{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T12:34:06Z","timestamp":1771504446155,"version":"3.50.1"},"reference-count":218,"publisher":"Association for Computing Machinery (ACM)","issue":"3","funder":[{"name":"Defence Research and Development Canada\u2019s (DRDC) Canadian Safety and Security Program","award":["CSSP-2018-CP-2344"],"award-info":[{"award-number":["CSSP-2018-CP-2344"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2026,2,28]]},"abstract":"<jats:p>With the rise of Industry 4.0, horizontal Internet of Things (IoT) platforms are becoming a standardized approach for managing interoperability within complex and heterogeneous IoT systems. Horizontal IoT platforms are software solutions that provide overall IoT system orchestration and management. They work to facilitate IoT services and resources, where security management remains one of the main challenges. This article provides a survey and comparison of security management in IoT systems using horizontal IoT platforms. For this purpose, we first define and compare vertical and horizontal IoT platforms. Although vertical IoT platforms provide solutions to many industries, horizontal IoT platforms improve system connectivity by interconnecting multiple vertical domains. We then describe the security management functionalities of horizontal IoT platforms. With these in mind, we perform a comparative study on the current state of security management approaches of existing horizontal IoT platforms. Particularly, we survey and compare the security management features of the selected standard-based reference implementations. Through discussions, we cover concerns that researchers and developers should be aware of when selecting specific reference implementations for their works. Finally, we identify open issues in the existing security management principles of these reference implementations to be addressed in future studies and practical implementations.<\/jats:p>","DOI":"10.1145\/3766888","type":"journal-article","created":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T10:37:42Z","timestamp":1757587062000},"page":"1-39","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Security Management of Horizontal IoT Platforms: A Survey and Comparison"],"prefix":"10.1145","volume":"58","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7202-9943","authenticated-orcid":false,"given":"Anastassia","family":"Gharib","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, American University of Sharjah","place":["Sharjah, United Arab Emirates"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6316-3040","authenticated-orcid":false,"given":"Jason","family":"Jaskolka","sequence":"additional","affiliation":[{"name":"Department of Systems and Computer Engineering, Carleton University","place":["Ottawa, Canada"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4319-8021","authenticated-orcid":false,"given":"Mohamed","family":"Ibnkahla","sequence":"additional","affiliation":[{"name":"Department of Systems and Computer Engineering, Carleton University","place":["Ottawa, Canada"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9220-4630","authenticated-orcid":false,"given":"Ashraf","family":"Matrawy","sequence":"additional","affiliation":[{"name":"Department of Systems and Computer Engineering, Carleton University","place":["Ottawa, Canada"]}]}],"member":"320","published-online":{"date-parts":[[2025,10,6]]},"reference":[{"key":"e_1_3_2_2_2","unstructured":"FIWARE Academy. 2023. IoT Agents. (2023). Retrieved August 14 2023 from https:\/\/fiware-academy.readthedocs.io\/en\/latest\/iot-agents\/idas.html"},{"key":"e_1_3_2_3_2","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1145\/3312480.3313174","volume-title":"Proceedings of the 2nd Workshop on Benchmarking Cyber-Physical Systems and Internet of Things (CPS-IoTBench\u201919)","author":"Aguiar Ana","year":"2019","unstructured":"Ana Aguiar and Ricardo Morla. 2019. Lessons learned and challenges on benchmarking publish-subscribe IoT platforms. In Proceedings of the 2nd Workshop on Benchmarking Cyber-Physical Systems and Internet of Things (CPS-IoTBench\u201919). Association for Computing Machinery, New York, NY, USA, 24\u201329. DOI:10.1145\/3312480.3313174"},{"key":"e_1_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2444095"},{"key":"e_1_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2014.05.536"},{"key":"e_1_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.21681\/2311-3456-2022-1-49-65"},{"key":"e_1_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.3390\/su15010743"},{"key":"e_1_3_2_8_2","unstructured":"Open Mobile Alliance. 2018. Lightweight machine-to-machine technical specification v1.0.2. (Feb.2018). Retrieved August 14 2023 from http:\/\/openmobilealliance.org\/release\/LightweightM2M\/V1_0_2-20180209-A\/OMA-TS-LightweightM2M-V1_0_2-20180209-A.pdf"},{"key":"e_1_3_2_9_2","unstructured":"Open Mobile Alliance. 2021. LwM2M open source code. (Mar.2021). Retrieved August 14 2023 from https:\/\/github.com\/OpenMobileAlliance\/OMA_LwM2M_for_Developers\/wiki\/LwM2M-Open-Source-Code"},{"key":"e_1_3_2_10_2","unstructured":"Open Mobile Alliance. 2023. LWM2M registry. (2023). Retrieved August 14 2023 from https:\/\/github.com\/OpenMobileAlliance\/lwm2m-registry"},{"key":"e_1_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/CSNet64211.2024.10851733"},{"key":"e_1_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1049\/icp.2022.0399"},{"key":"e_1_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2960316"},{"key":"e_1_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2905275"},{"key":"e_1_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICWR.2019.8765259"},{"key":"e_1_3_2_16_2","first-page":"1","volume-title":"Proceedings of the International Conference on Computing and Information Technology (ICCIT-1441)","author":"Mohamed Awad M. Awadelkarim","year":"2020","unstructured":"Awad M. Awadelkarim Mohamed and Yahia Abdallah M. Hamad. 2020. IoT Security: Review and future directions for protection models. In Proceedings of the International Conference on Computing and Information Technology (ICCIT-1441). 1\u20134. DOI:10.1109\/ICCIT-144147971.2020.9213715"},{"key":"e_1_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108040"},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.4108\/eai.20-12-2018.156084"},{"key":"e_1_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2019.00029"},{"key":"e_1_3_2_20_2","first-page":"1","volume-title":"Proceedings of the 11th International Conference on Mobile Computing and Ubiquitous Network (ICMU)","author":"Ban Tao","year":"2018","unstructured":"Tao Ban, Ryoichi Isawa, Katsunari Yoshioka, and Daisuke Inoue. 2018. A cross-platform study on IoT malware. In Proceedings of the 11th International Conference on Mobile Computing and Ubiquitous Network (ICMU). 1\u20132. DOI:10.23919\/ICMU.2018.8653580"},{"key":"e_1_3_2_21_2","first-page":"680","volume-title":"Proceedings of the IEEE Conference on Communications and Network Security (CNS)","author":"Barreto Luciano","year":"2015","unstructured":"Luciano Barreto, Antonio Celesti, Massimo Villari, Maria Fazio, and Antonio Puliafito. 2015. Identity management in IoT clouds: A FIWARE case of study. In Proceedings of the IEEE Conference on Communications and Network Security (CNS). 680\u2013684. DOI:10.1109\/cns.2015.7346887"},{"key":"e_1_3_2_22_2","first-page":"823","volume-title":"Proceedings of the IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC)","year":"2019","unstructured":"Emmanuel Bello-Ogunu, Mohamed Shehab, and Nazmus Sakib Miazi. 2019. Privacy is the best policy: A framework for BLE beacon privacy management. In Proceedings of the IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC). 823\u2013832. DOI:10.1109\/compsac.2019.00121"},{"key":"e_1_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/icin.2013.6670903"},{"key":"e_1_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.autcon.2022.104622"},{"key":"e_1_3_2_25_2","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1145\/3462203.3475883","volume-title":"Proceedings of the Conference on Information Technology for Social Good (GoodIT\u201921)","author":"Boano Carlo Alberto","year":"2021","unstructured":"Carlo Alberto Boano. 2021. Enabling support of legacy devices for a more sustainable Internet of Things: A position paper on the need to proactively avoid an \u201cInternet of Trash\u201d. In Proceedings of the Conference on Information Technology for Social Good (GoodIT\u201921). Association for Computing Machinery, New York, NY, USA, 97\u2013102. DOI:10.1145\/3462203.3475883"},{"key":"e_1_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/3586010"},{"key":"e_1_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2018.0024"},{"key":"e_1_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.1002\/9780470519905.ch12"},{"key":"e_1_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2018.2878658"},{"key":"e_1_3_2_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/cscn.2016.7785166"},{"key":"e_1_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.1145\/3231535.3231537"},{"key":"e_1_3_2_32_2","first-page":"1079","volume-title":"Proceedings of the 27th USENIX Security Symposium (USENIX Security 18)","author":"Chen Jianjun","year":"2018","unstructured":"Jianjun Chen, Jian Jiang, Haixin Duan, Tao Wan, Shuo Chen, Vern Paxson, and Min Yang. 2018. We still don\u2019t have secure cross-domain requests: An empirical study of CORS. In Proceedings of the 27th USENIX Security Symposium (USENIX Security 18). USENIX Association, Baltimore, MD, 1079\u20131093. Retrieved from https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/chen-jianjun"},{"key":"e_1_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1080\/00207543.2021.2022802"},{"key":"e_1_3_2_34_2","first-page":"267","volume-title":"Proceedings of the International Conference on Information Networking (ICOIN)","author":"Cherupally Sumanth Reddy","year":"2021","unstructured":"Sumanth Reddy Cherupally, Srinivas Boga, Prashanth Podili, and Kotaro Kataoka. 2021. Lightweight and scalable DAG based distributed ledger for verifying IoT data integrity. In Proceedings of the International Conference on Information Networking (ICOIN). 267\u2013272. DOI:10.1109\/icoin50884.2021.9334000"},{"key":"e_1_3_2_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/iotm.0001.1800022"},{"key":"e_1_3_2_36_2","first-page":"137","volume-title":"Proceedings of the ICCSA: 17th International Conference on Computational Science and Its Applications","author":"Dang Thien-Binh","year":"2017","unstructured":"Thien-Binh Dang, Manh-Hung Tran, Duc-Tai Le, and Hyunseung Choo. 2017. On evaluating IoTivity cloud platform. In Proceedings of the ICCSA: 17th International Conference on Computational Science and Its Applications. 137\u2013147. DOI:10.1007\/978-3-319-62404-4_10"},{"key":"e_1_3_2_37_2","unstructured":"Laura Daniele. 2015. SAREF ontology v2.1.1. (2015). Retrieved August 14 2023 from https:\/\/ontology.tno.nl\/saref\/"},{"key":"e_1_3_2_38_2","first-page":"237","volume-title":"Proceedings of the Digitising the Industry Internet of Things Connecting the Physical, Digital and VirtualWorlds","author":"Darmois Emmanuel","year":"2022","unstructured":"Emmanuel Darmois, Omar Elloumi, Patrick Guillemin, and Philippe Moretto. 2022. IoT standards\u2013state-of-the-art analysis. In Proceedings of the Digitising the Industry Internet of Things Connecting the Physical, Digital and VirtualWorlds. River Publishers, 237\u2013263. Retrieved from https:\/\/books.google.jo\/books?id=4_yGEAAAQBAJ"},{"key":"e_1_3_2_39_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.aci.2014.02.001"},{"key":"e_1_3_2_40_2","first-page":"189","volume-title":"Proceedings of the Conference on AI, Science, Engineering, and Technology (AIxSET)","author":"Davis Brittany D.","year":"2024","unstructured":"Brittany D. Davis, Yang Liu, and Mohd Anwar. 2024. Repository of metadata-related threats and mitigation strategies to enhance security in smart homes. In Proceedings of the Conference on AI, Science, Engineering, and Technology (AIxSET). 189\u2013193. DOI:10.1109\/AIxSET62544.2024.00035"},{"key":"e_1_3_2_41_2","doi-asserted-by":"publisher","DOI":"10.3390\/app12042172"},{"key":"e_1_3_2_42_2","article-title":"RFC 5246: The transport layer security (TLS) protocol version 1.2","author":"Dierks Tim","year":"2008","unstructured":"Tim Dierks and Eric Rescorla. 2008. RFC 5246: The transport layer security (TLS) protocol version 1.2. RFC Editor, USA. (Aug.2008). Retrieved from https:\/\/www.rfc-editor.org\/info\/rfc5246","journal-title":"RFC Editor, USA"},{"key":"e_1_3_2_43_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2985932"},{"key":"e_1_3_2_44_2","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243865"},{"key":"e_1_3_2_45_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2022.100626"},{"key":"e_1_3_2_46_2","first-page":"1","volume-title":"Proceedings of the Moscow Workshop on Electronic and Networking Technologies (MWENT)","author":"Ebraheem Ali","year":"2022","unstructured":"Ali Ebraheem and Ilya Ivanov. 2022. IoT standardization: An overview of organizations and standards. In Proceedings of the Moscow Workshop on Electronic and Networking Technologies (MWENT). 1\u20135. DOI:10.1109\/MWENT55238.2022.9802373"},{"key":"e_1_3_2_47_2","unstructured":"ETSI. 2019. oneM2M; Security solutions (oneM2M TS-0003 version 2.12.1 Release 2A). (2019). Retrieved Auguest 14 2023 from https:\/\/www.etsi.org\/deliver\/etsi_ts\/118100_118199\/118103\/02.12.01_60\/ts_118103v021201p.pdf"},{"key":"e_1_3_2_48_2","volume-title":"SmartM2M; SAREF extension investigation; Requirements for eHealth\/ageing-well","year":"2019","unstructured":"ETSI. 2019. SmartM2M; SAREF extension investigation; Requirements for eHealth\/ageing-well. Technical Report. Sophia Antipolis Cedex, France. Retrieved from https:\/\/www.etsi.org\/deliver\/etsi_tr\/103500_103599\/103509\/01.01.01_60\/tr_103509v010101p.pdf"},{"key":"e_1_3_2_49_2","volume-title":"SmartM2M; SAREF extension investigation; Requirements for wearables","year":"2019","unstructured":"ETSI. 2019. SmartM2M; SAREF extension investigation; Requirements for wearables. Technical Report. Sophia Antipolis Cedex, France. Retrieved from https:\/\/www.etsi.org\/deliver\/etsi_tr\/103500_103599\/103510\/01.01.01_60\/tr_103510v010101p.pdf"},{"key":"e_1_3_2_50_2","unstructured":"ETSI. 2021. SAREF: The smart applications reference ontology. (2021). Retrieved August 14 2023 from https:\/\/saref.etsi.org\/"},{"key":"e_1_3_2_51_2","volume-title":"Context information management (CIM); NGSI-LD information model","year":"2023","unstructured":"ETSI. 2023. Context information management (CIM); NGSI-LD information model. Technical Report. Sophia Antipolis Cedex, France. Retrieved from https:\/\/www.etsi.org\/deliver\/etsi_gs\/CIM\/001_099\/006\/01.02.01_60\/gs_CIM006v010201p.pdf"},{"key":"e_1_3_2_52_2","unstructured":"FIWARE Foundation e.V.2023. FIWARE generic enablers (GEs) GitHub repository. (Aug.2023). Retrieved August 14 2023 from https:\/\/github.com\/FIWARE-GEs"},{"key":"e_1_3_2_53_2","unstructured":"Ali Farhat Abdelrahman Eldosouky Jason Jaskolka Mohamed Ibnkahla and Ashraf Matrawy. 2022. Open source horizontal IoT platforms: A comparative study on functional requirements. arXiv:2209.06384. Retrieved from https:\/\/arxiv.org\/abs\/2209.06384"},{"key":"e_1_3_2_54_2","doi-asserted-by":"publisher","DOI":"10.1109\/iscc.2015.7405526"},{"key":"e_1_3_2_55_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2011.5984064"},{"key":"e_1_3_2_56_2","unstructured":"FIWARE. 2022. FIWARE - Open APIs for open minds. (2022). Retrieved August 14 2023 from https:\/\/www.fiware.org\/"},{"key":"e_1_3_2_57_2","unstructured":"FIWARE. 2022. NGSI-v2 smart supermarket tutorials: Activating the initial PolicySet. (2022). Retrieved August 14 2023 from https:\/\/fiware-tutorials.readthedocs.io\/en\/latest\/administrating-xacml.html#response_15"},{"key":"e_1_3_2_58_2","unstructured":"FIWARE. 2022. Smart agrifood: The new revolution in farming. (2022). Retrieved August 14 2023 from https:\/\/www.fiware.org\/community\/smart-agrifood\/"},{"key":"e_1_3_2_59_2","unstructured":"FIWARE. 2023. FIWARE catalogue GitHub releases. (July2023). Retrieved August 14 2023 from https:\/\/github.com\/FIWARE\/catalogue\/releases"},{"key":"e_1_3_2_60_2","volume-title":"City Data Spaces: A Guide to Building and Operationalising Data Services","author":"FIWARE SmartCitiesWorld and","year":"2023","unstructured":"SmartCitiesWorld and FIWARE. 2023. City Data Spaces: A Guide to Building and Operationalising Data Services. White Paper. Retrieved from https:\/\/www.fiware.org\/marketing-material\/city-data-spaces-a-guide-to-building-and-operationalising-data-services\/"},{"key":"e_1_3_2_61_2","unstructured":"e.V. FIWARE Foundation. 2022. Generic enabler (GE) catalogue. Retrieved August 12 2023 from https:\/\/www.fiware.org\/catalogue\/"},{"key":"e_1_3_2_62_2","doi-asserted-by":"publisher","DOI":"10.1109\/wf-iot.2014.6803109"},{"key":"e_1_3_2_63_2","unstructured":"Food and Drug Association. 2023. Medical device reporting. (2023). Retrieved August 14 2023 from https:\/\/www.fda.gov\/MedicalDevices\/Safety\/default.htm"},{"key":"e_1_3_2_64_2","unstructured":"Alliance for IoT Innovation (AIOTI) WG03 \u2013 IoT Standardisation. 2020. High priority IoT standardisation gaps and relevant SDOs release 2.0 A. (Jan.2020). Retrieved August 14 2023 from https:\/\/aioti.eu\/wp-content\/uploads\/2020\/01\/AIOTI-WG3-High-Priority-Gaps-v2.0-200128-Final.pdf"},{"key":"e_1_3_2_65_2","doi-asserted-by":"publisher","DOI":"10.3390\/s22062196"},{"key":"e_1_3_2_66_2","unstructured":"Eclipse Foundation. 2015. Eclipse OM2M - Open source platform for M2M communication. (2015). Retrieved August 14 2023 from https:\/\/eclipse.dev\/om2m\/"},{"key":"e_1_3_2_67_2","unstructured":"Eclipse Foundation. 2015. Leshan: OMA lightweight M2M server and client in Java. (2015). Retrieved August 14 2023 from https:\/\/www.eclipse.org\/leshan\/"},{"key":"e_1_3_2_68_2","unstructured":"Eclipse Foundation. 2015. Wakaama: OMA lightweight M2M C implementation designed to be portable on POSIX compliant systems. (2015). Retrieved August 14 2023 from https:\/\/www.eclipse.org\/wakaama\/"},{"key":"e_1_3_2_69_2","unstructured":"Eclipse Foundation. 2020. The Eclipse Jetty project. (2020). Retrieved August 14 2023 from https:\/\/www.eclipse.org\/jetty\/"},{"key":"e_1_3_2_70_2","unstructured":"Eclipse Foundation. 2021. Eclipse OM2M. (Feb.2021). Retrieved August 14 2023 from https:\/\/projects.eclipse.org\/projects\/iot.om2m"},{"key":"e_1_3_2_71_2","unstructured":"FIWARE Foundation. 2019. How to secure FIWARE architectures. (Apr.2019). Retrieved August 14 2023 from https:\/\/www.slideshare.net\/FI-WARE\/fiware-wednesday-webinars-how-to-secure-fiware-architectures"},{"key":"e_1_3_2_72_2","unstructured":"FIWARE Foundation. 2020. How to secure IoT devices. (Apr.2020). Retrieved August 14 2023 from https:\/\/www.slideshare.net\/slideshow\/fiware-wednesday-webinars-how-to-secure-iot-devices\/232515721"},{"key":"e_1_3_2_73_2","unstructured":"FIWARE Foundation. 2020. Integrating FIWARE with blockchain\/DLTs. (July2020). Retrieved August 14 2023 from https:\/\/www.slideshare.net\/FI-WARE\/fiware-wednesday-webinars-integrating-fiware-with-blockchaindlts"},{"key":"e_1_3_2_74_2","unstructured":"FIWARE Foundation. 2020. Security and core context: New patch release of the FIWARE catalogue. (Jan.2020). Retrieved August 14 2023 from https:\/\/www.fiware.org\/2020\/01\/24\/security-and-core-context-new-patch-release-of-the-fiware-catalogue\/"},{"key":"e_1_3_2_75_2","unstructured":"Open Connectivity Foundation. 2020. OCF cloud security specification v2.2.0. (July2020). Retrieved August 14 2023 from https:\/\/openconnectivity.org\/specs\/OCF_Cloud_Security_Specification_v2.2.0.pdf"},{"key":"e_1_3_2_76_2","unstructured":"Open Connectivity Foundation. 2020. OCF resource type specification v2.2.1. (Dec.2020). Retrieved August 14 2023 from https:\/\/openconnectivity.org\/specs\/OCF_Resource_Type_Specification_v2.2.1.pdf"},{"key":"e_1_3_2_77_2","unstructured":"Open Connectivity Foundation. 2020. OCF security specification v2.1.2. (Apr.2020). Retrieved August 14 2023 from https:\/\/openconnectivity.org\/specs\/OCF_Security_Specification_v2.1.2.pdf"},{"key":"e_1_3_2_78_2","unstructured":"Open Connectivity Foundation. 2020. OCF security specification v2.2.0. (July2020). Retrieved August 14 2023 from https:\/\/openconnectivity.org\/specs\/OCF_Security_Specification_v2.2.0.pdf"},{"key":"e_1_3_2_79_2","unstructured":"Open Connectivity Foundation. 2020. OCF security specification v2.2.1. (Dec.2020). Retrieved August 14 2023 from https:\/\/openconnectivity.org\/specs\/OCF_Security_Specification_v2.2.1.pdf"},{"key":"e_1_3_2_80_2","unstructured":"Open Connectivity Foundation. 2022. OCF core specification v2.2.5. (Jan.2022). Retrieved August 14 2023 from https:\/\/openconnectivity.org\/specs\/OCF_Core_Specification_v2.2.5.pdf"},{"key":"e_1_3_2_81_2","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12081864"},{"key":"e_1_3_2_82_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-022-00645-z"},{"key":"e_1_3_2_83_2","first-page":"244","volume-title":"Proceedings of the International Conference on Computational Performance Evaluation (ComPE)","author":"Garagad Vishwanath","year":"2020","unstructured":"Vishwanath Garagad, Nalini Iyer, and Heera Wali. 2020. Data integrity: A security threat for internet of things and cyber-physical systems. In Proceedings of the International Conference on Computational Performance Evaluation (ComPE). 244\u2013249. DOI:10.1109\/ComPE49325.2020.9200170"},{"key":"e_1_3_2_84_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-021-09055-1"},{"key":"e_1_3_2_85_2","doi-asserted-by":"publisher","DOI":"10.1109\/IOTM.0011.2000049"},{"key":"e_1_3_2_86_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICC42927.2021.9500741"},{"key":"e_1_3_2_87_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3152183"},{"key":"e_1_3_2_88_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3229891"},{"key":"e_1_3_2_89_2","first-page":"152","volume-title":"Proceedings of the 3rd International conference on IoT in Social, Mobile, Analytics and Cloud (I-SMAC)","author":"Ghorbani Hamidreza","year":"2019","unstructured":"Hamidreza Ghorbani and Mohsen Saeed Mohammadzadeh. 2019. Review on IoT standards and suggesting a new method to enhance data security. In Proceedings of the 3rd International conference on IoT in Social, Mobile, Analytics and Cloud (I-SMAC). 152\u2013158. DOI:10.1109\/I-SMAC47947.2019.9032571"},{"key":"e_1_3_2_90_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2941767"},{"key":"e_1_3_2_91_2","doi-asserted-by":"publisher","DOI":"10.3390\/pr10091782"},{"key":"e_1_3_2_92_2","doi-asserted-by":"publisher","DOI":"10.1109\/I2C2SW45816.2018.8997157"},{"key":"e_1_3_2_93_2","doi-asserted-by":"publisher","DOI":"10.1109\/percomw.2014.6815203"},{"key":"e_1_3_2_94_2","unstructured":"Samsung Open Source Group. 2015. IoT meets security. (2015). Retrieved August 14 2023 from https:\/\/events.static.linuxfound.org\/sites\/events\/files\/slides\/LinuxConEU2015_IoTivitySecurity_0.pdf"},{"key":"e_1_3_2_95_2","doi-asserted-by":"publisher","DOI":"10.1145\/3523064"},{"key":"e_1_3_2_96_2","first-page":"1","volume-title":"Proceedings of the NOMS 2022-2022 IEEE\/IFIP Network Operations and Management Symposium","author":"Gustin Denis","year":"2022","unstructured":"Denis Gustin and Juergen Jasperneite. 2022. IoT device management based on open source platforms - requirements analysis and evaluation. In Proceedings of the NOMS 2022-2022 IEEE\/IFIP Network Operations and Management Symposium. 1\u20134. DOI:10.1109\/NOMS54207.2022.9789875"},{"key":"e_1_3_2_97_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-5861-5_4"},{"key":"e_1_3_2_98_2","doi-asserted-by":"publisher","DOI":"10.1109\/CIOT.2016.7872918"},{"key":"e_1_3_2_99_2","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2020.2976075"},{"key":"e_1_3_2_100_2","first-page":"1","volume-title":"Proceedings of the IEEE 101st Vehicular Technology Conference (VTC2025-Spring)","author":"Hammad Ahmad","year":"2025","unstructured":"Ahmad Hammad, Omar Hourani, Anastassia Gharib, and Omar Qawasmeh. 2025. Decentralizing OM2M: A self-sustaining, lightweight, and scalable IoT platform deployment. In Proceedings of the IEEE 101st Vehicular Technology Conference (VTC2025-Spring). 1\u20136."},{"key":"e_1_3_2_101_2","first-page":"1","volume-title":"Proceedings of the IEEE Global Communications Conference (GLOBECOM)","year":"2019","unstructured":"George Hatzivasilis, Othonas Soultatos, Darko Anicic, Arne Br\u00f6ring, Konstantinos Fysarakis, and George Spanoudakis. 2019. Secure semantic interoperability for IoT applications with linked data. In Proceedings of the IEEE Global Communications Conference (GLOBECOM). 1\u20136. DOI:10.1109\/GLOBECOM38437.2019.9013147"},{"key":"e_1_3_2_102_2","doi-asserted-by":"publisher","DOI":"10.1145\/3485130"},{"key":"e_1_3_2_103_2","doi-asserted-by":"publisher","DOI":"10.22215\/etd\/2021-14639"},{"key":"e_1_3_2_104_2","doi-asserted-by":"publisher","DOI":"10.3390\/s18061675"},{"key":"e_1_3_2_105_2","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1016\/B978-0-323-99330-2.00010-6","volume-title":"Proceedings of the Management and Engineering of Critical Infrastructures","author":"Hurst William","year":"2024","unstructured":"William Hurst and Nathan Shone. 2024. Chapter 12 - Critical infrastructure security: Cyber-threats, legacy systems and weakening segmentation. In Proceedings of the Management and Engineering of Critical Infrastructures. Bedir Tekinerdogan, Mehmet Ak\u015fit, Cagatay Catal, William Hurst, and Tarek Alskaif (Eds.), Academic Press, 265\u2013286. DOI:10.1016\/B978-0-323-99330-2.00010-6"},{"key":"e_1_3_2_106_2","doi-asserted-by":"publisher","DOI":"10.1109\/isncc49221.2020.9297174"},{"key":"e_1_3_2_107_2","doi-asserted-by":"crossref","DOI":"10.1201\/b12891","volume-title":"Wireless Sensor Networks: A Cognitive Perspective","author":"Ibnkahla Mohamed","year":"2017","unstructured":"Mohamed Ibnkahla. 2017. Wireless Sensor Networks: A Cognitive Perspective. Taylor and Francis Publishers, CRC Press, Boca Raton, FL, USA."},{"key":"e_1_3_2_108_2","first-page":"808","volume-title":"Proceedings of the 15th International Conference on COMmunication Systems and NETworkS (COMSNETS)","year":"2023","unstructured":"Gangavarapu Vigneswara Ihita, Vybhav K. Acharya, Likhith Kanigolla, Sachin Chaudhari, and Thierry Monteil. 2023. Security for oneM2M-Based smart city network: An OM2M implementation. In Proceedings of the 15th International Conference on COMmunication Systems and NETworkS (COMSNETS). 808\u2013813. DOI:10.1109\/COMSNETS56262.2023.10041334"},{"key":"e_1_3_2_109_2","doi-asserted-by":"publisher","DOI":"10.24138\/jcomss.v10i3.121"},{"key":"e_1_3_2_110_2","unstructured":"IoTivity. 2018. IoTivity UPnP bridge GitHub repository. (2018). Retrieved August 14 2023 from https:\/\/github.com\/iotivity\/iotivity-upnp-bridge"},{"key":"e_1_3_2_111_2","unstructured":"IoTivity. 2023. IoTivity GitHub repository. (2023). Retrieved August 14 2023 from https:\/\/github.com\/iotivity"},{"key":"e_1_3_2_112_2","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2020.2997651"},{"key":"e_1_3_2_113_2","unstructured":"J. Clarke Stevens. 2016. Open connectivity foundation oneIoTa Tool. (Mar.2016). Retrieved August 14 2023 from https:\/\/www.ietf.org\/slides\/slides-iotsiws-open-connectivity-foundation-oneiota-tool-00.pdf"},{"key":"e_1_3_2_114_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-52243-8_37"},{"key":"e_1_3_2_115_2","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2017.2665164"},{"key":"e_1_3_2_116_2","unstructured":"Eclipse Jetty. 2023. Configuring Jetty Connectors Version 9.4.51.v20230217. (Feb.2023). Retrieved August 14 2023 from https:\/\/eclipse.dev\/jetty\/documentation\/jetty-9\/index.html#configuring-connectors"},{"key":"e_1_3_2_117_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2017.06.005"},{"key":"e_1_3_2_118_2","doi-asserted-by":"publisher","DOI":"10.23919\/ICACT53585.2022.9728913"},{"key":"e_1_3_2_119_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2021.07.007"},{"key":"e_1_3_2_120_2","first-page":"1","volume-title":"Proceedings of the IEEE Conference on Standards for Communications and Networking (CSCN)","year":"2018","unstructured":"Abdulkadir Karaagac, Matthias VanEeghem, Jen Rossev, Bart Moons, Eli DePoorter, and Jeroen Hoebeke. 2018. Extensions to LwM2M for intermittent connectivity and improved efficiency. In Proceedings of the IEEE Conference on Standards for Communications and Networking (CSCN). 1\u20136. DOI:10.1109\/cscn.2018.8581821"},{"key":"e_1_3_2_121_2","first-page":"161","volume-title":"Proceedings of the IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC)","author":"Karimibiuki Mehdi","year":"2018","unstructured":"Mehdi Karimibiuki, Ekta Aggarwal, Karthik Pattabiraman, and Andr\u00e9 Ivanov. 2018. DynPolAC: Dynamic policy-based access control for IoT systems. In Proceedings of the IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC). 161\u2013170. DOI:10.1109\/PRDC.2018.00027"},{"key":"e_1_3_2_122_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC55196.2022.9952998"},{"key":"e_1_3_2_123_2","doi-asserted-by":"publisher","DOI":"10.1504\/ijitst.2019.101828"},{"key":"e_1_3_2_124_2","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.2016.7514163"},{"key":"e_1_3_2_125_2","doi-asserted-by":"publisher","DOI":"10.3390\/s16101645"},{"key":"e_1_3_2_126_2","doi-asserted-by":"publisher","DOI":"10.1145\/3555776.3577768"},{"key":"e_1_3_2_127_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2022.05.003"},{"key":"e_1_3_2_128_2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2017.1500284"},{"key":"e_1_3_2_129_2","doi-asserted-by":"crossref","unstructured":"Anelia Kurteva Kathleen McMahon Alessandro Bozzon and Ruud Balkenende. 2023. Semantic Web and its role in facilitating ICT data sharing for the circular economy: state-of-the-art survey. Semantic Web 15 5 (Feb2023) 1\u201326. Retrieved August 14 2024 from https:\/\/www.semantic-web-journal.net\/system\/files\/swj3381.pdf","DOI":"10.3233\/SW-243586"},{"key":"e_1_3_2_130_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.06.062"},{"key":"e_1_3_2_131_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3067354"},{"key":"e_1_3_2_132_2","first-page":"887","volume-title":"Proceedings of the International Conference on Information and Communication Technology Convergence (ICTC)","author":"Lee Joo-Chul","year":"2016","unstructured":"Joo-Chul Lee, Jong-Hong Jeon, and Sang-Ha Kim. 2016. Design and implementation of healthcare resource model on IoTivity platform. In Proceedings of the International Conference on Information and Communication Technology Convergence (ICTC). 887\u2013891. DOI:10.1109\/ictc.2016.7763322"},{"key":"e_1_3_2_133_2","doi-asserted-by":"publisher","DOI":"10.1109\/ictc.2017.8191053"},{"key":"e_1_3_2_134_2","doi-asserted-by":"publisher","DOI":"10.1109\/iecon.2019.8927799"},{"key":"e_1_3_2_135_2","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/9641143"},{"key":"e_1_3_2_136_2","doi-asserted-by":"publisher","DOI":"10.1145\/3456629"},{"key":"e_1_3_2_137_2","unstructured":"Awa LWM2M. 2020. Awa lightweightM2M. (July2020). Retrieved March 30 2025 from https:\/\/github.com\/ConnectivityFoundry\/AwaLWM2M"},{"key":"e_1_3_2_138_2","unstructured":"Sonsoles L\u00f3pez-Pernas Andres Mu\u00f1oz Joaqu\u00edn Salvach\u00faa and Alejandro Pozo Huertas. 2020. FIWARE usage control. (Jan.2020). Retrieved August 14 2023 from https:\/\/github.com\/ging\/fiware-usage-control"},{"key":"e_1_3_2_139_2","unstructured":"Francesco Martella Giovanni Parrino Mario Colosi Giuseppe Ciulla Roberto Di Bernardo Marco Martorana Roberto Callari Maria Fazio Antonio Celesti and Massimo Villari. 2021. URBANITE: Messina use case in smart mobility scenario. Information Society 2021 4\u20138 October 2021 Ljubljana Slovenia 1\u20134. Retrieved August 14 2023 from https:\/\/urbanite-project.eu\/sites\/urbanite.drupal.pulsartecnalia.com\/files\/documents\/2021Papers\/03%20Martellaetal.pdf"},{"key":"e_1_3_2_140_2","first-page":"1","volume-title":"Proceedings of the IEEE International Conference on Smart Computing (SMARTCOMP)","year":"2017","unstructured":"Philippe Massonet, Laurent Deru, Amel Achour, Sebastien Dupont, Anna Levin, and Massimo Villari. 2017. End-to-end security architecture for federated cloud and IoT networks. In Proceedings of the IEEE International Conference on Smart Computing (SMARTCOMP). 1\u20136. DOI:10.1109\/smartcomp.2017.7947005"},{"key":"e_1_3_2_141_2","doi-asserted-by":"crossref","unstructured":"David McGrew Daniel Bailey Matthew Campagna and Robert Dugal. 2014. RFC 7251: AES-CCM Elliptic Curve Cryptography (ECC) Cipher Suites for TLS. RFC Editor USA. Retrieved from https:\/\/www.rfc-editor.org\/info\/rfc7251","DOI":"10.17487\/rfc7251"},{"key":"e_1_3_2_142_2","article-title":"RFC 6655: AES-CCM Cipher Suites for Transport Layer Security (TLS)","author":"McGrew David","year":"2012","unstructured":"David McGrew and Daniel Bailey. 2012. RFC 6655: AES-CCM Cipher Suites for Transport Layer Security (TLS). RFC Editor, USA. Retrieved from https:\/\/www.rfc-editor.org\/info\/rfc6655","journal-title":"RFC Editor, USA"},{"key":"e_1_3_2_143_2","first-page":"263","volume-title":"Proceedings of the International Conference on Smart Grid and Electrical Automation (ICSGEA)","author":"Mei Zhou","year":"2019","unstructured":"Zhou Mei and Li Yangqun. 2019. Internet of things experiment platform based on open source ecosystem. In Proceedings of the International Conference on Smart Grid and Electrical Automation (ICSGEA). 263\u2013269. DOI:10.1109\/icsgea.2019.00068"},{"key":"e_1_3_2_144_2","doi-asserted-by":"publisher","DOI":"10.1109\/cc.2016.7445514"},{"key":"e_1_3_2_145_2","unstructured":"Thierry Monteil Mahdi Ben Alaya Samir Medjiah Khalil Drira Guillaume Garzone and Fran\u00e7ois A\u00efssaoui. 2015. EventLog.java. (Apr.2015). Retrieved August 14 2023 from https:\/\/git.eclipse.org\/r\/plugins\/gitiles\/om2m\/org.eclipse.om2m\/+\/ffa076c1617ab2ce2971fb72f88ec32bdfe3ad58\/org.eclipse.om2m.commons\/src\/main\/java\/org\/eclipse\/om2m\/commons\/resource\/EventLog.java"},{"key":"e_1_3_2_146_2","doi-asserted-by":"publisher","DOI":"10.3390\/su12093885"},{"key":"e_1_3_2_147_2","first-page":"1","volume-title":"Proceedings of the IEEE International Systems Engineering Symposium (ISSE)","author":"Naik Nitin","year":"2017","unstructured":"Nitin Naik. 2017. Choice of effective messaging protocols for IoT systems: MQTT, CoAP, AMQP and HTTP. In Proceedings of the IEEE International Systems Engineering Symposium (ISSE). 1\u20137. DOI:10.1109\/SysEng.2017.8088251"},{"key":"e_1_3_2_148_2","first-page":"164","volume-title":"Proceedings of the International Conference on Big Data and Internet of Thing (BDIOT2017)","author":"Nedeltcheva Galia Novakova","year":"2017","unstructured":"Galia Novakova Nedeltcheva and Elena Shoikova. 2017. Models for innovative IoT ecosystems. In Proceedings of the International Conference on Big Data and Internet of Thing (BDIOT2017). Association for Computing Machinery, New York, NY, USA, 164\u2013168. DOI:10.1145\/3175684.3175710"},{"key":"e_1_3_2_149_2","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2019.2910750"},{"key":"e_1_3_2_150_2","doi-asserted-by":"publisher","DOI":"10.1145\/3281411.3281440"},{"key":"e_1_3_2_151_2","unstructured":"Open Connectivity Foundation (OCF. 2023. IoTivity. (2023). Retrieved August 14 2023 from https:\/\/iotivity.org\/"},{"key":"e_1_3_2_152_2","first-page":"41","volume-title":"Proceedings of the 13th International Computer Engineering Conference (ICENCO)","author":"Oh Se-Ra","year":"2017","unstructured":"Se-Ra Oh and Young-Gab Kim. 2017. Development of IoT security component for interoperability. In Proceedings of the 13th International Computer Engineering Conference (ICENCO). 41\u201344. DOI:10.1109\/ICENCO.2017.8289760"},{"key":"e_1_3_2_153_2","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6641562"},{"key":"e_1_3_2_154_2","doi-asserted-by":"publisher","DOI":"10.1109\/aina.2018.00104"},{"key":"e_1_3_2_155_2","unstructured":"OneM2M. 2021. Functional architecture v4.12.0 technical specification TS-0001-V4.12.0. (Sept.2021). Retrieved August 14 2023 from https:\/\/member.onem2m.org\/Application\/documentapp\/downloadLatestRevision\/default.aspx?docID=34134"},{"key":"e_1_3_2_156_2","unstructured":"Open Mobile Aliance. 2023. OMA SpecWorks. (2023). Retrieved August 14 2023 from https:\/\/www.omaspecworks.org\/"},{"key":"e_1_3_2_157_2","doi-asserted-by":"publisher","DOI":"10.1201\/9781003337584"},{"key":"e_1_3_2_158_2","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2018.8406189"},{"key":"e_1_3_2_159_2","unstructured":"Oleh Palka Nataliia Kunanets Palka Volodymyr Pasichnyk Oleksandr Matsiuk and Sofia Matsiuk. 2023. Comparative analysis of smart city platforms. (Apr.2023). Retrieved August 14 2023 from https:\/\/ceur-ws.org\/Vol-3403\/paper38.pdf"},{"key":"e_1_3_2_160_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2869344"},{"key":"e_1_3_2_161_2","doi-asserted-by":"publisher","DOI":"10.1109\/waina.2017.86"},{"key":"e_1_3_2_162_2","unstructured":"OneM2M Partners. 2023. OneM2M basics. (2023). Retrieved August 14 2023 from https:\/\/onem2m.org\/using-onem2m\/developers\/basics"},{"key":"e_1_3_2_163_2","unstructured":"OneM2M Partners. 2023. OneM2M open source projects. (2023). Retrieved August 14 2023 from https:\/\/www.onem2m.org\/developers-corner\/tools\/open-source-projects"},{"key":"e_1_3_2_164_2","unstructured":"OneM2M Partners. 2023. OneM2M technical specifications and drafts release 4. (2023). Retrieved August 14 2023 from http:\/\/www.onem2m.org\/technical\/published-drafts\/release-4"},{"key":"e_1_3_2_165_2","doi-asserted-by":"publisher","DOI":"10.1109\/cloudtech.2018.8713357"},{"key":"e_1_3_2_166_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-020-03415-7"},{"key":"e_1_3_2_167_2","first-page":"1","volume-title":"Proceedings of the Living in the Internet of Things","author":"Pothong Kruakae","year":"2019","unstructured":"Kruakae Pothong, Larissa Pschetz, Jeremy Watson, James Gbadamosi, and Andre Asaturyan. 2019. Making IoT security policies relevant, inclusive and practical for people: A multi-dimensional method. In Proceedings of the Living in the Internet of Things. 1\u201311. DOI:10.1049\/cp.2019.0157"},{"key":"e_1_3_2_168_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2933518"},{"key":"e_1_3_2_169_2","doi-asserted-by":"publisher","DOI":"10.1109\/csnt48778.2020.9115735"},{"key":"e_1_3_2_170_2","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1007\/978-3-030-90158-5_12","volume-title":"Proceedings of the Internet of Things From Hype to Reality: The Road to Digitization","author":"Rayes Ammar","year":"2022","unstructured":"Ammar Rayes and Samer Salam. 2022. The role of open source in IoT. In Proceedings of the Internet of Things From Hype to Reality: The Road to Digitization. Springer, 323\u2013335. DOI:10.1007\/978-3-319-44860-2_11"},{"key":"e_1_3_2_171_2","article-title":"RFC 6347: Datagram Transport Layer Security Version 1.2","author":"Rescorla Eric","year":"2012","unstructured":"Eric Rescorla and Nagendra Modadugu. 2012. RFC 6347: Datagram Transport Layer Security Version 1.2. RFC Editor, USA. Retrieved from https:\/\/www.rfc-editor.org\/info\/rfc6347","journal-title":"RFC Editor, USA"},{"key":"e_1_3_2_172_2","doi-asserted-by":"publisher","DOI":"10.1109\/mc.2018.3011051"},{"key":"e_1_3_2_173_2","doi-asserted-by":"publisher","DOI":"10.1109\/giots.2019.8766407"},{"key":"e_1_3_2_174_2","doi-asserted-by":"publisher","DOI":"10.5555\/3312193"},{"key":"e_1_3_2_175_2","unstructured":"Ryan Daws. 2021. Kaspersky: Attacks on IoT devices double in a year. (Sept.2021). Retrieved August 14 2023 from https:\/\/iottechnews.com\/news\/2021\/sep\/07\/kaspersky-attacks-on-iot-devices-double-in-a-year\/"},{"key":"e_1_3_2_176_2","doi-asserted-by":"publisher","DOI":"10.1016\/0270-0255(87)90473-8"},{"key":"e_1_3_2_177_2","doi-asserted-by":"publisher","unstructured":"Jibran Saleem Mohammad Hammoudeh Umar Raza Bamidele Adebisi and Ruth Ande. 2018. IoT standardisation: Challenges perspectives and solution. In Proceedings of the 2nd International Conference on Future Networks and Distributed Systems (ICFNDS\u201918). Association for Computing Machinery New York NY USA Article 1 9 pages. DOI:10.1145\/3231053.3231103","DOI":"10.1145\/3231053.3231103"},{"key":"e_1_3_2_178_2","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2019.00102"},{"key":"e_1_3_2_179_2","volume-title":"Proceedings of the Wirtschaftsinformatik","author":"Schermuly Louisa","year":"2019","unstructured":"Louisa Schermuly, Maximilian Schreieck, Manuel Wiesche, and Helmut Krcmar. 2019. Developing an industrial IoT platform\u2014tradeoff between horizontal and vertical approaches. In Proceedings of the Wirtschaftsinformatik. Retrieved August 14, 2023 from https:\/\/aisel.aisnet.org\/wi2019\/track01\/papers\/3\/"},{"key":"e_1_3_2_180_2","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1007\/978-3-319-69191-6","volume-title":"Proceedings of the Software Business","author":"Ojala Arto","year":"2017","unstructured":"Maximilian Schreieck, Christoph Hakes, Manuel Wiesche, and Helmut Krcmar. 2017. Governing platforms in the internet of things. In Proceedings of the Software Business. Arto Ojala, Helena Holmstr\u00f6m Olsson, and Karl Werder (Eds.), Springer International Publishing, Cham, 32\u201346. DOI:10.1007\/978-3-319-69191-6_3"},{"key":"e_1_3_2_181_2","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243817"},{"key":"e_1_3_2_182_2","doi-asserted-by":"publisher","DOI":"10.1109\/platcon.2017.7883726"},{"key":"e_1_3_2_183_2","doi-asserted-by":"publisher","DOI":"10.29027\/IJIRASE.v4.i4.2020.699-703"},{"key":"e_1_3_2_184_2","first-page":"313","volume-title":"Proceedings of the IEEE International Conference on Autonomic Computing","author":"Sicari Sabrina","year":"2015","unstructured":"Sabrina Sicari, Alessandra Rizzardi, Alberto Coen-Porisini, Luigi Alfredo Grieco, and Thierry Monteil. 2015. Secure OM2M service platform. In Proceedings of the IEEE International Conference on Autonomic Computing. 313\u2013318. DOI:10.1109\/icac.2015.59"},{"key":"e_1_3_2_185_2","doi-asserted-by":"publisher","DOI":"10.3390\/s19030676"},{"key":"e_1_3_2_186_2","doi-asserted-by":"publisher","DOI":"10.1109\/ithings-greencom-cpscom-smartdata.2016.55"},{"key":"e_1_3_2_187_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-023-07935-1"},{"key":"e_1_3_2_188_2","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2019.2943087"},{"key":"e_1_3_2_189_2","first-page":"1083","volume-title":"Proceedings of the International Conference On Smart Technologies For Smart Nation (SmartTechCon)","author":"Singh Vaibhav Pratap","year":"2017","unstructured":"Vaibhav Pratap Singh, Tulasi Dwarakanath, Haribabu, and Sarat Chandra Babu. 2017. IoT standardization efforts \u2013 An analysis. In Proceedings of the International Conference On Smart Technologies For Smart Nation (SmartTechCon). 1083\u20131088. DOI:10.1109\/SmartTechCon.2017.8358536"},{"key":"e_1_3_2_190_2","doi-asserted-by":"publisher","DOI":"10.1109\/msp.2012.85"},{"key":"e_1_3_2_191_2","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10212567"},{"key":"e_1_3_2_192_2","doi-asserted-by":"publisher","DOI":"10.3390\/s21175898"},{"key":"e_1_3_2_193_2","unstructured":"OMA SpecWorks. 2018. Lightweight machine-to-machine technical specification: Core v1.1. (2018). Retrieved August 14 2023 from http:\/\/openmobilealliance.org\/RELEASE\/LightweightM2M\/V1_1-20180612-C\/OMA-TS-LightweightM2M_Core-V1_1-20180612-C.pdf"},{"key":"e_1_3_2_194_2","unstructured":"OMA SpecWorks. 2019. An application layer approach to end to end security for the internet of things. (2019). Retrieved August 14 2023 from https:\/\/omaspecworks.org\/end-to-end-security-for-the-internet-of-things\/"},{"key":"e_1_3_2_195_2","unstructured":"OMA SpecWorks. 2019. Lightweight machine-to-machine technical specification: Transport bindings v1.1.1. (2019). Retrieved August 14 2023 from http:\/\/www.openmobilealliance.org\/release\/LightweightM2M\/V1_1_1-20190617-A\/OMA-TS-LightweightM2M_Transport-V1_1_1-20190617-A.pdf"},{"key":"e_1_3_2_196_2","unstructured":"OMA SpecWorks. 2020. Enabler release definition for LwM2M eventlog approved v1.0.1. (June2020). Retrieved August 14 2023 from https:\/\/www.openmobilealliance.org\/release\/LwM2M_EventLog\/V1_0_1-20200616-A\/OMA-ERELD-LWM2M_EventLog-V1_0_1-20200616-A.pdf"},{"key":"e_1_3_2_197_2","unstructured":"OMA SpecWorks. 2023. OMA lightweight M2M (LwM2M) object and resource registry. (2023). Retrieved August 14 2023 from https:\/\/technical.openmobilealliance.org\/OMNA\/LwM2M\/LwM2MRegistry.html"},{"key":"e_1_3_2_198_2","doi-asserted-by":"publisher","DOI":"10.1109\/FiCloud.2018.00022"},{"key":"e_1_3_2_199_2","doi-asserted-by":"publisher","DOI":"10.1117\/12.2324942"},{"key":"e_1_3_2_200_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2974257"},{"key":"e_1_3_2_201_2","unstructured":"Ziran Sun. 2016. IoTivity: Status and future direction. (2016). Retrieved August 14 2023 from https:\/\/www.ietf.org\/proceedings\/interim-2016-t2trg-03\/slides\/slides-interim-2016-t2trg-03-sessa-iotivity-status-and-future-direction-00.pdf"},{"issue":"1","key":"e_1_3_2_202_2","first-page":"42","article-title":"FIWARE, information platform for implementing data utilization based city management","volume":"13","author":"Takashi Takeuchi","year":"2018","unstructured":"Takeuchi Takashi and Terasawa Kazuyuki. 2018. FIWARE, information platform for implementing data utilization based city management. NEC Technical Journal: Special Issue on Sustainable Data-driven City Management 13, 1 (Nov.2018), 42\u201348. Retrieved August 14, 2023 from https:\/\/www.nec.com\/en\/global\/techrep\/journal\/g18\/n01\/pdf\/180109.pdf?fromPDF_E7101","journal-title":"NEC Technical Journal: Special Issue on Sustainable Data-driven City Management"},{"key":"e_1_3_2_203_2","doi-asserted-by":"publisher","DOI":"10.1109\/dasip.2016.7853800"},{"key":"e_1_3_2_204_2","doi-asserted-by":"publisher","DOI":"10.1109\/ccnc.2017.7983155"},{"key":"e_1_3_2_205_2","first-page":"198","volume-title":"Proceedings of the IEEE 14th International Conference on Networking, Sensing and Control (ICNSC)","author":"Tracey David","year":"2017","unstructured":"David Tracey and Cormac Sreenan. 2017. OMA LwM2M in a holistic architecture for the internet of things. In Proceedings of the IEEE 14th International Conference on Networking, Sensing and Control (ICNSC). 198\u2013203. DOI:10.1109\/ICNSC.2017.8000091"},{"key":"e_1_3_2_206_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3063485"},{"key":"e_1_3_2_207_2","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2015.7248377"},{"key":"e_1_3_2_208_2","doi-asserted-by":"publisher","DOI":"10.1109\/ASET48392.2020.9118238"},{"key":"e_1_3_2_209_2","first-page":"1832","volume-title":"Proceedings of the IEEE International Conference on Industrial Technology (ICIT)","year":"2015","unstructured":"Elvis Vogli, Mahdi Ben Alaya, Thierry Monteil, Luigi Alfredo Grieco, and Khalil Drira. 2015. An efficient resource naming for enabling constrained devices in SmartM2M architecture. In Proceedings of the IEEE International Conference on Industrial Technology (ICIT). 1832\u20131837. DOI:10.1109\/icit.2015.7125363"},{"key":"e_1_3_2_210_2","first-page":"1196","volume-title":"Proceedings of the 39th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","author":"Vresk Tomislav","year":"2016","unstructured":"Tomislav Vresk and Igor \u010cavrak. 2016. Architecture of an interoperable IoT platform based on microservices. In Proceedings of the 39th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO). 1196\u20131201. DOI:10.1109\/MIPRO.2016.7522321"},{"key":"e_1_3_2_211_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCES.2017.8275359"},{"key":"e_1_3_2_212_2","doi-asserted-by":"publisher","DOI":"10.1109\/cscn.2018.8581740"},{"key":"e_1_3_2_213_2","first-page":"425","volume-title":"Proceedings of the IEEE\/ACM Symposium on Edge Computing (SEC)","author":"Yousefi Shima","year":"2024","unstructured":"Shima Yousefi, Shameek Bhattacharjee, and Saptarshi Debroy. 2024. Intent-driven data falsification attack on collaborative IoT-edge environments. In Proceedings of the IEEE\/ACM Symposium on Edge Computing (SEC). 425\u2013430. DOI:10.1109\/SEC62691.2024.00047"},{"key":"e_1_3_2_214_2","first-page":"1","volume-title":"Proceedings of the International Conference on Platform Technology and Service (PlatCon)","author":"Yu Jin-Yong","year":"2019","unstructured":"Jin-Yong Yu and Young-Gab Kim. 2019. Analysis of IoT platform security: A survey. In Proceedings of the International Conference on Platform Technology and Service (PlatCon). 1\u20135. DOI:10.1109\/platcon.2019.8669423"},{"key":"e_1_3_2_215_2","doi-asserted-by":"publisher","DOI":"10.1109\/ictc.2016.7763511"},{"key":"e_1_3_2_216_2","doi-asserted-by":"publisher","DOI":"10.1109\/ucc.2014.129"},{"key":"e_1_3_2_217_2","first-page":"139","volume-title":"Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","year":"2014","unstructured":"Yiying Zhang, Weifu Zou, Xi Chen, Chengyue Yang, and Jinping Cao. 2014. The security for power internet of things: Framework, policies, and countermeasures. In Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery. 139\u2013142. DOI:10.1109\/cyberc.2014.32"},{"key":"e_1_3_2_218_2","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2018.2847733"},{"key":"e_1_3_2_219_2","doi-asserted-by":"publisher","DOI":"10.53608\/estudambilisim.1297052"}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3766888","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,6]],"date-time":"2025-10-06T13:58:54Z","timestamp":1759759134000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3766888"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,6]]},"references-count":218,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2026,2,28]]}},"alternative-id":["10.1145\/3766888"],"URL":"https:\/\/doi.org\/10.1145\/3766888","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,6]]},"assertion":[{"value":"2023-09-18","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-08-29","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-10-06","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}