{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T12:50:45Z","timestamp":1777726245280,"version":"3.51.4"},"reference-count":52,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2021.3102280","type":"journal-article","created":{"date-parts":[[2021,8,3]],"date-time":"2021-08-03T20:08:35Z","timestamp":1628021315000},"page":"111095-111113","source":"Crossref","is-referenced-by-count":19,"title":["Automated and Secure Onboarding for System of Systems"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0422-4215","authenticated-orcid":false,"given":"Silia","family":"Maksuti","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2477-3692","authenticated-orcid":false,"given":"Ani","family":"Bicaku","sequence":"additional","affiliation":[]},{"given":"Mario","family":"Zsilak","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3037-7813","authenticated-orcid":false,"given":"Igor","family":"Ivkic","sequence":"additional","affiliation":[]},{"given":"Balint","family":"Peceli","sequence":"additional","affiliation":[]},{"given":"Gabor","family":"Singler","sequence":"additional","affiliation":[]},{"given":"Kristof","family":"Kovacs","sequence":"additional","affiliation":[]},{"given":"Markus","family":"Tauber","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4133-3317","authenticated-orcid":false,"given":"Jerker","family":"Delsing","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2009.2038702"},{"key":"ref38","first-page":"11","article-title":"A survey on application layer protocols for the Internet of Things","volume":"3","author":"karagiannis","year":"2015","journal-title":"Trans IoT Cloud Comput"},{"key":"ref33","author":"housley","year":"2459","journal-title":"Internet X 509 Public Key Infrastructure Certificate and CRL Profile"},{"key":"ref32","first-page":"1","article-title":"Service interaction through gateways for inter-cloud collaboration within the arrowhead framework","author":"varga","year":"2015","journal-title":"Proc 5th IEEE WirelessVitae"},{"key":"ref31","first-page":"1","author":"cotton","year":"2011","journal-title":"Internet Assigned Numbers Authority (IANA) Procedures for the Management of the Service Name and Transport Protocol Port Number Registry"},{"key":"ref30","year":"2020","journal-title":"What is Azure Active Directory"},{"key":"ref37","first-page":"61","article-title":"OPC UA&#x2013;service-oriented architecture for industrial applications","volume":"48","author":"leitner","year":"2006","journal-title":"ABB Corporate Research Center"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2013.2277656"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7252"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2616"},{"key":"ref28","year":"2020","journal-title":"The extensible open source Java\/OSGi IoT Edge Framework"},{"key":"ref27","year":"2020","journal-title":"Azure iot solution accelerators"},{"key":"ref29","first-page":"16","article-title":"Guide to industrial control systems (ICS) security","volume":"800","author":"stouffer","year":"2011","journal-title":"NIST Special Publication"},{"key":"ref2","article-title":"Security in service-oriented architectures: Challenges and solutions","author":"myllarniemi","year":"2007"},{"key":"ref1","year":"2020","journal-title":"IoT Business Opportunities Models & Ideas for 2020&#x2014;Business Insider"},{"key":"ref20","article-title":"ISO\/IEC JTC 1 n8010 2005-11-30","author":"action","year":"2005"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73530-4_1"},{"key":"ref21","year":"2019","journal-title":"It Security and Privacy&#x2014;A Framework for Identity Management&#x2014;Part 1 Terminology and Concepts"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ISSPIT.2016.7886021"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1998441.1998446"},{"key":"ref26","year":"2020","journal-title":"AWS IoT-IoT services for industrial consumer and commercial solutions"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN41052.2019.8972250"},{"key":"ref50","author":"howard","year":"2006","journal-title":"The Security Development Lifecycle"},{"key":"ref51","year":"2013","journal-title":"System security requirements and security levels[S]"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1177\/1550147720922731"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2017.11.002"},{"key":"ref11","first-page":"20","article-title":"A survey on Internet of Things: Security and privacy issues","volume":"90","author":"sathishkumar","year":"2014","journal-title":"Int J Comput Appl"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.15837\/ijccc.2013.5.329"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2694844"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/PST47121.2019.8949023"},{"key":"ref14","first-page":"2168","article-title":"Onboard tagging for smart medical devices","author":"li","year":"2011","journal-title":"Proc Annu Int Conf IEEE Eng Med Biol Soc"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CODESISSS.2018.8525931"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2019.8651724"},{"key":"ref17","first-page":"1","year":"2017","journal-title":"Intel secure device onboard"},{"key":"ref18","year":"2019","journal-title":"Systems and Software Engineering&#x2014;System of Systems (SOS) Considerations in Life Cycle Stages of a System"},{"key":"ref19","first-page":"143","article-title":"Challenges in security engineering of systems-of-systems","author":"chiprianov","year":"2014","journal-title":"Proc Troisi&#x00E8;me Conf&#x00E9;rence en Ing&#x00E9;nieriE du Logiciel"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1201\/9781315367897"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1520-6858(1998)1:4<267::AID-SYS3>3.0.CO;2-D"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2019.8927245"},{"key":"ref5","article-title":"Collection of sensor data from sensor devices","author":"neild","year":"2019"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2015.7301661"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICPHYS.2018.8390800"},{"key":"ref49","article-title":"RFC2986: Pkcs# 10: Certification request syntax specification version 1.7","author":"nystrom","year":"2986"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2020.2993323"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2617"},{"key":"ref45","first-page":"1721","author":"bormann","year":"2014","journal-title":"Terminology for Constrained-Node Networks"},{"key":"ref48","year":"2020","journal-title":"Swagger API Development for Everyone"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5246"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04798-5_6"},{"key":"ref41","article-title":"A description of the manufacturing message specification (MMS)","author":"johnsen","year":"2007"},{"key":"ref44","author":"rosenberg","year":"2004","journal-title":"Securing Web Services with WS-Security Demystifying WS-Security WS-Policy SAML XML Signature and XML Encryption"},{"key":"ref43","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-08744-3","author":"proudler","year":"2014","journal-title":"Trusted Computing Platforms&#x2014;TPM2 0 in Context"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09505607.pdf?arnumber=9505607","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,6]],"date-time":"2023-01-06T11:17:42Z","timestamp":1673003862000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9505607\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":52,"URL":"https:\/\/doi.org\/10.1109\/access.2021.3102280","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}