{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T11:53:52Z","timestamp":1773921232869,"version":"3.50.1"},"reference-count":23,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2016,12,7]],"date-time":"2016-12-07T00:00:00Z","timestamp":1481068800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Internet Technol."],"published-print":{"date-parts":[[2016,12,22]]},"abstract":"<jats:p>The Internet of Things (IoT) is the latest Internet evolution that incorporates a diverse range of things such as sensors, actuators, and services deployed by different organizations and individuals to support a variety of applications. The information captured by IoT present an unprecedented opportunity to solve large-scale problems in those application domains to deliver services; example applications include precision agriculture, environment monitoring, smart health, smart manufacturing, and smart cities. Like all other Internet based services in the past, IoT-based services are also being developed and deployed without security consideration. By nature, IoT devices and services are vulnerable to malicious cyber threats as they cannot be given the same protection that is received by enterprise services within an enterprise perimeter. While IoT services will play an important role in our daily life resulting in improved productivity and quality of life, the trend has also \u201cencouraged\u201d cyber-exploitation and evolution and diversification of malicious cyber threats. Hence, there is a need for coordinated efforts from the research community to address resulting concerns, such as those presented in this special section. Several potential research topics are also identified in this special section.<\/jats:p>","DOI":"10.1145\/3013520","type":"journal-article","created":{"date-parts":[[2016,12,7]],"date-time":"2016-12-07T20:36:23Z","timestamp":1481142983000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":110,"title":["Internet of Things (IoT)"],"prefix":"10.1145","volume":"16","author":[{"given":"Elisa","family":"Bertino","sequence":"first","affiliation":[{"name":"Purdue University, IN, USA"}]},{"given":"Kim-Kwang Raymond","family":"Choo","sequence":"additional","affiliation":[{"name":"University of Texas at San Antonio, TX, USA"}]},{"given":"Dimitrios","family":"Georgakopolous","sequence":"additional","affiliation":[{"name":"Swinburne University of Technology, Victoria, Australia"}]},{"given":"Surya","family":"Nepal","sequence":"additional","affiliation":[{"name":"CSIRO Data61, Marsfield NSW, Australia"}]}],"member":"320","published-online":{"date-parts":[[2016,12,7]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Proceedings of EDBT","author":"Bertino Elisa","year":"2016","unstructured":"Elisa Bertino . 2016 . Data Security and Privacy in the IoT. Keynote Summary , Proceedings of EDBT 2016. Elisa Bertino. 2016. Data Security and Privacy in the IoT. Keynote Summary, Proceedings of EDBT 2016."},{"key":"e_1_2_1_2_1","volume-title":"Information Security and Cryptography","author":"Boyd Colin","unstructured":"Colin Boyd . 2003. Protocols for Authentication and Key Establishment . In Information Security and Cryptography , Springer Colin Boyd. 2003. Protocols for Authentication and Key Establishment. In Information Security and Cryptography, Springer"},{"key":"e_1_2_1_3_1","volume-title":"Secure Key Establishment. Advances in Information Security 41","author":"Raymond Choo Kim-Kwang","unstructured":"Kim-Kwang Raymond Choo . 2009. Secure Key Establishment. Advances in Information Security 41 , Springer Kim-Kwang Raymond Choo. 2009. Secure Key Establishment. Advances in Information Security 41, Springer"},{"key":"e_1_2_1_4_1","unstructured":"CSA. 2015. Identity and Access Management for the Internet of Things - Summary Guidance. https:\/\/downloads.cloudsecurityalliance.org\/assets\/research\/internet-of-things\/identity-and-access- management-for-the-iot.pdf (accessed Oct 13 2016).  CSA. 2015. Identity and Access Management for the Internet of Things - Summary Guidance. https:\/\/downloads.cloudsecurityalliance.org\/assets\/research\/internet-of-things\/identity-and-access- management-for-the-iot.pdf (accessed Oct 13 2016)."},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2578285"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3007190"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2010.151"},{"key":"e_1_2_1_8_1","first-page":"925","volume-title":"Proceedings of the 23rd USENIX Security Symposium (USENIX Security\u201914)","author":"Lentz Matthew","year":"2014","unstructured":"Matthew Lentz , Viktor Erd\u00e9lyi , Paarijaat Aditya , Elaine Shi , Peter Druschel , and Bobby Bhattacharjee . 2014 . SDDR: Light-weight, Secure Mobile Encounters . In Proceedings of the 23rd USENIX Security Symposium (USENIX Security\u201914) . pp. 925 -- 940 . Matthew Lentz, Viktor Erd\u00e9lyi, Paarijaat Aditya, Elaine Shi, Peter Druschel, and Bobby Bhattacharjee. 2014. SDDR: Light-weight, Secure Mobile Encounters. In Proceedings of the 23rd USENIX Security Symposium (USENIX Security\u201914). pp. 925--940."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2576898"},{"key":"e_1_2_1_10_1","volume-title":"Accessed","author":"Project Milagro","year":"2016","unstructured":"Milagro Project . 2016 . http:\/\/dev.docs.milagro.io.s3-website-us-east-1.amazonaws.com\/en\/milagro-a-case-for-something-new-part-1.html , Accessed Oct. 12, 2016. Milagro Project. 2016. http:\/\/dev.docs.milagro.io.s3-website-us-east-1.amazonaws.com\/en\/milagro-a-case-for-something-new-part-1.html, Accessed Oct. 12, 2016."},{"key":"e_1_2_1_11_1","volume-title":"Sheng","author":"Ngu Anne H. H.","year":"2016","unstructured":"Anne H. H. Ngu , Mario Gutierrez , Vangelis Metsis , Surya Nepal , and Quan Z . Sheng . 2016 . IoT Middleware Survey: Issues and Enabling Technologies. IEEE Internet of Things Journal . online, http:\/\/ieeexplore.ieee.org\/document\/7582463\/. Anne H. H. Ngu, Mario Gutierrez, Vangelis Metsis, Surya Nepal, and Quan Z. Sheng. 2016. IoT Middleware Survey: Issues and Enabling Technologies. IEEE Internet of Things Journal. online, http:\/\/ieeexplore.ieee.org\/document\/7582463\/."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2569063"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2016.63"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2937755"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2990499"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2981547"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/2993206.2993207"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2320731"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2981546"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714616"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29078-2_6"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24177-7_8"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2955095"}],"container-title":["ACM Transactions on Internet Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3013520","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3013520","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:50:40Z","timestamp":1750218640000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3013520"}},"subtitle":["Smart and Secure Service Delivery"],"short-title":[],"issued":{"date-parts":[[2016,12,7]]},"references-count":23,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2016,12,22]]}},"alternative-id":["10.1145\/3013520"],"URL":"https:\/\/doi.org\/10.1145\/3013520","relation":{},"ISSN":["1533-5399","1557-6051"],"issn-type":[{"value":"1533-5399","type":"print"},{"value":"1557-6051","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,12,7]]},"assertion":[{"value":"2016-10-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-10-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-12-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}