papadopoulos S, Drosou A, Tzovaras D, Refanidis I. A graph neural network method for distributed anomaly detection in IoT. Evol Syst. 2021;12:19\u201336.","journal-title":"Evol Syst"},{"key":"150_CR71","doi-asserted-by":"publisher","first-page":"62722","DOI":"10.1109\/ACCESS.2022.3176317","volume":"10","author":"I Ullah","year":"2022","unstructured":"Ullah I, Mahmoud QH. Design and development of RNN anomaly detection model for IoT networks. IEEE Access. 2022;10:62722\u201350.","journal-title":"IEEE Access"},{"key":"150_CR72","doi-asserted-by":"publisher","first-page":"4583","DOI":"10.3390\/s20164583","volume":"20","author":"V Dutta","year":"2020","unstructured":"Dutta V, Choras M, Pawlicki M, Kozik R. A deep learning ensemble for network anomaly and cyber-attack detection. Sensors. 2020;20:4583.","journal-title":"Sensors"},{"key":"150_CR73","doi-asserted-by":"publisher","DOI":"10.1007\/s12530-022-09471-z","author":"M Nobakht","year":"2022","unstructured":"Nobakht M, Javidan R, Pourebrahimi A. DEMD-IoT: a deep ensemble model for IoT malware detection using CNNs and network traffic. Evol Syst. 2022. https:\/\/doi.org\/10.1007\/s12530-022-09471-z.","journal-title":"Evol Syst"},{"key":"150_CR74","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-022-04783-y","author":"M Douiba","year":"2022","unstructured":"Douiba M, Benkirane S, Guezzaz A, Azrour M. An improved anomaly detection model for IoT security using decision tree and gradient boosting. J Supercomput. 2022. https:\/\/doi.org\/10.1007\/s11227-022-04783-y.","journal-title":"J Supercomput"},{"key":"150_CR75","doi-asserted-by":"publisher","first-page":"28177","DOI":"10.1109\/ACCESS.2021.3052867","volume":"9","author":"VA Thakor","year":"2021","unstructured":"Thakor VA, Razzaque MA, Khandaker MRA. Lightweight cryptography algorithms for resource-constrained IoT devices: a review, comparison and research opportunities. IEEE Access. 2021;9:28177\u201393. https:\/\/doi.org\/10.1109\/ACCESS.2021.3052867.","journal-title":"IEEE Access"},{"key":"150_CR76","doi-asserted-by":"publisher","DOI":"10.3390\/s21175745","author":"P Fraga-Lamas","year":"2021","unstructured":"Fraga-Lamas P, Lopes SI, Fernandez-Carames TM. Green IoT and edge AI as key technological enablers for a sustainable digital transition towards a smart circular economy: an industry 5.0 Use case. Sensors. 2021. https:\/\/doi.org\/10.3390\/s21175745.","journal-title":"Sensors"},{"key":"150_CR77","doi-asserted-by":"publisher","first-page":"108227","DOI":"10.1016\/j.cie.2022.108227","volume":"169","author":"Z Yu","year":"2022","unstructured":"Yu Z, Khan S, Mathew M, Umar M, Hassan M, Sajid MJ. Identifying and analyzing the barriers of Internet-of-Things in sustainable supply chain through newly proposed spherical fuzzy geometric mean. Comput Ind Eng. 2022;169:108227. https:\/\/doi.org\/10.1016\/j.cie.2022.108227.","journal-title":"Comput Ind Eng"},{"key":"150_CR78","unstructured":"Garcia, S.; Parmisano, A.; Erquiaga, M. IoT-23: A Labeled Dataset with Malicious and Benign IoT Network Traffic; Stratosphere Lab.:Praha, Czech Republic, 2020."},{"key":"150_CR79","doi-asserted-by":"crossref","unstructured":"Hegde M, Kepnang G, Al Mazroei M, Chavis JS, Watkins L. Identification of Botnet Activity in IoT Network Traffic Using Machine Learning. In Proceedings of the 2020 International Conference on Intelligent Data Science Technologies and Applications (IDSTA), Valencia, Spain, 19\u201322 October 2020; 21\u201327.","DOI":"10.1109\/IDSTA50958.2020.9264143"},{"key":"150_CR80","unstructured":"Storcheus D, Rostamizadeh A, Kumar S. A survey of modern questions and challenges in feature extraction. In Proceedings of the Feature Extraction: Modern Questions and Challenges. PMLR, Montreal, QC, Canada, 11 December 2015; 1\u201318."},{"key":"150_CR81","doi-asserted-by":"crossref","unstructured":"Hussain F, Abbas SG, Fayyaz UU, Shah GA, Toqeer A, Ali A. Towards a Universal Features Set for IoT Botnet Attacks Detection. arXiv 2020, arXiv:2012.00463.","DOI":"10.21203\/rs.3.rs-114467\/v1"},{"key":"150_CR82","doi-asserted-by":"crossref","unstructured":"Nguyen TD, Marchal S, Miettinen M, Fereidooni H, Asokan N, Sadeghi AR. D\u00cfoT: A federated self-learning anomaly detection system for IoT. In Proceedings of the 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS), Dallas, TX, USA, 7\u20139 July 2019; 756\u2013767.","DOI":"10.1109\/ICDCS.2019.00080"},{"key":"150_CR83","unstructured":"Stoian NA. Machine Learning for Anomaly Detection in IoT Networks: Malware Analysis on the IoT-23 Data Set. Bachelor Thesis, University of Twente, Enschede, The Netherlands, 2020."},{"key":"150_CR84","doi-asserted-by":"publisher","first-page":"2545","DOI":"10.1109\/JIOT.2021.3077803","volume":"9","author":"V Mothukuri","year":"2021","unstructured":"Mothukuri V, Khare P, Parizi RM, Pouriyeh S, Dehghantanha A, Srivastava G. Federated-learning-based anomaly detection for IoT security attacks. IEEE Internet Things J. 2021;9:2545\u201354.","journal-title":"IEEE Internet Things J"},{"key":"150_CR85","doi-asserted-by":"publisher","first-page":"6578","DOI":"10.3390\/s20226578","volume":"20","author":"I Vaccari","year":"2020","unstructured":"Vaccari I, Chiola G, Aiello M, Mongelli M, Cambiaso E. MQTTset, a new dataset for machine learning techniques on MQTT. Sensors. 2020;20:6578.","journal-title":"Sensors"},{"key":"150_CR86","doi-asserted-by":"publisher","first-page":"77396","DOI":"10.1109\/ACCESS.2020.2986013","volume":"8","author":"S Manimurugan","year":"2020","unstructured":"Manimurugan S, Al-Mutairi S, Aborokbah MM, Chilamkurti N, Ganesan S, Patan R. Effective attack detection in internet of medical things smart environment using a deep belief neural network. IEEE Access. 2020;8:77396\u2013404.","journal-title":"IEEE Access"},{"key":"150_CR87","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1109\/TSMC.2020.2968516","volume":"52","author":"C Yin","year":"2020","unstructured":"Yin C, Zhang S, Wang J, Xiong NN. Anomaly detection based on convolutional recurrent autoencoder for IoT time series. IEEE Trans Syst Man Cybern Syst. 2020;52:112\u201322.","journal-title":"IEEE Trans Syst Man Cybern Syst"},{"issue":"1","key":"150_CR88","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/s10922-016-9384-x","volume":"25","author":"J Poonam","year":"2017","unstructured":"Poonam J, Brahmjit S. Security-performance tradeofs in a class of wireless network scenarios. J Netw Syst Manag. 2017;25(1):83\u2013121.","journal-title":"J Netw Syst Manag"},{"key":"150_CR89","doi-asserted-by":"publisher","first-page":"45","DOI":"10.13154\/tosc.v2017.i1.45-79","volume":"1","author":"M Hamann","year":"2017","unstructured":"Hamann M, Krause M, Meier W. LIZARD\u2014a lightweight stream cipher for power constrained devices. IACR Transm Symmetric Cryptol. 2017;1:45\u201379. https:\/\/doi.org\/10.13154\/tosc.v2017.i1.45-79.","journal-title":"IACR Transm Symmetric Cryptol"},{"issue":"2","key":"150_CR90","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/s12095-015-0173-2","volume":"9","author":"E Dubrova","year":"2017","unstructured":"Dubrova E, Hell M. Espresso: a stream cipher for 5G wireless communication systems. J Cryptogr Commun. 2017;9(2):273\u201389.","journal-title":"J Cryptogr Commun"},{"key":"150_CR91","unstructured":"Bussi K, Dey D, Kumar M, Dass BK. Neeva: A Lightweight Hash Function. IACR Cryptology ePrint Archive, (042). 2016. https:\/\/eprint.iacr.org\/2016\/042.pdf."},{"key":"150_CR92","doi-asserted-by":"publisher","DOI":"10.1109\/MCAS.2017.2757080","author":"D Schinianakis","year":"2017","unstructured":"Schinianakis D. Alternative security options in the 5G and IoT Era. IEEE Circuits Syst Magzine. 2017. https:\/\/doi.org\/10.1109\/MCAS.2017.2757080.","journal-title":"IEEE Circuits Syst Magzine"},{"key":"150_CR93","doi-asserted-by":"publisher","first-page":"7647","DOI":"10.3390\/su13147647","volume":"13","author":"I Mart\u00ednez","year":"2021","unstructured":"Mart\u00ednez I, Zalba B, Trillo-Lado R, Blanco T, Cambra D, Casas R. Internet of things (IoT) as sustainable development goals (SDG) enabling technology towards smart readiness indicators (SRI) for university buildings. Sustainability. 2021;13:7647. https:\/\/doi.org\/10.3390\/su13147647.","journal-title":"Sustainability"},{"key":"150_CR94","doi-asserted-by":"publisher","first-page":"10471","DOI":"10.3390\/su151310471","volume":"15","author":"KU Sarker","year":"2023","unstructured":"Sarker KU, Yunus F, Deraman A. Penetration taxonomy: a systematic review on the penetration process, framework, standards, tools, and scoring methods. Sustainability. 2023;15:10471. https:\/\/doi.org\/10.3390\/su151310471.","journal-title":"Sustainability"},{"issue":"3","key":"150_CR95","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1016\/j.oneear.2022.02.010","volume":"5","author":"A Manthiram","year":"2022","unstructured":"Manthiram A, Lutkenhaus JL, Fu Y, Bai P, Kim BG, Lee SW, Okonkwo E, Penner RM. Technological pathways toward sustainable batteries. One Earth. 2022;5(3):203\u20136. https:\/\/doi.org\/10.1016\/j.oneear.2022.02.010.","journal-title":"One Earth"},{"key":"150_CR96","doi-asserted-by":"publisher","first-page":"101182","DOI":"10.1016\/j.pmatsci.2023.101182","volume":"139","author":"D Wu","year":"2023","unstructured":"Wu D, Chen L, Li H, Wu F. Solid-state lithium batteries-from fundamental research to industrial progress. Progress Mater Sci. 2023;139:101182.","journal-title":"Progress Mater Sci"},{"key":"150_CR97","doi-asserted-by":"publisher","unstructured":"Turan MS, McKay AK, \u00c7al\u0131k C, Chang D, Bassham M. NISTIR 8268: Status Report on the First Round of the NIST Lightweight Cryptography Standardization Process. NIST 2019. https:\/\/doi.org\/10.6028\/NIST.IR.8268","DOI":"10.6028\/NIST.IR.8268"},{"key":"150_CR98","doi-asserted-by":"publisher","DOI":"10.1088\/2631-8695\/ace58f","author":"B Ilkhom","year":"2023","unstructured":"Ilkhom B, Khan A, Bakhtiyor A, Das R, Khudoykulov Z. Integral cryptanalysis: a new key determination technique for 3-phase Kuznyechik encryption. Eng Res Express. 2023. https:\/\/doi.org\/10.1088\/2631-8695\/ace58f.","journal-title":"Eng Res Express"},{"issue":"6","key":"150_CR99","doi-asserted-by":"publisher","first-page":"2391","DOI":"10.1007\/s13198-024-02253-7","volume":"15","author":"R Das","year":"2024","unstructured":"Das R, Khan A, Arya R, Ilkhom B, Bakhtiyor A, Safoyev N, Khudoykulov Z. SSKA: secure symmetric encryption exploiting Kuznyechik algorithm for trustworthy communication. Int J Syst Assu Eng Manag. 2024;15(6):2391\u2013400. https:\/\/doi.org\/10.1007\/s13198-024-02253-7.","journal-title":"Int J Syst Assu Eng Manag"},{"key":"150_CR100","doi-asserted-by":"publisher","first-page":"1079","DOI":"10.1007\/s11277-020-07092-w","volume":"112","author":"R Das","year":"2020","unstructured":"Das R, Dash D, Sarkar MK. HTMS: fuzzy based hierarchical trust management scheme in WSN. Wirel Pers Commun. 2020;112:1079\u2013112. https:\/\/doi.org\/10.1007\/s11277-020-07092-w.","journal-title":"Wirel Pers Commun"},{"key":"150_CR101","doi-asserted-by":"publisher","unstructured":"Das R, Singh M, Majumder K. SGSQoT: A Community-Based Trust Management Scheme in Internet of Things. In: Chakraborty M, Chakrabarti S, Balas V, Mandal J (eds). Proceedings of International Ethical Hacking Conference 2018. Advances in Intelligent Systems and Computing. 2019; 811. Springer, Singapore. https:\/\/doi.org\/10.1007\/978-981-13-1544-2_18","DOI":"10.1007\/978-981-13-1544-2_18"},{"key":"150_CR102","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/j.future.2021.11.011","volume":"129","author":"M Rana","year":"2022","unstructured":"Rana M, Mamun Q, Islam R. Lightweight cryptography in IoT networks: a survey. Future Gener Comput Syst. 2022;129:77\u201389. https:\/\/doi.org\/10.1016\/j.future.2021.11.011.","journal-title":"Future Gener Comput Syst"},{"issue":"6","key":"150_CR103","doi-asserted-by":"publisher","first-page":"4132","DOI":"10.1109\/JIOT.2020.3026493","volume":"8","author":"MN Khan","year":"2021","unstructured":"Khan MN, Rao A, Camtepe S. Lightweight cryptographic protocols for IoT-constrained devices: a survey. IEEE Internet Things J. 2021;8(6):4132\u201356. https:\/\/doi.org\/10.1109\/JIOT.2020.3026493.","journal-title":"IEEE Internet Things J"},{"key":"150_CR104","doi-asserted-by":"publisher","first-page":"1625","DOI":"10.1007\/s12652-017-0494-4","volume":"15","author":"S Singh","year":"2024","unstructured":"Singh S, Sharma PK, Moon SY, et al. Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions. J Ambient Intell Human Comput. 2024;15:1625\u201342. https:\/\/doi.org\/10.1007\/s12652-017-0494-4.","journal-title":"J Ambient Intell Human Comput"},{"key":"150_CR105","doi-asserted-by":"publisher","DOI":"10.4108\/eetiot.5565","author":"Amrita","year":"2024","unstructured":"Amrita, Ekwueme CP, Adam IH, Dwivedi A. Lightweight cryptography for internet of things: a review. EAI Endorsed Trans IoT. 2024. https:\/\/doi.org\/10.4108\/eetiot.5565.","journal-title":"EAI Endorsed Trans IoT"},{"key":"150_CR106","doi-asserted-by":"publisher","first-page":"8835","DOI":"10.1007\/s12652-020-02672-x","volume":"12","author":"V Rao","year":"2021","unstructured":"Rao V, Prema KV. A review on lightweight cryptography for internet-of-things based applications. J Ambient Intell Human Comput. 2021;12:8835\u201357. https:\/\/doi.org\/10.1007\/s12652-020-02672-x.","journal-title":"J Ambient Intell Human Comput"}],"container-title":["Discover Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00150-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s43926-025-00150-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00150-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,25]],"date-time":"2025-04-25T14:05:44Z","timestamp":1745589944000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s43926-025-00150-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,25]]},"references-count":106,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["150"],"URL":"https:\/\/doi.org\/10.1007\/s43926-025-00150-4","relation":{},"ISSN":["2730-7239"],"issn-type":[{"value":"2730-7239","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4,25]]},"assertion":[{"value":"2 September 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 April 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 April 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"47"}}