{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T17:21:20Z","timestamp":1778347280745,"version":"3.51.4"},"reference-count":144,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T00:00:00Z","timestamp":1722470400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"SERICS","award":["PE00000014"],"award-info":[{"award-number":["PE00000014"]}]},{"name":"MUR National Recovery and Resilience Plan"},{"name":"European Union, NextGenerationEU"},{"name":"M.D. 351, National Recovery and Resilience"},{"name":"European Union, NextGenerationEU"},{"name":"Italian Ministry of Enterprises and Made in Italy"},{"name":"5G technology support program, on axis 1 \u201cHouse of Emerging Technologies\u201d"},{"name":"\u201cCagliari Digital Lab\u201d","award":["(ID: G27F22000040008)"],"award-info":[{"award-number":["(ID: G27F22000040008)"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2024,8]]},"DOI":"10.1109\/tnsm.2024.3390543","type":"journal-article","created":{"date-parts":[[2024,4,17]],"date-time":"2024-04-17T17:31:28Z","timestamp":1713375088000},"page":"4669-4685","source":"Crossref","is-referenced-by-count":37,"title":["A Cross-Layer Survey on Secure and Low-Latency Communications in Next-Generation IoT"],"prefix":"10.1109","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4918-0818","authenticated-orcid":false,"given":"Marco","family":"Martal\u00f2","sequence":"first","affiliation":[{"name":"Department of Electrical and Electronic Engineering, University of Cagliari, Cagliari, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-3207-2669","authenticated-orcid":false,"given":"Giovanni","family":"Pettorru","sequence":"additional","affiliation":[{"name":"Department of Electrical and Electronic Engineering, University of Cagliari, Cagliari, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1350-3574","authenticated-orcid":false,"given":"Luigi","family":"Atzori","sequence":"additional","affiliation":[{"name":"Department of Electrical and Electronic Engineering, University of Cagliari, Cagliari, Italy"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/mvt.2019.2921208"},{"key":"ref2","volume-title":"Redefine connectivity by building a network to support the Internet of Things","year":"2019"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2021.3103320"},{"key":"ref5","volume-title":"Recommendations for Implementing the Strategic Initiative INDUSTRIE 4.0: Securing the Future of German Manufacturing Industry; Final Report of the Industrie 4.0 Working Group","author":"Kagermann","year":"2013"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/access.2018.2884906"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2014.2300753"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/jsyst.2020.2993323"},{"key":"ref9","volume-title":"6G: The Next Hyper Connected Experience for All","year":"2020"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2021.3078081"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2020.07.003"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3315374"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2970118"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3058982"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2847733"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JCN.2019.000048"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3106669"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3390\/S20133625"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3109440"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3015432"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108040"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.3011208"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3025916"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3122147"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3022661"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2958185"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3057419"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3026493"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3040957"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2021.3121870"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3117902"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3124812"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.3390\/electronics8090981"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3148473"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2022.3142532"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/mcomstd.001.2000045"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.109720"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3069707"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2907245"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.3035315"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3159241"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2694844"},{"key":"ref43","volume-title":"QUIC: A UDP-based multiplexed and secure transport","year":"2022"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2021.3115983"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.phycom.2021.101293"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT51360.2021.9595324"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3120145"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3052965"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3048824"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/CSCN53733.2021.9686162"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3085967"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2020.3046262"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3118017"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3097553"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.3390\/s22041566"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3091458"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3123822"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/MCOMSTD.121.2100028"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.02.027"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/MeditCom49071.2021.9647558"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2022.3160508"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2021.3117957"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/wcsp52459.2021.9613597"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/tcc.2022.3147226"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/noms54207.2022.9789900"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3142430"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3121529"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3072984"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/TGCN.2021.3094771"},{"key":"ref70","volume-title":"RPL: IPv6 routing protocol for low-power and lossy networks","year":"2012"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3022793"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/IDAACS.2019.8924283"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/IDAACS-SWS50031.2020.9297079"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/WOCC53213.2021.9603069"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2960033"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2990936"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3070104"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2021.3102996"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.3390\/s22145327"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCT53315.2021.9711865"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/DSC49826.2021.9346250"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/SCIoT56583.2022.9953671"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/ICMNWC52512.2021.9688553"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3145379"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/IBSSC53889.2021.9673462"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/ComTech52583.2021.9616966"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/CONECCT52877.2021.9622711"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS51098.2021.9352937"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.23919\/SoftCOM50211.2020.9238224"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2977476"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.3390\/s22187052"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/icnas53565.2021.9628947"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/icaa53760.2021.00129"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2020.3022276"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2021.3109109"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-40061-5_29"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/ieeecloudsummit48914.2020.00016"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.2977953"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3036589"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2019.2950295"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3002815"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2018.8638027"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1145\/3547331"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1145\/3609423"},{"key":"ref105","first-page":"9","article-title":"Physical unclonable functions for device authentication and secret key generation","volume-title":"Proc. 44th ACM\/IEEE Design Autom. Conf. (DAC)","author":"Suh"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3151430"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC52510.2021.9620848"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/ictc55196.2022.9952899"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3047662"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2021.3118014"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3096048"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3098224"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3098496"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.3390\/s20164361"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2956748"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.3390\/inventions7040109"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3037733"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/I2MTC43012.2020.9128817"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.3390\/s19102228"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3165666"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.3390\/s22207917"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.3390\/s21227656"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2019.2953549"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2932905"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/tnsm.2021.3134562"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/csnet56116.2022.9955622"},{"key":"ref127","volume-title":"QUIC implementations","year":"2024"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.12.012"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.3390\/s22103694"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/COINS54846.2022.9854951"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/WiMob50308.2020.9253384"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.3390\/s21175737"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3302160"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/LANMAN.2018.8475048"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/CSCN53733.2021.9686113"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/ICC42927.2021.9500675"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10172175"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-021-00468-0"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2023.100905"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45041.2023.10279305"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2023.02.018"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.109640"},{"key":"ref143","first-page":"1","article-title":"Towards securing the Internet of Things with QUIC","volume-title":"Proc. Netw. Distrib. Syst. Secur. Symp. (NDSS)","author":"Eggert"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2988126"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4275028\/10643497\/10504601.pdf?arnumber=10504601","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T04:05:17Z","timestamp":1725163517000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10504601\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8]]},"references-count":144,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2024.3390543","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"value":"1932-4537","type":"electronic"},{"value":"2373-7379","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,8]]}}}