{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T10:01:13Z","timestamp":1769076073638,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"PRODEP","award":["550\/2281\/2018"],"award-info":[{"award-number":["550\/2281\/2018"]}]},{"name":"Consejo Nacional de Ciencia y Tecnolog\u00eda","award":["296323"],"award-info":[{"award-number":["296323"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.1145\/3341325.3342008","type":"proceedings-article","created":{"date-parts":[[2019,9,6]],"date-time":"2019-09-06T13:04:52Z","timestamp":1567775092000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Anomaly Behavior Analysis for IoT Network Nodes"],"prefix":"10.1145","author":[{"given":"Jesus","family":"Pacheco","sequence":"first","affiliation":[{"name":"Industrial Engineering, Universidad de Sonora, Hermosillo, Sonora Mexico"}]},{"given":"Victor","family":"Benitez","sequence":"additional","affiliation":[{"name":"Industrial Engineering, Universidad de Sonora, Hermosillo, Sonora Mexico"}]},{"given":"Luis","family":"F\u00e9lix","sequence":"additional","affiliation":[{"name":"School of Engineering and Science Tecnologico de Monterrey, Hermosillo, Sonora Mexico"}]}],"member":"320","published-online":{"date-parts":[[2019,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/978-3-030-01168-0_12","volume-title":"Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems","author":"Al-Bahri M.","year":"2018","unstructured":"M. Al-Bahri , A. Yankovsky , A. Borodin , R. Kirichek , R. 2018. Testbed for Identify IoT-Devices Based on Digital Object Architecture . In Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems ; Galinina, O., Andreev, S., Balandin, S., Koucheryavy, Y., Eds.; Springer International Publishing , 2018 ; pp. 129 -- 137 . M. Al-Bahri, A. Yankovsky, A. Borodin, R. Kirichek, R. 2018. Testbed for Identify IoT-Devices Based on Digital Object Architecture. In Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems; Galinina, O., Andreev, S., Balandin, S., Koucheryavy, Y., Eds.; Springer International Publishing, 2018; pp. 129--137."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2306328"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2013.6471059"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/FAS-W.2016.58"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.05.013"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.08.016"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3188"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/FAS-W.2016.54"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/FAS-W.2016.56"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342509.2342513"},{"key":"e_1_3_2_1_11_1","first-page":"248","volume-title":"Proceedings of the 2016 IEEE 1st International Workshops on Foundations and Applications of Self* Systems (FAS*W); 2016;","author":"Garcia-Perez C.A.","unstructured":"C.A. Garcia-Perez , P. Merino . Enabling Low Latency Services on LTE Networks . In Proceedings of the 2016 IEEE 1st International Workshops on Foundations and Applications of Self* Systems (FAS*W); 2016; pp. 248 -- 255 . C.A. Garcia-Perez, P. Merino. Enabling Low Latency Services on LTE Networks. In Proceedings of the 2016 IEEE 1st International Workshops on Foundations and Applications of Self* Systems (FAS*W); 2016; pp. 248--255."},{"key":"e_1_3_2_1_12_1","volume-title":"SIoTFog: Byzantine-resilient IoT fog networking. Frontiers Inf Technol Electronic Eng","author":"Xu J.","year":"2018","unstructured":"J. Xu , K. Ota , M. Dong , A. Liu , Q. Li . SIoTFog: Byzantine-resilient IoT fog networking. Frontiers Inf Technol Electronic Eng 2018 , 19, 1546--1557. J. Xu, K. Ota, M. Dong, A. Liu, Q. Li. SIoTFog: Byzantine-resilient IoT fog networking. Frontiers Inf Technol Electronic Eng 2018, 19, 1546--1557."},{"key":"e_1_3_2_1_13_1","first-page":"256","volume-title":"Proceedings of the 2016 IEEE 1st International Workshops on Foundations and Applications of Self* Systems (FAS*W)","author":"Yaseen Q.","year":"2016","unstructured":"Q. Yaseen , F. AlBalas , Y. Jararweh , M. Al-Ayyoub . A Fog Computing Based System for Selective Forwarding Detection in Mobile Wireless Sensor Networks . In Proceedings of the 2016 IEEE 1st International Workshops on Foundations and Applications of Self* Systems (FAS*W) ; 2016 ; pp. 256 -- 262 . Q. Yaseen, F. AlBalas, Y. Jararweh, M. Al-Ayyoub. A Fog Computing Based System for Selective Forwarding Detection in Mobile Wireless Sensor Networks. In Proceedings of the 2016 IEEE 1st International Workshops on Foundations and Applications of Self* Systems (FAS*W); 2016; pp. 256--262."},{"key":"e_1_3_2_1_14_1","volume-title":"Internet of Things security and forensics: Challenges and opportunities. Future Generation Computer Systems","author":"Conti M.","year":"2018","unstructured":"M. Conti , A. Dehghantanha , K. Franke , S. Watson . Internet of Things security and forensics: Challenges and opportunities. Future Generation Computer Systems 2018 , 78, 544--546. M. Conti, A. Dehghantanha, K. Franke, S. Watson. Internet of Things security and forensics: Challenges and opportunities. Future Generation Computer Systems 2018, 78, 544--546."},{"key":"e_1_3_2_1_15_1","volume-title":"Internet of Things: A survey on the security of IoT frameworks. Journal of Information Security and Applications","author":"Ammar M.","year":"2018","unstructured":"M. Ammar , G. Russello , B. Crispo . Internet of Things: A survey on the security of IoT frameworks. Journal of Information Security and Applications 2018 , 38, 8--27. M. Ammar, G. Russello, B. Crispo. Internet of Things: A survey on the security of IoT frameworks. Journal of Information Security and Applications 2018, 38, 8--27."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-75880-0_2"},{"key":"e_1_3_2_1_17_1","first-page":"1","volume-title":"Proceedings of the 2015 6th International Conference on Modeling, Simulation, and Applied Optimization (ICMSAO); 2015;","author":"Can O.","unstructured":"O. Can , O.K. Sahingoz . A survey of intrusion detection systems in wireless sensor networks . In Proceedings of the 2015 6th International Conference on Modeling, Simulation, and Applied Optimization (ICMSAO); 2015; pp. 1 -- 6 . O. Can, O.K. Sahingoz. A survey of intrusion detection systems in wireless sensor networks. In Proceedings of the 2015 6th International Conference on Modeling, Simulation, and Applied Optimization (ICMSAO); 2015; pp. 1--6."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/MOBIQ.2007.4451054"},{"key":"e_1_3_2_1_19_1","first-page":"1","volume-title":"Proceedings of the 2016 International Symposium on Networks, Computers and Communications (ISNCC); 2016;","author":"Hodo E.","unstructured":"E. Hodo , X. Bellekens , A. Hamilton , P. Dubouilh , E. Iorkyase , C. Tachtatzis , R. Atkinson . Threat analysis of IoT networks using artificial neural network intrusion detection system . In Proceedings of the 2016 International Symposium on Networks, Computers and Communications (ISNCC); 2016; pp. 1 -- 6 . E. Hodo, X. Bellekens, A. Hamilton, P. Dubouilh, E. Iorkyase, C. Tachtatzis, R. Atkinson. Threat analysis of IoT networks using artificial neural network intrusion detection system. In Proceedings of the 2016 International Symposium on Networks, Computers and Communications (ISNCC); 2016; pp. 1--6."},{"key":"e_1_3_2_1_20_1","first-page":"197","volume-title":"Proceedings of the 2015 IEEE 13th International Conference on Industrial Informatics (INDIN); 2015;","author":"Schlegel R.","unstructured":"R. Schlegel , S. Obermeier , J. Schneider . Structured system threat modeling and mitigation analysis for industrial automation systems . In Proceedings of the 2015 IEEE 13th International Conference on Industrial Informatics (INDIN); 2015; pp. 197 -- 203 . R. Schlegel, S. Obermeier, J. Schneider. Structured system threat modeling and mitigation analysis for industrial automation systems. In Proceedings of the 2015 IEEE 13th International Conference on Industrial Informatics (INDIN); 2015; pp. 197--203."},{"key":"e_1_3_2_1_21_1","volume-title":"An Information Framework for Internet of Things Services in Physical Internet","author":"Tran-Dang H.","year":"2018","unstructured":"H. Tran-Dang , D. Kim . An Information Framework for Internet of Things Services in Physical Internet . IEEE Access 2018 , 6, 43967--43977. H. Tran-Dang, D. Kim. An Information Framework for Internet of Things Services in Physical Internet. IEEE Access 2018, 6, 43967--43977."},{"key":"e_1_3_2_1_22_1","first-page":"1","volume-title":"Proceedings of the 2016 Cloudification of the Internet of Things (CIoT); 2016;","author":"Guth J.","unstructured":"J. Guth , U. Breitenb\u00fccher , M. Falkenthal , F. Leymann , L. Reinfurt . Comparison of IoT platform architectures: A field study based on a reference architecture . In Proceedings of the 2016 Cloudification of the Internet of Things (CIoT); 2016; pp. 1 -- 6 . J. Guth, U. Breitenb\u00fccher, M. Falkenthal, F. Leymann, L. Reinfurt. Comparison of IoT platform architectures: A field study based on a reference architecture. In Proceedings of the 2016 Cloudification of the Internet of Things (CIoT); 2016; pp. 1--6."},{"key":"e_1_3_2_1_23_1","first-page":"123","volume-title":"Proceedings of the 2018 IEEE Asian Solid-State Circuits Conference (A-SSCC); 2018;","author":"Gadde V.V.","unstructured":"V.V. Gadde , H. Awano , Ikeda, M. An Encryption-Authentication Unified A\/D Conversion Scheme for IoT Sensor Nodes . In Proceedings of the 2018 IEEE Asian Solid-State Circuits Conference (A-SSCC); 2018; pp. 123 -- 126 . V.V. Gadde, H. Awano, Ikeda, M. An Encryption-Authentication Unified A\/D Conversion Scheme for IoT Sensor Nodes. In Proceedings of the 2018 IEEE Asian Solid-State Circuits Conference (A-SSCC); 2018; pp. 123--126."},{"key":"e_1_3_2_1_24_1","first-page":"258","volume-title":"Proceedings of the 2017 IEEE National Aerospace and Electronics Conference (NAECON); 2017;","author":"Daddala B.","unstructured":"B. Daddala , H. Wang , A.Y. Javaid . Design and implementation of a customized encryption algorithm for authentication and secure communication between devices . In Proceedings of the 2017 IEEE National Aerospace and Electronics Conference (NAECON); 2017; pp. 258 -- 262 . B. Daddala, H. Wang, A.Y. Javaid. Design and implementation of a customized encryption algorithm for authentication and secure communication between devices. In Proceedings of the 2017 IEEE National Aerospace and Electronics Conference (NAECON); 2017; pp. 258--262."},{"key":"e_1_3_2_1_25_1","first-page":"1","volume-title":"Proceedings of the 2016 IEEE International Smart Cities Conference (ISC2); 2016;","author":"Pacheco J.","unstructured":"J. Pacheco , C. Tunc , S. Hariri . Design and evaluation of resilient infrastructures systems for smart cities . In Proceedings of the 2016 IEEE International Smart Cities Conference (ISC2); 2016; pp. 1 -- 6 . J. Pacheco, C. Tunc, S. Hariri. Design and evaluation of resilient infrastructures systems for smart cities. In Proceedings of the 2016 IEEE International Smart Cities Conference (ISC2); 2016; pp. 1--6."},{"key":"e_1_3_2_1_26_1","first-page":"1285","volume-title":"Proceedings of the 2017 IEEE\/ACS 14th International Conference on Computer Systems and Applications (AICCSA); 2017;","author":"Pacheco J.","unstructured":"J. Pacheco , D. Ibarra , A. Vijay , S. Hariri . IoT Security Framework for Smart Water System . In Proceedings of the 2017 IEEE\/ACS 14th International Conference on Computer Systems and Applications (AICCSA); 2017; pp. 1285 -- 1292 . J. Pacheco, D. Ibarra, A. Vijay, S. Hariri. IoT Security Framework for Smart Water System. In Proceedings of the 2017 IEEE\/ACS 14th International Conference on Computer Systems and Applications (AICCSA); 2017; pp. 1285--1292."},{"key":"e_1_3_2_1_27_1","first-page":"177","volume-title":"Proceedings of the 2018 21st Euromicro Conference on Digital System Design (DSD); 2018;","author":"Mahmoodi Y.","unstructured":"Y. Mahmoodi , S. Reiter , Viehl, O. Bringmann , W. Rosenstiel . Attack Surface Modeling and Assessment for Penetration Testing of IoT System Designs . In Proceedings of the 2018 21st Euromicro Conference on Digital System Design (DSD); 2018; pp. 177 -- 181 . Y. Mahmoodi, S. Reiter, Viehl, O. Bringmann, W. Rosenstiel. Attack Surface Modeling and Assessment for Penetration Testing of IoT System Designs. In Proceedings of the 2018 21st Euromicro Conference on Digital System Design (DSD); 2018; pp. 177--181."},{"key":"e_1_3_2_1_28_1","volume-title":"PHP and MySQL Web development","author":"Welling L.","year":"2003","unstructured":"L. Welling , L. Thomson . PHP and MySQL Web development . Sams Publishing , 2003 . L. Welling, L. Thomson. PHP and MySQL Web development. Sams Publishing, 2003."},{"key":"e_1_3_2_1_29_1","unstructured":"Weka (consulted on March 25th 2019) retrieved form: http:\/\/weka.sourceforge.net\/doc.dev\/weka\/classifiers\/rules\/JRip.html.  Weka (consulted on March 25th 2019) retrieved form: http:\/\/weka.sourceforge.net\/doc.dev\/weka\/classifiers\/rules\/JRip.html."},{"key":"e_1_3_2_1_30_1","volume-title":"Data Mining: Practical Machine Learning Tools and Techniques","author":"Witten I.","year":"2011","unstructured":"I. Witten , E. Frank , M. Hall . Data Mining: Practical Machine Learning Tools and Techniques . 3 rd Edition. Morgan Kaufmann Publishers (ISBN : 978-0-12-374856-0), 2011 I. Witten, E. Frank, M. Hall. Data Mining: Practical Machine Learning Tools and Techniques. 3rd Edition. Morgan Kaufmann Publishers (ISBN: 978-0-12-374856-0), 2011","edition":"3"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCBI.2013.16"}],"event":{"name":"ICFNDS '19: 3rd International Conference on Future Networks and Distributed Systems","location":"Paris France","acronym":"ICFNDS '19","sponsor":["CNAM Conservatoire des Arts et M\u00e9tiers"]},"container-title":["Proceedings of the 3rd International Conference on Future Networks and Distributed Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3341325.3342008","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3341325.3342008","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:12:57Z","timestamp":1750201977000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3341325.3342008"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7]]},"references-count":31,"alternative-id":["10.1145\/3341325.3342008","10.1145\/3341325"],"URL":"https:\/\/doi.org\/10.1145\/3341325.3342008","relation":{},"subject":[],"published":{"date-parts":[[2019,7]]},"assertion":[{"value":"2019-07-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}