{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T10:07:25Z","timestamp":1730282845681,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,20]],"date-time":"2024-05-20T00:00:00Z","timestamp":1716163200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,20]],"date-time":"2024-05-20T00:00:00Z","timestamp":1716163200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,20]]},"DOI":"10.1109\/mipro60963.2024.10569748","type":"proceedings-article","created":{"date-parts":[[2024,6,28]],"date-time":"2024-06-28T17:55:56Z","timestamp":1719597356000},"page":"1537-1542","source":"Crossref","is-referenced-by-count":0,"title":["Enhancing Security of Intermediate Devices in the Connection Between IoT Devices and Cloud Service"],"prefix":"10.1109","author":[{"given":"Damir","family":"Regvart","sequence":"first","affiliation":[{"name":"Algebra University,Zagreb,Croatia"}]},{"given":"Miljenko","family":"Mikuc","sequence":"additional","affiliation":[{"name":"University of Zagreb,Faculty of Electrical Engineering and Computing,Zagreb,Croatia"}]},{"given":"Luka","family":"Zgrabli\u0107","sequence":"additional","affiliation":[{"name":"Algebra University,Zagreb,Croatia"}]},{"given":"Zlatan","family":"Mori\u0107","sequence":"additional","affiliation":[{"name":"Algebra University,Zagreb,Croatia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2015.2460333"},{"issue":"12","key":"ref2","doi-asserted-by":"crossref","first-page":"4102","DOI":"10.3390\/app10124102","article-title":"IoT Privacy and Security: Challenges and Solutions","volume":"10","author":"Tawalbeh","year":"2020","journal-title":"Applied Sciences"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/9324035"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.11.027"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/wccct.2016.49"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2019.2953364"},{"issue":"1","key":"ref7","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1109\/COMST.2016.2598968","article-title":"Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges","volume":"19","author":"Liu","year":"2017","journal-title":"IEEE Communications Surveys and Tutorials"},{"issue":"4","key":"ref8","doi-asserted-by":"crossref","first-page":"679","DOI":"10.1109\/JSAC.2018.2825560","article-title":"A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead","volume":"36","author":"Wu","year":"2018","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"ref9","first-page":"172","article-title":"Security analysis of IoT protocols: A focus in CoAP","volume-title":"2016 3rd MEC International Conference on Big Data and Smart City, ICBDSC 2016","author":"Rahman"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"909","DOI":"10.1016\/j.future.2018.04.027","article-title":"Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework","volume":"108","author":"Tewari","year":"2020","journal-title":"Future Generation Computer Systems"},{"key":"ref11","doi-asserted-by":"crossref","DOI":"10.1016\/j.comcom.2018.04.013","article-title":"The state of affairs in BGP security: A survey of attacks and defenses","author":"Mitseva","year":"2018","journal-title":"Computer Communications"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"115051","DOI":"10.1109\/ACCESS.2020.3003998","article-title":"Message Queuing Telemetry Transport (MQTT) Security: A Cryptographic Smart Card Approach","volume":"8","author":"Sanjuan","year":"2020","journal-title":"IEEE Access"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.1007\/s11831-022-09708-9","article-title":"A Comprehensive Survey on Security Challenges in Different Network Layers in Cloud Computing","author":"Jangjou","year":"2022","journal-title":"Archives of Computational Methods in Engineering"},{"issue":"3","key":"ref14","doi-asserted-by":"crossref","first-page":"583","DOI":"10.1016\/j.future.2010.12.006","article-title":"Addressing cloud computing security issues","volume":"28","author":"Zissis","year":"2012","journal-title":"Future Generation Computer Systems"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10212647"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"680","DOI":"10.1016\/j.future.2016.11.009","article-title":"Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges","volume":"78","author":"Roman","year":"2018","journal-title":"Future Generation Computer Systems"},{"key":"ref19","article-title":"A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends","author":"Zou","year":"2016","journal-title":"Proceedings of the IEEE"},{"issue":"13","key":"ref20","doi-asserted-by":"crossref","first-page":"3625","DOI":"10.3390\/s20133625","article-title":"A Survey of IoT Security Based on a Layered Architecture of Sensing and Data Analysis","volume":"20","author":"Mrabet","year":"2020","journal-title":"Sensors"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1016\/j.jnca.2018.01.003","article-title":"Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks","volume":"106","author":"Shen","year":"2018","journal-title":"Journal of Network and Computer Applications"},{"key":"ref22","article-title":"Machine Learning for Cloud Security: A Systematic Review","author":"Nassif","year":"2021","journal-title":"IEEE Access"},{"issue":"3","key":"ref23","doi-asserted-by":"crossref","first-page":"36","DOI":"10.53555\/ephijse.v9i3.212","article-title":"Secure by Intelligence: Enhancing products with AI-Driven security measures","volume":"9","author":"Rangaraju","year":"2023","journal-title":"EPH - International Journal of Science And Engineering"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"18209","DOI":"10.1109\/ACCESS.2018.2820162","article-title":"Data Security and Privacy-Preserving in Edge Computing Paradigm: Survey and Open Issues","volume":"6","author":"Zhang","year":"2018","journal-title":"IEEE Access"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1016\/j.future.2018.05.046","article-title":"On blockchain and its integration with IoT. Challenges and opportunities","volume":"88","author":"Reyna","year":"2018","journal-title":"Future Generation Computer Systems"},{"key":"ref26","doi-asserted-by":"crossref","DOI":"10.1109\/JIOT.2019.2958788","article-title":"From Pre-Quantum to Post-Quantum IoT Security: A Survey on Quantum-Resistant Cryptosystems for the Internet of Things","author":"Fernandez-Carames","year":"2020","journal-title":"IEEE Internet of Things Journal"},{"issue":"1","key":"ref27","doi-asserted-by":"crossref","DOI":"10.1038\/s41534-021-00400-7","article-title":"Experimental authentication of quantum key distribution with post-quantum cryptography","volume":"7","author":"Wang","year":"2021","journal-title":"Npj Quantum Information"},{"key":"ref29","doi-asserted-by":"crossref","DOI":"10.4018\/978-1-6684-6697-1.ch016","article-title":"Future of Quantum Computing in Cyber Security","author":"Brijwan","year":"2023","journal-title":"Handbook of Research on Quantum Computing for Smart Environments"},{"issue":"2","key":"ref31","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1108\/IntR-07-2014-0173","article-title":"The Internet of Things: a security point of view","volume":"26","author":"Li","year":"2016","journal-title":"Internet Research"},{"issue":"2","key":"ref32","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1108\/IntR-07-2014-0173","article-title":"The Internet of Things: a security point of view","volume":"26","author":"Li","year":"2016","journal-title":"Internet Research"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2020.3013959"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102669"}],"event":{"name":"2024 47th MIPRO ICT and Electronics Convention (MIPRO)","start":{"date-parts":[[2024,5,20]]},"location":"Opatija, Croatia","end":{"date-parts":[[2024,5,24]]}},"container-title":["2024 47th MIPRO ICT and Electronics Convention (MIPRO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10569139\/10569147\/10569748.pdf?arnumber=10569748","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,29]],"date-time":"2024-06-29T05:24:45Z","timestamp":1719638685000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10569748\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,20]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/mipro60963.2024.10569748","relation":{},"subject":[],"published":{"date-parts":[[2024,5,20]]}}}