{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T06:21:35Z","timestamp":1773469295953,"version":"3.50.1"},"reference-count":38,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,12,15]],"date-time":"2020-12-15T00:00:00Z","timestamp":1607990400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,12,15]],"date-time":"2020-12-15T00:00:00Z","timestamp":1607990400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,12,15]],"date-time":"2020-12-15T00:00:00Z","timestamp":1607990400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,12,15]]},"DOI":"10.1109\/ist50524.2020.9345886","type":"proceedings-article","created":{"date-parts":[[2021,2,12]],"date-time":"2021-02-12T21:32:57Z","timestamp":1613165577000},"page":"251-256","source":"Crossref","is-referenced-by-count":9,"title":["Security Framework of IoT-Based Smart Home"],"prefix":"10.1109","author":[{"given":"Shahrouz","family":"Sotoudeh","sequence":"first","affiliation":[{"name":"Information Technology and Communication Research Center,Tehran,Iran"}]},{"given":"Sattar","family":"Hashemi","sequence":"additional","affiliation":[{"name":"University of Shiraz,Department of Computer and Electronic,Shiraz,Iran"}]},{"given":"Hossein Gharaee","family":"Garakani","sequence":"additional","affiliation":[{"name":"Information Technology and Communication Research Center,Tehran,Iran"}]}],"member":"263","reference":[{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-16184-2_31"},{"key":"ref33","first-page":"154","article-title":"Analyzing loT reference architecture models","volume":"5","author":"torkaman","year":"2016","journal-title":"International Journal of Software Engineering and Computing"},{"key":"ref32","author":"fhg","year":"2012","journal-title":"Internet-of-Things Architecture Deliverable D1 3-UPDATED REFERENCE MODEL FOR IoT V1 5"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2337336"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2011.291"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2014.12.021"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2014.6997467"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2014.6785328"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/SERVICES.2015.12"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICFN.2010.58"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2444095"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.01.008"},{"key":"ref13","first-page":"35","article-title":"IOT Based Smart Home","volume":"5","author":"vinodhan","year":"2016","journal-title":"Int J Innov Res Sci Eng Technol"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/J.ENG.2016.01.014"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-014-0761-7"},{"key":"ref16","author":"nimmermark","year":"2016","journal-title":"Comparison of loT frameworks for the smart home"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"348","DOI":"10.3390\/en9050348","article-title":"A review of systems and technologies for smart homes and smart grids","volume":"9","author":"lobaccaro","year":"2016","journal-title":"Energies"},{"key":"ref18","author":"jonnalagadda","year":"2016","journal-title":"Secure Communication Scheme in Smart Home Environment"},{"key":"ref19","article-title":"The security of communication protocols used for Internet of Things","author":"johari","year":"2015","journal-title":"LU-CS-EX 2015&#x2013;42"},{"key":"ref28","first-page":"7","article-title":"Lightweight cryptography for the internet of things","author":"katagi","year":"2008","journal-title":"Sony Corporation"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICICIP.2010.5564232"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ITAP.2011.6006307"},{"key":"ref3","first-page":"74","article-title":"The exploration in the education of professionals in applied internet of things engineering","author":"yu","year":"2010","journal-title":"2010 4th International Conference on Distance Learning and Education"},{"key":"ref6","first-page":"138","article-title":"Have your objects call my objects","volume":"80","author":"ferguson","year":"2002","journal-title":"Harv Bus Rev"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/WIRELESSVITAE.2011.5940923"},{"key":"ref5","first-page":"97","article-title":"That &#x2018;internet of things' thing","volume":"22","author":"ashton","year":"2009","journal-title":"RFID J"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2004.137"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICNIDC.2010.5657908"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2014.10.007"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2011.6069706"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.5121\/ijcnc.2012.4603"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1080\/15325008.2013.832439"},{"key":"ref21","author":"marzano","year":"2003","journal-title":"The New Everyday Views on Ambient Intelligence"},{"key":"ref24","article-title":"Integrated wireless technologies for smart homes applications","author":"al-qutayri","year":"2010","journal-title":"Smart Home Systems Intech Open"},{"key":"ref23","author":"granzer","year":"2006","journal-title":"A modular architecture for building automation systems na"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-011-0385-5"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclepro.2016.10.006"}],"event":{"name":"2020 10th International Symposium on Telecommunications (IST)","location":"Tehran, Iran","start":{"date-parts":[[2020,12,15]]},"end":{"date-parts":[[2020,12,17]]}},"container-title":["2020 10th International Symposium onTelecommunications (IST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9345809\/9345812\/09345886.pdf?arnumber=9345886","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,30]],"date-time":"2022-06-30T21:02:24Z","timestamp":1656622944000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9345886\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,15]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/ist50524.2020.9345886","relation":{},"subject":[],"published":{"date-parts":[[2020,12,15]]}}}