{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T17:13:49Z","timestamp":1774631629219,"version":"3.50.1"},"reference-count":170,"publisher":"MDPI AG","issue":"10","license":[{"start":{"date-parts":[[2016,10,5]],"date-time":"2016-10-05T00:00:00Z","timestamp":1475625600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100003329","name":"Ministerio de Econom\u00eda y Competitividad","doi-asserted-by":"publisher","award":["TEC2013-47141-C4-1-R"],"award-info":[{"award-number":["TEC2013-47141-C4-1-R"]}],"id":[{"id":"10.13039\/501100003329","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003329","name":"Ministerio de Econom\u00eda y Competitividad","doi-asserted-by":"publisher","award":["TEC2015-69648-REDC"],"award-info":[{"award-number":["TEC2015-69648-REDC"]}],"id":[{"id":"10.13039\/501100003329","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>The Internet of Things (IoT) is undeniably transforming the way that organizations communicate and organize everyday businesses and industrial procedures. Its adoption has proven well suited for sectors that manage a large number of assets and coordinate complex and distributed processes. This survey analyzes the great potential for applying IoT technologies (i.e., data-driven applications or embedded automation and intelligent adaptive systems) to revolutionize modern warfare and provide bene\ufb01ts similar to those in industry. It identi\ufb01es scenarios where Defense and Public Safety (PS) could leverage better commercial IoT capabilities to deliver greater survivability to the war\ufb01ghter or \ufb01rst responders, while reducing costs and increasing operation ef\ufb01ciency and effectiveness. This article reviews the main tactical requirements and the architecture, examining gaps and shortcomings in existing IoT systems across the military \ufb01eld and mission-critical scenarios. The review characterizes the open challenges for a broad deployment and presents a research roadmap for enabling an affordable IoT for defense and PS.<\/jats:p>","DOI":"10.3390\/s16101644","type":"journal-article","created":{"date-parts":[[2016,10,5]],"date-time":"2016-10-05T10:18:55Z","timestamp":1475662735000},"page":"1644","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":198,"title":["A Review on Internet of Things for Defense and Public Safety"],"prefix":"10.3390","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4991-6808","authenticated-orcid":false,"given":"Paula","family":"Fraga-Lamas","sequence":"first","affiliation":[{"name":"Department Electronics and Systems, Faculty of Computer Science, Universidade da Coru\u00f1a, A Coru\u00f1a 15071, Spain"}]},{"given":"Tiago","family":"Fern\u00e1ndez-Caram\u00e9s","sequence":"additional","affiliation":[{"name":"Department Electronics and Systems, Faculty of Computer Science, Universidade da Coru\u00f1a, A Coru\u00f1a 15071, Spain"}]},{"given":"Manuel","family":"Su\u00e1rez-Albela","sequence":"additional","affiliation":[{"name":"Department Electronics and Systems, Faculty of Computer Science, Universidade da Coru\u00f1a, A Coru\u00f1a 15071, Spain"}]},{"given":"Luis","family":"Castedo","sequence":"additional","affiliation":[{"name":"Department Electronics and Systems, Faculty of Computer Science, Universidade da Coru\u00f1a, A Coru\u00f1a 15071, Spain"}]},{"given":"Miguel","family":"Gonz\u00e1lez-L\u00f3pez","sequence":"additional","affiliation":[{"name":"Department Electronics and Systems, Faculty of Computer Science, Universidade da Coru\u00f1a, A Coru\u00f1a 15071, Spain"}]}],"member":"1968","published-online":{"date-parts":[[2016,10,5]]},"reference":[{"key":"ref_1","unstructured":"Lee, H., Yoo, S., and Kim, Y.W. (February, January 31). An energy management framework for smart factory based on context-awareness. Proceedings of the 18th International Conference on Advanced Communication Technology (ICACT), Pyeongchang, Korea."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"742","DOI":"10.1109\/TKDE.2010.136","article-title":"RFID data processing in supply chain management using a path encoding scheme","volume":"23","author":"Lee","year":"2011","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"ref_3","unstructured":"Manyika, J., Chui, M., Bisson, P., Woetzel, J., Dobbs, R., Bughin, J., and Aharon, D. (2015). The Internet of Things: Mapping the Value beyond the Hype, McKinsey Global Institute. Technical Report."},{"key":"ref_4","unstructured":"Ericsson (2015). Ericsson Mobility Report on the Pulse of the Networked Society, Ericsson. Technical Report."},{"key":"ref_5","unstructured":"Business Insider (BI) Intelligence (2015). The Internet of Things: Examining How the IoT Will Affect the World, Business Insider. Technical Report."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1109\/JIOT.2014.2306328","article-title":"Internet of things for smart cities","volume":"1","author":"Zanella","year":"2014","journal-title":"IEEE Internet Things J."},{"key":"ref_7","unstructured":"Vermesan, O., and Friess, P. (2014). IoT\u2014From Research and Innovation to Market Deployment, River Publishers."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Takanokura, M., Matsui, M., and Tang, H. (2014, January 28\u201330). Energy management with battery system for smart city. Proceedings of the 33rd Chinese Control Conference (CCC), Nanjing, China.","DOI":"10.1109\/ChiCC.2014.6896373"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1109\/ACCESS.2015.2416657","article-title":"Toward social internet of vehicles: Concept, architecture, and applications","volume":"3","author":"Alam","year":"2015","journal-title":"IEEE Access"},{"key":"ref_10","unstructured":"Zheng, D., and Carter, W.A. (2015). Leveraging the IoT for a more Efficient and Effective Military, Rowman & Littlefield. Technical Report."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"2347","DOI":"10.1109\/COMST.2015.2444095","article-title":"Internet of things: A survey on enabling technologies, protocols, and applications","volume":"17","author":"Guizani","year":"2015","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"1497","DOI":"10.1016\/j.adhoc.2012.02.016","article-title":"Internet of things: Vision, applications and research challenges","volume":"10","author":"Miorandi","year":"2012","journal-title":"Ad Hoc Netw."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","article-title":"The internet of things: A survey","volume":"54","author":"Atzori","year":"2010","journal-title":"Comput. Netw."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1109\/MWC.2010.5675779","article-title":"The Internet of nano-things","volume":"17","author":"Akyildiz","year":"2010","journal-title":"IEEE Wirel. Commun."},{"key":"ref_15","unstructured":"International Telecommunication Union Radiocommunication Sector (ITU-R) (2015). Radiocommunication Objectives and Requirements for Public Protection and Disaster Relief (PPDR), ITU. Technical Report ITU-R M.2377-0 (07\/2015)."},{"key":"ref_16","unstructured":"TETRA Association (2010). Public Safety Mobile Broadband and Spectrum Needs,16395-94, Analysis Mason, Analysis Mason Limited. Technical Report."},{"key":"ref_17","unstructured":"TETRA Critical Communications Association (TCCA) (2013). The Strategic Case for Mission Critical Mobile Broadband: A Review of the Future Needs of the Users of Critical Communications, TCCA. Technical Report."},{"key":"ref_18","unstructured":"European Telecommunications Standards Institute (ETSI) (2010). Emergency Communications (EMTEL); Requirements for Communications from Authorities\/Organizations to Individuals, Groups or the General Public During Emergencies, ETSI. Technical Report ETSI TS 102 182-V1.4.1."},{"key":"ref_19","unstructured":"Telecommunications Industry Association (TIA) (2013). APCO Project 25 Statement of Requirements (P25 SoR), TIA. Technical Report."},{"key":"ref_20","unstructured":"Office of Emergency Communications (2016). Fiscal Year 2016 SAFECOM Guidance on Emergency Communications Grants (SAFECOM Guidance)."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1109\/MCOM.2011.5681013","article-title":"Considerations and suggestions on improvement of communication network disaster countermeasures after the Wenchuan earthquake","volume":"49","author":"Ran","year":"2011","journal-title":"IEEE Commun. Mag."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/MCOM.2006.1580931","article-title":"Evolving public safety communication systems by integrating WLAN and TETRA networks","volume":"44","author":"Salkintzis","year":"2006","journal-title":"IEEE Commun. Mag."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/MVT.2013.2252273","article-title":"Public safety mobile broadband: A techno-economic perspective","volume":"8","author":"Ferrus","year":"2013","journal-title":"IEEE Veh. Technol. Mag."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Hasan, M.S., LaMacchia, M., Muzzelo, L., Gunsaulis, R., Housewright, L.R., and Miller, J. (2007, January 29\u201331). Designing the joint tactical radio system (JTRS) handheld, manpack, and small form fit (HMS) radios for interoperable networking and waveform applications. Proceedings of the IEEE Military Communications Conference, Orlando, FL, USA.","DOI":"10.1109\/MILCOM.2007.4455121"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"619","DOI":"10.1109\/SURV.2013.082713.00034","article-title":"Survey of wireless communication technologies for public safety","volume":"16","author":"Baldini","year":"2014","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/MCOM.2016.7432142","article-title":"Toward moving public safety networks","volume":"54","author":"Favraud","year":"2016","journal-title":"IEEE Commun. Mag."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/MCOM.2016.7452262","article-title":"Public safety networks evolution toward broadband: Sharing infrastructures and spectrum with commercial systems","volume":"54","author":"Fantacci","year":"2016","journal-title":"IEEE Commun. Mag."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"1649","DOI":"10.1109\/ACCESS.2015.2479855","article-title":"A software-defined device-to-device communication architecture for public safety applications in 5G networks","volume":"3","author":"Usman","year":"2015","journal-title":"IEEE Access"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Chudzikiewicz, J., Furtak, J., and Zielinski, Z. (2015, January 12\u201314). Fault-tolerant techniques for the Internet of Military Things. Proceedings of the IEEE 2nd World Forum on Internet of Things (WF-IoT), Milan, Italy.","DOI":"10.1109\/WF-IoT.2015.7389104"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Yushi, L., Fei, J., and Hui, Y. (2012, January 25\u201327). Study on application modes of military Internet of Things (MIOT). Proceedings of the IEEE International Conference on Computer Science and Automation Engineering (CSAE), Zhangjiajie, China.","DOI":"10.1109\/CSAE.2012.6273031"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1109\/MCOM.2016.7452265","article-title":"Cloud-centric multi-level authentication as a service for secure public safety device networks","volume":"54","author":"Butun","year":"2016","journal-title":"IEEE Commun. Mag."},{"key":"ref_32","unstructured":"Zheng, D., and Carter, W.A. (2015). The Internet of Things for Defense, Wind River Systems. Technical Report."},{"key":"ref_33","unstructured":"Mariani, J., Williams, B., and Loubert, B. (2015). Continuing the March: The Past, Present, and Future of the IoT in the Military, Deloitte University Press. Technical Report."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Suri, N., Tortonesi, M., Michaelis, J., Budulas, P., Benincasa, G., Russell, S., Stefanelli, C., and Winkler, R. (2016, January 23\u201324). Analyzing the applicability of internet of things to the battlefield environment. Proceedings of the International Conference on Military Communications and Information Systems (ICMCIS), Brussels, Belgium.","DOI":"10.1109\/ICMCIS.2016.7496574"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Wrona, K. (2015, January 12\u201314). Securing the Internet of Things a military perspective. Proceedings of the IEEE 2nd World Forum on Internet of Things (WF-IoT), Milan, Italy.","DOI":"10.1109\/WF-IoT.2015.7389105"},{"key":"ref_36","first-page":"347","article-title":"Security threats recognition and countermeasures on smart battlefield environment based on IoT","volume":"9","author":"Eom","year":"2015","journal-title":"Int. J. Secur. Appl."},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Alqassem, I., and Svetinovic, D. (2014, January 9\u201312). A taxonomy of security and privacy requirements for the Internet of Things (IoT). Proceedings of the IEEE International Conference on Industrial Engineering and Engineering Management, Bandar Sunway, Malaysia.","DOI":"10.1109\/IEEM.2014.7058837"},{"key":"ref_38","unstructured":"Trusted Computing Group, Guidance for Securing IoT Using TCG Technology, Version 1.0, Revision 21. Available online: http:\/\/www.trustedcomputinggroup.org\/wp-content\/uploads\/TCG_Guidance_for_Securing_IoT_1_0r21.pdf."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Tunnell, H.D. (2015, January 26\u201328). The U.S. Army and network-centric warfare a thematic analysis of the literature. Proceedings of the Military Communications Conference, Tampa, FL, USA.","DOI":"10.1109\/MILCOM.2015.7357558"},{"key":"ref_40","first-page":"43","article-title":"Network-centric warfare and the data-information-knowledge-wisdom hierarchy","volume":"92","author":"Tunnell","year":"2014","journal-title":"Mil. Rev."},{"key":"ref_41","unstructured":"Telogis. Available online: https:\/\/www.telogis.com\/gm."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"1595","DOI":"10.3390\/s16101595","article-title":"Home Automation System Based on Intelligent Transducer Enablers","volume":"16","author":"Dapena","year":"2016","journal-title":"Sensors"},{"key":"ref_43","first-page":"214805","article-title":"An intelligent power outlet system for the smart home of the Internet of Things","volume":"2015","year":"2015","journal-title":"Int. J. Distrib. Sensor Netw."},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Misbahuddin, S., Zubairi, J.A., Saggaf, A., Basuni, J., A-Wadany, S., and Al-Sofi, A. (2015, January 21\u201323). IoT based dynamic road traffic management for smart cities. Proceedings of the 12th International Conference on High-Capacity Optical Networks and Enabling\/Emerging Technologies (HONET), Islamabad, Pakistan.","DOI":"10.1109\/HONET.2015.7395434"},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Zhou, W., Saha, D., and Rangarajan, S. (2015, January 6\u201310). A system architecture to aggregate video surveillance data in Smart Cities. Proceedings of the IEEE Global Communications Conference (GLOBECOM), San Diego, CA, USA.","DOI":"10.1109\/GLOCOM.2015.7417602"},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Boubrima, A., Matigot, F., Bechkit, W., Rivano, H., and Ruas, A. (2015, January 3\u20136). Optimal deployment of wireless sensor networks for air pollution monitoring. Proceedings of the 24th International Conference on Computer Communication and Networks (ICCCN), Las Vegas, NV, USA.","DOI":"10.1109\/ICCCN.2015.7288443"},{"key":"ref_47","unstructured":"Statement of General Norton A Schwartz, USAF Commander, United States Transportation Command. Available online: http:\/\/www.dod.mil\/dodgc\/olc\/docs\/testSchwartz080312.pdf."},{"key":"ref_48","unstructured":"Rio Tinto, Rio Tinto Mine of the Future, Next-Generation Mining: People and Technology Working Together. Available online: http:\/\/www.riotinto.com\/documents\/Mine_of_The_Future_Brochure.pdf."},{"key":"ref_49","unstructured":"RERUM: REliable, Resilient and SecUre IoT for sMart City Applications. Available online: https:\/\/ict-rerum.eu."},{"key":"ref_50","unstructured":"RELYonIt: Research by Experimentation for Dependability on the Internet of Things. Available online: http:\/\/relyonit.eu."},{"key":"ref_51","unstructured":"FIESTA-IoT: Federated Interoperable Semantic IoT Testbeds and Applications. Available online: http:\/\/fiesta-iot.eu."},{"key":"ref_52","unstructured":"BIG IoT: Bridging the Interoperability Gap of the Internet of Things. Available online: http:\/\/big-iot.eu."},{"key":"ref_53","unstructured":"BloTope: Building an IoT Open Innovation Ecosystem for Connected Smart Objects. Available online: http:\/\/biotope.cs.hut.fi\/index.php\/partners."},{"key":"ref_54","unstructured":"METIS II. Available online: https:\/\/metis-ii.5g-ppp.eu\/about-metis\/."},{"key":"ref_55","unstructured":"Li, F., Qanbari, S., V\u00f6gler, M., and Dustdar, S. (2015). Green in Software Engineering, Springer International Publishing."},{"key":"ref_56","unstructured":"Aegis Combat System. Available online: http:\/\/www.lockheedmartin.com\/us\/products\/aegis.html."},{"key":"ref_57","unstructured":"Tomahawk Land Attack Missile (TLAM). Available online: http:\/\/www.navair.navy.mil\/index.cfm?fuseaction=home.display&key=F4E98B0F-33F5-413B-9FAE-8B8F7C5F0766."},{"key":"ref_58","unstructured":"Calhoun, G.L., and Draper, M.H. (2015). Handbook of Unmanned Aerial Vehicles, Springer."},{"key":"ref_59","unstructured":"Meunier, F., Wood, A., Weiss, K., Huberty, K., Flannery, S., Moore, J., Hettenbach, C., and Lu, B. (2014). The Internet of Things Is Now: Connecting the Real Economy, Morgan Stanley Research. Technical Report."},{"key":"ref_60","doi-asserted-by":"crossref","unstructured":"Wang, P., Ali, A., and Kelly, W. (2015, January 5\u20137). Data security and threat modeling for smart city infrastructure. Proceedings of the International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC), Shanghai, China.","DOI":"10.1109\/SSIC.2015.7245322"},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1109\/MITP.2015.89","article-title":"Wearable computing for the internet of things","volume":"17","author":"Cirani","year":"2015","journal-title":"IT Prof."},{"key":"ref_62","doi-asserted-by":"crossref","unstructured":"Catherwood, P.A., Finlay, D.D., and McLaughlin, J.A.D. (2015, January 11\u201312). Subcutaneous body area networks: A SWOT analysis. Proceedings of the IEEE International Symposium on Technology and Society (ISTAS), Dublin, Ireland.","DOI":"10.1109\/ISTAS.2015.7439414"},{"key":"ref_63","first-page":"84","article-title":"Sports tech\u2014Fitness trackers","volume":"10","author":"Alderson","year":"2015","journal-title":"Eng. Technol."},{"key":"ref_64","first-page":"91","article-title":"Ethics and the enhanced soldier of the near future","volume":"95","author":"Shunk","year":"2015","journal-title":"Mil. Rev."},{"key":"ref_65","unstructured":"Instrumented-Multiple Integrated Laser Engagement System (I-MILES). Available online: https:\/\/www.cubic.com\/Global-Defense\/Training-Systems-and-Solutions\/Ground-Combat-Training\/Multiple-Integrated-Laser-Engagement-System."},{"key":"ref_66","doi-asserted-by":"crossref","unstructured":"Preece, A., Pizzocaro, D., Borowiecki, K., de Mel, G., Gomez, M., Vasconcelos, W., Bar-Noy, A., Johnson, M.P., Porta, T.L., and Rowaihy, H. (2008, January 16\u201319). Reasoning and resource allocation for sensor-mission assignment in a coalition context. Proceedings of the IEEE Military Communications Conference, San Diego, CA, USA.","DOI":"10.1109\/MILCOM.2008.4753114"},{"key":"ref_67","doi-asserted-by":"crossref","first-page":"3733","DOI":"10.1109\/JSEN.2013.2262677","article-title":"Sensing as a service: Challenges, solutions and future directions","volume":"13","author":"Sheng","year":"2013","journal-title":"IEEE Sens. J."},{"key":"ref_68","doi-asserted-by":"crossref","first-page":"370","DOI":"10.1109\/JIOT.2015.2409151","article-title":"A survey of incentive techniques for mobile crowd sensing","volume":"2","author":"Jaimes","year":"2015","journal-title":"IEEE Internet Things J."},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1109\/MITP.2014.76","article-title":"Securing BYOD","volume":"16","author":"Chang","year":"2014","journal-title":"IT Prof."},{"key":"ref_70","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1109\/SURV.2010.021510.00088","article-title":"Outlier detection techniques for wireless sensor networks: A survey","volume":"12","author":"Zhang","year":"2010","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_71","doi-asserted-by":"crossref","first-page":"360","DOI":"10.1109\/JIOT.2014.2337886","article-title":"Trustworthy sensing for public safety in cloud-centric internet of things","volume":"1","author":"Kantarci","year":"2014","journal-title":"IEEE Internet Things J."},{"key":"ref_72","unstructured":"U.S. Department of Defense (2015). Annual Energy Management Report."},{"key":"ref_73","doi-asserted-by":"crossref","unstructured":"Fraga-Lamas, P., Castedo-Ribas, L., Morales-M\u00e9ndez, A., and Camas-Albar, J.M. (2016, January 23\u201324). Evolving military broadband wireless communication systems: WiMAX, LTE and WLAN. Proceedings of the International Conference on Military Communications and Information Systems (ICMCIS), Brussels, Belgium.","DOI":"10.1109\/ICMCIS.2016.7496570"},{"key":"ref_74","unstructured":"OMA Lightweight M2M. Available online: http:\/\/technical.openmobilealliance.org\/Technical\/technical-information\/release-program\/current-releases\/oma-lightweightm2m-v1-0."},{"key":"ref_75","unstructured":"Perelman, V., Sch\u00f6nw\u00e4lder, J., Ersue, M., and Watsen, K. (2012). Network configuration protocol for constrained devices (NETCONF Light). IETF Draft, Available online: https:\/\/tools.ietf.org\/html\/draft-schoenw-netconf-light-01."},{"key":"ref_76","unstructured":"Abeele, F.V., Hoebeke, J., Moerman, I., and Demeester, P. (2014, January 5\u20138). Fine-grained management of CoAP interactions with constrained IoT devices. Proceedings of the IEEE Network Operations and Management Symposium (NOMS), Krakow, Poland."},{"key":"ref_77","unstructured":"OMA Device Management Working Group. Available online: http:\/\/openmobilealliance.org\/about-oma\/work-program\/device-management\/."},{"key":"ref_78","unstructured":"Program Executive Office Soldier, Portfolio 2014\u2014The Soldier: Our Strength and Purpose. Available online: http:\/\/www.peosoldier.army.mil\/portfolio\/."},{"key":"ref_79","unstructured":"U.S. Air Force: Programmers Earn Award for Innovative Tablet App. Available online: http:\/\/www.af.mil\/News\/ArticleDisplay\/tabid\/223\/Article\/518660\/programmers-earn-award-for-innovative-tablet-app.aspx."},{"key":"ref_80","doi-asserted-by":"crossref","unstructured":"Mitchell, P.T. (2009). Network Centric Warfare and Coalition Operations\u2014The New Military Operating System, Routledge. [1st ed.].","DOI":"10.4324\/9780203881163"},{"key":"ref_81","unstructured":"Janes.com, U.S. Harris Corporation Readies New Tactical Radios for US Special Forces. Available online: http:\/\/www.janes.com\/article\/60812\/harris-corporation-readies-new-tactical-radios-for-us-special-forces."},{"key":"ref_82","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/MNET.2015.7113223","article-title":"Toward a software-based network: Integrating software defined networking and network function virtualization","volume":"29","author":"Wood","year":"2015","journal-title":"IEEE Netw."},{"key":"ref_83","unstructured":"Openstack. Available online: https:\/\/www.openstack.org."},{"key":"ref_84","doi-asserted-by":"crossref","unstructured":"Redi, J., and Ramanathan, R. (2011, January 7\u201310). The DARPA WNaN network architecture. Proceedings of the Military Communications Conference, Baltimore, MD, USA.","DOI":"10.1109\/MILCOM.2011.6127657"},{"key":"ref_85","doi-asserted-by":"crossref","unstructured":"Salmanian, M., Brown, J.D., Watson, S., Song, R., Tang, H., and Simmelink, D. (2015, January 26\u201328). An architecture for secure interoperability between coalition tactical MANETs. Proceedings of the Military Communications Conference, Tampa, FL, USA.","DOI":"10.1109\/MILCOM.2015.7357415"},{"key":"ref_86","doi-asserted-by":"crossref","unstructured":"Nguyen, M.T., and Teague, K.A. (2015, January 26\u201328). Compressive and cooperative sensing in distributed mobile sensor networks. Proceedings of the Military Communications Conference, Tampa, FL, USA.","DOI":"10.1109\/MILCOM.2015.7357581"},{"key":"ref_87","doi-asserted-by":"crossref","unstructured":"Ward, J.R., and Younis, M. (2015, January 26\u201328). A cross-layer defense scheme for countering traffic analysis attacks in Wireless Sensor Networks. Proceedings of the Military Communications Conference, Tampa, FL, USA.","DOI":"10.1109\/MILCOM.2015.7357571"},{"key":"ref_88","doi-asserted-by":"crossref","unstructured":"Amdouni, I., Adjih, C., and Plesse, T. (2015, January 18\u201319). Network coding in military wireless ad hoc and sensor networks: Experimentation with GardiNet. Proceedings of the International Conference on Military Communications and Information Systems (ICMCIS), Cracow, Poland.","DOI":"10.1109\/ICMCIS.2015.7158701"},{"key":"ref_89","doi-asserted-by":"crossref","first-page":"2002","DOI":"10.1109\/TC.2013.85","article-title":"Opportunistic sensing in wireless sensor networks: Theory and application","volume":"63","author":"Liang","year":"2014","journal-title":"IEEE Trans. Comput."},{"key":"ref_90","doi-asserted-by":"crossref","unstructured":"Zambrano, A., Perez, I., Palau, C., and Esteve, M. (2014, January 24\u201328). Quake detection system using smartphone-based wireless sensor network for early warning. Proceedings of the 2014 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), Budapest, Hungary.","DOI":"10.1109\/PerComW.2014.6815221"},{"key":"ref_91","doi-asserted-by":"crossref","unstructured":"Beal, J., Usbeck, K., Loyall, J., and Metzler, J. (2016, January 26\u201328). Opportunistic sharing of airborne sensors. Proceedings of the 2016 International Conference on Distributed Computing in Sensor Systems (DCOSS), Washington, DC, USA.","DOI":"10.1109\/DCOSS.2016.43"},{"key":"ref_92","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1109\/MCOM.2014.6871666","article-title":"Opportunities in mobile crowd sensing","volume":"52","author":"Ma","year":"2014","journal-title":"IEEE Commun. Mag."},{"key":"ref_93","doi-asserted-by":"crossref","unstructured":"Ganz, F., Li, R., Barnaghi, P., and Harai, H. (2012, January 20\u201323). A resource mobility scheme for service-continuity in the internet of things. Proceedings of the IEEE International Conference on Green Computing and Communications (GreenCom), Besan\u00e7on, France.","DOI":"10.1109\/GreenCom.2012.48"},{"key":"ref_94","doi-asserted-by":"crossref","first-page":"1296","DOI":"10.1109\/TVT.2013.2284596","article-title":"Group mobility management for large-scale machine-to-machine mobile networking","volume":"63","author":"Fu","year":"2014","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_95","doi-asserted-by":"crossref","first-page":"437","DOI":"10.1007\/s00500-011-0728-x","article-title":"Bio-inspired group mobility model for mobile ad hoc networks based on bird-flocking behavior","volume":"16","author":"Misra","year":"2012","journal-title":"Soft Comput."},{"key":"ref_96","doi-asserted-by":"crossref","unstructured":"Pi\u00f1ol, O.P., Raza, S., Eriksson, J., and Voigt, T. (2015, January 26\u201329). BSD-based elliptic curve cryptography for the open Internet of Things. Proceedings of the 7th International Conference on New Technologies, Mobility and Security (NTMS), Paris, France.","DOI":"10.1109\/NTMS.2015.7266475"},{"key":"ref_97","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1109\/LWC.2015.2408609","article-title":"Security and privacy in the internet-of-things under time-and-budget-limited adversary model","volume":"4","author":"Premnath","year":"2015","journal-title":"IEEE Wirel. Commun. Lett."},{"key":"ref_98","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1109\/COMST.2014.2381246","article-title":"Context-awareness for mobile sensing: A survey and future directions","volume":"18","author":"Liu","year":"2016","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_99","unstructured":"Etefia, B., Gerla, M., and Zhang, L. (November, January 29). Supporting military communications with Named Data Networking: An emulation analysis. Proceedings of the IEEE Military Communications Conference, Orlando, FL, USA."},{"key":"ref_100","doi-asserted-by":"crossref","unstructured":"Fongen, A., and Mancini, F. (2015, January 12\u201314). Integrity attestation in military IoT. Proceedings of the IEEE 2nd World Forum on Internet of Things (WF-IoT), Milan, Italy.","DOI":"10.1109\/WF-IoT.2015.7389102"},{"key":"ref_101","unstructured":"Defense Information Systems Agency (DISA) for Department of Defense (DoD) (2016). Cloud Computing Security Requirements Guide."},{"key":"ref_102","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1109\/JIOT.2015.2411227","article-title":"A practical evaluation of information processing and abstraction techniques for the internet of things","volume":"2","author":"Ganz","year":"2015","journal-title":"IEEE Internet Things J."},{"key":"ref_103","doi-asserted-by":"crossref","unstructured":"\u00c1lvarez, J.L., Rice, M., Samson, J.R., and Koets, M.A. (2016, January 4\u201311). Increasing the capability of CubeSat-based software-defined radio applications. Proceedings of the IEEE Aerospace Conference, Big Sky, MT, USA.","DOI":"10.1109\/AERO.2016.7500847"},{"key":"ref_104","unstructured":"U.S. Department of Defense (2016). Program Acquisition Cost by Weapon System."},{"key":"ref_105","unstructured":"U.S. Department of Defense (2013). Unmanned Systems Integrated Roadmap FY2013\u20132038."},{"key":"ref_106","doi-asserted-by":"crossref","unstructured":"Macedo, D., Guedes, L.A., and Silva, I. (2014, January 7\u20139). A dependability evaluation for Internet of Things incorporating redundancy aspects. Proceedings of the IEEE 11th International Conference on Networking, Sensing and Control (ICNSC), Miami, FL, USA.","DOI":"10.1109\/ICNSC.2014.6819662"},{"key":"ref_107","doi-asserted-by":"crossref","unstructured":"Maalel, N., Natalizio, E., Bouabdallah, A., Roux, P., and Kellil, M. (2013, January 20\u201323). Reliability for emergency applications in internet of things. Proceedings of the IEEE International Conference on Distributed Computing in Sensor Systems, Cambridge, MA, USA.","DOI":"10.1109\/DCOSS.2013.40"},{"key":"ref_108","doi-asserted-by":"crossref","unstructured":"Li, L., Jin, Z., Li, G., Zheng, L., and Wei, Q. (2012, January 24\u201329). Modeling and analyzing the reliability and cost of service composition in the IoT: A probabilistic approach. Proceedings of the IEEE 19th International Conference on Web Services (ICWS), Honolulu, HI, USA.","DOI":"10.1109\/ICWS.2012.25"},{"key":"ref_109","doi-asserted-by":"crossref","first-page":"1239","DOI":"10.1109\/COMST.2015.2420686","article-title":"Markov decision processes with applications in wireless sensor networks: A survey","volume":"17","author":"Alsheikh","year":"2015","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_110","unstructured":"Defense Information Systems Agency (DISA) (2014). Enabling the Joint Information Environment (JIE), Shaping the Enterprise for the Conflicts of Tomorrow."},{"key":"ref_111","unstructured":"Lockheed Martin, Lockheed Martin-Led Team Demonstrates Interoperability with Legacy and Stealth Fighters Using Open Systems Architecture. Available online: http:\/\/www.lockheedmartin.com\/us\/news\/press-releases\/2014\/march\/140307ae_lockheed-martin-demonstrates-interoperability.html."},{"key":"ref_112","unstructured":"U.S. Army CERDEC (Communications-Electronics Research, Development and Engineering Center) NVESD. Available online: http:\/\/www.cerdec.army.mil\/inside_cerdec\/."},{"key":"ref_113","doi-asserted-by":"crossref","unstructured":"Kr\u010do, S., Pokri\u0107, B., and Carrez, F. (2014, January 6\u20138). Designing IoT architecture(s): A European perspective. Proceedings of the IEEE World Forum on Internet of Things (WF-IoT), Seoul, Korea.","DOI":"10.1109\/WF-IoT.2014.6803124"},{"key":"ref_114","unstructured":"EU FP7 Internet of Things Architecture Project. Available online: http:\/\/www.iot-a.eu\/public."},{"key":"ref_115","unstructured":"Docking, M., Uzunov, A.V., Fiddyment, C., Brain, R., Hewett, S., and Blucher, L. (October, January 28). UNISON: Towards a middleware architecture for autonomous cyber defence. Proceedings of the 24th Australasian Software Engineering Conference (ASWEC), Adelaide, Australia."},{"key":"ref_116","doi-asserted-by":"crossref","unstructured":"Cameron, A., Stumptner, M., Nandagopal, N., Mayer, W., and Mansell, T. (2013, January 12\u201314). A rule-based platform for distributed real-time SOA with application in defence systems. Proceedings of the Military Communications and Information Systems Conference (MilCIS), Canberra, Australia.","DOI":"10.1109\/MilCIS.2013.6694494"},{"key":"ref_117","unstructured":"Yang, Z., Yue, Y., Yang, Y., Peng, Y., Wang, X., and Liu, W. (2011, January 26\u201328). Study and application on the architecture and key technologies for IOT. Proceedings of the International Conference on Multimedia Technology (ICMT), Hangzhou, China."},{"key":"ref_118","doi-asserted-by":"crossref","unstructured":"Chaqfeh, M.A., and Mohamed, N. (2012, January 21\u201325). Challenges in middleware solutions for the internet of things. Proceedings of the International Conference on Collaboration Technologies and Systems (CTS), Denver, CO, USA.","DOI":"10.1109\/CTS.2012.6261022"},{"key":"ref_119","unstructured":"Wu, M., Lu, T.J., Ling, F.Y., Sun, J., and Du, H.Y. (2010, January 20\u201322). Research on the architecture of Internet of Things. Proceedings of the 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE), Chengdu, China."},{"key":"ref_120","doi-asserted-by":"crossref","unstructured":"Sarkar, C., Nambi, S.N.A.U., Prasad, R.V., and Rahim, A. (2014, January 6\u20138). A scalable distributed architecture towards unifying IoT applications. Proceedings of the IEEE World Forum on Internet of Things (WF-IoT), Seoul, Korea.","DOI":"10.1109\/WF-IoT.2014.6803220"},{"key":"ref_121","unstructured":"Powers, B. (August, January 28). A Multi-agent Architecture for NATO Network Enabled Capabilities: Enabling Semantic Interoperability in Dynamic Environments (NC3A RD-2376). Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, Turku, Finland."},{"key":"ref_122","unstructured":"ASSIST Database. Available online: http:\/\/quicksearch.dla.mil\/."},{"key":"ref_123","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1109\/MCOM.2015.7263375","article-title":"Toward better horizontal integration among IoT services","volume":"53","author":"Khreishah","year":"2015","journal-title":"IEEE Commun. Mag."},{"key":"ref_124","doi-asserted-by":"crossref","unstructured":"Ranasinghe, C.D., Sheng, Z.Q., and Zeadally, S. (2011). Unique Radio Innovation for the 21st Century: Building Scalable and Global RFID Networks, Springer.","DOI":"10.1007\/978-3-642-03462-6"},{"key":"ref_125","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/SURV.2013.102213.00229","article-title":"Service discovery protocols for constrained machine-to-machine communications","volume":"16","author":"Villaverde","year":"2014","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_126","unstructured":"Institute of Electrical and Electronics Engineers (IEEE) (2012). IEEE Standard for Information Technology\u2014Telecommunications and Information Exchange between Systems Local and Metropolitan Area Networks\u2013Specific Requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE. IEEE Std 802.11-2012 (Revision of IEEE Std 802.11-2007)."},{"key":"ref_127","doi-asserted-by":"crossref","unstructured":"Olyaei, B.B., Pirskanen, J., Raeesi, O., Hazmi, A., and Valkama, M. (2013, January 7\u20139). Performance comparison between slotted IEEE 802.15.4 and IEEE 802.11ah in IoT based applications. Proceedings of the IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Lyon, France.","DOI":"10.1109\/WiMOB.2013.6673381"},{"key":"ref_128","unstructured":"Institute of Electrical and Electronics Engineers (IEEE) (2012). IEEE Standard for Air Interface for Broadband Wireless Access Systems, IEEE. IEEE Std 802.16-2012 (Revision of IEEE Std 802.16-2009)."},{"key":"ref_129","unstructured":"Institute of Electrical and Electronics Engineers (IEEE) (2011). IEEE Standard for Local and Metropolitan Area Networks Part 16: Air Interface for Broadband Wireless Access Systems Amendment 3: Advanced Air Interface, IEEE. IEEE Std 802.16m-2011(Amendment to IEEE Std 802.16-2009)."},{"key":"ref_130","unstructured":"European Telecommunications Standards Institute (ETSI)\u2014Third Generation Partnership Project (3GPP) LTE Specifications. Available online: http:\/\/www.3gpp.org\/technologies\/keywords-acronyms\/98-lte."},{"key":"ref_131","doi-asserted-by":"crossref","first-page":"1250","DOI":"10.1109\/TASE.2013.2295394","article-title":"Performance Analysis of RFID Protocols: CDMA Versus the Standard EPC Gen-2","volume":"11","author":"Vahedi","year":"2014","journal-title":"IEEE Trans. Autom. Sci. Eng."},{"key":"ref_132","unstructured":"Open Automotive Alliance. Available online: http:\/\/www.openautoalliance.net."},{"key":"ref_133","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1109\/SURV.2013.103013.00206","article-title":"Data mining for internet of things: A survey","volume":"16","author":"Tsai","year":"2014","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_134","unstructured":"U.S. Department of Defense (2015). Updated Guidance on the Acquisition and Use of Commercial Cloud Computing Services."},{"key":"ref_135","unstructured":"MilCloud. Available online: http:\/\/www.disa.mil\/computing\/cloud-services\/milcloud."},{"key":"ref_136","unstructured":"Xu, X., Huang, S., Chen, Y., Browny, K., Halilovicy, I., and Lu, W. (July, January 27). TSAaaS: Time series analytics as a service on IoT. Proceedings of the IEEE International Conference on Web Services (ICWS), Anchorage, AK, USA."},{"key":"ref_137","unstructured":"AWS IoT. Available online: http:\/\/aws.amazon.com\/iot\/."},{"key":"ref_138","unstructured":"Nextgov, CIA is Bringing Amazon\u2019s Marketplace to the Intelligence Community. Available online: http:\/\/www.nextgov.com\/cloud-computing\/2015\/02\/cia-bringing-amazons-marketplace-intelligence-community\/104937\/."},{"key":"ref_139","unstructured":"Bluemix IoT Solutions. Available online: https:\/\/www.ibm.com\/cloud-computing\/bluemix\/solutions\/iot\/."},{"key":"ref_140","unstructured":"Xively. Available online: https:\/\/www.xively.com\/."},{"key":"ref_141","doi-asserted-by":"crossref","unstructured":"Verma, D.C., and Verma, P. (2014). Techniques for Surviving Mobile Data Explosion, Wiley-IEEE Press. [1st ed.].","DOI":"10.1002\/9781118834404"},{"key":"ref_142","unstructured":"Nimbits. Available online: http:\/\/bsautner.github.io\/com.nimbits\/."},{"key":"ref_143","doi-asserted-by":"crossref","unstructured":"Mazhelis, O., and Tyrv\u00e4inen, P. (2014, January 6\u20138). A framework for evaluating Internet-of-Things platforms: Application provider viewpoint. Proceedings of the IEEE World Forum on Internet of Things (WF-IoT), Seoul, Korea.","DOI":"10.1109\/WF-IoT.2014.6803137"},{"key":"ref_144","first-page":"1","article-title":"A scalable framework for provisioning large-scale IoT deployments","volume":"16","author":"Schleicher","year":"2015","journal-title":"ACM Trans. Internet Technol."},{"key":"ref_145","doi-asserted-by":"crossref","unstructured":"Reddy, J.M., and Monika, J.M. (2012, January 10\u201316). Integrate military with distributed cloud computing and secure virtualization. Proceedings of the 2012 SC Companion: High Performance Computing, Networking, Storage and Analysis (SCC), Salt Lake City, UT, USA.","DOI":"10.1109\/SC.Companion.2012.145"},{"key":"ref_146","doi-asserted-by":"crossref","first-page":"1265","DOI":"10.1109\/TIFS.2016.2523941","article-title":"An efficient file hierarchy attribute-based encryption scheme in cloud computing","volume":"11","author":"Wang","year":"2016","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_147","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/MPRV.2013.77","article-title":"The role of cloudlets in hostile environments","volume":"12","author":"Satyanarayanan","year":"2013","journal-title":"IEEE Pervasive Comput."},{"key":"ref_148","doi-asserted-by":"crossref","first-page":"1729","DOI":"10.1109\/ACCESS.2015.2482981","article-title":"Distributed parameter estimation for mobile wireless sensor network based on cloud computing in battlefield surveillance system","volume":"3","author":"Wan","year":"2015","journal-title":"IEEE Access"},{"key":"ref_149","doi-asserted-by":"crossref","unstructured":"Fox, G.C., Kamburugamuve, S., and Hartman, R.D. (2012, January 21\u201325). Architecture and measured characteristics of a cloud based internet of things. Proceedings of the International Conference on Collaboration Technologies and Systems (CTS), Denver, CO, USA.","DOI":"10.1109\/CTS.2012.6261020"},{"key":"ref_150","unstructured":"Chang, H., Hari, A., Mukherjee, S., and Lakshman, T.V. (May, January 27). Bringing the cloud to the edge. Proceedings of the IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Toronto, ON, Canada."},{"key":"ref_151","unstructured":"Ponte: Connecting Things to Developers. Available online: http:\/\/www.eclipse.org\/ponte\/."},{"key":"ref_152","unstructured":"Kura: OSGI-Based Application Framework for M2M Service Gateways. Available online: http:\/\/www.eclipse.org\/proposals\/technology.kura."},{"key":"ref_153","unstructured":"Scada. Available online: http:\/\/www.eclipse.org\/proposals\/technology.eclipsescada\/."},{"key":"ref_154","unstructured":"Krikkit. Available online: http:\/\/www.eclipse.org\/proposals\/technology.krikkit\/."},{"key":"ref_155","doi-asserted-by":"crossref","unstructured":"Lin, Y.H., Wang, Q., Wang, J.S., Shao, L., and Tang, J. (2013, January 20\u201323). Wireless IoT platform based on SDR technology. Proceedings of the IEEE International Conference on Cyber, Physical and Social Computing, Beijing, China.","DOI":"10.1109\/GreenCom-iThings-CPSCom.2013.426"},{"key":"ref_156","doi-asserted-by":"crossref","unstructured":"Qin, Z., Denker, G., Giannelli, C., Bellavista, P., and Venkatasubramanian, N. (2014, January 23\u201327). A software defined networking architecture for the internet-of-things. Proceedings of the IEEE Network Operations and Management Symposium (NOMS), Krakow, Poland.","DOI":"10.1109\/NOMS.2014.6838365"},{"key":"ref_157","doi-asserted-by":"crossref","unstructured":"Celesti, A., Fazio, M., Giacobbe, M., Puliafito, A., and Villari, M. (2016, January 23\u201325). Characterizing cloud federation in IoT. Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops (WAINA), Crans-Montana, Switzerland.","DOI":"10.1109\/WAINA.2016.152"},{"key":"ref_158","unstructured":"ClouT: Cloud of Things for Empowering the Citizen Clout in Smart Cities. Call: FP7-ICT-2013- EU-Japan. Available online: http:\/\/clout-project.eu."},{"key":"ref_159","unstructured":"MUlti-cloud Secure Applications (MUSA) Project Call: H2020-ICT- 2014-1. Topic: ICT-07-2014. Available online: http:\/\/www.musa-project.eu\/."},{"key":"ref_160","doi-asserted-by":"crossref","first-page":"704","DOI":"10.1007\/s11036-015-0590-7","article-title":"Cloud-based wireless network: Virtualized, reconfigurable, smart wireless network to enable 5G technologies","volume":"20","author":"Chen","year":"2015","journal-title":"Mob. Netw. Appl."},{"key":"ref_161","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1109\/MCC.2016.15","article-title":"Cloud federation management and beyond: Requirements, relevant standards, and gaps","volume":"3","author":"Lee","year":"2016","journal-title":"IEEE Cloud Comput."},{"key":"ref_162","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/1869-0238-4-5","article-title":"An analysis of security issues for cloud computing","volume":"4","author":"Hashizume","year":"2013","journal-title":"J. Internet Serv. Appl."},{"key":"ref_163","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1109\/MCOM.2015.7060487","article-title":"Mechanisms and challenges on mobility-augmented service provisioning for mobile cloud computing","volume":"53","author":"Li","year":"2015","journal-title":"IEEE Commun. Mag."},{"key":"ref_164","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1109\/TSC.2015.2491281","article-title":"Towards achieving data security with the cloud computing adoption framework","volume":"9","author":"Chang","year":"2016","journal-title":"IEEE Trans. Serv. Comput."},{"key":"ref_165","doi-asserted-by":"crossref","unstructured":"Wei-bing, M., Wen-guang, W., Yi-fan, Z., Wei-bing, M., and Fa-yi, Y. (2014, January 20\u201321). Semantic Web services description based on command and control interaction user context. Proceedings of the 2014 IEEE 7th Joint International Information Technology and Artificial Intelligence Conference (ITAIC), Chongqing, China.","DOI":"10.1109\/ITAIC.2014.7065109"},{"key":"ref_166","unstructured":"G\u00f3mez, M., Preece, A., Johnson, M.P., de Mel, G., Vasconcelos, W., Gibson, C., Bar-Noy, A., Borowiecki, K., La Porta, T., and Pizzocaro, D. (2008). Knowledge Engineering: Practice and Patterns, Springer."},{"key":"ref_167","unstructured":"W3 PROV. Available online: https:\/\/www.w3.org\/TR\/prov-overview."},{"key":"ref_168","unstructured":"U.S. Government Accountability Office (GAO) (2015). GAO-16-88: DOD Has Addressed Most Reporting Requirements and Continues to Refine Its Asset Visibility Strategy."},{"key":"ref_169","unstructured":"U.S. Government Accountability Office (GAO) (2014). Department of Defense Fiscal Year (FY) 2015 Budget Estimates."},{"key":"ref_170","unstructured":"U.S. Government Accountability Office (GAO) (2014). F-35 Sustainment Need for Affordable Strategy, Greater Attention to Risks, and Improved Cost Estimates."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/16\/10\/1644\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T19:32:27Z","timestamp":1760211147000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/16\/10\/1644"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,5]]},"references-count":170,"journal-issue":{"issue":"10","published-online":{"date-parts":[[2016,10]]}},"alternative-id":["s16101644"],"URL":"https:\/\/doi.org\/10.3390\/s16101644","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,10,5]]}}}