{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T23:30:47Z","timestamp":1764977447447,"version":"3.46.0"},"reference-count":57,"publisher":"Walter de Gruyter GmbH","issue":"2","license":[{"start":{"date-parts":[[2016,9,14]],"date-time":"2016-09-14T00:00:00Z","timestamp":1473811200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/3.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,3,28]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>Internet of Things (IoT) has been a most important research area for almost a decade now, where a huge network of billions or trillions of \u201cthings\u201d communicating with one another is facing many technical and application challenges. Although there are many uncertainties about its security and privacy, the literature presents different techniques to handle the security issues and challenges in order to develop a well-defined security architecture. This paper reviews 50 research papers that are related to the security of IoT. The security techniques were classified with respect to time consumption, energy consumption, power consumption, lightweight property, reliability, robustness, and smart applicability. Also, the security techniques were analyzed based on the considered attacks, application, utilized simulation tool, security model, and attributes. The objective of the survey is focused on the security loopholes arising out of the information exchange technologies used in IoT. Finally, the important research issues are addressed for the researchers to find the way for further research in the security of IoT. The survey signifies that multilevel and mutual authentication based on attribute-based profile modeling bring more security for access control and authentication.<\/jats:p>","DOI":"10.1515\/jisys-2016-0032","type":"journal-article","created":{"date-parts":[[2016,9,14]],"date-time":"2016-09-14T12:37:19Z","timestamp":1473856639000},"page":"149-162","source":"Crossref","is-referenced-by-count":4,"title":["A Critical Analysis on the Security Architectures of Internet of Things: The Road Ahead"],"prefix":"10.1515","volume":"27","author":[{"given":"Vivek V.","family":"Jog","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering , Vel Tech Dr.RR & Dr.SR Technical University , Chennai, Tamil Nadu 600062 , India"}]},{"given":"T. Senthil","family":"Murugan","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering , Vel Tech Dr.RR & Dr.SR Technical University , Chennai, Tamil Nadu 600062 , India"}]}],"member":"374","published-online":{"date-parts":[[2016,9,14]]},"reference":[{"key":"2025120523273715576_j_jisys-2016-0032_ref_001_w2aab3b7b1b1b6b1ab1b5b1Aa","doi-asserted-by":"crossref","unstructured":"A. Al Shidhani and V. Leung, Fast and secure reauthentications for 3GPP subscribers during WiMAX-WLAN handovers, IEEE Trans. Depend. Secure Comput.8 (2011), 699\u2013713.10.1109\/TDSC.2010.39","DOI":"10.1109\/TDSC.2010.39"},{"key":"2025120523273715576_j_jisys-2016-0032_ref_002_w2aab3b7b1b1b6b1ab1b5b2Aa","doi-asserted-by":"crossref","unstructured":"I. Alqassem and D. Svetinovic, A taxonomy of security and privacy requirements for the Internet of Things (IoT), in: Proceedings of IEEE International Conference on Industrial Engineering and Engineering Management (IEEM), pp. 1244\u20131248, 2014.","DOI":"10.1109\/IEEM.2014.7058837"},{"key":"2025120523273715576_j_jisys-2016-0032_ref_003_w2aab3b7b1b1b6b1ab1b5b3Aa","doi-asserted-by":"crossref","unstructured":"D. Altolini, V. Lakkundi, N. Bui, C. Tapparello and M. Rossi, Low power link layer security for IoT: implementation and performance analysis, in: Proceedings 9th International on Wireless Communications and Mobile Computing Conference (IWCMC), pp. 919\u2013925, 2013.","DOI":"10.1109\/IWCMC.2013.6583680"},{"key":"2025120523273715576_j_jisys-2016-0032_ref_004_w2aab3b7b1b1b6b1ab1b5b4Aa","doi-asserted-by":"crossref","unstructured":"L. Atzori, A. Iera and G. Morabito, The Internet of Things: a survey, Comput. Netw.54 (2010), 2787\u20132805.10.1016\/j.comnet.2010.05.010","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"2025120523273715576_j_jisys-2016-0032_ref_005_w2aab3b7b1b1b6b1ab1b5b5Aa","unstructured":"T. Borgohain, A. Borgohain, U. Kumar and S. Sanyal, Authentication systems in Internet of Things, Int. J. Adv. Netw. Appl.6 (2015), 2422\u20132426."},{"key":"2025120523273715576_j_jisys-2016-0032_ref_006_w2aab3b7b1b1b6b1ab1b5b6Aa","doi-asserted-by":"crossref","unstructured":"S. Chen, H. Xu, D. Liu, B. Hu and H. Wang, A vision of IoT: applications, challenges, and opportunities with China perspective, IEEE Internet Things J.1 (2014), 349\u2013359.10.1109\/JIOT.2014.2337336","DOI":"10.1109\/JIOT.2014.2337336"},{"key":"2025120523273715576_j_jisys-2016-0032_ref_007_w2aab3b7b1b1b6b1ab1b5b7Aa","doi-asserted-by":"crossref","unstructured":"J. M. de Fuentes, P. Peris-Lopez, J. E. Tapiador and S. Pastrana, Probabilistic yoking proofs for large scale IoT systems, Ad Hoc Netw.32(2015), 43\u201352.10.1016\/j.adhoc.2015.01.003","DOI":"10.1016\/j.adhoc.2015.01.003"},{"key":"2025120523273715576_j_jisys-2016-0032_ref_008_w2aab3b7b1b1b6b1ab1b5b8Aa","doi-asserted-by":"crossref","unstructured":"K. Fan, C. Liang, H. Li and Y. Yang, LRMAPC: a lightweight RFID mutual authentication protocol with cache in the reader for IoT, in: Proceedings of IEEE International Conference on Computer and Information Technology, pp. 276\u2013280, 2014.","DOI":"10.1109\/CIT.2014.80"},{"key":"2025120523273715576_j_jisys-2016-0032_ref_009_w2aab3b7b1b1b6b1ab1b5b9Aa","doi-asserted-by":"crossref","unstructured":"M. S. Farash, M. Turkanovic, S. Kumari and M. Holbl, An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment, Ad Hoc Netw.36(2016), 152\u2013176.10.1016\/j.adhoc.2015.05.014","DOI":"10.1016\/j.adhoc.2015.05.014"},{"key":"2025120523273715576_j_jisys-2016-0032_ref_010_w2aab3b7b1b1b6b1ab1b5c10Aa","doi-asserted-by":"crossref","unstructured":"M. U. Farooq, M. Waseem, A. Khairi and S. Mazhar, A critical analysis on the security concerns of Internet of Things (IoT), Int. J. Comput. Appl.111 (2015), 1\u20136.","DOI":"10.5120\/19547-1280"},{"key":"2025120523273715576_j_jisys-2016-0032_ref_011_w2aab3b7b1b1b6b1ab1b5c11Aa","doi-asserted-by":"crossref","unstructured":"D. Gessner, A. Olivereau, A. Olivereau and A. Serbanati, Trustworthy infrastructure services for a secure and privacy-respecting Internet of Things, in: Proceedings of IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 998\u20131003, 2012.","DOI":"10.1109\/TrustCom.2012.286"},{"key":"2025120523273715576_j_jisys-2016-0032_ref_012_w2aab3b7b1b1b6b1ab1b5c12Aa","doi-asserted-by":"crossref","unstructured":"R. Giuliano, F. Mazzenga, A. Neri and A. M. Vegni, Security access protocols in IoT networks with heterogenous non-IP terminals, in: Proceedings of the IEEE International Conference on Distributed Computing in Sensor Systems, pp. 257\u2013262, 2014.","DOI":"10.1109\/DCOSS.2014.50"},{"key":"2025120523273715576_j_jisys-2016-0032_ref_013_w2aab3b7b1b1b6b1ab1b5c13Aa","doi-asserted-by":"crossref","unstructured":"Y. Gu and W. Wu, A light-weight mutual authentication protocol for ISO 18000-6b standard RFID system, in: Proceedings of IEEE International Conference on Communications Technology and Applications, pp. 21\u201325, 2009.","DOI":"10.1109\/ICCOMTA.2009.5349247"},{"key":"2025120523273715576_j_jisys-2016-0032_ref_014_w2aab3b7b1b1b6b1ab1b5c14Aa","doi-asserted-by":"crossref","unstructured":"S. N. Han, G. M. Lee, N. Crespi, N. V. Luong, K. Heo, M. Brut and P. Gatellier, DPWSim: a devices profile for web services (DPWS) simulator, IEEE Internet Things J.2 (2015), 221\u2013229.10.1109\/JIOT.2014.2388131","DOI":"10.1109\/JIOT.2014.2388131"},{"key":"2025120523273715576_j_jisys-2016-0032_ref_015_w2aab3b7b1b1b6b1ab1b5c15Aa","doi-asserted-by":"crossref","unstructured":"D. He and S. Zeadally, An analysis of RFID authentication schemes for Internet of Things in healthcare environment using elliptic curve cryptography, IEEE Internet Things J.2 (2014), 72\u201383.","DOI":"10.1109\/JIOT.2014.2360121"},{"key":"2025120523273715576_j_jisys-2016-0032_ref_016_w2aab3b7b1b1b6b1ab1b5c16Aa","doi-asserted-by":"crossref","unstructured":"J. L. Hernandez-Ramos, M. P. Pawlowskis, A. J. Jara, A. F. Skarmeta and L. Ladid, Towards a lightweight authentication and authorization framework for smart objects, IEEE J. Select. Areas Commun.33 (2015), 690\u2013702.10.1109\/JSAC.2015.2393436","DOI":"10.1109\/JSAC.2015.2393436"},{"key":"2025120523273715576_j_jisys-2016-0032_ref_017_w2aab3b7b1b1b6b1ab1b5c17Aa","doi-asserted-by":"crossref","unstructured":"F. Hou, C. Yang, J. Liu, Y. Zhang, J. Tian and Y. Zhang, HB-MAP protocol: a new secure bidirectional light-weight authentication protocol of HB, in: Proceedings of IEEE Ninth International Conference on e-Business Engineering (ICEBE), pp. 151\u2013155, 2012.","DOI":"10.1109\/ICEBE.2012.33"},{"key":"2025120523273715576_j_jisys-2016-0032_ref_018_w2aab3b7b1b1b6b1ab1b5c18Aa","doi-asserted-by":"crossref","unstructured":"T. Hu, J. Wang, G. Zhao and X. Long, An improved mutual authentication and key update scheme for multi-hop relay in Internet of Things, in: Proceedings of 7th IEEE Conference on Industrial Electronics and Applications (ICIEA), pp. 1024\u20131029, 2012.","DOI":"10.1109\/ICIEA.2012.6360873"},{"key":"2025120523273715576_j_jisys-2016-0032_ref_019_w2aab3b7b1b1b6b1ab1b5c19Aa","doi-asserted-by":"crossref","unstructured":"M. A. Jan, P. Nanda, X. He, Z. Tan and R. P. Liu, A robust authentication scheme for observing resources in the Internet of Things environment, in: Proceedings of IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 205\u2013211, 2014.","DOI":"10.1109\/TrustCom.2014.31"},{"key":"2025120523273715576_j_jisys-2016-0032_ref_020_w2aab3b7b1b1b6b1ab1b5c20Aa","doi-asserted-by":"crossref","unstructured":"S. L. Keoh, S. S. Kumar, and H. Tschofenig, Securing the Internet of Things: a standardization perspective, IEEE Internet Things J.1(2014), 265\u2013275.10.1109\/JIOT.2014.2323395","DOI":"10.1109\/JIOT.2014.2323395"},{"key":"2025120523273715576_j_jisys-2016-0032_ref_021_w2aab3b7b1b1b6b1ab1b5c21Aa","unstructured":"H. J. Kim and K. Kim, Toward an inverse-free lightweight encryption scheme for IoT, in: Proceedings of Conference on Information Security & Cryptography, 2014."},{"key":"2025120523273715576_j_jisys-2016-0032_ref_022_w2aab3b7b1b1b6b1ab1b5c22Aa","doi-asserted-by":"crossref","unstructured":"T. Kothmay, C. Schmitt, W. Hu, M. Brunig and G. Carle, A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication, in: Proceedings of IEEE 37th Conference on Local Computer Networks Workshops (LCN Workshops), pp. 956\u2013963, 2012.","DOI":"10.1109\/LCNW.2012.6424088"},{"key":"2025120523273715576_j_jisys-2016-0032_ref_023_w2aab3b7b1b1b6b1ab1b5c23Aa","doi-asserted-by":"crossref","unstructured":"D. Kozlov, J. Veijalainen and Y. Ali, Security and privacy threats in IoT architectures, in: Proceedings of the 7th International Conference on Body Area Networks, pp. 256\u2013262, 2012.","DOI":"10.4108\/icst.bodynets.2012.250550"},{"key":"2025120523273715576_j_jisys-2016-0032_ref_024_w2aab3b7b1b1b6b1ab1b5c24Aa","doi-asserted-by":"crossref","unstructured":"C. Lai, H. Li, X. Liang, R. Lu, K. Zhang and X. Shen, CPAL: a conditional privacy-preserving authentication with access linkability for roaming service, IEEE Internet Things J.1 (2014), 46\u201357.10.1109\/JIOT.2014.2306673","DOI":"10.1109\/JIOT.2014.2306673"},{"key":"2025120523273715576_j_jisys-2016-0032_ref_025_w2aab3b7b1b1b6b1ab1b5c25Aa","doi-asserted-by":"crossref","unstructured":"D. Lake, R. Milito, M. Morrow and R. Vargheese, Internet of Things: architectural framework for eHealth security, J. ICT Stand.1 (2014), 301\u2013328.10.13052\/jicts2245-800X.133","DOI":"10.13052\/jicts2245-800X.133"},{"key":"2025120523273715576_j_jisys-2016-0032_ref_026_w2aab3b7b1b1b6b1ab1b5c26Aa","doi-asserted-by":"crossref","unstructured":"M. Leo, F. Battisti, M. Carli and A. Neri, A federated architecture approach for Internet of Things security, in: Proceedings of Euro Med Telco Conference (EMTC), pp. 1\u20135, 2014.","DOI":"10.1109\/EMTC.2014.6996638"},{"key":"2025120523273715576_j_jisys-2016-0032_ref_027_w2aab3b7b1b1b6b1ab1b5c27Aa","doi-asserted-by":"crossref","unstructured":"X. Li, R. Lu, X. Liang, X. Shen, J. Chen and X. Lin, Smart community: an Internet of Things application, IEEE Commun. Mag.49 (2011), 68\u201375.10.1109\/MCOM.2011.6069711","DOI":"10.1109\/MCOM.2011.6069711"},{"key":"2025120523273715576_j_jisys-2016-0032_ref_028_w2aab3b7b1b1b6b1ab1b5c28Aa","unstructured":"B. Maarten, N. Ricardo, B. Gianmarco. N. Igor, S. Gary and T. Elias, Dynamic Context-Aware Scalable and Trust-based IoT Security, Privacy Framework, River Publisher, Denmark, 2014."},{"key":"2025120523273715576_j_jisys-2016-0032_ref_029_w2aab3b7b1b1b6b1ab1b5c29Aa","doi-asserted-by":"crossref","unstructured":"P. N. Mahalle, B. Anggorojati, N. R. Prasad and R. Prasad, Identity Authentication and Capability Based Access Control (IACAC) for the Internet of Things, J. Cyber Secur. Mobil.1 (2013), 309\u2013348.","DOI":"10.13052\/jcsm2245-1439.142"},{"key":"2025120523273715576_j_jisys-2016-0032_ref_030_w2aab3b7b1b1b6b1ab1b5c30Aa","doi-asserted-by":"crossref","unstructured":"D. Miorandi, S. Sicari, F. DePellegrini and I. Chlamtac, Internet of Things: vision, applications and research challenges, Ad Hoc Netw.10(2012), 1497\u20131516.10.1016\/j.adhoc.2012.02.016","DOI":"10.1016\/j.adhoc.2012.02.016"},{"key":"2025120523273715576_j_jisys-2016-0032_ref_031_w2aab3b7b1b1b6b1ab1b5c31Aa","doi-asserted-by":"crossref","unstructured":"S. R. Moosavi, T. N. Gia, A. M. Rahmani, E. Nigussie and S. Virtanen, SEA: a secure and efficient authentication and authorization architecture for IoT-based healthcare using smart gateways, Proc. Comput. Sci.52 (2015), 452\u2013459.10.1016\/j.procs.2015.05.013","DOI":"10.1016\/j.procs.2015.05.013"},{"key":"2025120523273715576_j_jisys-2016-0032_ref_032_w2aab3b7b1b1b6b1ab1b5c32Aa","doi-asserted-by":"crossref","unstructured":"H. Ning, H. Liu and L. T. Yang, Aggregated-proof based hierarchical authentication scheme for the Internet of Things, IEEE Trans. Parallel Distrib. Syst.26 (2015), 657\u2013667.10.1109\/TPDS.2014.2311791","DOI":"10.1109\/TPDS.2014.2311791"},{"key":"2025120523273715576_j_jisys-2016-0032_ref_033_w2aab3b7b1b1b6b1ab1b5c33Aa","doi-asserted-by":"crossref","unstructured":"M. Panwar and A. Kumar, Security for IoT: an effective DTLS with public certificates, in: Proceedings International Conference on Advances in Computer Engineering and Applications (ICACEA), pp. 163\u2013166, 2015.","DOI":"10.1109\/ICACEA.2015.7164688"},{"key":"2025120523273715576_j_jisys-2016-0032_ref_034_w2aab3b7b1b1b6b1ab1b5c34Aa","doi-asserted-by":"crossref","unstructured":"N. Park and H. C. Bang, Mobile middleware platform for secure vessel traffic system in IoT service environment, Secur. Commun. Netw.9 (2014), 500\u2013512.","DOI":"10.1002\/sec.1108"},{"key":"2025120523273715576_j_jisys-2016-0032_ref_035_w2aab3b7b1b1b6b1ab1b5c35Aa","doi-asserted-by":"crossref","unstructured":"G. Peretti, V. Lakkundi and M. Zorzi, BlinkToSCoAP: an end-to-end security framework for the Internet of Things, in: Proceedings of 2015 7th International Conference on Communication Systems and Networks (COMSNETS), pp. 1\u20136, 2015.","DOI":"10.1109\/COMSNETS.2015.7098708"},{"key":"2025120523273715576_j_jisys-2016-0032_ref_036_w2aab3b7b1b1b6b1ab1b5c36Aa","doi-asserted-by":"crossref","unstructured":"H. C. Pohls, V. Angelakis, S. Suppan, K. Fischer, G. Oikonomous, E. Z. Tragos, R. D. Rodriguez and T. Mouroutis, RERUM: building a reliable iot upon privacy- and security- enabled smart objects, in: Proceedings of Wireless Communications and Networking Conference Workshops (WCNCW), pp. 122\u2013127, 2014.","DOI":"10.1109\/WCNCW.2014.6934872"},{"key":"2025120523273715576_j_jisys-2016-0032_ref_037_w2aab3b7b1b1b6b1ab1b5c37Aa","unstructured":"S. Raza, T. Voigt and V. Jutvik, Lightweight IKEv2: a key management solution for both the compressed IPsec and the IEEE 802.15.4 security, in: Proceedings of the IETF Workshop on Smart Object Security, 2012."},{"key":"2025120523273715576_j_jisys-2016-0032_ref_038_w2aab3b7b1b1b6b1ab1b5c38Aa","doi-asserted-by":"crossref","unstructured":"A. Riahi, Y. Challal, E. Natalizio, Z. Chtourou and A. Bouabdallah, A systemic approach for IoT security, in: Proceedings of IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS), pp. 351\u2013355, 2013.","DOI":"10.1109\/DCOSS.2013.78"},{"key":"2025120523273715576_j_jisys-2016-0032_ref_039_w2aab3b7b1b1b6b1ab1b5c39Aa","doi-asserted-by":"crossref","unstructured":"A. Rizzardi, D. Miorandi, S. Sicari, C. Cappiello and A. Coen-Porisini, Networked smart objects: moving data processing closer to the source, in: 2nd EAI International Conference on IoT as a Service, October 2015.","DOI":"10.1007\/978-3-319-47075-7_4"},{"key":"2025120523273715576_j_jisys-2016-0032_ref_040_w2aab3b7b1b1b6b1ab1b5c40Aa","doi-asserted-by":"crossref","unstructured":"R. M. Savola and H. Abie, Metrics-driven security objective decomposition for an EHealth application with adaptive security management, in: Proceedings of the International Workshop on Adaptive Security, 2012.","DOI":"10.1145\/2523501.2523507"},{"key":"2025120523273715576_j_jisys-2016-0032_ref_041_w2aab3b7b1b1b6b1ab1b5c41Aa","doi-asserted-by":"crossref","unstructured":"H. Shafagh, A. Hithnawi, A. Dr\u00f6scher, S. Duquennoy and W. Hu, Poster: towards encrypted query processing for the Internet of Things, in: Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, pp. 251\u2013253, 2015.","DOI":"10.1145\/2789168.2795172"},{"key":"2025120523273715576_j_jisys-2016-0032_ref_042_w2aab3b7b1b1b6b1ab1b5c42Aa","unstructured":"C. M. Shah, V. B. Sangoi and R. M. Visharia, Smart security solutions based on Internet of Things (IoT), Int. J. Curr. Eng. Technol.4 (2014), 3401\u20133404."},{"key":"2025120523273715576_j_jisys-2016-0032_ref_043_w2aab3b7b1b1b6b1ab1b5c43Aa","unstructured":"M. Shi, X. Shen and J. W. Mark, A light weight authentication scheme for mobile wireless Internet applications, in: Proceedings of IEEE WCNC, pp. 2126\u20132131, New Orleans, LA, March 16\u201320, 2003."},{"key":"2025120523273715576_j_jisys-2016-0032_ref_044_w2aab3b7b1b1b6b1ab1b5c44Aa","doi-asserted-by":"crossref","unstructured":"S. Sicari, A. Rizzardi, L. A. Grieco and A. Coen-Porisini, Security, privacy and trust in Internet of Things: the road ahead, Comput. Netw.76 (2015), 146\u2013164.10.1016\/j.comnet.2014.11.008","DOI":"10.1016\/j.comnet.2014.11.008"},{"key":"2025120523273715576_j_jisys-2016-0032_ref_045_w2aab3b7b1b1b6b1ab1b5c45Aa","doi-asserted-by":"crossref","unstructured":"S. Sicari, A. Rizzardi, L. A. Grieco, T. Monteil and A. Coen-Porisini, Secure OM2M service platform, in: 12th IEEE International Conference on Autonomic Computing, Self-IoT 2015, 7\u201310 July 2015.","DOI":"10.1109\/ICAC.2015.59"},{"key":"2025120523273715576_j_jisys-2016-0032_ref_046_w2aab3b7b1b1b6b1ab1b5c46Aa","doi-asserted-by":"crossref","unstructured":"S. Sicari, A. Rizzardi, D. Miorandi, C. Cappiello and A. Coen-Porisini, A secure and quality-aware prototypical architecture for the Internet of Things, Inf. Syst.58 (2016), 43\u201355.10.1016\/j.is.2016.02.003","DOI":"10.1016\/j.is.2016.02.003"},{"key":"2025120523273715576_j_jisys-2016-0032_ref_047_w2aab3b7b1b1b6b1ab1b5c47Aa","doi-asserted-by":"crossref","unstructured":"V. Sivaraman, H. H. Gharakheili, A. Vishwanath, R. Boreli and O. Mehani, Network-level security and privacy control for smart-home IoT devices, in: Proceedings of Eight International Workshop on Selected Topics in Mobile and Wireless Computing, pp. 163\u2013167, 2015.","DOI":"10.1109\/WiMOB.2015.7347956"},{"key":"2025120523273715576_j_jisys-2016-0032_ref_048_w2aab3b7b1b1b6b1ab1b5c48Aa","doi-asserted-by":"crossref","unstructured":"A. B. Torjusen, D. Trcek, H. Abie and \u00c5. Skomedal, Towards run-time verification of adaptive security for IoT in eHealth, in: Proceedings of the European Conference on Software Architecture Workshops, 2014.","DOI":"10.1145\/2642803.2642807"},{"key":"2025120523273715576_j_jisys-2016-0032_ref_049_w2aab3b7b1b1b6b1ab1b5c49Aa","doi-asserted-by":"crossref","unstructured":"P. Urien, LLCPS: a new security framework based on TLS for NFC P2P applications in the Internet of Things, in: Proceedings of the 10th Annual IEEE Consumer Communications and Networking Conference, pp. 845\u2013846, 2013.","DOI":"10.1109\/CCNC.2013.6488560"},{"key":"2025120523273715576_j_jisys-2016-0032_ref_050_w2aab3b7b1b1b6b1ab1b5c50Aa","doi-asserted-by":"crossref","unstructured":"P. Urien, LLCPS: a new secure model for Internet of Things services based on the NFC P2P model, in: Proceedings of IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), pp. 1\u20136, 2014.","DOI":"10.1109\/ISSNIP.2014.6827682"},{"key":"2025120523273715576_j_jisys-2016-0032_ref_051_w2aab3b7b1b1b6b1ab1b5c51Aa","doi-asserted-by":"crossref","unstructured":"M. Vucinic, B. Tourancheau, F. Rousseau, A. Duda, L. Damon and R. Guizzetti, OSCAR: object security architecture for the Internet of Things, in: Proceedings of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (IEEE WoWMoM 2014), 2014.","DOI":"10.1109\/WoWMoM.2014.6918975"},{"key":"2025120523273715576_j_jisys-2016-0032_ref_052_w2aab3b7b1b1b6b1ab1b5c52Aa","doi-asserted-by":"crossref","unstructured":"X. Wang, X. Sun, H. Yang and S. A. Shah, An anonymity and authentication mechanism for Internet of Things, J. Convergence Inform. Technol.6 (2011), 98\u2013105.10.4156\/jcit.vol6.issue3.11","DOI":"10.4156\/jcit.vol6.issue3.11"},{"key":"2025120523273715576_j_jisys-2016-0032_ref_053_w2aab3b7b1b1b6b1ab1b5c53Aa","doi-asserted-by":"crossref","unstructured":"X. Xu, N. Bessis and J. Cao, An autonomic agent trust model for IoT systems, Proc. Comput. Sci.21 (2013), 107\u2013113.10.1016\/j.procs.2013.09.016","DOI":"10.1016\/j.procs.2013.09.016"},{"key":"2025120523273715576_j_jisys-2016-0032_ref_054_w2aab3b7b1b1b6b1ab1b5c54Aa","doi-asserted-by":"crossref","unstructured":"X. Yao, Z. Chen and Y. Tian, A lightweight attribute-based encryption scheme for the Internet of Things, Future Gen. Comput. Syst.49 (2015), 104\u2013112.10.1016\/j.future.2014.10.010","DOI":"10.1016\/j.future.2014.10.010"},{"key":"2025120523273715576_j_jisys-2016-0032_ref_055_w2aab3b7b1b1b6b1ab1b5c55Aa","doi-asserted-by":"crossref","unstructured":"G. Zhao, X. Si, J. Wang, X. Long and T. Hu, A novel mutual authentication scheme for Internet of Things, in: Proceedings of Int. Conf. Model., Identification Control, pp. 563\u2013566, 2011.","DOI":"10.1109\/ICMIC.2011.5973767"},{"key":"2025120523273715576_j_jisys-2016-0032_ref_056_w2aab3b7b1b1b6b1ab1b5c56Aa","doi-asserted-by":"crossref","unstructured":"Y. Zhao, Research on data security technology in Internet of Things, Appl. Mech. Mater.433\u2013435 (2013), 1752\u20131755.","DOI":"10.4028\/www.scientific.net\/AMM.433-435.1752"},{"key":"2025120523273715576_j_jisys-2016-0032_ref_057_w2aab3b7b1b1b6b1ab1b5c57Aa","doi-asserted-by":"crossref","unstructured":"L. Zhou and H. C. Chao, Multimedia traffic security architecture for the Internet of Things, IEEE Netw.25 (2011), 35\u201340.10.1109\/MNET.2011.5772059","DOI":"10.1109\/MNET.2011.5772059"}],"container-title":["Journal of Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.degruyter.com\/view\/j\/jisys.2018.27.issue-2\/jisys-2016-0032\/jisys-2016-0032.xml","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jisys-2016-0032\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jisys-2016-0032\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T23:27:53Z","timestamp":1764977273000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jisys-2016-0032\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9,14]]},"references-count":57,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2016,9,14]]},"published-print":{"date-parts":[[2018,3,28]]}},"alternative-id":["10.1515\/jisys-2016-0032"],"URL":"https:\/\/doi.org\/10.1515\/jisys-2016-0032","relation":{},"ISSN":["2191-026X","0334-1860"],"issn-type":[{"type":"electronic","value":"2191-026X"},{"type":"print","value":"0334-1860"}],"subject":[],"published":{"date-parts":[[2016,9,14]]}}}