{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T16:25:56Z","timestamp":1775492756974,"version":"3.50.1"},"reference-count":369,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100002560","name":"Soonchunhyang University","doi-asserted-by":"publisher","award":["The Soonchunhyang University Research Fund"],"award-info":[{"award-number":["The Soonchunhyang University Research Fund"]}],"id":[{"id":"10.13039\/501100002560","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Institute for Information and communications Technology Planning and Evaluation","award":["No.2018-0-00231"],"award-info":[{"award-number":["No.2018-0-00231"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.3022661","type":"journal-article","created":{"date-parts":[[2020,9,8]],"date-time":"2020-09-08T19:46:32Z","timestamp":1599594392000},"page":"167123-167163","source":"Crossref","is-referenced-by-count":109,"title":["Security, Privacy and Trust for Smart Mobile- Internet of Things (M-IoT): A Survey"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7470-6506","authenticated-orcid":false,"given":"Vishal","family":"Sharma","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0604-3445","authenticated-orcid":false,"given":"Ilsun","family":"You","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0244-3561","authenticated-orcid":false,"given":"Karl","family":"Andersson","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1760-5527","authenticated-orcid":false,"given":"Francesco","family":"Palmieri","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3565-7390","authenticated-orcid":false,"given":"Mubashir Husain","family":"Rehmani","sequence":"additional","affiliation":[]},{"given":"Jaedeok","family":"Lim","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref365","doi-asserted-by":"publisher","DOI":"10.1145\/3139367.3139417"},{"key":"ref275","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2714842"},{"key":"ref364","doi-asserted-by":"publisher","DOI":"10.1109\/ICMECH.2017.7921154"},{"key":"ref274","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2017.8108673"},{"key":"ref363","doi-asserted-by":"publisher","DOI":"10.1109\/IPCC.2017.8013965"},{"key":"ref277","doi-asserted-by":"publisher","DOI":"10.3390\/s16030339"},{"key":"ref362","article-title":"Physical environment profiling through Internet of Things integration platform","author":"shaashua","year":"2018"},{"key":"ref276","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2778185"},{"key":"ref361","doi-asserted-by":"publisher","DOI":"10.1109\/ATNAC.2017.8215434"},{"key":"ref271","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2608932"},{"key":"ref360","doi-asserted-by":"publisher","DOI":"10.1109\/BWCCA.2010.85"},{"key":"ref270","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2575863"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1007\/s40860-017-0046-x"},{"key":"ref273","doi-asserted-by":"publisher","DOI":"10.3390\/s17092023"},{"key":"ref272","doi-asserted-by":"publisher","DOI":"10.3390\/s16122152"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.09.008"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.07.038"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2013.2277656"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2017.01.003"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.3390\/s16030358"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1109\/ISNE.2014.6839375"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2388550"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-011-0385-5"},{"key":"ref168","first-page":"1","article-title":"Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks","author":"mishra","year":"2017","journal-title":"Multimedia Tools Appl"},{"key":"ref169","first-page":"108","article-title":"Lightweight anonymity-preserving authentication and key agreement protocol for the Internet of Things environment","author":"alkuhlani","year":"2017","journal-title":"Proc Int Conf Intell Inf Technol"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.03.011"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TMSCS.2015.2498605"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40925-7_20"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.3837\/tiis.2012.01.001"},{"key":"ref359","doi-asserted-by":"publisher","DOI":"10.1016\/j.bushor.2015.06.005"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2012.6263790"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-011-0386-4"},{"key":"ref357","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700332"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.11.008"},{"key":"ref267","doi-asserted-by":"publisher","DOI":"10.1145\/2378023.2378025"},{"key":"ref358","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422622"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-014-0761-7"},{"key":"ref268","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-1385-2"},{"key":"ref355","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2805690"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2014.01.014"},{"key":"ref269","doi-asserted-by":"publisher","DOI":"10.1364\/IPRSN.2017.JTu4A.20"},{"key":"ref356","article-title":"A framework for mitigating zero-day attacks in IoT","author":"sharma","year":"2018","journal-title":"arXiv 1804 05549"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.12.018"},{"key":"ref352","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2323395"},{"key":"ref288","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7120014"},{"key":"ref351","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2444095"},{"key":"ref287","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2684221"},{"key":"ref354","doi-asserted-by":"publisher","DOI":"10.24018\/ejece.2018.2.2.15"},{"key":"ref286","first-page":"1","article-title":"Impact study of a mobile botnet over LTE networks","volume":"6","author":"kitana","year":"2016","journal-title":"J Internet Serv Inf Security"},{"key":"ref353","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2018.2814082"},{"key":"ref285","doi-asserted-by":"publisher","DOI":"10.3390\/e19080420"},{"key":"ref284","doi-asserted-by":"publisher","DOI":"10.3390\/info7030049"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1109\/ICT4M.2010.5971930"},{"key":"ref283","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2015.2466548"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1109\/ISIE.2014.6864831"},{"key":"ref350","doi-asserted-by":"publisher","DOI":"10.3390\/info7030044"},{"key":"ref282","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7120011"},{"key":"ref281","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2010.5700466"},{"key":"ref280","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08991-1_44"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2019.2920154"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2922039"},{"key":"ref183","article-title":"Blockchain enabled crowdsourcing","author":"irazabal","year":"2019"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1002\/0470017465"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.1145\/2490428.2490439"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1109\/GreenCom.2012.45"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.05.007"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700863"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.08.013"},{"key":"ref27","article-title":"Optimizing the advanced metering infrastructure architecture in smart grid","volume":"5023","author":"chasempour","year":"2016"},{"key":"ref179","first-page":"44","article-title":"Generic construction of privacy-preserving optimistic fair exchange protocols","volume":"7","author":"guo","year":"2017","journal-title":"J Internet Services Inf Secur"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-1674-7_38"},{"key":"ref348","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.02.001"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.3390\/jsan8010015"},{"key":"ref349","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2016.2525418"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2017.11.002"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700871"},{"key":"ref344","doi-asserted-by":"publisher","DOI":"10.1109\/ISIE.2017.8001421"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2015.7436304"},{"key":"ref345","first-page":"1","article-title":"An overview of 802.21a-2012 and its incorporation into IoT-fog networks using osmotic framework","author":"sharma","year":"2017","journal-title":"Proc 3rd EAI Int Conf IoT Service"},{"key":"ref23","first-page":"89","article-title":"Technology forecasting of IoT healthcare with big data analysis","author":"sawng","year":"2017","journal-title":"Proc ICCC Soc Korea"},{"key":"ref346","first-page":"1","article-title":"Fuzzy-based protocol for secure remote diagnosis of IoT devices in 5G networks","author":"sharma","year":"2017","journal-title":"Proc 3rd EAI Int Conf IoT Service"},{"key":"ref278","first-page":"1195","article-title":"A polarization state modulation based physical layer security scheme for wireless communications","author":"wei","year":"2016","journal-title":"IEEE Proc Mil Commun Conf MILCOM"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT.2016.7781250"},{"key":"ref347","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.11.009"},{"key":"ref279","doi-asserted-by":"publisher","DOI":"10.1109\/WCSP.2016.7752531"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/GreenTech.2016.8"},{"key":"ref293","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2013.6664487"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2749982"},{"key":"ref292","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2012.6379140"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2017.2750067"},{"key":"ref295","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2016.08.013"},{"key":"ref294","first-page":"914","article-title":"Context gathering and management for centralized context-aware handover in heterogeneous mobile networks","volume":"20","author":"ghahfarokhi","year":"2012","journal-title":"Turkish J Electr Eng Comput Sci"},{"key":"ref297","first-page":"953","article-title":"A secure and efficient mutual authentication hand-off protocol for sensor device support in Internet of Things","volume":"29","author":"ndibanje","year":"2017","journal-title":"Sensors Mater"},{"key":"ref296","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.07.258"},{"key":"ref299","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2012.081612.112070"},{"key":"ref298","doi-asserted-by":"publisher","DOI":"10.1145\/2981547"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2014.6803204"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2940"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2013.6733571"},{"key":"ref155","first-page":"1","article-title":"Lightweight IKEv2: A key management solution for both the compressed IPsec and the IEEE 802.15. 4 security","volume":"23","author":"raza","year":"2012","journal-title":"Proc IETF Workshop Object Secur"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2016.7849040"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/CSPC.2017.8305890"},{"key":"ref291","doi-asserted-by":"publisher","DOI":"10.23919\/AEIT.2016.7892788"},{"key":"ref151","article-title":"Cross-layer balanced and reliable opportunistic routing algorithm for mobile ad hoc networks","author":"li","year":"2017","journal-title":"arXiv 1710 00105"},{"key":"ref290","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2014.6997467"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2710379"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.12.039"},{"key":"ref148","first-page":"1","article-title":"HHSRP: A cluster based hybrid hierarchical secure routing protocol for wireless sensor networks","author":"deepa","year":"2017","journal-title":"Cluster Comput"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/481761"},{"key":"ref289","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2013.6583680"},{"key":"ref59","year":"2018","journal-title":"IoT Standards and Protocols"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2016.7444917"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700364"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2734681"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/JRFID.2017.2745510"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2017.2702098"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2624824"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2701551"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1108\/IntR-07-2014-0173"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2015.08.001"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.06.023"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.12.028"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2014.6952860"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2013.05.003"},{"key":"ref162","article-title":"A practical and lightweight source authentication protocol using one-way hash chain in CAN","author":"kang","year":"2017"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/ICECA.2017.8203733"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.08.009"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2906793"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/GreenTech.2016.17"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3333501"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.12.002"},{"key":"ref159","article-title":"Extension of MIH to support FPMIPv6 for optimized heterogeneous handover","author":"guan","year":"2017","journal-title":"arXiv 1705 09835"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-017-4647-8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600993"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2777443"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.05.009"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.11.004"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2016.7444787"},{"key":"ref366","doi-asserted-by":"publisher","DOI":"10.1109\/WiCOM.2012.6478402"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2018.011581520"},{"key":"ref367","doi-asserted-by":"publisher","DOI":"10.11591\/telkomnika.v11i2.2030"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2017.4241357"},{"key":"ref368","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2018.8319297"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2788919"},{"key":"ref369","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2018.8329617"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2793280"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2694844"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600363CM"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2765699"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2695525"},{"key":"ref320","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-017-0986-1"},{"key":"ref321","doi-asserted-by":"publisher","DOI":"10.1145\/3131672.3131688"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.111412.00158"},{"key":"ref72","year":"2018","journal-title":"IoT Standards and Protocols"},{"key":"ref71","year":"2018","journal-title":"Standards"},{"key":"ref70","first-page":"1","article-title":"NB-IoT system for M2M communication","author":"ratasuk","year":"2016","journal-title":"Proc Wireless Commun Netw Conf Workshops (WCNCW)"},{"key":"ref318","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1701062"},{"key":"ref76","year":"2018","journal-title":"Openiot"},{"key":"ref317","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2018.03.091"},{"key":"ref77","year":"2018","journal-title":"OCF"},{"key":"ref316","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSP.2014.6950117"},{"key":"ref74","year":"2018","journal-title":"IBM Watson IoT"},{"key":"ref315","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/3273917"},{"key":"ref75","year":"2018","journal-title":"Microsoft Azure IoT Suite"},{"key":"ref314","doi-asserted-by":"crossref","first-page":"1077","DOI":"10.1109\/TIE.2012.2198035","article-title":"Comparative handover performance analysis of IPv6 mobility management protocols","volume":"60","author":"lee","year":"2013","journal-title":"IEEE Trans Ind Electron"},{"key":"ref313","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2726114"},{"key":"ref312","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60131-1_4"},{"key":"ref78","article-title":"Pinpointing security vulnerabilities in computer software applications","author":"amit","year":"2013"},{"key":"ref311","doi-asserted-by":"publisher","DOI":"10.1109\/DESEC.2017.8073829"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.10.002"},{"key":"ref319","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.10.022"},{"key":"ref310","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2010.5421661"},{"key":"ref60","year":"2018","journal-title":"Iot security guidelines"},{"key":"ref62","first-page":"44","article-title":"Insider threats and auctions: Formalization, mechanized proof, and code generation","volume":"8","author":"kamm\u00fcller","year":"2017","journal-title":"J Wireless Mobile Netw Ubiquitous Comput Dependable Appl"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/4749085"},{"key":"ref305","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2734852"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/3139923.3139932"},{"key":"ref304","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2014.6845045"},{"key":"ref64","first-page":"21","article-title":"Application-aware and dynamic security function chaining for mobile networks","volume":"7","author":"li","year":"2017","journal-title":"J Internet Services Inf Secur"},{"key":"ref307","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4736-4"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2666823"},{"key":"ref306","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2016.7721743"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2017.12.005"},{"key":"ref301","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-016-0261-4"},{"key":"ref67","first-page":"1","article-title":"Evaluation of LoRa LPWAN technology for remote health and wellbeing monitoring","author":"pet\u00e4j\u00e4j\u00e4rvi","year":"2016","journal-title":"Proc 10th Int Symp Med Inf Commun Technol (ISMICT)"},{"key":"ref300","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2016.7564916"},{"key":"ref68","volume":"43","author":"shelby","year":"2011","journal-title":"6LoWPAN The Wireless Embedded Internet"},{"key":"ref303","doi-asserted-by":"publisher","DOI":"10.1002\/sec.406"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-48799-1_21"},{"key":"ref302","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3029"},{"key":"ref309","doi-asserted-by":"publisher","DOI":"10.1109\/ITechA.2015.7317403"},{"key":"ref308","doi-asserted-by":"publisher","DOI":"10.5626\/JOK.2015.42.6.807"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2358578"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.3527"},{"key":"ref199","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2015.2412552"},{"key":"ref193","first-page":"21","article-title":"A lightweight privacy and integrity preserving data communication in smart grid","volume":"3","author":"bamasag","year":"2015","journal-title":"Eur J Comput Sci Inf Technol"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.1109\/ICBNMT.2011.6155923"},{"key":"ref195","doi-asserted-by":"publisher","DOI":"10.1109\/BIBE.2012.6399701"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883405"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-017-0849-9"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2389960"},{"key":"ref190","first-page":"917","article-title":"Towards the CP-ABE application for privacy-preserving secure data sharing in IoT contexts","author":"p\u00e9rez","year":"2017","journal-title":"Proc Int Conf Innov Mobile Internet Services Ubiquitous Comput"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.05.031"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.03.001"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS.2017.00104"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.01.036"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2855563"},{"key":"ref342","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2015.7249483"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-016-1855-z"},{"key":"ref343","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2614976"},{"key":"ref340","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2011.258"},{"key":"ref341","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2706738"},{"key":"ref336","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2012.032712.110659"},{"key":"ref335","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2011.6133722"},{"key":"ref334","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2010.0004"},{"key":"ref333","doi-asserted-by":"publisher","DOI":"10.1109\/NPSEC.2010.5634455"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/MAMI.2015.7456584"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2016.7745481"},{"key":"ref339","first-page":"122","article-title":"A proxy signature based re-authentication scheme for secure fast handoff in wireless mesh networks","volume":"15","author":"ma","year":"2013","journal-title":"IJ Network Security"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/IRI.2014.7051866"},{"key":"ref338","doi-asserted-by":"publisher","DOI":"10.1002\/dac.983"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2014.2361406"},{"key":"ref337","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2306673"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1145\/3184558.3188736"},{"key":"ref81","year":"2018","journal-title":"Open Web Application Security Project (Owasp)"},{"key":"ref84","first-page":"43","article-title":"Studying open source vulnerability scanners for vulnerabilities in Web applications","volume":"9","author":"sagar","year":"2018","journal-title":"J of IIOABJ"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1145\/3194452.3194469"},{"key":"ref330","first-page":"46","article-title":"Fast pre-authentication with minimized overhead and high security for WLAN handoff","volume":"7","author":"chien","year":"2008","journal-title":"WSEAS Trans Comput"},{"key":"ref331","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2010.01.091607"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491222"},{"key":"ref332","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2010.39"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2767291"},{"key":"ref323","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.02.008"},{"key":"ref322","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2018.03.084"},{"key":"ref325","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.10.011"},{"key":"ref324","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-017-0352-x"},{"key":"ref327","first-page":"1","article-title":"BASH: A backhaul-aided seamless handoff scheme for wireless mesh networks","author":"he","year":"2008","journal-title":"Proc Int Symp World Wireless Mobile Multimedia Netw"},{"key":"ref85","article-title":"Method and system to accelerate IoT patch propagation and reduce security vulnerabilities exposure time","author":"lancioni","year":"2018"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2018.111145022"},{"key":"ref326","doi-asserted-by":"publisher","DOI":"10.1109\/MOBIQ.2007.4451014"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2856368"},{"key":"ref329","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.10.009"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-5041-1_35"},{"key":"ref328","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.06.008"},{"key":"ref200","doi-asserted-by":"publisher","DOI":"10.1109\/PAAP.2015.48"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/SpliTech.2016.7555946"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2014.7049308"},{"key":"ref209","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2015.34"},{"key":"ref203","doi-asserted-by":"publisher","DOI":"10.1109\/MobServ.2014.24"},{"key":"ref204","year":"2018","journal-title":"Spore"},{"key":"ref201","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2677520"},{"key":"ref202","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04219-5_9"},{"key":"ref207","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.Congress.2014.112"},{"key":"ref208","first-page":"1","article-title":"Data security and privacy in the IoT","author":"bertino","year":"2016","journal-title":"Proc EDBT"},{"key":"ref205","doi-asserted-by":"publisher","DOI":"10.1109\/SIOT.2015.9"},{"key":"ref206","doi-asserted-by":"publisher","DOI":"10.1109\/IEEM.2014.7058837"},{"key":"ref211","doi-asserted-by":"publisher","DOI":"10.1109\/SOCA.2014.58"},{"key":"ref210","doi-asserted-by":"publisher","DOI":"10.1145\/2732209.2732216"},{"key":"ref212","first-page":"1","article-title":"An efficient symmetric searchable encryption scheme for cloud storage","volume":"7","author":"jiang","year":"2017","journal-title":"J Internet Services Inf Secur"},{"key":"ref213","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2747942"},{"key":"ref214","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2014.6803122"},{"key":"ref215","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.08.002"},{"key":"ref216","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2015.7158207"},{"key":"ref217","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01718-6_4"},{"key":"ref218","first-page":"459","article-title":"K-isomorphism: Privacy preserving network publication against structural attacks","author":"cheng","year":"2010","journal-title":"Proc ACM SIGMOD Int Conf Manage Data"},{"key":"ref219","doi-asserted-by":"publisher","DOI":"10.14778\/1687627.1687734"},{"key":"ref220","doi-asserted-by":"publisher","DOI":"10.1109\/PRISMS.2014.6970594"},{"key":"ref222","first-page":"256","article-title":"Security and privacy threats in IoT architectures","author":"kozlov","year":"2012","journal-title":"Proc Int Conf Body Area Netw"},{"key":"ref221","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2009.11.008"},{"key":"ref229","first-page":"122","article-title":"RERUM: Building a reliable IoT upon privacy- and security- enabled smart objects","author":"p\u00f6hls","year":"2014","journal-title":"Proc Wireless Commun Netw Conf Workshops (WCNCW)"},{"key":"ref228","doi-asserted-by":"publisher","DOI":"10.1109\/CISTI.2014.6877073"},{"key":"ref227","first-page":"60","article-title":"Parallel big data processing system for security monitoring in Internet of Things networks","volume":"8","author":"kotenko","year":"2017","journal-title":"J Wireless Mobile Netw Ubiquitous Comput Dependable Appl"},{"key":"ref226","first-page":"1","article-title":"Comparing alternatives to measure the impact of DDoS attack announcements on target stock prices","volume":"8","author":"abhishta","year":"2017","journal-title":"J Wireless Mobile Netw Ubiquitous Comput Dependable Appl"},{"key":"ref225","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2017.7917634"},{"key":"ref224","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2014.6849186"},{"key":"ref223","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2015.7248377"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2009.17"},{"key":"ref126","volume":"4","author":"kaufmann","year":"2013","journal-title":"Computer-Aided Reasoning ACL2 Case Studies"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1007\/11513988_27"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1145\/322510.322530"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2013.6488560"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70545-1_38"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-016-0168-0"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.4236\/ait.2012.21001"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-13102-3_67"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-75928-9_43"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1145\/2981546"},{"key":"ref232","first-page":"533","article-title":"A centralized trust management mechanism for the Internet of Things (CTM-IoT)","author":"alshehri","year":"2017","journal-title":"Proc Int Conf Broadband Wireless Comput Commun Appl"},{"key":"ref233","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2014.2365797"},{"key":"ref230","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2015.7347956"},{"key":"ref231","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2016.7845511"},{"key":"ref239","doi-asserted-by":"publisher","DOI":"10.1109\/VITAE.2013.6617083"},{"key":"ref238","doi-asserted-by":"publisher","DOI":"10.1007\/s40815-016-0149-1"},{"key":"ref235","doi-asserted-by":"publisher","DOI":"10.1109\/MobileCloud.2017.13"},{"key":"ref234","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0181124"},{"key":"ref237","doi-asserted-by":"publisher","DOI":"10.1109\/GIOTS.2017.8016285"},{"key":"ref236","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.Workshops.2017.77"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1002\/sres.2184"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.13052\/jicts2245-800X.133"},{"key":"ref138","first-page":"135","article-title":"Security comes first, a public-key cryptography framework for the Internet of Things","author":"shafagh","year":"2014","journal-title":"Proc IEEE Int Conf Distrib Comput Sensor Syst (DCOSS)"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.05.099"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2512494"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2015.110"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11227-5_22"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2537208"},{"key":"ref143","article-title":"Managing service-heterogeneity using osmotic computing","author":"sharma","year":"2017","journal-title":"arXiv 1704 04213"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2017.10.009"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2808356"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.08.007"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2017.09.002"},{"key":"ref241","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2683159"},{"key":"ref242","doi-asserted-by":"publisher","DOI":"10.2298\/CSIS110303056C"},{"key":"ref243","doi-asserted-by":"publisher","DOI":"10.1145\/3098954.3098963"},{"key":"ref244","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-69459-7_15"},{"key":"ref240","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2017.7983132"},{"key":"ref248","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60033-8_27"},{"key":"ref247","article-title":"Drive-by download attacks: Effects and detection methods","author":"niki","year":"2009","journal-title":"Proc 3rd IT Secur Conf Next Gener"},{"key":"ref246","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2008.100"},{"key":"ref245","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2011.08.020"},{"key":"ref249","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2017.11.010"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/FiCloud.2016.57"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.03.023"},{"key":"ref107","first-page":"776","article-title":"A framework for modeling and assessing security of the Internet of Things","author":"ge","year":"2015","journal-title":"Proc Int Conf Parallel and Distributed Systems (ICPADS)"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.4108\/icst.bodynets.2012.250235"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/ICIME.2009.84"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3282"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2014.12.021"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2013.6583465"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1259"},{"key":"ref112","article-title":"Adaptive secondary authentication criteria based on account data","author":"mclachlan","year":"2015"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/IOT.2014.7030108"},{"key":"ref250","doi-asserted-by":"publisher","DOI":"10.1109\/ISNCC.2017.8071998"},{"key":"ref251","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2807788"},{"key":"ref254","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2012.6362662"},{"key":"ref255","doi-asserted-by":"publisher","DOI":"10.4018\/IJACI.2016070102"},{"key":"ref252","article-title":"Persona and device based certificate management","author":"obaidi","year":"2017"},{"key":"ref253","doi-asserted-by":"publisher","DOI":"10.1109\/Kaleidoscope.2015.7383635"},{"key":"ref257","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2014.6821746"},{"key":"ref256","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.105"},{"key":"ref10","year":"2018","journal-title":"Low-Power Wide Area Networks (LPWAN)"},{"key":"ref259","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2014.6953138"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/en11030573"},{"key":"ref258","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2314132"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600613"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2016.7763213"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2015.7158142"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2015.7338323"},{"key":"ref118","first-page":"204","article-title":"Network traffic pattern analysis using improved information theoretic co-clustering based collective anomaly detection","author":"ahmed","year":"2014","journal-title":"Proc Int Conf Secur Privacy Commun Syst"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MASS.2015.100"},{"key":"ref117","first-page":"56","article-title":"Real-time anomaly detection system for time series at scale","author":"toledano","year":"2018","journal-title":"Proceedings of the KDD Workshop on Anomaly Detection in Finance"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2016.7848825"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2017.1700003"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.1999.779761"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2018.1800193"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1145\/2896387.2906198"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.11.011"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2818163"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2017.04.070"},{"key":"ref120","first-page":"121","article-title":"Logical omniscience in the semantics of ban logic","author":"cohen","year":"2005","journal-title":"Found Secure Comput"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14992-4_16"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-5906-5_220"},{"key":"ref123","author":"mao","year":"2003","journal-title":"Modern Cryptography Theory and Practice"},{"key":"ref260","doi-asserted-by":"publisher","DOI":"10.2991\/iccsee.2013.552"},{"key":"ref261","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.09.001"},{"key":"ref262","doi-asserted-by":"publisher","DOI":"10.1109\/ICITECH.2017.8080016"},{"key":"ref263","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2736446"},{"key":"ref264","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2017.7986378"},{"key":"ref265","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2017.161"},{"key":"ref266","first-page":"1","article-title":"Trust management for the Internet of Things and its application to service composition","author":"bao","year":"2012","journal-title":"Proc IEEE Int Symp World of Wireless Mobile and Multimedia Networks (WoWMoM06)"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/09187908.pdf?arnumber=9187908","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T19:55:47Z","timestamp":1639770947000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9187908\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":369,"URL":"https:\/\/doi.org\/10.1109\/access.2020.3022661","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}