{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T11:24:18Z","timestamp":1772277858877,"version":"3.50.1"},"reference-count":32,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T00:00:00Z","timestamp":1772150400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Systems Architecture"],"published-print":{"date-parts":[[2026,6]]},"DOI":"10.1016\/j.sysarc.2026.103751","type":"journal-article","created":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T16:27:30Z","timestamp":1772209650000},"page":"103751","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Enhancing IoT object integrity and energy efficiency through DBSCAN and fuzzy Logic-based self-management framework"],"prefix":"10.1016","volume":"175","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-6776-5895","authenticated-orcid":false,"given":"Abdelhamid","family":"Garah","sequence":"first","affiliation":[]},{"given":"Nader","family":"Mbarek","sequence":"additional","affiliation":[]},{"given":"Sergey","family":"Kirgizov","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.sysarc.2026.103751_b1","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2021.102498","article-title":"A survey of remote attestation in Internet of Things: Attacks, countermeasures, and prospects","volume":"112","author":"Kuang","year":"2022","journal-title":"Comput. Secur."},{"key":"10.1016\/j.sysarc.2026.103751_b2","series-title":"IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004","first-page":"272","article-title":"SWATT: Software-based attestation for embedded devices","author":"Seshadri","year":"2004"},{"key":"10.1016\/j.sysarc.2026.103751_b3","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1016\/j.comnet.2018.01.039","article-title":"AAoT: Lightweight attestation and authentication of low-resource things in IoT and CPS","volume":"134","author":"Feng","year":"2018","journal-title":"Comput. Netw."},{"key":"10.1016\/j.sysarc.2026.103751_b4","series-title":"Proceedings of ACM Symposium on Operating Systems Principles","first-page":"10","article-title":"Pioneer: Verifying integrity and guaranteeing execution of code on legacy platforms","volume":"Vol. 173","author":"Seshadri","year":"2005"},{"issue":"3","key":"10.1016\/j.sysarc.2026.103751_b5","doi-asserted-by":"crossref","first-page":"429","DOI":"10.1109\/TDSC.2011.61","article-title":"Remote attestation with domain-based integrity model and policy analysis","volume":"9","author":"Xu","year":"2011","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"10.1016\/j.sysarc.2026.103751_b6","unstructured":"H.R. Ghaeini, M. Chan, R. Bahmani, F. Brasser, L. Garcia, J. Zhou, A.-R. Sadeghi, N.O. Tippenhauer, S. Zonouz, {PAtt}: Physics-based attestation of control systems, in: 22nd International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2019, 2019, pp. 165\u2013180."},{"issue":"3","key":"10.1016\/j.sysarc.2026.103751_b7","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3079763","article-title":"Sancus 2.0: A low-cost security architecture for IoT devices","volume":"20","author":"Noorman","year":"2017","journal-title":"ACM Trans. Priv. Secur. (TOPS)"},{"key":"10.1016\/j.sysarc.2026.103751_b8","series-title":"2017 IEEE\/ACM International Conference on Computer-Aided Design","first-page":"384","article-title":"ATRIUM: Runtime attestation resilient under memory attacks","author":"Zeitouni","year":"2017"},{"key":"10.1016\/j.sysarc.2026.103751_b9","doi-asserted-by":"crossref","unstructured":"K. Eldefrawy, N. Rattanavipanon, G. Tsudik, HYDRA: hybrid design for remote attestation (using a formally verified microkernel), in: Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017, pp. 99\u2013110.","DOI":"10.1145\/3098243.3098261"},{"key":"10.1016\/j.sysarc.2026.103751_b10","unstructured":"I.D.O. Nunes, K. Eldefrawy, N. Rattanavipanon, G. Tsudik, {APEX}: A verified architecture for proofs of execution on remote devices under full software compromise, in: 29th USENIX Security Symposium, USENIX Security 20, 2020, pp. 771\u2013788."},{"key":"10.1016\/j.sysarc.2026.103751_b11","doi-asserted-by":"crossref","unstructured":"I. De Oliveira Nunes, S. Jakkamsetti, N. Rattanavipanon, G. Tsudik, On the TOCTOU problem in remote attestation, in: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, 2021, pp. 2921\u20132936.","DOI":"10.1145\/3460120.3484532"},{"key":"10.1016\/j.sysarc.2026.103751_b12","unstructured":"J. Wang, Y. Wang, A. Li, Y. Xiao, R. Zhang, W. Lou, Y.T. Hou, N. Zhang, {ARI}: Attestation of real-time mission execution integrity, in: 32nd USENIX Security Symposium, USENIX Security 23, 2023, pp. 2761\u20132778."},{"key":"10.1016\/j.sysarc.2026.103751_b13","series-title":"Autonomic Computing: Principles, Design and Implementation","author":"Lalanda","year":"2013"},{"key":"10.1016\/j.sysarc.2026.103751_b14","unstructured":"F.M. De Almeida, A.d.R.L. Ribeiro, E.D. Moreno, An architecture for self-healing in internet of things, in: Proceedings of the UBICOMM, Vol. 89, 2015, pp. 76\u201381."},{"issue":"4","key":"10.1016\/j.sysarc.2026.103751_b15","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3466696","article-title":"Autonomic security management for IoT smart spaces","volume":"2","author":"Lin","year":"2021","journal-title":"ACM Trans. Internet Things"},{"key":"10.1016\/j.sysarc.2026.103751_b16","doi-asserted-by":"crossref","DOI":"10.1016\/j.iot.2024.101219","article-title":"Enhancing IoT data confidentiality and energy efficiency through decision tree-based self-management","volume":"26","author":"Garah","year":"2024","journal-title":"Internet Things"},{"key":"10.1016\/j.sysarc.2026.103751_b17","series-title":"HMAC: Keyed-hashing for message authentication","author":"Krawczyk","year":"1997"},{"key":"10.1016\/j.sysarc.2026.103751_b18","doi-asserted-by":"crossref","unstructured":"A. Ibrahim, A.-R. Sadeghi, G. Tsudik, S. Zeitouni, Darpa: Device attestation resilient to physical attacks, in: Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016, pp. 171\u2013182.","DOI":"10.1145\/2939918.2939938"},{"key":"10.1016\/j.sysarc.2026.103751_b19","series-title":"OMNeT++ Discrete Event Simulator","author":"Varga","year":"2025"},{"key":"10.1016\/j.sysarc.2026.103751_b20","series-title":"INET Framework","author":"B\u00f6jthe","year":"2025"},{"key":"10.1016\/j.sysarc.2026.103751_b21","series-title":"Crypto++ library","author":"Dai","year":"2007"},{"key":"10.1016\/j.sysarc.2026.103751_b22","doi-asserted-by":"crossref","first-page":"4015","DOI":"10.1007\/s13369-021-05358-4","article-title":"Performance evaluation of lightweight encryption algorithms for IoT-based applications","volume":"46","author":"Panahi","year":"2021","journal-title":"Arab. J. Sci. Eng."},{"key":"10.1016\/j.sysarc.2026.103751_b23","first-page":"2825","article-title":"Scikit-learn: Machine learning in Python","volume":"12","author":"Pedregosa","year":"2011","journal-title":"J. Mach. Learn. Res."},{"key":"10.1016\/j.sysarc.2026.103751_b24","series-title":"Kdd","first-page":"226","article-title":"A density-based algorithm for discovering clusters in large spatial databases with noise","volume":"Vol. 96","author":"Ester","year":"1996"},{"issue":"Nov","key":"10.1016\/j.sysarc.2026.103751_b25","first-page":"2579","article-title":"Visualizing data using t-SNE","volume":"9","author":"van der Maaten","year":"2008","journal-title":"J. Mach. Learn. Res."},{"key":"10.1016\/j.sysarc.2026.103751_b26","series-title":"A rapid review of clustering algorithms","author":"Yin","year":"2024"},{"issue":"559\u2013569","key":"10.1016\/j.sysarc.2026.103751_b27","first-page":"4","article-title":"Data mining: Concepts and techniques","volume":"10","author":"Mining","year":"2006","journal-title":"Morgan Kaufinann"},{"issue":"1","key":"10.1016\/j.sysarc.2026.103751_b28","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/S0020-7373(75)80002-2","article-title":"An experiment in linguistic synthesis with a fuzzy logic controller","volume":"7","author":"Mamdani","year":"1975","journal-title":"Int. J. Man-Mach. Stud."},{"key":"10.1016\/j.sysarc.2026.103751_b29","series-title":"2020 International Conference on Computational Intelligence","first-page":"115","article-title":"Fuzzy type-1 triangular membership function approximation using fuzzy C-means","author":"Azam","year":"2020"},{"key":"10.1016\/j.sysarc.2026.103751_b30","doi-asserted-by":"crossref","first-page":"82272","DOI":"10.1109\/ACCESS.2022.3195572","article-title":"Lightweight cryptographic hash functions: Design trends, comparative study, and future directions","volume":"10","author":"Windarta","year":"2022","journal-title":"IEEE Access"},{"key":"10.1016\/j.sysarc.2026.103751_b31","doi-asserted-by":"crossref","unstructured":"A. Francillon, C. Castelluccia, Code injection attacks on harvard-architecture devices, in: Proceedings of the 15th ACM Conference on Computer and Communications Security, 2008, pp. 15\u201326.","DOI":"10.1145\/1455770.1455775"},{"key":"10.1016\/j.sysarc.2026.103751_b32","doi-asserted-by":"crossref","unstructured":"X. Carpent, K. Eldefrawy, N. Rattanavipanon, G. Tsudik, Temporal consistency of integrity-ensuring computations and applications to embedded systems security, in: Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018, pp. 313\u2013327.","DOI":"10.1145\/3196494.3196526"}],"container-title":["Journal of Systems Architecture"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S138376212600069X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S138376212600069X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T07:47:20Z","timestamp":1772264840000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S138376212600069X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,6]]},"references-count":32,"alternative-id":["S138376212600069X"],"URL":"https:\/\/doi.org\/10.1016\/j.sysarc.2026.103751","relation":{},"ISSN":["1383-7621"],"issn-type":[{"value":"1383-7621","type":"print"}],"subject":[],"published":{"date-parts":[[2026,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Enhancing IoT object integrity and energy efficiency through DBSCAN and fuzzy Logic-based self-management framework","name":"articletitle","label":"Article Title"},{"value":"Journal of Systems Architecture","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.sysarc.2026.103751","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 The Authors. Published by Elsevier B.V.","name":"copyright","label":"Copyright"}],"article-number":"103751"}}