{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T08:47:26Z","timestamp":1775810846756,"version":"3.50.1"},"reference-count":21,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T00:00:00Z","timestamp":1771977600000},"content-version":"vor","delay-in-days":55,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100003246","name":"NWO","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003246","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Procedia Computer Science"],"published-print":{"date-parts":[[2026]]},"DOI":"10.1016\/j.procs.2026.02.380","type":"journal-article","created":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T07:17:59Z","timestamp":1774250279000},"page":"3444-3452","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Towards Zero-Touch Network Provisioning for Embedded Industrial IoT: A Feasibility Study on Autonomous Guest Wi-Fi Access"],"prefix":"10.1016","volume":"277","author":[{"given":"Fatih Cemil","family":"Demir","sequence":"first","affiliation":[]},{"given":"Sabari Nathan","family":"Anbalagan","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.procs.2026.02.380_bib1","unstructured":"Ali, S.A.A., 2020. A Large-Scale Evaluation of Privacy Practices of Public WiFi Captive Portals. Master\u2019s thesis. Concordia University. URL:https:\/\/spectrum.library.concordia.ca\/id\/eprint\/987023\/."},{"key":"10.1016\/j.procs.2026.02.380_bib2","doi-asserted-by":"crossref","first-page":"2730","DOI":"10.1016\/j.procs.2024.02.090","article-title":"Assessing factory\u2019s industry 4.0 readiness: A practical method for iiot sensor and network analysis","volume":"232","author":"Anbalagan","year":"2024","journal-title":"Procedia Computer Science"},{"key":"10.1016\/j.procs.2026.02.380_bib3","unstructured":"APAC Task Group, 2024. WBA OPENROAMING\u2122 INTRODUCTION GUIDE. URL: https:\/\/wballiance.com\/wp-content\/uploads\/2024\/10\/WBA-OpenRoaming-Guide-APAC-TG_v1.0.0-FINALPublic.pdf#:~:text=For%20over%20a%20decade%2C%20Passpoint%C2%AE,cumbersome%20process%20of%20onboarding%20the."},{"key":"10.1016\/j.procs.2026.02.380_bib4","doi-asserted-by":"crossref","unstructured":"Chatzisofroniou, G., Kotzanikolaou, P., 2025. Security analysis of the Wi-Fi Easy Connect. International Journal of Information Security 24, 74. URL: https:\/\/doi.org\/10.1007\/s10207-025-00988-3, doi: 10.1007\/s10207-025-00988-3.","DOI":"10.1007\/s10207-025-00988-3"},{"key":"10.1016\/j.procs.2026.02.380_bib5","unstructured":"Cisco, 2011. MAC Authentication Bypass Deployment Guide. URL: https:\/\/www.cisco.com\/c\/en\/us\/td\/docs\/solutions\/Enterprise\/Security\/TrustSec_1-99\/MAB\/MAB_Dep_Guide.html."},{"key":"10.1016\/j.procs.2026.02.380_bib6","doi-asserted-by":"crossref","unstructured":"Et-Tousy, J., Zyane, A., 2025. Integration of mqtt and coap protocols in onem2m for iot applications, in: The International Conference on Artificial Intelligence and Smart Environment, Springer. pp. 185\u2013195.","DOI":"10.1007\/978-3-031-90921-4_26"},{"key":"10.1016\/j.procs.2026.02.380_bib7","unstructured":"Google Inc, 2016. Modernizing OAuth interactions in Native Apps for Better Usability and Security- Google Developers Blog. URL: https:\/\/developers.googleblog.com\/en\/modernizing-oauth-interactions-in-native-apps-for-better-usability-and-securit"},{"key":"10.1016\/j.procs.2026.02.380_bib8","doi-asserted-by":"crossref","unstructured":"Hardt, D., 2012. The OAuth 2.0 Authorization Framework. Request for Comments RFC 6749. Internet Engineering Task Force. URL:https:\/\/datatracker.ietf.org\/doc\/rfc6749, doi: 10.17487\/RFC6749. num Pages: 76.","DOI":"10.17487\/rfc6749"},{"key":"10.1016\/j.procs.2026.02.380_bib9","doi-asserted-by":"crossref","unstructured":"Harkins, D., Kumari, W., 2017. Opportunistic Wireless Encryption. Request for Comments RFC 8110. Internet Engineering Task Force. URL:https:\/\/datatracker.ietf.org\/doc\/rfc8110, doi: 10.17487\/RFC8110. num Pages: 12.","DOI":"10.17487\/RFC8110"},{"key":"10.1016\/j.procs.2026.02.380_bib10","doi-asserted-by":"crossref","unstructured":"Idris, M., Irdayanti, M., Ramlee, M., 2023. A review of microcontroller design in future industrial revolution, in: AIP Conference Proceedings, AIP Publishing LLC. p. 050031.","DOI":"10.1063\/5.0149680"},{"key":"10.1016\/j.procs.2026.02.380_bib11","doi-asserted-by":"crossref","unstructured":"Kumari, W., Kline, E., 2020. Captive-Portal Identification in DHCP and Router Advertisements (RAs). Request for Comments RFC 8910. Internet Engineering Task Force. URL: https:\/\/datatracker.ietf.org\/doc\/rfc8910, doi: 10.17487\/RFC8910. num Pages: 11.","DOI":"10.17487\/RFC8910"},{"key":"10.1016\/j.procs.2026.02.380_bib12","doi-asserted-by":"crossref","unstructured":"Larose, K., Dolson, D., Liu, H., 2020. Captive Portal Architecture. Request for Comments RFC 8952. Internet Engineering Task Force. URL:https:\/\/datatracker.ietf.org\/doc\/rfc8952, doi: 10.17487\/RFC8952. num Pages: 19.","DOI":"10.17487\/RFC8952"},{"key":"10.1016\/j.procs.2026.02.380_bib13","doi-asserted-by":"crossref","unstructured":"Lei, Z., Nan, Y., Fratantonio, Y., Bianchi, A., 2021. On the Insecurity of SMS One-Time Password Messages against Local Attackers in Modern Mobile Devices, in: Proceedings 2021 Network and Distributed System Security Symposium, Internet Society, Virtual. p. 19. URL: https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/ndss2021_3B-4_24212_paper.pdf, doi: 10.14722\/ndss.2021.24212.","DOI":"10.14722\/ndss.2021.24212"},{"key":"10.1016\/j.procs.2026.02.380_bib14","doi-asserted-by":"crossref","unstructured":"Maier, A., Sharp, A., Vagapov, Y., 2017. Comparative analysis and practical implementation of the ESP32 microcontroller module for the internet of things, in: 2017 Internet Technologies and Applications (ITA), IEEE. pp. 143\u2013148. URL: https:\/\/ieeexplore.ieee.org\/abstract\/document\/8101926, doi: 10.1109\/ITECHA.2017.8101926.","DOI":"10.1109\/ITECHA.2017.8101926"},{"key":"10.1016\/j.procs.2026.02.380_bib15","doi-asserted-by":"crossref","first-page":"1891","DOI":"10.1007\/s11277-020-07298-y","article-title":"Integration of the Captive Portal paradigm with the 802.1X architecture","volume":"113","author":"Marques","year":"2020","journal-title":"Wireless Personal Communications"},{"key":"10.1016\/j.procs.2026.02.380_bib16","doi-asserted-by":"crossref","unstructured":"Pauly, T., Thakore, D., 2020. Captive Portal API. Request for Comments RFC 8908. Internet Engineering Task Force. URL: https:\/\/datatracker.ietf.org\/doc\/rfc8908, doi: 10.17487\/RFC8908. num Pages: 11.","DOI":"10.17487\/RFC8908"},{"key":"10.1016\/j.procs.2026.02.380_bib17","doi-asserted-by":"crossref","first-page":"97183","DOI":"10.1109\/ACCESS.2022.3206030","article-title":"Coverage and energy-efficiency experimental test performance for a comparative evaluation of unlicensed lpwan: Lorawan and sigfox","volume":"10","author":"P\u00e9rez","year":"2022","journal-title":"IEEE Access"},{"key":"10.1016\/j.procs.2026.02.380_bib18","doi-asserted-by":"crossref","first-page":"359","DOI":"10.1016\/j.comcom.2023.07.011","article-title":"Blind-trust: Raising awareness of the dangers of using unsecured public Wi-Fi networks","volume":"209","author":"Sangeen","year":"2023","journal-title":"Computer Communications"},{"key":"10.1016\/j.procs.2026.02.380_bib19","unstructured":"Sujathakumari, B.A., Sabhat, H., 2018. A Theoretical Survey on MAC Address Blacklisting. International Journal of Engineering Research 6, 4."},{"key":"10.1016\/j.procs.2026.02.380_bib20","unstructured":"Systems, E., 2025. Wi-Fi Security - ESP32 - \u2014 ESP-IDF Programming Guide v5.4.1 documentation. URL: https:\/\/docs.espressif.com\/projects\/esp-idf\/en\/stable\/esp32\/api-guides\/wifi-security.html."},{"key":"10.1016\/j.procs.2026.02.380_bib21","doi-asserted-by":"crossref","unstructured":"Wang, P.L., Chou, K.H., Hsiao, S.C., Low, A.T., Kim, T.H.J., Hsiao, H.C., 2023. Capturing Antique Browsers in Modern Devices: A Security Analysis of Captive Portal Mini-Browsers, in: Applied Cryptography and Network Security: 21st International Conference, ACNS 2023, Kyoto, Japan, June 19\u201322, 2023, Proceedings, Part I, Springer-Verlag, Berlin, Heidelberg. pp. 260\u2013283. URL: https:\/\/doi.org\/10.1007\/978-3-031-33488-7_10, doi: 10.1007\/978-3-031-33488-7_10.","DOI":"10.1007\/978-3-031-33488-7_10"}],"container-title":["Procedia Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050926005016?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050926005016?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T07:49:22Z","timestamp":1775807362000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1877050926005016"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":21,"alternative-id":["S1877050926005016"],"URL":"https:\/\/doi.org\/10.1016\/j.procs.2026.02.380","relation":{},"ISSN":["1877-0509"],"issn-type":[{"value":"1877-0509","type":"print"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Towards Zero-Touch Network Provisioning for Embedded Industrial IoT: A Feasibility Study on Autonomous Guest Wi-Fi Access","name":"articletitle","label":"Article Title"},{"value":"Procedia Computer Science","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.procs.2026.02.380","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 The Author(s). Published by Elsevier B.V.","name":"copyright","label":"Copyright"}]}}