{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T00:50:08Z","timestamp":1769043008380,"version":"3.49.0"},"reference-count":63,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2021,10,5]],"date-time":"2021-10-05T00:00:00Z","timestamp":1633392000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Sen. Netw."],"published-print":{"date-parts":[[2022,2,28]]},"abstract":"<jats:p>The Internet of Things (IoT) revolutionised the way devices, and human beings, cooperate and interact. The interconnectivity and mobility brought by IoT devices led to extremely variable networks, as well as unpredictable information flows. In turn, security proved to be a serious issue for the IoT, far more serious than it has been in the past for other technologies. We claim that IoT devices need detailed descriptions of their behaviour to achieve secure default configurations, sufficient security configurability, and self-configurability. In this article, we propose S\u00d7C4IoT, a framework that addresses these issues by combining two paradigms: Security by Contract (S\u00d7C) and Fog computing. First, we summarise the necessary background such as the basic S\u00d7C definitions. Then, we describe how devices interact within S\u00d7C4IoT and how our framework manages the dynamic evolution that naturally result from IoT devices life-cycles. Furthermore, we show that S\u00d7C4IoT can allow legacy S\u00d7C-noncompliant devices to participate with an S\u00d7C network, we illustrate two different integration approaches, and we show how they fit into S\u00d7C4IoT. Last, we implement the framework as a proof-of-concept. We show the feasibility of S\u00d7C4IoT and we run different experiments to evaluate its impact in terms of communication and storage space overhead.<\/jats:p>","DOI":"10.1145\/3480462","type":"journal-article","created":{"date-parts":[[2021,10,5]],"date-time":"2021-10-05T20:05:13Z","timestamp":1633464313000},"page":"1-51","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["S\u00d7C4IoT: A Security-by-contract Framework for Dynamic Evolving IoT Devices"],"prefix":"10.1145","volume":"18","author":[{"given":"Alberto","family":"Giaretta","sequence":"first","affiliation":[{"name":"Centre for Applied Autonomous Sensor Systems (AASS), \u00d6rebro University, Fakultetsgatan, Sweden"}]},{"given":"Nicola","family":"Dragoni","sequence":"additional","affiliation":[{"name":"DTU Compute, Technical University of Denmark, Kongens Lyngby, Denmark"}]},{"given":"Fabio","family":"Massacci","sequence":"additional","affiliation":[{"name":"Department of Information Sciences and Engineering, University of Trento, Italy and Vrije Universiteit Amsterdam, De Boelelaan, Amsterdam, Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2021,10,5]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Dani","author":"Adriansyah Andi","year":"2014","unstructured":"Andi Adriansyah and Akhmad W . Dani . 2014 . Design of small smart home system based on Arduino. In Electrical Power, Electronics, Communications, Control and Informatics Seminar (EECCIS) . 121\u2013125. DOI:https:\/\/doi.org\/10.1109\/EECCIS.2014.7003731 10.1109\/EECCIS.2014.7003731 Andi Adriansyah and Akhmad W. Dani. 2014. Design of small smart home system based on Arduino. In Electrical Power, Electronics, Communications, Control and Informatics Seminar (EECCIS). 121\u2013125. DOI:https:\/\/doi.org\/10.1109\/EECCIS.2014.7003731"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3054977.3057312"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/EIT.2018.8500157"},{"key":"e_1_2_1_4_1","unstructured":"Arduino. 2018. Memory | Arduino. Retrieved from https:\/\/www.arduino.cc\/en\/Tutorial\/Foundations\/M emory.  Arduino. 2018. Memory | Arduino. Retrieved from https:\/\/www.arduino.cc\/en\/Tutorial\/Foundations\/M emory."},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.4108\/icst.collaboratecom.2013.254091"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2962564.2962569"},{"key":"e_1_2_1_7_1","volume-title":"Big Data and Internet of Things: A Roadmap for Smart Environments","author":"Bonomi Flavio","unstructured":"Flavio Bonomi , Rodolfo Milito , Preethi Natarajan , and Jiang Zhu . 2014. Fog computing: A platform for internet of things and analytics . In Big Data and Internet of Things: A Roadmap for Smart Environments , Nik Bessis and Ciprian Dobre (Eds.). Springer International Publishing , Cham , 169\u2013186. DOI:https:\/\/doi.org\/10.1007\/978-3-319-05029-4_7 10.1007\/978-3-319-05029-4_7 Flavio Bonomi, Rodolfo Milito, Preethi Natarajan, and Jiang Zhu. 2014. Fog computing: A platform for internet of things and analytics. In Big Data and Internet of Things: A Roadmap for Smart Environments, Nik Bessis and Ciprian Dobre (Eds.). Springer International Publishing, Cham, 169\u2013186. DOI:https:\/\/doi.org\/10.1007\/978-3-319-05029-4_7"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE.2019.8661909"},{"key":"e_1_2_1_9_1","unstructured":"ISO\/IEC JTC 1 Technical Committee. 2016. ISO\/IEC 20922:2016 Information technology \u2013 Message Queuing Telemetry Transport (MQTT) v3.1.1. Retrieved from https:\/\/www.iso.org\/standard\/69466.html.  ISO\/IEC JTC 1 Technical Committee. 2016. ISO\/IEC 20922:2016 Information technology \u2013 Message Queuing Telemetry Transport (MQTT) v3.1.1. Retrieved from https:\/\/www.iso.org\/standard\/69466.html."},{"key":"e_1_2_1_10_1","unstructured":"ISO\/IEC JTC 1\/SC 22 Technical Committee. 2017. ISO\/IEC 21778:2017 Information technology \u2013 The JSON data interchange syntax. Retrieved from https:\/\/www.iso.org\/standard\/71616.html.  ISO\/IEC JTC 1\/SC 22 Technical Committee. 2017. ISO\/IEC 21778:2017 Information technology \u2013 The JSON data interchange syntax. Retrieved from https:\/\/www.iso.org\/standard\/71616.html."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.07.060"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12368-9_16"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.31224\/osf.io\/5ua7g"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/2394420.2394441"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.06.005"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/IRI.2014.7051866"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813703"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2983282"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/3277203.3277228"},{"key":"e_1_2_1_20_1","volume-title":"Deployment of IoT edge and fog computing technologies to develop smart building services. Sustainability 10, 11","author":"Ferr\u00e1ndez-Pastor Francisco Javier","year":"2018","unstructured":"Francisco Javier Ferr\u00e1ndez-Pastor , Higinio Mora , Antonio Jimeno-Morenilla , and Bruno Volckaert . 2018. Deployment of IoT edge and fog computing technologies to develop smart building services. Sustainability 10, 11 ( 2018 ). DOI:https:\/\/doi.org\/10.3390\/su10113832 10.3390\/su10113832 Francisco Javier Ferr\u00e1ndez-Pastor, Higinio Mora, Antonio Jimeno-Morenilla, and Bruno Volckaert. 2018. Deployment of IoT edge and fog computing technologies to develop smart building services. Sustainability 10, 11 (2018). DOI:https:\/\/doi.org\/10.3390\/su10113832"},{"key":"e_1_2_1_21_1","volume-title":"BACnet Secure Connect: A secure infrastructure for building automation. AHRAE BACnet whitepaper 21","author":"Fisher David","year":"2019","unstructured":"David Fisher , Bernhard Isler , and Michael Osborne . 2019. BACnet Secure Connect: A secure infrastructure for building automation. AHRAE BACnet whitepaper 21 ( 2019 ). Retrieved from https:\/\/www.ashrae.org\/File20Library\/Technical20Resources\/Bookstore\/BAC net-SC-Whitepaper-v10_Final_20180710.pdf. David Fisher, Bernhard Isler, and Michael Osborne. 2019. BACnet Secure Connect: A secure infrastructure for building automation. AHRAE BACnet whitepaper 21 (2019). Retrieved from https:\/\/www.ashrae.org\/File20Library\/Technical20Resources\/Bookstore\/BAC net-SC-Whitepaper-v10_Final_20180710.pdf."},{"key":"e_1_2_1_22_1","unstructured":"Eclipse Foundation. 2020. Eclipse Mosquitto\u2014An open source MQTT broker. Retrieved from https:\/\/github.com\/eclipse\/mosquitto.  Eclipse Foundation. 2020. Eclipse Mosquitto\u2014An open source MQTT broker. Retrieved from https:\/\/github.com\/eclipse\/mosquitto."},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.3390\/s18082660"},{"key":"e_1_2_1_24_1","unstructured":"Alberto Giaretta. 2020. SC4IoT. Retrieved from https:\/\/github.com\/albertogiaretta\/SxC4IoT.  Alberto Giaretta. 2020. SC4IoT. Retrieved from https:\/\/github.com\/albertogiaretta\/SxC4IoT."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.3390\/s19194121"},{"key":"e_1_2_1_26_1","volume-title":"Protecting the internet of things with security-by-contract and fog computing","author":"Giaretta Alberto","unstructured":"Alberto Giaretta , Nicola Dragoni , and Fabio Massacci . 2019. Protecting the internet of things with security-by-contract and fog computing . In IEEE 5th World Forum on Internet of Things (WF-IoT) . 1\u20136. Alberto Giaretta, Nicola Dragoni, and Fabio Massacci. 2019. Protecting the internet of things with security-by-contract and fog computing. In IEEE 5th World Forum on Internet of Things (WF-IoT). 1\u20136."},{"key":"e_1_2_1_27_1","unstructured":"Laurence Goasduff. 2019. Gartner Says 5.8 Billion Enterprise and Automotive IoT Endpoints Will Be in Use in 2020. Retrieved from https:\/\/www.gartner.com\/en\/newsroom\/press-releas es\/2019-08-29-gartner-says-5-8-billion-enterprise-and-automotive-io.  Laurence Goasduff. 2019. Gartner Says 5.8 Billion Enterprise and Automotive IoT Endpoints Will Be in Use in 2020. Retrieved from https:\/\/www.gartner.com\/en\/newsroom\/press-releas es\/2019-08-29-gartner-says-5-8-billion-enterprise-and-automotive-io."},{"key":"e_1_2_1_28_1","unstructured":"Google. 2020. A Java serialization\/deserialization library to convert Java Objects into JSON and back. Retrieved from https:\/\/github.com\/google\/gson.  Google. 2020. A Java serialization\/deserialization library to convert Java Objects into JSON and back. Retrieved from https:\/\/github.com\/google\/gson."},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCA.1999.801208"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3229565.3229571"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3229565.3229566"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/1740729"},{"key":"e_1_2_1_33_1","unstructured":"Sebastian Kaebisch Takuki Kamiya Michael McCool Victor Charpenay and Matthias Kovatsch. 2020. Web of Things (WoT) Thing Description. Retrieved from https:\/\/www.w3.org\/TR\/wot-thing-description\/.  Sebastian Kaebisch Takuki Kamiya Michael McCool Victor Charpenay and Matthias Kovatsch. 2020. Web of Things (WoT) Thing Description. Retrieved from https:\/\/www.w3.org\/TR\/wot-thing-description\/."},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2592798.2592824"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICITST.2016.7856708"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/MoWNet.2016.7496625"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.21105\/joss.00265"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2019.01.004"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.5555\/3271445"},{"key":"e_1_2_1_40_1","volume-title":"10th International Conference for Internet Technology and Secured Transactions (ICITST). 336\u2013341","author":"Mahmoud Rwan","unstructured":"Rwan Mahmoud , Tasneem Yousuf , Fadi A. Aloul , and Imran A. Zualkernan . 2015. Internet of things (IoT) security: Current status, challenges and prospective measures . In 10th International Conference for Internet Technology and Secured Transactions (ICITST). 336\u2013341 . Rwan Mahmoud, Tasneem Yousuf, Fadi A. Aloul, and Imran A. Zualkernan. 2015. Internet of things (IoT) security: Current status, challenges and prospective measures. In 10th International Conference for Internet Technology and Secured Transactions (ICITST). 336\u2013341."},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2019.8927065"},{"key":"e_1_2_1_42_1","volume-title":"Skarmeta","author":"Matheu Sara N.","year":"2019","unstructured":"Sara N. Matheu , Jos\u00e9 L. Hern\u00e1ndez-Ramos , Salvador P\u00e9rez , and Antonio F . Skarmeta . 2019 . Extending MUD profiles through an automated IoT security testing methodology. IEEE Access 7 (Oct. 2019), 149444\u2013149463. Sara N. Matheu, Jos\u00e9 L. Hern\u00e1ndez-Ramos, Salvador P\u00e9rez, and Antonio F. Skarmeta. 2019. Extending MUD profiles through an automated IoT security testing methodology. IEEE Access 7 (Oct. 2019), 149444\u2013149463."},{"key":"e_1_2_1_43_1","volume-title":"Risk-based automated assessment and testing for the cybersecurity certification and labelling of IoT devices. Comput. Stand. Interf. 62 (Feb","author":"Matheu-Garc\u00eda Sara N.","year":"2019","unstructured":"Sara N. Matheu-Garc\u00eda , Jos\u00e9 L. Hern\u00e1ndez-Ramos , Antonio F. Skarmeta , and Gianmarco Baldini . 2019. Risk-based automated assessment and testing for the cybersecurity certification and labelling of IoT devices. Comput. Stand. Interf. 62 (Feb . 2019 ), 64\u201383. DOI:https:\/\/doi.org\/10.1016\/j.csi.2018.08.003 10.1016\/j.csi.2018.08.003 Sara N. Matheu-Garc\u00eda, Jos\u00e9 L. Hern\u00e1ndez-Ramos, Antonio F. Skarmeta, and Gianmarco Baldini. 2019. Risk-based automated assessment and testing for the cybersecurity certification and labelling of IoT devices. Comput. Stand. Interf. 62 (Feb. 2019), 64\u201383. DOI:https:\/\/doi.org\/10.1016\/j.csi.2018.08.003"},{"key":"#cr-split#-e_1_2_1_44_1.1","unstructured":"Gu\u00f0ni Matth\u00ecasson Alberto Giaretta and Nicola Dragoni. 2020. IoT device profiling: From MUD files to SC contracts. In Open Identity Summit. 143-154. DOI:https:\/\/doi.org\/10.18420\/ois2020_12 10.18420\/ois2020_12"},{"key":"#cr-split#-e_1_2_1_44_1.2","unstructured":"Gu\u00f0ni Matth\u00ecasson Alberto Giaretta and Nicola Dragoni. 2020. IoT device profiling: From MUD files to SC contracts. In Open Identity Summit. 143-154. DOI:https:\/\/doi.org\/10.18420\/ois2020_12"},{"key":"e_1_2_1_45_1","volume-title":"Economics of Grids, Clouds, Systems, and Services, Congduc Pham, J\u00f6rn Altmann, and Jos\u00e9 \u00c1ngel Ba\u00f1ares (Eds.)","author":"Mavrogiorgou Argyro","unstructured":"Argyro Mavrogiorgou , Athanasios Kiourtis , and Dimosthenis Kyriazis . 2017. A comparative study of classification techniques for managing IoT devices of common specifications . In Economics of Grids, Clouds, Systems, and Services, Congduc Pham, J\u00f6rn Altmann, and Jos\u00e9 \u00c1ngel Ba\u00f1ares (Eds.) . Springer International Publishing , Cham , 67\u201377. Argyro Mavrogiorgou, Athanasios Kiourtis, and Dimosthenis Kyriazis. 2017. A comparative study of classification techniques for managing IoT devices of common specifications. In Economics of Grids, Clouds, Systems, and Services, Congduc Pham, J\u00f6rn Altmann, and Jos\u00e9 \u00c1ngel Ba\u00f1ares (Eds.). Springer International Publishing, Cham, 67\u201377."},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/263699.263712"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/358438.349314"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/248155.238781"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/989393.989454"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2078195"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2021.101727"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.5555\/3029320"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/508171.508175"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945448"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2017.04.003"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.01.059"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2018.08.198"},{"key":"e_1_2_1_58_1","unstructured":"Mathias Dahl Thomsen. 2019. Device-b Access Control. Master\u2019s thesis. Danmarks Tekniske Universitet Denmark. Retrieved from https:\/\/findit.dtu.dk\/en\/catalog\/2452038023.  Mathias Dahl Thomsen. 2019. Device-b Access Control. Master\u2019s thesis. Danmarks Tekniske Universitet Denmark. Retrieved from https:\/\/findit.dtu.dk\/en\/catalog\/2452038023."},{"key":"e_1_2_1_59_1","volume-title":"12th International Network Conference (INC\u201920)","author":"Thomsen Mathias Dahl","year":"2020","unstructured":"Mathias Dahl Thomsen , Alberto Giaretta , and Nicola Dragoni . 2020 . Smart lamp or security camera? Automatic identification of IoT devices . In 12th International Network Conference (INC\u201920) . Mathias Dahl Thomsen, Alberto Giaretta, and Nicola Dragoni. 2020. Smart lamp or security camera? Automatic identification of IoT devices. In 12th International Network Conference (INC\u201920)."},{"key":"e_1_2_1_60_1","volume-title":"Zuck","author":"Zhang Yiji","year":"2018","unstructured":"Yiji Zhang and Lenore D . Zuck . 2018 . Formal verification of optimizing compilers. In Distributed Computing and Internet Technology (LNCS) . 50\u201365. Yiji Zhang and Lenore D. Zuck. 2018. Formal verification of optimizing compilers. In Distributed Computing and Internet Technology (LNCS). 50\u201365."},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/SOCA.2014.58"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2847733"}],"container-title":["ACM Transactions on Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3480462","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3480462","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:31:17Z","timestamp":1750188677000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3480462"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,5]]},"references-count":63,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,2,28]]}},"alternative-id":["10.1145\/3480462"],"URL":"https:\/\/doi.org\/10.1145\/3480462","relation":{},"ISSN":["1550-4859","1550-4867"],"issn-type":[{"value":"1550-4859","type":"print"},{"value":"1550-4867","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,10,5]]},"assertion":[{"value":"2020-11-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-08-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-10-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}