{"id":"https://openalex.org/W7140117265","doi":"https://doi.org/10.1016/j.procs.2026.02.380","title":"Towards Zero-Touch Network Provisioning for Embedded Industrial IoT: A Feasibility Study on Autonomous Guest Wi-Fi Access","display_name":"Towards Zero-Touch Network Provisioning for Embedded Industrial IoT: A Feasibility Study on Autonomous Guest Wi-Fi Access","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7140117265","doi":"https://doi.org/10.1016/j.procs.2026.02.380"},"language":"en","primary_location":{"id":"doi:10.1016/j.procs.2026.02.380","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.procs.2026.02.380","pdf_url":null,"source":{"id":"https://openalex.org/S120348307","display_name":"Procedia Computer Science","issn_l":"1877-0509","issn":["1877-0509"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Procedia Computer Science","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.1016/j.procs.2026.02.380","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5130367820","display_name":"Fatih Cemil Demir","orcid":null},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Fatih Cemil Demir","raw_affiliation_strings":["Pervasive Systems, University of Twente, Drienerlolaan 5, 7522 NB Enschede"],"affiliations":[{"raw_affiliation_string":"Pervasive Systems, University of Twente, Drienerlolaan 5, 7522 NB Enschede","institution_ids":["https://openalex.org/I94624287"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5066212697","display_name":"Sabari Nathan Anbalagan","orcid":"https://orcid.org/0000-0002-9509-4497"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Sabari Nathan Anbalagan","raw_affiliation_strings":["Pervasive Systems, University of Twente, Drienerlolaan 5, 7522 NB Enschede"],"affiliations":[{"raw_affiliation_string":"Pervasive Systems, University of Twente, Drienerlolaan 5, 7522 NB Enschede","institution_ids":["https://openalex.org/I94624287"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5066212697"],"corresponding_institution_ids":["https://openalex.org/I94624287"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.77251764,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"277","issue":null,"first_page":"3444","last_page":"3452"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.27309998869895935,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.27309998869895935,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12079","display_name":"IoT Networks and Protocols","score":0.1370999962091446,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12216","display_name":"Network Time Synchronization Technologies","score":0.09889999777078629,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.6599000096321106},{"id":"https://openalex.org/keywords/provisioning","display_name":"Provisioning","score":0.5785999894142151},{"id":"https://openalex.org/keywords/automation","display_name":"Automation","score":0.49320000410079956},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.439300000667572},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.3828999996185303},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.373199999332428},{"id":"https://openalex.org/keywords/legacy-system","display_name":"Legacy system","score":0.34549999237060547},{"id":"https://openalex.org/keywords/industry-4.0","display_name":"Industry 4.0","score":0.3440999984741211}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8299000263214111},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.6599000096321106},{"id":"https://openalex.org/C172191483","wikidata":"https://www.wikidata.org/wiki/Q1071806","display_name":"Provisioning","level":2,"score":0.5785999894142151},{"id":"https://openalex.org/C115901376","wikidata":"https://www.wikidata.org/wiki/Q184199","display_name":"Automation","level":2,"score":0.49320000410079956},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.439300000667572},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4140999913215637},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.391400009393692},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.3828999996185303},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.373199999332428},{"id":"https://openalex.org/C105446022","wikidata":"https://www.wikidata.org/wiki/Q445962","display_name":"Legacy system","level":3,"score":0.34549999237060547},{"id":"https://openalex.org/C2777986313","wikidata":"https://www.wikidata.org/wiki/Q1661989","display_name":"Industry 4.0","level":2,"score":0.3440999984741211},{"id":"https://openalex.org/C173018170","wikidata":"https://www.wikidata.org/wiki/Q165678","display_name":"Microcontroller","level":2,"score":0.3391000032424927},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.3142000138759613},{"id":"https://openalex.org/C9903902","wikidata":"https://www.wikidata.org/wiki/Q3025536","display_name":"DevOps","level":3,"score":0.29789999127388},{"id":"https://openalex.org/C83931994","wikidata":"https://www.wikidata.org/wiki/Q1149653","display_name":"Building automation","level":2,"score":0.2888999879360199},{"id":"https://openalex.org/C119701452","wikidata":"https://www.wikidata.org/wiki/Q5165881","display_name":"Control reconfiguration","level":2,"score":0.2831999957561493},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.2802000045776367},{"id":"https://openalex.org/C546215728","wikidata":"https://www.wikidata.org/wiki/Q39531","display_name":"Bluetooth","level":3,"score":0.2685999870300293},{"id":"https://openalex.org/C58642233","wikidata":"https://www.wikidata.org/wiki/Q8269924","display_name":"Taxonomy (biology)","level":2,"score":0.26010000705718994},{"id":"https://openalex.org/C59201141","wikidata":"https://www.wikidata.org/wiki/Q46904","display_name":"GSM","level":2,"score":0.25209999084472656},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2515999972820282}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1016/j.procs.2026.02.380","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.procs.2026.02.380","pdf_url":null,"source":{"id":"https://openalex.org/S120348307","display_name":"Procedia Computer Science","issn_l":"1877-0509","issn":["1877-0509"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Procedia Computer Science","raw_type":"journal-article"},{"id":"pmh:oai:ris.utwente.nl:openaire/89fb0a3e-e6b1-4bef-848c-2b6787a2cb9d","is_oa":false,"landing_page_url":"https://research.utwente.nl/en/publications/89fb0a3e-e6b1-4bef-848c-2b6787a2cb9d","pdf_url":null,"source":{"id":"https://openalex.org/S4406922991","display_name":"University of Twente Research Information","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Demir, F C & Anbalagan, S N 2026, 'Towards Zero-Touch Network Provisioning for Embedded Industrial IoT : A Feasibility Study on Autonomous Guest Wi-Fi Access', Procedia computer science, vol. 277, pp. 3444-3452. https://doi.org/10.1016/j.procs.2026.02.380","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"doi:10.1016/j.procs.2026.02.380","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.procs.2026.02.380","pdf_url":null,"source":{"id":"https://openalex.org/S120348307","display_name":"Procedia Computer Science","issn_l":"1877-0509","issn":["1877-0509"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Procedia Computer Science","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.4171375334262848}],"awards":[],"funders":[{"id":"https://openalex.org/F4320321800","display_name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek","ror":"https://ror.org/04jsz6e67"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W2112995928","https://openalex.org/W2512873101","https://openalex.org/W2767500399","https://openalex.org/W2793735513","https://openalex.org/W3017574706","https://openalex.org/W3047901257","https://openalex.org/W3089126791","https://openalex.org/W3135988818","https://openalex.org/W4295308338","https://openalex.org/W4378587138","https://openalex.org/W4384616567","https://openalex.org/W4392974932","https://openalex.org/W4393032486","https://openalex.org/W4407252555","https://openalex.org/W4410857853"],"related_works":[],"abstract_inverted_index":{"As":[0],"Industry":[1,170],"4.0":[2,171],"accelerates":[3],"the":[4,70,80,88,113,137],"deployment":[5],"of":[6,72,84,100,169],"autonomous":[7,73],"embedded":[8,58,85,163],"systems":[9,164],"across":[10],"diverse":[11],"sectors,":[12],"including":[13],"healthcare,":[14],"logistics,":[15],"infrastructure,":[16],"and":[17,21,82,111,122,133,145],"energy,":[18],"ensuring":[19],"reliable":[20],"secure":[22],"wireless":[23],"connectivity":[24,131,160],"remains":[25],"a":[26,52,92,97,153,166],"foundational":[27,154],"challenge.":[28],"Many":[29],"operational":[30],"environments":[31],"rely":[32],"on":[33],"guest":[34,102],"or":[35],"public":[36],"Wi-Fi":[37,103],"networks":[38,77],"protected":[39],"by":[40,78],"captive":[41],"portals,":[42],"which":[43],"are":[44],"inherently":[45],"designed":[46],"for":[47,55,139,156,162],"human":[48],"interaction.":[49],"This":[50,67,150],"presents":[51],"significant":[53],"barrier":[54],"resource-constrained,":[56],"headless":[57],"devices":[59],"that":[60],"must":[61],"operate":[62],"autonomously":[63],"without":[64],"user":[65],"input.":[66],"paper":[68],"investigates":[69],"feasibility":[71],"onboarding":[74],"to":[75],"such":[76],"analyzing":[79],"capabilities":[81],"limitations":[83],"platforms,":[86],"using":[87],"ESP32":[89],"microcontroller":[90],"as":[91],"representative":[93],"device.":[94],"We":[95],"develop":[96],"comprehensive":[98],"taxonomy":[99],"prevalent":[101],"architectures,":[104],"assess":[105],"their":[106],"compatibility":[107],"with":[108],"automated":[109],"workflows,":[110],"evaluate":[112],"associated":[114],"trade-offs":[115,129],"in":[116,165],"implementation":[117],"complexity,":[118],"resource":[119],"consumption,":[120],"latency,":[121],"cybersecurity":[123],"risk.":[124],"The":[125],"findings":[126],"reveal":[127],"critical":[128],"between":[130],"automation":[132],"security":[134],"posture,":[135],"emphasizing":[136],"need":[138],"machine-friendly":[140],"networking":[141],"standards":[142],"like":[143],"Passpoint":[144],"Opportunistic":[146],"Wireless":[147],"Encryption":[148],"(OWE).":[149],"study":[151],"provides":[152],"framework":[155],"designing":[157],"zero-touch,":[158],"resilient":[159],"mechanisms":[161],"wide":[167],"range":[168],"applications.":[172]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2026-03-24T00:00:00"}
