{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T14:56:31Z","timestamp":1776956191277,"version":"3.51.4"},"reference-count":33,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"10","license":[{"start":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T00:00:00Z","timestamp":1747267200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T00:00:00Z","timestamp":1747267200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T00:00:00Z","timestamp":1747267200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"CERADE Laboratory at ESAIP School of Engineering as part of its projects on cybersecurity and IIoT"},{"name":"Brazilian National Council for Scientific and Technological Development","award":["306607\/2023-9"],"award-info":[{"award-number":["306607\/2023-9"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2025,5,15]]},"DOI":"10.1109\/jiot.2025.3525779","type":"journal-article","created":{"date-parts":[[2025,1,3]],"date-time":"2025-01-03T19:35:01Z","timestamp":1735932901000},"page":"14577-14585","source":"Crossref","is-referenced-by-count":2,"title":["Cost-Effective Strategy for IIoT Security Based on Bi-Objective Optimization"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2023-6398","authenticated-orcid":false,"given":"Sofiane","family":"Hamrioui","sequence":"first","affiliation":[{"name":"CERADE, ESAIP Engineer School, Saint Barth&#x00E9;lemy d&#x2019;Anjou, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3346-7216","authenticated-orcid":false,"given":"Pascal","family":"Lorenz","sequence":"additional","affiliation":[{"name":"PARAGRAPHE, Paris 8 University, Saint-Denis, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0862-0533","authenticated-orcid":false,"given":"Jaime","family":"Lloret","sequence":"additional","affiliation":[{"name":"Universitat Politecnica de Valencia, Valencia, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8657-3800","authenticated-orcid":false,"given":"Joel J. P. C","family":"Rodrigues","sequence":"additional","affiliation":[{"name":"Federal University of Piau&#x00ED; (UFPI), Teresina-PI, Brazil"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3185049"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmsy.2020.11.017"},{"key":"ref3","volume-title":"How GE uses IIoT to improve manufacturing","year":"2019"},{"key":"ref4","volume-title":"Siemens IIoT solutions for predictive maintenance","year":"2020"},{"key":"ref5","article-title":"Analysis of the 2017 WannaCry ransomware attack","year":"2017"},{"issue":"3","key":"ref6","first-page":"45","article-title":"Best practices in cybersecurity for IIoT systems","volume":"15","author":"Smith","year":"2021","journal-title":"Cybersecurity J."},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.12.018"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.11.008"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.bushor.2015.03.008"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.43"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2017.37"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2008.080128"},{"issue":"4","key":"ref13","first-page":"29","article-title":"Practical network latency attacks against Tor hidden services","volume":"15","author":"Wagner","year":"2018","journal-title":"IEEE Security Privacy"},{"issue":"3","key":"ref14","first-page":"255","article-title":"Lightweight encryption for IoT: A comparison of block ciphers in terms of security and performance","volume":"7","author":"Tange","year":"2017","journal-title":"J. Cryptograph. Eng."},{"key":"ref15","first-page":"70772","article-title":"Anomaly detection in IoT systems using machine learning algorithms","volume":"6","author":"Zhang","year":"2018","journal-title":"IEEE Access"},{"key":"ref16","first-page":"102360","article-title":"Blockchain-based secure firmware update for embedded devices in an IoT environment","volume":"8","author":"Kim","year":"2020","journal-title":"IEEE Access"},{"key":"ref17","first-page":"256","article-title":"Security and resource constraints in Industrial Internet of Things (IIoT): A comprehensive review","volume":"19","author":"Singh","year":"2021","journal-title":"J. Ind. Inf. Integr."},{"issue":"4","key":"ref18","first-page":"2764","article-title":"Resource management and security challenges in IIoT systems: A review of recent trends and solutions","volume":"18","author":"Dhillon","year":"2022","journal-title":"IEEE Trans. Ind. Informat."},{"issue":"1","key":"ref19","first-page":"72","article-title":"Bi-objective optimization models for balancing security and resource efficiency in networks","volume":"74","author":"Lalla","year":"2019","journal-title":"Comput. Elect. Eng."},{"issue":"1","key":"ref20","article-title":"A bi-objective optimization approach for secure and efficient communication in IoT-based industrial environments","volume":"153","author":"Li","year":"2020","journal-title":"J. Netw. Comput. Appl."},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2023.123648"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2021.3122428"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3072953"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2020.2971512"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ET59121.2023.10279697"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2022.103426"},{"key":"ref27","article-title":"Optimization of industrial control systems in the Internet of Things environment","volume-title":"Applied Computational Intelligence and Soft Computing","author":"Kakkad","year":"2019"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.cam.2004.07.034"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1162\/evco.1994.2.3.221"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.05.041"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/4235.996017"},{"key":"ref32","volume-title":"Genetic Algorithms in Search, Optimization, and Machine Learning","author":"Goldberg","year":"1989"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-03315-9"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488907\/10993477\/10824847.pdf?arnumber=10824847","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,9]],"date-time":"2025-05-09T04:17:42Z","timestamp":1746764262000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10824847\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,15]]},"references-count":33,"journal-issue":{"issue":"10"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2025.3525779","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5,15]]}}}