{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T11:25:13Z","timestamp":1763810713807,"version":"3.37.3"},"reference-count":45,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T00:00:00Z","timestamp":1675209600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T00:00:00Z","timestamp":1675209600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T00:00:00Z","timestamp":1675209600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Guangdong Research and Development Key Program","award":["2019B010137001"],"award-info":[{"award-number":["2019B010137001"]}]},{"name":"Shenzhen Research Program","award":["GXWD2020123116580700720200807164903001","JCYJ20210324122013036","JCYJ20190808155607340"],"award-info":[{"award-number":["GXWD2020123116580700720200807164903001","JCYJ20210324122013036","JCYJ20190808155607340"]}]},{"name":"China Environment for Network Innovation","award":["GJFGW [2020] 386","SZFGW [2019] 261"],"award-info":[{"award-number":["GJFGW [2020] 386","SZFGW [2019] 261"]}]},{"name":"Huawei Funding","award":["TC20201222002"],"award-info":[{"award-number":["TC20201222002"]}]},{"name":"ZTE Funding","award":["2019ZTE03-01"],"award-info":[{"award-number":["2019ZTE03-01"]}]},{"DOI":"10.13039\/501100012166","name":"National Keystone Research and Development Program of China","doi-asserted-by":"publisher","award":["2017YFB0803204"],"award-info":[{"award-number":["2017YFB0803204"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2023,2,1]]},"DOI":"10.1109\/jiot.2021.3137526","type":"journal-article","created":{"date-parts":[[2021,12,22]],"date-time":"2021-12-22T20:34:37Z","timestamp":1640205277000},"page":"1919-1932","source":"Crossref","is-referenced-by-count":15,"title":["Scalable Identifier System for Industrial Internet Based on Multi-Identifier Network Architecture"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0066-2384","authenticated-orcid":false,"given":"Yunmin","family":"Wang","sequence":"first","affiliation":[{"name":"School of Electronic and Computer Engineering, and the Future Networking Laboratory of China Environment for Network Innovation, Peking University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5244-9473","authenticated-orcid":false,"given":"Hui","family":"Li","sequence":"additional","affiliation":[{"name":"School of Electronic and Computer Engineering, and the Future Networking Laboratory of China Environment for Network Innovation, Peking University, Beijing, China"}]},{"given":"Ting","family":"Huang","sequence":"additional","affiliation":[{"name":"School of Electronic and Computer Engineering, and the Future Networking Laboratory of China Environment for Network Innovation, Peking University, Beijing, China"}]},{"given":"Xinchun","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Electronic and Computer Engineering, and the Future Networking Laboratory of China Environment for Network Innovation, Peking University, Beijing, China"}]},{"given":"Yongjie","family":"Bai","sequence":"additional","affiliation":[{"name":"School of Electronic and Computer Engineering, and the Future Networking Laboratory of China Environment for Network Innovation, Peking University, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2691349"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.11.016"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2019.07.001"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MSMC.2017.2702391"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2019.12.035"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3390\/app10217670"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2869350"},{"issue":"11","key":"ref8","first-page":"134","article-title":"Identifier technology in industrial Internet","volume":"33","author":"Yang","year":"2017","journal-title":"Telecommun. Sci."},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3650"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/IWOOS.1995.470569"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/944759.944761"},{"article-title":"Challenges in IoT networking via TCP\/IP architecture","year":"2016","author":"Shang","key":"ref12"},{"key":"ref13","first-page":"117","article-title":"Named data networking of things","volume-title":"Proc. IEEE IoTDI","author":"Shang"},{"issue":"10","key":"ref14","first-page":"23","article-title":"Security risk analysis model for identifier resolution system of industrial Internet","volume":"46","author":"Chi","year":"2020","journal-title":"Inf. Commun. Technol. Policy"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2974327"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1360\/N112019-00070"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3389\/fbloc.2020.00011"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC-SmartCity-DSS.2017.61"},{"issue":"12","key":"ref19","first-page":"2983","article-title":"Industrial Internet architecture 2.0","volume":"25","author":"Yu","year":"2019","journal-title":"Comput. Integr. Manuf. Syst."},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1201\/b11499-49"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2010.87"},{"volume-title":"Identification System for Internet of Things\u2014Entity Code","year":"2015","key":"ref22"},{"volume-title":"Decentralized Identifiers (DIDs) V1.0 Core Data Model and Syntaxes","year":"2021","key":"ref23"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.3045136"},{"issue":"10","key":"ref25","first-page":"10","article-title":"Architecture and deployment progress of identifier resolution system for industrial Internet","volume":"46","author":"Xie","year":"2020","journal-title":"Inf. Commun. Technol. Policy"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2020.2983711"},{"issue":"1","key":"ref27","first-page":"49","article-title":"Security risk analysis model for identification and resolution system of industrial Internet","volume":"18","author":"Baoluo","year":"2020","journal-title":"ZTE Commun."},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656887"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3075317"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658941"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/EuCNC.2014.6882665"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2019.8846951"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2971009"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1360\/N112019-00005"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2317307.2317319"},{"key":"ref36","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-030-29844-9","volume-title":"Cyberspace Endogenous Safety and Security: Mimic Defence and Generalized Robust Control","author":"Wu","year":"2020"},{"key":"ref37","first-page":"181","article-title":"Blockstack: A global naming and storage system secured by blockchains","volume-title":"Proc. USENIX","author":"Ali"},{"key":"ref38","first-page":"1","article-title":"An empirical study of namecoin and lessons for decentralized namespace design","volume-title":"Proc. Workshop Econ. Inf. Security (WEIS)","author":"Kalodner"},{"volume-title":"Decentralized certificate authority and naming whitepaper","year":"2020","author":"Green","key":"ref39"},{"issue":"4","key":"ref40","first-page":"282","article-title":"To create a positive cyberspace by safeguarding network security with active immune trusted computing 3.0","volume":"4","author":"Shen","year":"2018","journal-title":"J. Inf. Security Res."},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2017.8107632"},{"article-title":"NFD developer guide","year":"2021","author":"Afanasyev","key":"ref42"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ANCS.2015.7110125"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.3403\/30152654"},{"volume-title":"Industrial-Process Measurement and Control\u2014Data Structures and Elements in Process Equipment Catalogues\u2014Part 10: Lists of Properties for Industrial-Process Measurement and Control for Electronic Data Exchange\u2014Fundamentals","year":"2009","key":"ref45"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/10024910\/09659825.pdf?arnumber=9659825","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,10]],"date-time":"2024-01-10T00:34:02Z","timestamp":1704846842000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9659825\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,1]]},"references-count":45,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2021.3137526","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"type":"electronic","value":"2327-4662"},{"type":"electronic","value":"2372-2541"}],"subject":[],"published":{"date-parts":[[2023,2,1]]}}}