{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:27:29Z","timestamp":1750220849525,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,9,20]],"date-time":"2019-09-20T00:00:00Z","timestamp":1568937600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,9,20]]},"DOI":"10.1145\/3361821.3361827","type":"proceedings-article","created":{"date-parts":[[2019,11,19]],"date-time":"2019-11-19T13:46:52Z","timestamp":1574171212000},"page":"82-89","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Design, Implementation and Performance Measurement of Raspberry Gate in the IoT Field"],"prefix":"10.1145","author":[{"given":"Shuting","family":"Hu","sequence":"first","affiliation":[{"name":"Department of Engineering Mathematics and Internetworking, Dalhousie University, Halifax, Canada"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hironobu","family":"Suzuki","sequence":"additional","affiliation":[{"name":"Universal Shell Programming Laboratory, Tokyo, Japan"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yoshiaki","family":"Kitaguchi","sequence":"additional","affiliation":[{"name":"The Global Scientific Information and Computing Center, Tokyo Institute of Technology, Tokyo, Japan"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hiroyuki","family":"Ohno","sequence":"additional","affiliation":[{"name":"Information Media Center, Kanazawa University, Kanazawa, Japan"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Srinivas","family":"Sampalli","sequence":"additional","affiliation":[{"name":"Dalhousie University, Halifax, Canada"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2019,9,20]]},"reference":[{"key":"e_1_3_2_1_2_1","first-page":"21","volume-title":"IEICE technical report (IA2016), 116(282)","author":"Ohno H.","year":"2016","unstructured":"H. Ohno , Y. Kitaguchi , H. Suzuki:A Design and Implementation of The Raspberry Gate : A Small Security Gateway for IoT Generations , IEICE technical report (IA2016), 116(282) , pp. 21 -- 26 ( Nov , 2016 ) H. Ohno, Y. Kitaguchi, H. Suzuki:A Design and Implementation of The Raspberry Gate: A Small Security Gateway for IoT Generations, IEICE technical report (IA2016), 116(282), pp.21--26(Nov, 2016)"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2863180"},{"key":"e_1_3_2_1_4_1","first-page":"301","volume-title":"Chennai","author":"Ayyappan B.","year":"2017","unstructured":"B. Ayyappan and P. M. Kumar , \" Security protocols in WSN: A survey,\" 2017 Third International Conference on Science Technology Engineering & Management (ICONSTEM) , Chennai , 2017 , pp. 301 -- 304 . doi: 10.1109\/ICONSTEM.2017.8261297 10.1109\/ICONSTEM.2017.8261297 B. Ayyappan and P. M. Kumar, \"Security protocols in WSN: A survey,\" 2017 Third International Conference on Science Technology Engineering & Management (ICONSTEM), Chennai, 2017, pp. 301--304. doi: 10.1109\/ICONSTEM.2017.8261297"},{"key":"e_1_3_2_1_5_1","first-page":"307","volume-title":"Coimbatore","author":"Kamble A.","year":"2018","unstructured":"A. Kamble and S. Bhutad , \" Survey on Internet of Things (IoT) security issues & solutions,\" 2018 2nd International Conference on Inventive Systems and Control (ICISC) , Coimbatore , 2018 , pp. 307 -- 312 . doi: 10.1109\/ICISC.2018.8399084 10.1109\/ICISC.2018.8399084 A. Kamble and S. Bhutad, \"Survey on Internet of Things (IoT) security issues & solutions,\" 2018 2nd International Conference on Inventive Systems and Control (ICISC), Coimbatore, 2018, pp. 307--312. doi: 10.1109\/ICISC.2018.8399084"},{"key":"e_1_3_2_1_6_1","first-page":"162","volume-title":"Duhok","author":"Sadeeq M. A.","year":"2018","unstructured":"M. A. M. Sadeeq , S. R. M. Zeebaree , R. Qashi , S. H. Ahmed and K. Jacksi , \" Internet of Things Security: A Survey,\" 2018 International Conference on Advanced Science and Engineering (ICOASE) , Duhok , 2018 , pp. 162 -- 166 . doi: 10.1109\/ICOASE.2018.8548785 10.1109\/ICOASE.2018.8548785 M. A. M.Sadeeq, S. R. M. Zeebaree, R. Qashi, S. H. Ahmed and K. Jacksi, \"Internet of Things Security: A Survey,\" 2018 International Conference on Advanced Science and Engineering (ICOASE), Duhok, 2018, pp. 162--166. doi: 10.1109\/ICOASE.2018.8548785"},{"key":"e_1_3_2_1_7_1","first-page":"1","volume-title":"Five acts of consumer behavior: A potential security and privacy threat to Internet of Things,\" 2018 IEEE International Conference on Consumer Electronics (ICCE)","author":"Khan W. Z.","year":"2018","unstructured":"W. Z. Khan , M. Y. Aalsalem and M. K. Khan , \" Five acts of consumer behavior: A potential security and privacy threat to Internet of Things,\" 2018 IEEE International Conference on Consumer Electronics (ICCE) , Las Vegas, NV , 2018 , pp. 1 -- 3 . doi: 10.1109\/ICCE.2018.8326124 10.1109\/ICCE.2018.8326124 W. Z. Khan, M. Y. Aalsalem and M. K. Khan, \"Five acts of consumer behavior: A potential security and privacy threat to Internet of Things,\" 2018 IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, NV, 2018, pp. 1--3. doi: 10.1109\/ICCE.2018.8326124"},{"key":"e_1_3_2_1_8_1","first-page":"1006","volume-title":"IoT security (IoTSec) considerations, requirements, and architectures,\" 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC)","author":"Minoli D.","year":"2017","unstructured":"D. Minoli , K. Sohraby and J. Kouns , \" IoT security (IoTSec) considerations, requirements, and architectures,\" 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC) , Las Vegas, NV , 2017 , pp. 1006 -- 1007 . doi: 10.1109\/CCNC.2017.7983271 10.1109\/CCNC.2017.7983271 D. Minoli, K. Sohraby and J. Kouns, \"IoT security (IoTSec) considerations, requirements, and architectures,\" 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, 2017, pp. 1006--1007. doi: 10.1109\/CCNC.2017.7983271"},{"key":"e_1_3_2_1_9_1","first-page":"107","volume-title":"Analytics and Cloud) (I-SMAC)","author":"Krishna B. V. S.","year":"2017","unstructured":"B. V. S. Krishna and T. Gnanasekaran , \" A systematic study of security issues in Internet-of-Things (IoT),\" 2017 International Conference on I-SMAC (IoT in Social, Mobile , Analytics and Cloud) (I-SMAC) , Palladam , 2017 , pp. 107 -- 111 . doi: 10.1109\/I-SMAC.2017.8058318 10.1109\/I-SMAC.2017.8058318 B. V. S. Krishna and T. Gnanasekaran, \"A systematic study of security issues in Internet-of-Things (IoT),\" 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, 2017, pp. 107--111. doi: 10.1109\/I-SMAC.2017.8058318"},{"key":"e_1_3_2_1_10_1","first-page":"1","volume-title":"Chennai","author":"Nagamalla V.","year":"2017","unstructured":"V. Nagamalla and A. Varanasi , \" A review of security frameworks for Internet of Things,\" 2017 International Conference on Information Communication and Embedded Systems (ICICES) , Chennai , 2017 , pp. 1 -- 7 . doi: 10.1109\/ICICES.2017.8070757 10.1109\/ICICES.2017.8070757 V. Nagamalla and A. Varanasi, \"A review of security frameworks for Internet of Things,\" 2017 International Conference on Information Communication and Embedded Systems (ICICES), Chennai, 2017, pp. 1--7. doi: 10.1109\/ICICES.2017.8070757"},{"key":"e_1_3_2_1_11_1","first-page":"492","volume-title":"Analytics and Cloud) (I-SMAC)","author":"Vashi S.","year":"2017","unstructured":"S. Vashi , J. Ram , J. Modi , S. Verma and C. Prakash , \" Internet of Things (IoT): A vision, architectural elements, and security issues,\" 2017 International Conference on I-SMAC (IoT in Social, Mobile , Analytics and Cloud) (I-SMAC) , Palladam , 2017 , pp. 492 -- 496 . doi: 10.1109\/I-SMAC.2017.8058399 10.1109\/I-SMAC.2017.8058399 S. Vashi, J. Ram, J. Modi, S. Verma and C. Prakash, \"Internet of Things (IoT): A vision, architectural elements, and security issues,\" 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, 2017, pp. 492--496. doi: 10.1109\/I-SMAC.2017.8058399"},{"key":"e_1_3_2_1_12_1","first-page":"294","volume-title":"Analytics and Security Trends (CAST)","author":"Pawar A. B.","year":"2016","unstructured":"A. B. Pawar and S. Ghumbre , \" A survey on IoT applications, security challenges and counter measures,\" 2016 International Conference on Computing , Analytics and Security Trends (CAST) , Pune , 2016 , pp. 294 -- 299 . doi: 10.1109\/CAST.2016.7914983 10.1109\/CAST.2016.7914983 A. B. Pawar and S. Ghumbre, \"A survey on IoT applications, security challenges and counter measures,\" 2016 International Conference on Computing, Analytics and Security Trends (CAST), Pune, 2016, pp. 294--299. doi: 10.1109\/CAST.2016.7914983"},{"key":"e_1_3_2_1_13_1","first-page":"140","volume-title":"Macau","author":"Ren Z.","year":"2017","unstructured":"Z. Ren , X. Liu , R. Ye and T. Zhang , \" Security and privacy on internet of things,\" 2017 7th IEEE International Conference on Electronics Information and Emergency Communication (ICEIEC) , Macau , 2017 , pp. 140 -- 144 . doi: 10.1109\/ICEIEC.2017.8076530 10.1109\/ICEIEC.2017.8076530 Z. Ren, X. Liu, R. Ye and T. Zhang, \"Security and privacy on internet of things,\" 2017 7th IEEE International Conference on Electronics Information and Emergency Communication (ICEIEC), Macau, 2017, pp. 140--144. doi: 10.1109\/ICEIEC.2017.8076530"},{"key":"e_1_3_2_1_14_1","first-page":"21","volume-title":"Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things,\" 2015 IEEE World Congress on Services","author":"Hossain M. M.","year":"2015","unstructured":"M. M. Hossain , M. Fotouhi and R. Hasan , \" Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things,\" 2015 IEEE World Congress on Services , New York, NY , 2015 , pp. 21 -- 28 . doi: 10.1109\/SERVICES.2015.12 10.1109\/SERVICES.2015.12 M. M. Hossain, M. Fotouhi and R. Hasan, \"Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things,\" 2015 IEEE World Congress on Services, New York, NY, 2015, pp. 21--28. doi: 10.1109\/SERVICES.2015.12"},{"key":"e_1_3_2_1_15_1","first-page":"1","volume-title":"Networking and Mobile Computing (WiCOM 2015","author":"Kraijak S.","year":"2015","unstructured":"S. Kraijak and P. Tuwanut , \" A survey on IoT architectures, protocols, applications, security, privacy, real-world implementation and future trends,\" 11th International Conference on Wireless Communications , Networking and Mobile Computing (WiCOM 2015 ), Shanghai , 2015 , pp. 1 -- 6 . doi: 10.1049\/cp.2015.0714 10.1049\/cp.2015.0714 S. Kraijak and P. Tuwanut, \"A survey on IoT architectures, protocols, applications, security, privacy, real-world implementation and future trends,\" 11th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM 2015), Shanghai, 2015, pp. 1--6. doi: 10.1049\/cp.2015.0714"},{"key":"e_1_3_2_1_16_1","first-page":"1","volume-title":"Aalborg","author":"Abomhara M.","year":"2014","unstructured":"M. Abomhara and G. M. K\u00f8ien , \" Security and privacy in the Internet of Things: Current status and open issues,\" 2014 International Conference on Privacy and Security in Mobile Systems (PRISMS) , Aalborg , 2014 , pp. 1 -- 8 . doi: 10.1109\/PRISMS.2014.6970594 10.1109\/PRISMS.2014.6970594 M. Abomhara and G. M. K\u00f8ien, \"Security and privacy in the Internet of Things: Current status and open issues,\" 2014 International Conference on Privacy and Security in Mobile Systems (PRISMS), Aalborg, 2014, pp. 1--8. doi: 10.1109\/PRISMS.2014.6970594"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.042313.00197"},{"key":"e_1_3_2_1_18_1","first-page":"230","volume-title":"Matsue","author":"Zhang Z.","year":"2014","unstructured":"Z. Zhang , M. C. Y. Cho , C. Wang , C. Hsu , C. Chen and S. Shieh , \" IoT Security: Ongoing Challenges and Research Opportunities,\" 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications , Matsue , 2014 , pp. 230 -- 234 . doi: 10.1109\/SOCA.2014.58 10.1109\/SOCA.2014.58 Z. Zhang, M. C. Y. Cho, C. Wang, C. Hsu, C. Chen and S. Shieh, \"IoT Security: Ongoing Challenges and Research Opportunities,\" 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications, Matsue, 2014, pp. 230--234. doi: 10.1109\/SOCA.2014.58"},{"key":"e_1_3_2_1_19_1","first-page":"351","volume-title":"A Systemic Approach for IoT Security,\" 2013 IEEE International Conference on Distributed Computing in Sensor Systems","author":"Riahi A.","year":"2013","unstructured":"A. Riahi , Y. Challal , E. Natalizio , Z. Chtourou and A. Bouabdallah , \" A Systemic Approach for IoT Security,\" 2013 IEEE International Conference on Distributed Computing in Sensor Systems , Cambridge, MA , 2013 , pp. 351 -- 355 . doi: 10.1109\/DCOSS.2013.78 10.1109\/DCOSS.2013.78 A. Riahi, Y. Challal, E. Natalizio, Z. Chtourou and A. Bouabdallah, \"A Systemic Approach for IoT Security,\" 2013 IEEE International Conference on Distributed Computing in Sensor Systems, Cambridge, MA, 2013, pp. 351--355. doi: 10.1109\/DCOSS.2013.78"},{"key":"e_1_3_2_1_20_1","first-page":"257","volume-title":"Islamabad","author":"Khan R.","year":"2012","unstructured":"R. Khan , S. U. Khan , R. Zaheer and S. Khan , \" Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges,\" 2012 10th International Conference on Frontiers of Information Technology , Islamabad , 2012 , pp. 257 -- 260 . doi: 10.1109\/FIT.2012.53 10.1109\/FIT.2012.53 R. Khan, S. U. Khan, R. Zaheer and S. Khan, \"Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges,\" 2012 10th International Conference on Frontiers of Information Technology, Islamabad, 2012, pp. 257--260. doi: 10.1109\/FIT.2012.53"},{"key":"e_1_3_2_1_21_1","first-page":"110","volume-title":"Beijing","author":"Fan T.","year":"2010","unstructured":"T. Fan and Y. Chen , \" A scheme of data management in the Internet of Things,\" 2010 2nd IEEE InternationalConference on Network Infrastructure and Digital Content , Beijing , 2010 , pp. 110 -- 114 . doi: 10.1109\/ICNIDC.2010.5657908 10.1109\/ICNIDC.2010.5657908 T. Fan and Y. Chen, \"A scheme of data management in the Internet of Things,\" 2010 2nd IEEE InternationalConference on Network Infrastructure and Digital Content, Beijing, 2010, pp. 110--114. doi: 10.1109\/ICNIDC.2010.5657908"},{"key":"e_1_3_2_1_22_1","first-page":"551","volume-title":"Milan","author":"Kim E.","year":"2017","unstructured":"E. Kim and C. Keum , \" Trustworthy gateway system providing IoT trust domain of smart home,\" 2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN) , Milan , 2017 , pp. 551 -- 553 . doi: 10.1109\/ICUFN.2017.7993848 10.1109\/ICUFN.2017.7993848 E. Kim and C. Keum, \"Trustworthy gateway system providing IoT trust domain of smart home,\" 2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN), Milan, 2017, pp. 551--553. doi: 10.1109\/ICUFN.2017.7993848"},{"key":"e_1_3_2_1_23_1","first-page":"2511","volume-title":"IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT,\" 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)","author":"Miettinen M.","year":"2017","unstructured":"M. Miettinen , \" IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT,\" 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS) , Atlanta, GA , 2017 , pp. 2511 -- 2514 . doi: 10.1109\/ICDCS.2017.284 10.1109\/ICDCS.2017.284 M. Miettinen et al., \"IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT,\" 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), Atlanta, GA, 2017, pp. 2511--2514. doi: 10.1109\/ICDCS.2017.284"},{"key":"e_1_3_2_1_24_1","first-page":"1","volume-title":"High quality, low cost education with the Raspberry Pi,\" 2017 IEEE Global Humanitarian Technology Conference (GHTC)","author":"Yamanoor N. S.","year":"2017","unstructured":"N. S. Yamanoor and S. Yamanoor , \" High quality, low cost education with the Raspberry Pi,\" 2017 IEEE Global Humanitarian Technology Conference (GHTC) , San Jose, CA , 2017 , pp. 1 -- 5 . doi: 10.1109\/GHTC.2017.8239274 10.1109\/GHTC.2017.8239274 N. S. Yamanoor and S. Yamanoor, \"High quality, low cost education with the Raspberry Pi,\" 2017 IEEE Global Humanitarian Technology Conference (GHTC), San Jose, CA, 2017, pp. 1--5. doi: 10.1109\/GHTC.2017.8239274"},{"key":"e_1_3_2_1_25_1","first-page":"1658","volume-title":"Proceedings of the 2003","volume":"2","year":"2003","unstructured":"Yuan Jianying, Zhou Jiantao, Wenjiang Pei and Taijun Wang, \"An application of network address translation on gateway,\" International Conference on Neural Networks and Signal Processing, 2003 . Proceedings of the 2003 , Nanjing , 2003 , pp. 1658 -- 1661 Vol. 2 . doi: 10.1109\/ICNNSP.2003.1281201 10.1109\/ICNNSP.2003.1281201 Yuan Jianying, Zhou Jiantao, Wenjiang Pei and Taijun Wang, \"An application of network address translation on gateway,\" International Conference on Neural Networks and Signal Processing, 2003. Proceedings of the 2003, Nanjing, 2003, pp. 1658--1661 Vol.2. doi: 10.1109\/ICNNSP.2003.1281201"},{"key":"e_1_3_2_1_26_1","first-page":"315","volume-title":"USA","author":"Herbert D. L.","year":"2001","unstructured":"D. L. Herbert , S. S. Devgan and C. Beane , \" Application of network address translation in a local area network,\" Proceedings of the 33rd Southeastern Symposium on System Theory (Cat. No.01EX460), Athens, OH , USA , 2001 , pp. 315 -- 318 . doi: 10.1109\/SSST.2001.918538 10.1109\/SSST.2001.918538 D. L. Herbert, S. S. Devgan and C. Beane, \"Application of network address translation in a local area network,\" Proceedings of the 33rd Southeastern Symposium on System Theory (Cat. No.01EX460), Athens, OH, USA, 2001, pp. 315--318. doi: 10.1109\/SSST.2001.918538"},{"key":"e_1_3_2_1_27_1","first-page":"1","article-title":"Internet of Things: A survey of technologies and security risks in smart home and city environments","volume":"2018","author":"Bastos D.","year":"2018","unstructured":"D. Bastos , M. Shackleton and F. El-Moussa , \" Internet of Things: A survey of technologies and security risks in smart home and city environments ,\" Living in the Internet of Things: Cybersecurity of the IoT - 2018 , London, 2018 , pp. 1 -- 7 . doi: 10.1049\/cp.2018.0030 10.1049\/cp.2018.0030 D. Bastos, M. Shackleton and F. El-Moussa, \"Internet of Things: A survey of technologies and security risks in smart home and city environments,\" Living in the Internet of Things: Cybersecurity of the IoT - 2018, London, 2018, pp. 1--7. doi: 10.1049\/cp.2018.0030","journal-title":"Living in the Internet of Things: Cybersecurity of the IoT -"},{"key":"e_1_3_2_1_28_1","first-page":"1","volume-title":"Communication and Networking Technologies (ICCCNT)","author":"Datta P.","year":"2017","unstructured":"P. Datta and B. Sharma , \" A survey on IoT architectures, protocols, security and smart city based applications,\" 2017 8th International Conference on Computing , Communication and Networking Technologies (ICCCNT) , Delhi , 2017 , pp. 1 -- 5 . doi: 10.1109\/ICCCNT.2017.8203943 10.1109\/ICCCNT.2017.8203943 P. Datta and B. Sharma, \"A survey on IoT architectures, protocols, security and smart city based applications,\" 2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT), Delhi, 2017, pp. 1--5. doi: 10.1109\/ICCCNT.2017.8203943"},{"key":"e_1_3_2_1_29_1","first-page":"618","volume-title":"Blockchain for IoT security and privacy: The case study of a smart home,\" 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","author":"Dorri A.","year":"2017","unstructured":"A. Dorri , S. S. Kanhere , R. Jurdak and P. Gauravaram , \" Blockchain for IoT security and privacy: The case study of a smart home,\" 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops) , Kona, HI , 2017 , pp. 618 -- 623 . doi: 10.1109\/PERCOMW.2017.7917634 10.1109\/PERCOMW.2017.7917634 A. Dorri, S. S. Kanhere, R. Jurdak and P. Gauravaram, \"Blockchain for IoT security and privacy: The case study of a smart home,\" 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), Kona, HI, 2017, pp. 618--623. doi: 10.1109\/PERCOMW.2017.7917634"},{"key":"e_1_3_2_1_30_1","first-page":"22","volume-title":"Analytics and Cloud) (I-SMAC)","author":"Venkatesan V. P.","year":"2017","unstructured":"V. P. Venkatesan , C. P. Devi and M. Sivaranjani , \" Design of a smart gateway solution based on the exploration of specific challenges in IoT,\" 2017 International Conference on I-SMAC (IoT in Social, Mobile , Analytics and Cloud) (I-SMAC) , Palladam , 2017 , pp. 22 -- 31 . doi: 10.1109\/I-SMAC.2017.8058352 10.1109\/I-SMAC.2017.8058352 V. P. Venkatesan, C. P. Devi and M. Sivaranjani, \"Design of a smart gateway solution based on the exploration of specific challenges in IoT,\" 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, 2017, pp. 22--31. doi: 10.1109\/I-SMAC.2017.8058352"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2749883"},{"key":"e_1_3_2_1_32_1","first-page":"47","volume-title":"IPSJ Annual Conference, 6D-4","author":"Ohno H.","year":"2014","unstructured":"H. Ohno , H. Suzuki : Security Gateway for Electronics Hobbyists (Part 1. Design and Implementation) , IPSJ Annual Conference, 6D-4 , pp. 47 -- 48 ( 2014 ) (in Japanese) H. Ohno, H. Suzuki: Security Gateway for Electronics Hobbyists (Part 1. Design and Implementation), IPSJ Annual Conference, 6D-4, pp.47--48 (2014) (in Japanese)"},{"key":"e_1_3_2_1_33_1","first-page":"49","volume-title":"IPSJ Annual Conference, 6D-5","author":"Ohno H.","year":"2014","unstructured":"H. Ohno , H. Suzuki : Security Gateway for Electronics Hobbyists (Part 2. Operation and Management) , IPSJ Annual Conference, 6D-5 , pp. 49 -- 50 ( 2014 ) (in Japanese) H. Ohno, H. Suzuki: Security Gateway for Electronics Hobbyists (Part 2. Operation and Management), IPSJ Annual Conference, 6D-5, pp.49--50 (2014) (in Japanese)"},{"key":"e_1_3_2_1_34_1","first-page":"211","volume-title":"IPSJ DICOMO 2014","author":"Ohno H.","year":"2014","unstructured":"H. Ohno , Y. Kitaguchi , H. Suzuki : Security Gateway for Electronics Hobbyists (Part 4. Experiments on Raspberry Guardian) , IPSJ DICOMO 2014 , pp. 211 -- 218 ( 2014 ) (in Japanese H. Ohno, Y. Kitaguchi, H. Suzuki: Security Gateway for Electronics Hobbyists (Part 4. Experiments on Raspberry Guardian), IPSJ DICOMO 2014, pp.211--218 (2014) (in Japanese"}],"event":{"name":"CCIOT 2019: 2019 4th International Conference on Cloud Computing and Internet of Things","sponsor":["Waseda University Waseda University"],"location":"Tokyo Japan","acronym":"CCIOT 2019"},"container-title":["Proceedings of the 2019 4th International Conference on Cloud Computing and Internet of Things"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3361821.3361827","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3361821.3361827","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:10Z","timestamp":1750202590000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3361821.3361827"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,20]]},"references-count":33,"alternative-id":["10.1145\/3361821.3361827","10.1145\/3361821"],"URL":"https:\/\/doi.org\/10.1145\/3361821.3361827","relation":{},"subject":[],"published":{"date-parts":[[2019,9,20]]},"assertion":[{"value":"2019-09-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}