{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T15:41:28Z","timestamp":1766504488829,"version":"3.37.3"},"reference-count":40,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"14","license":[{"start":{"date-parts":[[2023,7,15]],"date-time":"2023-07-15T00:00:00Z","timestamp":1689379200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,7,15]],"date-time":"2023-07-15T00:00:00Z","timestamp":1689379200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,7,15]],"date-time":"2023-07-15T00:00:00Z","timestamp":1689379200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2023,7,15]]},"DOI":"10.1109\/jiot.2023.3259340","type":"journal-article","created":{"date-parts":[[2023,3,20]],"date-time":"2023-03-20T17:56:56Z","timestamp":1679335016000},"page":"12867-12885","source":"Crossref","is-referenced-by-count":11,"title":["Trust-Based Certificate Management for Industrial IoT Networks"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1191-4046","authenticated-orcid":false,"given":"Chaimaa","family":"Boudagdigue","sequence":"first","affiliation":[{"name":"LIA\/CERI, University of Avignon, Avignon, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9307-6132","authenticated-orcid":false,"given":"Abderrahim","family":"Benslimane","sequence":"additional","affiliation":[{"name":"LIA\/CERI, University of Avignon, Avignon, France"}]},{"given":"Abdellatif","family":"Kobbane","sequence":"additional","affiliation":[{"name":"ENSIAS, Mohammed V University in Rabat, Rabat, Morocco"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4273-8866","authenticated-orcid":false,"given":"Jiajia","family":"Liu","sequence":"additional","affiliation":[{"name":"National Engineering Laboratory for Integrated Aero-Space-Ground-Ocean Big Data Application Technology, Northwestern Polytechnical University, Xi&#x2019;an, China"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/VETECS.2010.5494213"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.23919\/FRUCT.2017.8250199"},{"key":"ref12","first-page":"2321","article-title":"Cluster-based certificate revocation in mobile ad-hoc network using fuzzy logic","volume":"9","author":"sawant","year":"2015","journal-title":"Int J Comput Eng Appl"},{"year":"1991","author":"fudenberg","journal-title":"Game Theory","key":"ref34"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"654","DOI":"10.11591\/ijeecs.v10.i2.pp654-663","article-title":"A novel approach certificate revocation in MANET using fuzzy logic","volume":"10","author":"jayanthi","year":"2018","journal-title":"Indonesian J Electr Eng Comput Sci"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1287\/mnsc.1040.0297"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1016\/j.cose.2020.101962"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1109\/GLOBECOM42002.2020.9322497"},{"key":"ref31","article-title":"A blockchain-based certificate revocation management and status verification system","volume":"104","author":"adja","year":"2021","journal-title":"Comput Security"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1145\/1080091.1080114"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1145\/1151374.1151381"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1007\/978-1-0716-0368-0_481"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/ACCESS.2018.2880838"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1109\/TIFS.2020.2997179"},{"year":"2015","journal-title":"Data Captured by IoT Connections to Top 1 6 Zettabytes in 2020 As Analytics Evolve from Cloud to Edge","key":"ref2"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/JSAC.2020.2980916"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData.2017.113"},{"year":"2016","journal-title":"Contiki the Open Source Os for the Internet of Things","key":"ref39"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/TNET.2004.838598"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1016\/j.camwa.2011.07.027"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/ICATIECE45860.2019.9063622"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1049\/iet-ifs.2015.0047"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.17487\/rfc6960"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/JIOT.2020.3027536"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1016\/j.csi.2009.07.001"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.17487\/RFC8446"},{"key":"ref20","first-page":"1453","article-title":"Certificate revocation scheme based on weighted voting game and rational secure multiparty computing","volume":"8","author":"aravinthan1","year":"2019","journal-title":"ICTACT Journal of Communication Technology"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1016\/j.adhoc.2018.10.027"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/MSP.2011.96"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1145\/3098243.3106020"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1145\/3277593.3277595"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1109\/TDSC.2015.2467385"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.3390\/su13052549"},{"key":"ref7","first-page":"228","article-title":"Intranet security framework based on short-lived certificates","author":"hsu","year":"1997","journal-title":"Proc IEEE Int Workshops Enabling Technol Infrastruct Collab Enterp"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1016\/j.cose.2019.101658"},{"key":"ref4","first-page":"1","article-title":"Towards short-lived certificates","author":"topalovic","year":"2012","journal-title":"In Web 2 0 Security & Privacy"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/COMST.2019.2914453"},{"key":"ref6","first-page":"4186","article-title":"Certificate management scheme for IoT services","volume":"83","author":"ju","year":"2020","journal-title":"Test Eng Manage"},{"key":"ref5","first-page":"455","article-title":"Giving IoT services an identity and changeable attributes","author":"pahl","year":"2019","journal-title":"Proc IFIP\/IEEE Symp Integr Netw Service Manag (IM)"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1109\/ACCESS.2021.3092203"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/10175002\/10076881.pdf?arnumber=10076881","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,31]],"date-time":"2023-07-31T17:38:09Z","timestamp":1690825089000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10076881\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,15]]},"references-count":40,"journal-issue":{"issue":"14"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2023.3259340","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"type":"electronic","value":"2327-4662"},{"type":"electronic","value":"2372-2541"}],"subject":[],"published":{"date-parts":[[2023,7,15]]}}}