{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:08:44Z","timestamp":1750306124208,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,6,14]],"date-time":"2017-06-14T00:00:00Z","timestamp":1497398400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,6,14]]},"DOI":"10.1145\/3095786.3095793","type":"proceedings-article","created":{"date-parts":[[2017,7,11]],"date-time":"2017-07-11T20:17:18Z","timestamp":1499804238000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Multilevel IoT Model for Smart Cities Resilience"],"prefix":"10.1145","author":[{"given":"Amir","family":"Modarresi","sequence":"first","affiliation":[{"name":"Information and Telecommunication Technology Center, Electrical Engineering and Computer Science, The University of Kansas, Lawrence, KS, USA"}]},{"given":"James P.G.","family":"Sterbenz","sequence":"additional","affiliation":[{"name":"Information and Telecommunication Technology, Center Electrical Engineering and Computer Science, The University of Kansas, Lawrence, KS, USA, School of Comp. and Comm. (SCC) and InfoLab21, Lancaster University, UK, Computing, The Hong Kong Polytechnic University, Hung Hom, Kowloon, Hong Kong"}]}],"member":"320","published-online":{"date-parts":[[2017,6,14]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Cisco. 2014. The Internet of Things Reference Model. White paper. (2014). http:\/\/cdn.iotwf.com\/resources\/71\/IoT_Reference_Model_White_Paper_June_4_2014.pdf  Cisco. 2014. The Internet of Things Reference Model. White paper. (2014). http:\/\/cdn.iotwf.com\/resources\/71\/IoT_Reference_Model_White_Paper_June_4_2014.pdf"},{"key":"e_1_3_2_1_2_1","unstructured":"Cisco. 2015. Cisco Fog Computing: Unleash the Power of the Internet of Things. White paper. (2015). http:\/\/www.cisco.com\/c\/dam\/en_us\/solutions\/trends\/iot\/docs\/computing-overview.pdf  Cisco. 2015. Cisco Fog Computing: Unleash the Power of the Internet of Things. White paper. (2015). http:\/\/www.cisco.com\/c\/dam\/en_us\/solutions\/trends\/iot\/docs\/computing-overview.pdf"},{"key":"e_1_3_2_1_3_1","unstructured":"Dave Evans. 2011. The Internet of Things -- How the Next Evolution of the Internet Is Changing Everything. White paper. (2011). https:\/\/www.cisco.com\/web\/about\/ac79\/docs\/innov\/IoT_IBSG_0411FINAL.pdf  Dave Evans. 2011. The Internet of Things -- How the Next Evolution of the Internet Is Changing Everything. White paper. (2011). https:\/\/www.cisco.com\/web\/about\/ac79\/docs\/innov\/IoT_IBSG_0411FINAL.pdf"},{"key":"e_1_3_2_1_4_1","unstructured":"Dan Goodin. 2015. New Exploit Turns Samsung Galaxy Phones into Remote Bugging Devices. http:\/\/arstechnica.com\/security\/2015\/06\/new-exploit-turns-samsung-galaxy-phones-into-remote-bugging-devices\/. (June 2015).  Dan Goodin. 2015. New Exploit Turns Samsung Galaxy Phones into Remote Bugging Devices. http:\/\/arstechnica.com\/security\/2015\/06\/new-exploit-turns-samsung-galaxy-phones-into-remote-bugging-devices\/. (June 2015)."},{"key":"e_1_3_2_1_5_1","unstructured":"Chris Greer. 2014. The Internet's Next Big Idea: Connecting People Information and Things. (2014). http:\/\/www.nist.gov\/el\/20140611_internets_next_big_idea.cfm  Chris Greer. 2014. The Internet's Next Big Idea: Connecting People Information and Things. (2014). http:\/\/www.nist.gov\/el\/20140611_internets_next_big_idea.cfm"},{"key":"e_1_3_2_1_6_1","unstructured":"Bluetooth Special Interest Group. 2015. Bluetooth. http:\/\/www.bluetooth.com\/what-is-bluetooth-technology\/bluetooth. (2015).  Bluetooth Special Interest Group. 2015. Bluetooth. http:\/\/www.bluetooth.com\/what-is-bluetooth-technology\/bluetooth. (2015)."},{"key":"e_1_3_2_1_7_1","volume-title":"Smart Nest Thermostat: A Smart Spy in Your Home. Black Hat USA","author":"Hernandez Grant","year":"2014","unstructured":"Grant Hernandez , Orlando Arias , Daniel Buentello , and Yier Jin . 2014. Smart Nest Thermostat: A Smart Spy in Your Home. Black Hat USA ( 2014 ). Grant Hernandez, Orlando Arias, Daniel Buentello, and Yier Jin. 2014. Smart Nest Thermostat: A Smart Spy in Your Home. Black Hat USA (2014)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"J. Hui and P. Thubert. 2011. Compression Format for IPv6 Datagrams over IEEE 802.15.4-Based Networks. RFC 6282. (Sept. 2011). https:\/\/tools.ietf.org\/html\/rfc6282  J. Hui and P. Thubert. 2011. Compression Format for IPv6 Datagrams over IEEE 802.15.4-Based Networks. RFC 6282. (Sept. 2011). https:\/\/tools.ietf.org\/html\/rfc6282","DOI":"10.17487\/rfc6282"},{"key":"e_1_3_2_1_9_1","volume-title":"IEEE Standard for Local and metropolitan area networks--Part 15.4: Low-Rate Wireless Personal Area Networks (LR- WPANs)","author":"IEEE.","year":"2011","unstructured":"IEEE. 2011. IEEE Standard for Local and metropolitan area networks--Part 15.4: Low-Rate Wireless Personal Area Networks (LR- WPANs) . IEEE Std 802.15.4- 2011 (Revision of IEEE Std 802.15.4-2006) (Sept 2011), 1--314. IEEE. 2011. IEEE Standard for Local and metropolitan area networks--Part 15.4: Low-Rate Wireless Personal Area Networks (LR- WPANs). IEEE Std 802.15.4-2011 (Revision of IEEE Std 802.15.4-2006) (Sept 2011), 1--314."},{"key":"e_1_3_2_1_10_1","volume-title":"P2413. https:\/\/standards.ieee.org\/develop\/project\/2413.html. (May","author":"IEEE.","year":"2015","unstructured":"IEEE. 2015. IEEE Standard Association , P2413. https:\/\/standards.ieee.org\/develop\/project\/2413.html. (May 2015 ). https:\/\/standards.ieee.org\/develop\/project\/2413.html IEEE. 2015. IEEE Standard Association, P2413. https:\/\/standards.ieee.org\/develop\/project\/2413.html. (May 2015). https:\/\/standards.ieee.org\/develop\/project\/2413.html"},{"key":"e_1_3_2_1_11_1","volume-title":"Overview of the Internet of Things. https:\/\/www.itu.int\/rec\/T-REC-Y.2060-201206-I. (June","author":"ITU.","year":"2012","unstructured":"ITU. 2012. Overview of the Internet of Things. https:\/\/www.itu.int\/rec\/T-REC-Y.2060-201206-I. (June 2012 ). ITU. 2012. Overview of the Internet of Things. https:\/\/www.itu.int\/rec\/T-REC-Y.2060-201206-I. (June 2012)."},{"key":"e_1_3_2_1_12_1","volume-title":"Terms and Definitions for the Internet of Things. https:\/\/www.itu.int\/rec\/T-REC-Y.2069-201207-I\/en. (July","author":"ITU.","year":"2012","unstructured":"ITU. 2012. Terms and Definitions for the Internet of Things. https:\/\/www.itu.int\/rec\/T-REC-Y.2069-201207-I\/en. (July 2012 ). ITU. 2012. Terms and Definitions for the Internet of Things. https:\/\/www.itu.int\/rec\/T-REC-Y.2069-201207-I\/en. (July 2012)."},{"key":"e_1_3_2_1_13_1","volume-title":"The Internet of Things. The Internet Protocol Journal","author":"Lake David","year":"2012","unstructured":"David Lake , Ammar Rayes , and Monique Morrow . 2012. The Internet of Things. The Internet Protocol Journal ( 2012 ). David Lake, Ammar Rayes, and Monique Morrow. 2012. The Internet of Things. The Internet Protocol Journal (2012)."},{"key":"e_1_3_2_1_14_1","unstructured":"Alliance LoRa. 2016. LoRa Alliance. https:\/\/www.lora-alliance.org\/What-Is-LoRa\/Technology. (2016).  Alliance LoRa. 2016. LoRa Alliance. https:\/\/www.lora-alliance.org\/What-Is-LoRa\/Technology. (2016)."},{"key":"e_1_3_2_1_15_1","unstructured":"Alliance LoRa. 2016. LoRaWAN Specification. https:\/\/www.lora-alliance.org\/For-Developers\/LoRaWANDevelopers. (2016).  Alliance LoRa. 2016. LoRaWAN Specification. https:\/\/www.lora-alliance.org\/For-Developers\/LoRaWANDevelopers. (2016)."},{"key":"e_1_3_2_1_16_1","unstructured":"Ludovic Le Moan. 2017. Sigfox Website. https:\/\/www.sigfox.com\/en. (2017). https:\/\/www.sigfox.com\/en  Ludovic Le Moan. 2017. Sigfox Website. https:\/\/www.sigfox.com\/en. (2017). https:\/\/www.sigfox.com\/en"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"G. Montenegro N. Kushalnagar J. Hui and D. Culler. 2007. Transmission of IPv6 Packets over IEEE 802.15.4 Networks. RFC 4944. (Sept. 2007). https:\/\/tools.ietf.org\/html\/rfc4944  G. Montenegro N. Kushalnagar J. Hui and D. Culler. 2007. Transmission of IPv6 Packets over IEEE 802.15.4 Networks. RFC 4944. (Sept. 2007). https:\/\/tools.ietf.org\/html\/rfc4944","DOI":"10.17487\/rfc4944"},{"key":"e_1_3_2_1_18_1","unstructured":"ns-3. 2016. ns-3 website. https:\/\/www.nsnam.org\/. (2016). https:\/\/www.nsnam.org\/  ns-3. 2016. ns-3 website. https:\/\/www.nsnam.org\/. (2016). https:\/\/www.nsnam.org\/"},{"key":"e_1_3_2_1_19_1","volume-title":"Presidential Proclamation -- Critical Infrastructure Security and Resilience Month","author":"Obama Barack","year":"2015","unstructured":"Barack Obama . 2015. Presidential Proclamation -- Critical Infrastructure Security and Resilience Month , 2015 . https:\/\/www.whitehouse.gov\/the-press-office\/2015\/10\/29\/presidential-proclamation-critical-infrastructure-security-and\/. (Oct. 2015). Barack Obama. 2015. Presidential Proclamation -- Critical Infrastructure Security and Resilience Month, 2015. https:\/\/www.whitehouse.gov\/the-press-office\/2015\/10\/29\/presidential-proclamation-critical-infrastructure-security-and\/. (Oct. 2015)."},{"key":"e_1_3_2_1_20_1","volume-title":"The History of RFID Technology. RFID Journal","author":"Roberti Mark","year":"2005","unstructured":"Mark Roberti . 2005. The History of RFID Technology. RFID Journal ( 2005 ). Mark Roberti. 2005. The History of RFID Technology. RFID Journal (2005)."},{"key":"e_1_3_2_1_21_1","volume-title":"Special Report: The Internet of Things","author":"Rozenfeld Monica","year":"2014","unstructured":"Monica Rozenfeld . 2014 . Special Report: The Internet of Things . The Institute , IEEE (March 2014). http:\/\/theinstitute.ieee.org\/technology-topics\/internet-of-things\/setting-the-stage-for-the-internet-of-things Monica Rozenfeld. 2014. Special Report: The Internet of Things. The Institute, IEEE (March 2014). http:\/\/theinstitute.ieee.org\/technology-topics\/internet-of-things\/setting-the-stage-for-the-internet-of-things"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Z. Shelby S. Chakrabarti and E. Nordmark and C. Bormann. 2012. Neighbor Discovery Optimization for IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs). RFC 6775. (Nov. 2012). https:\/\/tools.ietf.org\/html\/rfc6775  Z. Shelby S. Chakrabarti and E. Nordmark and C. Bormann. 2012. Neighbor Discovery Optimization for IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs). RFC 6775. (Nov. 2012). https:\/\/tools.ietf.org\/html\/rfc6775","DOI":"10.17487\/rfc6775"},{"key":"e_1_3_2_1_23_1","volume-title":"Sterbenz and David Hutchison","author":"James","year":"2006","unstructured":"James P.G. Sterbenz and David Hutchison . 2006 . ResiliNets: Multilevel Resilient and Survivable Networking Initiative . http:\/\/wiki.ittc.ku.edu\/resilinets. (2006). http:\/\/wiki.ittc.ku.edu\/resilinets James P.G. Sterbenz and David Hutchison. 2006. ResiliNets: Multilevel Resilient and Survivable Networking Initiative. http:\/\/wiki.ittc.ku.edu\/resilinets. (2006). http:\/\/wiki.ittc.ku.edu\/resilinets"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-011-9573-6"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-013-9816-9"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.03.005"},{"volume-title":"Diverse Infrastructure and Architecture for Datacenter and Cloud Resilience. In 2013 22nd International Conference on Computer Communication and Networks (ICCCN). 1--7.","author":"Sterbenz J. P. G.","key":"e_1_3_2_1_27_1","unstructured":"J. P. G. Sterbenz and P. Kulkarni . 2013 . Diverse Infrastructure and Architecture for Datacenter and Cloud Resilience. In 2013 22nd International Conference on Computer Communication and Networks (ICCCN). 1--7. J. P. G. Sterbenz and P. Kulkarni. 2013. Diverse Infrastructure and Architecture for Datacenter and Cloud Resilience. In 2013 22nd International Conference on Computer Communication and Networks (ICCCN). 1--7."},{"key":"e_1_3_2_1_28_1","first-page":"11","article-title":"Hacking","volume":"54","author":"Wright Alex","year":"2011","unstructured":"Alex Wright . 2011 . Hacking Cars. Commun. ACM 54 , 11 (Nov. 2011), 18--19. Alex Wright. 2011. Hacking Cars. Commun. ACM 54, 11 (Nov. 2011), 18--19.","journal-title":"Cars. Commun. ACM"}],"event":{"name":"CFI'17: 12th International Conference on Future Internet Technologies","acronym":"CFI'17","location":"Fukuoka Japan"},"container-title":["Proceedings of the 12th International Conference on Future Internet Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3095786.3095793","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3095786.3095793","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:36:53Z","timestamp":1750217813000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3095786.3095793"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,14]]},"references-count":28,"alternative-id":["10.1145\/3095786.3095793","10.1145\/3095786"],"URL":"https:\/\/doi.org\/10.1145\/3095786.3095793","relation":{},"subject":[],"published":{"date-parts":[[2017,6,14]]},"assertion":[{"value":"2017-06-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}