{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T16:06:21Z","timestamp":1774541181435,"version":"3.50.1"},"reference-count":115,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"Research","award":["FRGS\/1\/2019\/ICT03\/UKM\/02\/1"],"award-info":[{"award-number":["FRGS\/1\/2019\/ICT03\/UKM\/02\/1"]}]},{"name":"Research","award":["GGPM-2019-030"],"award-info":[{"award-number":["GGPM-2019-030"]}]},{"name":"Research","award":["PP-FTSM-2020"],"award-info":[{"award-number":["PP-FTSM-2020"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.3002932","type":"journal-article","created":{"date-parts":[[2020,6,16]],"date-time":"2020-06-16T21:07:06Z","timestamp":1592341626000},"page":"111763-111782","source":"Crossref","is-referenced-by-count":124,"title":["A Survey on Trend and Classification of Internet of Things Reviews"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7337-6736","authenticated-orcid":false,"given":"Azana Hafizah","family":"Mohd Aman","sequence":"first","affiliation":[{"name":"Center for Cyber Security, Faculty of Information Science and Technology, The National University of Malaysia, Bangi, Malaysia"}]},{"given":"Elaheh","family":"Yadegaridehkordi","sequence":"additional","affiliation":[{"name":"Center for Software Technology and Management, Faculty of Information Science and Technology, The National University of Malaysia, Bangi, Malaysia"}]},{"given":"Zainab Senan","family":"Attarbashi","sequence":"additional","affiliation":[{"name":"School of Computing, Universiti Utara Malaysia, Sintok, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1348-5804","authenticated-orcid":false,"given":"Rosilah","family":"Hassan","sequence":"additional","affiliation":[{"name":"Center for Cyber Security, Faculty of Information Science and Technology, The National University of Malaysia, Bangi, Malaysia"}]},{"given":"Yong-Jin","family":"Park","sequence":"additional","affiliation":[{"name":"Faculty of Computing and Informatics, Universiti Malaysia Sabah, Kota Kinabalu, Malaysia"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.enbuild.2017.04.083"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.compag.2017.09.015"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2694469"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2751586"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2748178"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2015.2415194"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.11.007"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.08.017"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2688411"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2755980"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2652320"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2751617"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2647881"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2015.2498900"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2016.2525418"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2533541"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2664072"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2412971"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/ICITECH.2017.8079928"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2680318"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2019.101754"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2697839"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2796561"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2773600"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2879615"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2833501"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2842685"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2827946"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2739181"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2792534"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2883151"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2788449"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.02.002"},{"key":"ref4","article-title":"IoT and security standards and best practices","author":"irons-mclean","year":"2019","journal-title":"Orchestrating and Automating Security for the Internet of Things Delivering Advanced Security Capabilities from Edge to Cloud for IoT Book"},{"key":"ref3","author":"evans","year":"2011","journal-title":"The Internet of Things How the next Evolution of the Internet Is Changing Everything"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.031612.00124"},{"key":"ref5","article-title":"Internet of Things (IoT) 2017&#x2013;2027: Things that think: IP addressed sensor node systems","author":"harrop","year":"0"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2318835"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2802704"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2389854"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2323395"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2817685"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2844341"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2771153"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2825231"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2779844"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2759725"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2844742"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2817921"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2907245"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2883728"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2904945"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2929915"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2916717"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2886601"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2019.2928090"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2924045"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2869847"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2863180"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2846609"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2762345"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2789329"},{"key":"ref63","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1016\/j.comnet.2018.07.017","article-title":"Internet of Things (IoT): A review of enabling technologies, challenges, and open research issues","volume":"144","author":"?olakovi?","year":"2018","journal-title":"Comput Netw"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2018.01.053"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.07.020"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2932609"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2928233"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2950656"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8576"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2887076"},{"key":"ref1","year":"2017"},{"key":"ref109","first-page":"1","year":"2018"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2728000"},{"key":"ref108","year":"2020","journal-title":"Science Direct"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2885894"},{"key":"ref107","year":"2020","journal-title":"IEEE Xplore"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2926642"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2015.03.007"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2956748"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/MIE.2017.2649104"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2933518"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1007\/s12927-019-0003-8"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2864168"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3736"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6943-z"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2019.2940186"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2943120"},{"key":"ref110","first-page":"1","year":"2019"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.05.014"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1016\/j.compag.2018.12.039"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2912022"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.03.006"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"2233","DOI":"10.1109\/TII.2014.2300753","article-title":"Internet of Things in industries: A survey","volume":"10","author":"da xu","year":"2014","journal-title":"IEEE Trans Ind Informat"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2437951"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2497312"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2360121"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2015.2461555"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2549047"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2560919"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2895302"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2587754"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2960412"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2532458"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2921912"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2015.2480421"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2947723"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.3390\/s19143078"},{"key":"ref113","first-page":"12785","article-title":"A modified meander line microstrip patch antenna with enhanced bandwidth for 2.4 GHz ISM-band Internet of Things (IoT) applications","volume":"7","author":"islam","year":"2019","journal-title":"IEEE Access"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2894819"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.3390\/s19143173"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2925825"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2926354"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2911424"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2900957"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2896380"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/09119087.pdf?arnumber=9119087","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,8]],"date-time":"2022-09-08T19:47:11Z","timestamp":1662666431000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9119087\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":115,"URL":"https:\/\/doi.org\/10.1109\/access.2020.3002932","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}