{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:11:10Z","timestamp":1750306270087,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T00:00:00Z","timestamp":1490140800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,3,22]]},"DOI":"10.1145\/3018896.3018933","type":"proceedings-article","created":{"date-parts":[[2018,2,23]],"date-time":"2018-02-23T16:12:59Z","timestamp":1519402379000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["IoT security"],"prefix":"10.1145","author":[{"given":"Glenn","family":"Barrie","sequence":"first","affiliation":[{"name":"Curtin University, Kent St, Bentley WA"}]},{"given":"Andrew","family":"Whyte","sequence":"additional","affiliation":[{"name":"Curtin University, Kent St, Bentley WA"}]},{"given":"Joyce","family":"Bell","sequence":"additional","affiliation":[{"name":"Curtin University, Kent St, Bentley WA"}]}],"member":"320","published-online":{"date-parts":[[2017,3,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2014.11.011"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2014.07.064"},{"key":"e_1_3_2_1_3_1","first-page":"137","volume-title":"Towards the trillion sensors market. Sensor review 34 (2)","author":"Bogue R.","year":"2015","unstructured":"Bogue , R. 2014. Towards the trillion sensors market. Sensor review 34 (2) : pp 137 -- 142 . www.emeraldinsight.com\/0260-2288.htm (accessed March 17, 2015 ) Bogue, R. 2014. Towards the trillion sensors market. Sensor review 34 (2): pp 137--142. www.emeraldinsight.com\/0260-2288.htm (accessed March 17, 2015)"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.3390\/s150306607"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2013.03.007"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.3390\/s140406144"},{"key":"e_1_3_2_1_7_1","unstructured":"Contu R. S. Deshpande L. Pingree E. Ahlm and C. Lawson. 2015. Predicts 2015: Security Solutions http:\/\/www.gartner.com\/document\/2914318?ref=solrAll&refVal=170473000&qid=33e9f75496eb2ba7a9ab5b8c5040fb96 (accessed July 11 2016).  Contu R. S. Deshpande L. Pingree E. Ahlm and C. Lawson. 2015. Predicts 2015: Security Solutions http:\/\/www.gartner.com\/document\/2914318?ref=solrAll&refVal=170473000&qid=33e9f75496eb2ba7a9ab5b8c5040fb96 (accessed July 11 2016)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.proeng.2015.01.486"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jare.2014.02.006"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Foell S. G. Kortuem R. Rawassizadeh M. Handte U. Iqbal and P. Marron. 2014. Micro-Navigation for Urban Bus Passengers: Using the Internet of Things to Improve the Public Transport Experience. http:\/\/arxiv.org\/abs\/1412.6605 (accessed July 22 2015).  Foell S. G. Kortuem R. Rawassizadeh M. Handte U. Iqbal and P. Marron. 2014. Micro-Navigation for Urban Bus Passengers: Using the Internet of Things to Improve the Public Transport Experience. http:\/\/arxiv.org\/abs\/1412.6605 (accessed July 22 2015).","DOI":"10.4108\/icst.urb-iot.2014.257373"},{"key":"e_1_3_2_1_11_1","volume-title":"O\/T, M2M and security http:\/\/www.gartner.com\/document\/2884417 (accessed","author":"Gartner","year":"2015","unstructured":"Gartner . 2014. Relationship between IoT , O\/T, M2M and security http:\/\/www.gartner.com\/document\/2884417 (accessed May 13, 2015 ). Gartner. 2014. Relationship between IoT, O\/T, M2M and security http:\/\/www.gartner.com\/document\/2884417 (accessed May 13, 2015)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2014.07.013"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.12.028"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tej.2014.08.008"},{"key":"e_1_3_2_1_15_1","volume-title":"SAFIR: Secure access framework for IoT-enabled services on smart buildings. Journal of Computer and System Sciences (0)","author":"Hern\u00e1ndez-Ramos J. L.","year":"2014","unstructured":"Hern\u00e1ndez-Ramos , J. L. , M. V. Moreno , J. B. Bernab\u00e9 , D. G. Carrillo , and A. F. Skarmeta . 2014 . SAFIR: Secure access framework for IoT-enabled services on smart buildings. Journal of Computer and System Sciences (0) . http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0022000014001858 (accessed July 17, 2016) Hern\u00e1ndez-Ramos, J. L., M. V. Moreno, J. B. Bernab\u00e9, D. G. Carrillo, and A. F. Skarmeta. 2014. SAFIR: Secure access framework for IoT-enabled services on smart buildings. Journal of Computer and System Sciences (0). http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0022000014001858 (accessed July 17, 2016)"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procir.2015.02.110"},{"issue":"4","key":"e_1_3_2_1_17_1","first-page":"3478","article-title":"CLOUD COMPUTING SECURITY","volume":"3","author":"Jamil D.","year":"2011","unstructured":"Jamil , D. , and H. Zaki . 2011 . CLOUD COMPUTING SECURITY . International Journal of Engineering Science and Technology 3 ( 4 ): 3478 -- 3483 . ProQuest SciTech Collection. http:\/\/search.proquest.com\/docview\/900364421?accountid=10382 (accessed July 16, 2015) Jamil, D., and H. Zaki. 2011. CLOUD COMPUTING SECURITY. International Journal of Engineering Science and Technology 3 (4): 3478--3483. ProQuest SciTech Collection. http:\/\/search.proquest.com\/docview\/900364421?accountid=10382 (accessed July 16, 2015)","journal-title":"International Journal of Engineering Science and Technology"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2012.23"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.4018\/jitsr.2011010104"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.08.002"},{"key":"e_1_3_2_1_21_1","volume-title":"FinanceAsia","author":"Marriott C.","year":"2015","unstructured":"Marriott , C. 2015 . Into the rusty red . FinanceAsia , Feb 2015, 39--41. (accessed July 23, 2016) Marriott, C. 2015. Into the rusty red. FinanceAsia, Feb 2015, 39--41. (accessed July 23, 2016)"},{"key":"e_1_3_2_1_22_1","unstructured":"Mars. 2014. IoT for Mining. http:\/\/www.marsdd.com\/wp-content\/uploads\/2014\/11\/Fig-1-The-IoT-technologies-in-mining-1-e1415889245363.jpg (accessed May 4 2015).  Mars. 2014. IoT for Mining. http:\/\/www.marsdd.com\/wp-content\/uploads\/2014\/11\/Fig-1-The-IoT-technologies-in-mining-1-e1415889245363.jpg (accessed May 4 2015)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Ndibanje B. H.-J. Lee and S.-G. Lee. 2014. Security Analysis and Improvements of Authentication and Access Control in the Internet of Things. Sensors (Basel Switzerland) 14 (8): 14786--14805. Pmc. http:\/\/www.ncbi.nlm.nih.gov\/pmc\/articles\/PMC4179010\/ (accessed March 4 2015)  Ndibanje B. H.-J. Lee and S.-G. Lee. 2014. Security Analysis and Improvements of Authentication and Access Control in the Internet of Things. Sensors (Basel Switzerland) 14 (8): 14786--14805. Pmc. http:\/\/www.ncbi.nlm.nih.gov\/pmc\/articles\/PMC4179010\/ (accessed March 4 2015)","DOI":"10.3390\/s140814786"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Oh D. D. Kim and W. W. Ro. 2014. A Malicious Pattern Detection Engine for Embedded Security Systems in the Internet of Things. Sensors (Basel Switzerland) 14 (12): 24188--24211. Pmc. http:\/\/www.ncbi.nlm.nih.gov\/pmc\/articles\/PMC4299106\/ (accessed March 4 2015)  Oh D. D. Kim and W. W. Ro. 2014. A Malicious Pattern Detection Engine for Embedded Security Systems in the Internet of Things. Sensors (Basel Switzerland) 14 (12): 24188--24211. Pmc. http:\/\/www.ncbi.nlm.nih.gov\/pmc\/articles\/PMC4299106\/ (accessed March 4 2015)","DOI":"10.3390\/s141224188"},{"key":"e_1_3_2_1_25_1","volume-title":"Business Wire, 2011","author":"Pettey C.","year":"2011","unstructured":"Pettey , C. 2011 . Gartner Says the Worlds of IT and Operational Technology Are Converging . Business Wire, 2011 Mar 16. ProQuest Central. (accessed March 1, 2015) Pettey, C. 2011. Gartner Says the Worlds of IT and Operational Technology Are Converging. Business Wire, 2011 Mar 16. ProQuest Central. (accessed March 1, 2015)"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijpe.2014.09.001"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.proeng.2011.11.2442"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.12.018"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijpe.2014.09.003"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.bjp.2013.12.020"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2014.02.003"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.11.008"},{"volume-title":"WESTERN AUSTRALIA ECONOMIC PROFILE -","year":"2014","key":"e_1_3_2_1_33_1","unstructured":"WA. 2016. WESTERN AUSTRALIA ECONOMIC PROFILE - December 2014 . http:\/\/www.dsd.wa.gov.au\/docs\/default-source\/default-document-library\/wa_economic_profile_1214.pdf?sfvrsn=14 (accessed July 23, 2016). WA. 2016. WESTERN AUSTRALIA ECONOMIC PROFILE - December 2014. http:\/\/www.dsd.wa.gov.au\/docs\/default-source\/default-document-library\/wa_economic_profile_1214.pdf?sfvrsn=14 (accessed July 23, 2016)."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2012.07.011"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.proeng.2012.08.040"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"Yu-fang L. and S. Jin-xing. 2011. Using the Internet of Things Technology Constructing Digital Mine. Procedia Environmental Sciences 10 Part B (0): 1104--1108. http:\/\/www.sciencedirect.com\/science\/article\/pii\/S1878029611003719 (accessed March 1 2015)  Yu-fang L. and S. Jin-xing. 2011. Using the Internet of Things Technology Constructing Digital Mine. Procedia Environmental Sciences 10 Part B (0): 1104--1108. http:\/\/www.sciencedirect.com\/science\/article\/pii\/S1878029611003719 (accessed March 1 2015)","DOI":"10.1016\/j.proenv.2011.09.176"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-012-0194-0"}],"event":{"name":"ICC '17: Second International Conference on Internet of Things, Data and Cloud Computing","acronym":"ICC '17","location":"Cambridge United Kingdom"},"container-title":["Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3018896.3018933","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3018896.3018933","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:38:40Z","timestamp":1750221520000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3018896.3018933"}},"subtitle":["challenges and solutions for mining"],"short-title":[],"issued":{"date-parts":[[2017,3,22]]},"references-count":37,"alternative-id":["10.1145\/3018896.3018933","10.1145\/3018896"],"URL":"https:\/\/doi.org\/10.1145\/3018896.3018933","relation":{},"subject":[],"published":{"date-parts":[[2017,3,22]]},"assertion":[{"value":"2017-03-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}