{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,27]],"date-time":"2026-04-27T10:06:14Z","timestamp":1777284374697,"version":"3.51.4"},"reference-count":143,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/access.2022.3207472","type":"journal-article","created":{"date-parts":[[2022,9,16]],"date-time":"2022-09-16T19:35:52Z","timestamp":1663356952000},"page":"101362-101384","source":"Crossref","is-referenced-by-count":31,"title":["A Novel Architectural Framework on IoT Ecosystem, Security Aspects and Mechanisms: A Comprehensive Survey"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4858-7360","authenticated-orcid":false,"given":"Mohammed","family":"Bouzidi","sequence":"first","affiliation":[{"name":"Department of Electronic Systems, Faculty of Information Technology and Electrical Engineering, Norwegian University of Science and Technology, Gj&#x00F8;vik, Norway"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1568-368X","authenticated-orcid":false,"given":"Nishu","family":"Gupta","sequence":"additional","affiliation":[{"name":"Department of Electronic Systems, Faculty of Information Technology and Electrical Engineering, Norwegian University of Science and Technology, Gj&#x00F8;vik, Norway"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4823-5250","authenticated-orcid":false,"given":"Faouzi Alaya","family":"Cheikh","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Faculty of Information Technology and Electrical Engineering, Norwegian University of Science and Technology, Gj&#x00F8;vik, Norway"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1980-6875","authenticated-orcid":false,"given":"Andrii","family":"Shalaginov","sequence":"additional","affiliation":[{"name":"School of Economics, Innovation and Technology, Kristiania University College, Oslo, Norway"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0448-7613","authenticated-orcid":false,"given":"Mohammad","family":"Derawi","sequence":"additional","affiliation":[{"name":"Department of Electronic Systems, Faculty of Information Technology and Electrical Engineering, Norwegian University of Science and Technology, Gj&#x00F8;vik, Norway"}]}],"member":"263","reference":[{"issue":"2011","key":"ref1","first-page":"1","volume-title":"The Internet of Things: How the next evolution of the internet is changing everything","volume":"1","author":"Evans","year":"2011"},{"key":"ref2","volume-title":"State of IoT 2021: Number of Connected IoT devices","author":"Sinha","year":"2021"},{"key":"ref3","volume-title":"The Growth in Connected IoT Devices is Expected to Generate 79.4 ZB of Data in 2025, According to a New IDC Forecast","year":"2019"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/BigData47090.2019.9006596"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2016.63"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-014-0761-7"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10990-9_25"},{"issue":"4","key":"ref8","doi-asserted-by":"crossref","first-page":"486","DOI":"10.1016\/j.ifacol.2015.07.082","article-title":"Use of IQRF technology for large monitoring systems","volume":"48","author":"Hajovsky","year":"2015","journal-title":"IFAC-PapersOnLine"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2982558"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICWMC.2009.35"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MESH.2010.17"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-5281-1_31"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2013.145"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICITST.2015.7412116"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/9324035"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3390\/s19051141"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ISCID.2012.81"},{"issue":"4","key":"ref18","first-page":"797","article-title":"Comprehensive survey on Internet of Things, architecture, security aspects, applications, related technologies, economic perspective, and future directions","volume":"15","author":"Gafurov","year":"2019","journal-title":"J. Inf. Process. Syst."},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2924045"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3037359"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3006358"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2976075"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3022661"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2953364"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2021.3078081"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3067807"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3108618"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.3024783"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3103725"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3062546"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3081450"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3067354"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3141408"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2022.3149732"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3139989"},{"key":"ref36","article-title":"Understanding security in smart city domains from the ANT-centric perspective","volume-title":"arXiv:2202.05023","author":"Fan","year":"2022"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3127267"},{"key":"ref38","volume-title":"The Death of Competition","author":"James","year":"1996"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32686-8_2"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32686-8_1"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2013.2259691"},{"key":"ref42","first-page":"218","article-title":"A comprehensive performance study of IEEE 802.15. 4","volume":"4","author":"Zheng","year":"2006","journal-title":"Sensor Netw. Oper."},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4919"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4944"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.5815\/ijwmt.2017.03.05"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/WOCN.2016.7759025"},{"issue":"1","key":"ref47","first-page":"11","article-title":"A survey on application layer protocols for the Internet of Things","volume":"3","author":"Karagiannis","year":"2015","journal-title":"Trans. IoT Cloud Comput."},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.062612.00084"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/1582379.1582643"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/I-SMAC.2017.8058395"},{"key":"ref51","volume-title":"#WatchOut: Analysis of Smartwatches for Children","year":"2017"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/CECNet.2012.6201508"},{"key":"ref53","article-title":"ITU internet report 2005: The Internet of Things","author":"Pea-L\u00f3pez","year":"2005"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2008.4694171"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijpe.2013.05.007"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36511-9_10"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.3837\/tiis.2020.01.019"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/S1363-4127(05)70039-X"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-017-1565-3"},{"key":"ref60","article-title":"Development of a multi-domain RFID security model for global supply chains, and a practical framework for model adoption","author":"Lam","year":"2020"},{"key":"ref61","first-page":"3","volume-title":"RFID Security Techniques, Protocols and System-on-Chip Design","author":"Kitsos","year":"2008"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7252"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2444095"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8446"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6347"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2388550"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6655"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.17487\/rfc8422"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/3368235.3368876"},{"key":"ref70","article-title":"MQTT version 5.0","author":"Banks","year":"2019"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.17487\/rfc8126"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/IEEESTD.2017.7900315"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1145\/1023646.1023654"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/SUTC.2010.15"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/ICMTMA.2010.275"},{"key":"ref76","volume-title":"ZigBee Standards Organization","year":"2012"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2012.6256261"},{"key":"ref78","volume-title":"Spirit1 Radio","year":"2015"},{"key":"ref79","volume-title":"IQRF OS Operating System. User\u2019s Guide","year":"2018"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2460"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1145\/1278972.1278992"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2463"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6550"},{"key":"ref84","first-page":"59","article-title":"RPL: IPv6 routing protocol for low power and lossy networks","volume":"59","author":"Tsvetkov","year":"2011","journal-title":"Network"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2018.02.011"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.4108\/ICST.COLLABORATECOM2009.8393"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2007.05.008"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4301"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1016\/j.sbspro.2010.03.862"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2853985"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1016\/j.fcij.2017.02.001"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/ACCT.2015.20"},{"key":"ref93","article-title":"Amazon web services overview of security processes","author":"Amazon","year":"2015"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-3741-3_3"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.8"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/I-SMAC.2017.8058363"},{"issue":"11","key":"ref97","first-page":"1","article-title":"UML modeling of physical and data link layer security attacks in WSN","volume":"70","author":"Uke","year":"2013","journal-title":"Int. J. Comput. Appl."},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/Med-Hoc-Net.2011.5970494"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1002\/sec.681"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.18535\/ijecs\/v6i5.41"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCS.2019.8728533"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData.2017.115"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/ETIICT.2017.7977006"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2007.04.025"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.5120\/1415-1911"},{"issue":"6","key":"ref106","first-page":"36","article-title":"Sybil attacks and defenses in Internet of Things and mobile social networks","volume":"15","author":"Alharbi","year":"2018","journal-title":"Int. J. Comput. Sci. Issues"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/ICSCC.2019.8843649"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-415815-3.00010-8"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/PERVASIVE.2015.7087034"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/794326"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1016\/S1570-8705(03)00008-8"},{"issue":"2","key":"ref112","first-page":"1","article-title":"A literature reviewon sniffing attacks in computer network","volume":"1","author":"Kulshrestha","year":"2014","journal-title":"Int. J. Adv. Eng. Res. Sci."},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.13052\/jcsm2245-1439.414"},{"key":"ref114","first-page":"1","article-title":"Static analysis for the OWASP IoT top 10 2018","volume":"19","author":"Ferrara","year":"2019","journal-title":"Proc. SPIoT"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/6562953"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/NSITNSW.2015.7176384"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1145\/2463183.2463193"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/VITAE.2014.6934425"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2014.6952860"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2016.2544845"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/SYSCON.2015.7116721"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1145\/3102304.3102312"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37949-9_54"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.6028\/nist.ir.8114"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-017-0494-4"},{"key":"ref126","article-title":"State of the art in lightweight symmetric cryptography","author":"Biryukov","year":"2017"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74619-5_13"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2747946"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74735-2_31"},{"issue":"17","key":"ref130","first-page":"0974","article-title":"A comparative study of Rivest cipher algorithms","volume":"4","author":"Charbathia","year":"2014","journal-title":"Int. J. Inf. Comput. Technol."},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-018-0193-x"},{"key":"ref132","article-title":"Lightweight cryptography: Cryptographic engineering for a pervasive world","author":"Poschmann","year":"2009"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68351-3_1"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1504\/IJWMC.2007.013798"},{"key":"ref135","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1007\/978-3-540-68351-3_18","article-title":"TRIVIUM","volume-title":"New Stream Cipher Designs","author":"De Canniere","year":"2008"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68351-3_15"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIS.2013.114"},{"issue":"14","key":"ref138","first-page":"1","article-title":"Internet of Things: Architecture, security issues and countermeasures","volume":"125","author":"Bhabad","year":"2015","journal-title":"Int. J. Comput. Appl."},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2014.6803204"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/952905"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1007\/s00607-020-00823-8"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2752801"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.3390\/jsan2020235"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9668973\/09894427.pdf?arnumber=9894427","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T20:15:06Z","timestamp":1705954506000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9894427\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":143,"URL":"https:\/\/doi.org\/10.1109\/access.2022.3207472","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]}}}