{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T07:51:03Z","timestamp":1771833063757,"version":"3.50.1"},"reference-count":35,"publisher":"SAGE Publications","issue":"1","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"name":"Guangdong Province Universities and Colleges Pearl River Scholar Funded Scheme","award":["2019"],"award-info":[{"award-number":["2019"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872100"],"award-info":[{"award-number":["61872100"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Key R&D Program of China","award":["2017YFB0803001"],"award-info":[{"award-number":["2017YFB0803001"]}]},{"name":"Guangdong Province Key Research and Development Plan","award":["2019B010137004"],"award-info":[{"award-number":["2019B010137004"]}]},{"DOI":"10.13039\/501100004607","name":"natural science foundation of guangxi province","doi-asserted-by":"publisher","award":["2017GXNSFAA198372"],"award-info":[{"award-number":["2017GXNSFAA198372"]}],"id":[{"id":"10.13039\/501100004607","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2020,1]]},"abstract":"<jats:p> With the rapid development of Internet of Things technology (e.g. wireless sensor networks), security has become a global issue. Confidentiality, integrity, and availability (known as the CIA triangle) is widely used to define and model information security. However, this CIA triangle is insufficient to address rapidly changing security requirements. In this article, we divide information systems into four layers: physical layer, operational layer, data layer, and content layers (PODC). Corresponding, hierarchy of information security is proposed. Furthermore, we define the basic security properties for each layer and show that the four properties (i.e. confidentiality, availability, controllability, and authentication, called CACA) are minimally complete and independent for information security. Based on PODC and CACA, a new definition of information security is proposed, which acts as a secure foundation for information systems. <\/jats:p>","DOI":"10.1177\/1550147719899374","type":"journal-article","created":{"date-parts":[[2020,1,7]],"date-time":"2020-01-07T06:00:58Z","timestamp":1578376858000},"page":"155014771989937","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":9,"title":["Hierarchically defining Internet of Things security: From CIA to CACA"],"prefix":"10.1177","volume":"16","author":[{"given":"Lihua","family":"Yin","sequence":"first","affiliation":[{"name":"Cyberspace Institute of Advanced Technology (CIAT), Guangzhou University, Guangzhou, Guangdong, China"}]},{"given":"Binxing","family":"Fang","sequence":"additional","affiliation":[{"name":"Cyberspace Institute of Advanced Technology (CIAT), Guangzhou University, Guangzhou, Guangdong, China"}]},{"given":"Yunchuan","family":"Guo","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4633-7675","authenticated-orcid":false,"given":"Zhe","family":"Sun","sequence":"additional","affiliation":[{"name":"Cyberspace Institute of Advanced Technology (CIAT), Guangzhou University, Guangzhou, Guangdong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9409-5359","authenticated-orcid":false,"given":"Zhihong","family":"Tian","sequence":"additional","affiliation":[{"name":"Cyberspace Institute of Advanced Technology (CIAT), Guangzhou University, Guangzhou, Guangdong, China"}]}],"member":"179","published-online":{"date-parts":[[2020,1,7]]},"reference":[{"key":"bibr4-1550147719899374","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(03)00407-3"},{"key":"bibr5-1550147719899374","volume-title":"Computer security: art and science","author":"Bishop M","year":"2002"},{"key":"bibr6-1550147719899374","volume-title":"Security in computing","author":"Pfleeger CP","year":"2002"},{"key":"bibr7-1550147719899374","first-page":"2","volume":"6","author":"Chen TM","year":"2010","journal-title":"IEEE Netw"},{"key":"bibr8-1550147719899374","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.67"},{"key":"bibr9-1550147719899374","first-page":"248","volume-title":"Proceedings of the IEEE international conference on availability, reliability and security","author":"Virvilis N"},{"key":"bibr10-1550147719899374","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2509994"},{"key":"bibr13-1550147719899374","first-page":"1","volume-title":"Proceedings of the ACM\/EDAC\/IEEE design automation conference","author":"Sadeghi AR"},{"key":"bibr14-1550147719899374","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2015.2512235"},{"key":"bibr15-1550147719899374","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2703172"},{"key":"bibr16-1550147719899374","first-page":"1","volume-title":"Proceedings of the IEEE international conference for high performance computing, networking, storage and analysis","author":"Leonardo BG"},{"key":"bibr17-1550147719899374","first-page":"228","volume-title":"Proceedings of the IEEE international symposium on software reliability engineering","author":"Popov P"},{"key":"bibr18-1550147719899374","first-page":"41","volume-title":"Proceedings of the ACM international conference on embedded software","author":"Jiang W"},{"key":"bibr19-1550147719899374","first-page":"97","volume-title":"Proceedings of the 8th ACM SIGPLAN\/SIGOPS conference on virtual execution environments","author":"Shriram R"},{"key":"bibr20-1550147719899374","first-page":"1","volume-title":"Proceedings of the IEEE international workshop on resilient networks design and modeling","author":"Sterbenz JPG"},{"key":"bibr21-1550147719899374","first-page":"45","volume-title":"Proceedings of the Springer international workshop on cryptographic hardware and embedded systems","author":"Weingart SH"},{"key":"bibr26-1550147719899374","doi-asserted-by":"publisher","DOI":"10.21236\/ADA453251"},{"key":"bibr27-1550147719899374","doi-asserted-by":"publisher","DOI":"10.1201\/9781439833032"},{"key":"bibr29-1550147719899374","first-page":"859","volume-title":"Proceedings of the IEEE international conference on management of innovation & technology","author":"Ehsan N"},{"key":"bibr30-1550147719899374","unstructured":"Chrisis M, Konrad M, Shrum S. CMMI\u2013guidelines for process integration and product improvement (SEI Series in Software Engineering). Boston, MA: Addison-Wesley, 2003."},{"key":"bibr34-1550147719899374","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2910217"},{"key":"bibr35-1550147719899374","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2850780"},{"key":"bibr36-1550147719899374","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2846653"},{"key":"bibr38-1550147719899374","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2006.05.012"},{"key":"bibr39-1550147719899374","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2007.4378332"},{"key":"bibr40-1550147719899374","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2008.4599222"},{"key":"bibr41-1550147719899374","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.12.054"},{"key":"bibr42-1550147719899374","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2009.060598"},{"key":"bibr43-1550147719899374","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2007.04.009"},{"key":"bibr44-1550147719899374","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2907754"},{"key":"bibr45-1550147719899374","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2903191"},{"key":"bibr46-1550147719899374","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2846590"},{"key":"bibr47-1550147719899374","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.04.011"},{"key":"bibr48-1550147719899374","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1800526"},{"key":"bibr49-1550147719899374","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.09.019"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147719899374","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/1550147719899374","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147719899374","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,7]],"date-time":"2020-01-07T06:01:06Z","timestamp":1578376866000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1177\/1550147719899374"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1]]},"references-count":35,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,1]]}},"alternative-id":["10.1177\/1550147719899374"],"URL":"https:\/\/doi.org\/10.1177\/1550147719899374","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"value":"1550-1477","type":"print"},{"value":"1550-1477","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,1]]}}}