{"id":"https://openalex.org/W2357941180","doi":"https://doi.org/10.1109/icics.2015.7459923","title":"Open security and privacy challenges for the Internet of Things","display_name":"Open security and privacy challenges for the Internet of Things","publication_year":2015,"publication_date":"2015-12-01","ids":{"openalex":"https://openalex.org/W2357941180","doi":"https://doi.org/10.1109/icics.2015.7459923","mag":"2357941180"},"language":"en","primary_location":{"id":"doi:10.1109/icics.2015.7459923","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icics.2015.7459923","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 10th International Conference on Information, Communications and Signal Processing (ICICS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5061874098","display_name":"\u0122irts Strazdi\u0146\u0161","orcid":"https://orcid.org/0000-0001-7422-5294"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Girts Strazdins","raw_affiliation_strings":["Faculty of Engineering and Natural Sciences, Aalesund University College, Norway"],"affiliations":[{"raw_affiliation_string":"Faculty of Engineering and Natural Sciences, Aalesund University College, Norway","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100446064","display_name":"Hao Wang","orcid":"https://orcid.org/0000-0001-9301-5989"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hao Wang","raw_affiliation_strings":["Faculty of Engineering and Natural Sciences, Aalesund University College, Norway"],"affiliations":[{"raw_affiliation_string":"Faculty of Engineering and Natural Sciences, Aalesund University College, Norway","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5061874098"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.3313,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.84506051,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":"1","issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.7419391870498657},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.7228096723556519},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.691281259059906},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.6165012121200562},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6119818091392517},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.5812079310417175},{"id":"https://openalex.org/keywords/position-paper","display_name":"Position paper","score":0.5462254881858826},{"id":"https://openalex.org/keywords/privacy-software","display_name":"Privacy software","score":0.5335114002227783},{"id":"https://openalex.org/keywords/position","display_name":"Position (finance)","score":0.5069918632507324},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.49864625930786133},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4652935266494751},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.4260697066783905},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3149891495704651},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.157059907913208}],"concepts":[{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.7419391870498657},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.7228096723556519},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.691281259059906},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.6165012121200562},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6119818091392517},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.5812079310417175},{"id":"https://openalex.org/C78780964","wikidata":"https://www.wikidata.org/wiki/Q7233193","display_name":"Position paper","level":2,"score":0.5462254881858826},{"id":"https://openalex.org/C509729295","wikidata":"https://www.wikidata.org/wiki/Q7246032","display_name":"Privacy software","level":3,"score":0.5335114002227783},{"id":"https://openalex.org/C198082294","wikidata":"https://www.wikidata.org/wiki/Q3399648","display_name":"Position (finance)","level":2,"score":0.5069918632507324},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.49864625930786133},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4652935266494751},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.4260697066783905},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3149891495704651},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.157059907913208},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icics.2015.7459923","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icics.2015.7459923","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 10th International Conference on Information, Communications and Signal Processing (ICICS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.4399999976158142}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W183369512","https://openalex.org/W1495746971","https://openalex.org/W1528138196","https://openalex.org/W1755227063","https://openalex.org/W1967561194","https://openalex.org/W1992025196","https://openalex.org/W2002271762","https://openalex.org/W2029758586","https://openalex.org/W2072641892","https://openalex.org/W2100375917","https://openalex.org/W2104149471","https://openalex.org/W2105103777","https://openalex.org/W2111619626","https://openalex.org/W2136649349","https://openalex.org/W2140372921","https://openalex.org/W2152792006","https://openalex.org/W2157137121","https://openalex.org/W2161735290","https://openalex.org/W2240163252","https://openalex.org/W2245534414","https://openalex.org/W2398715209","https://openalex.org/W2564566221","https://openalex.org/W4246079400","https://openalex.org/W6690086590","https://openalex.org/W6712714140","https://openalex.org/W6730999400"],"related_works":["https://openalex.org/W2101582069","https://openalex.org/W2116878667","https://openalex.org/W2219269088","https://openalex.org/W2127814706","https://openalex.org/W2584827882","https://openalex.org/W2118333568","https://openalex.org/W2994243660","https://openalex.org/W2528109871","https://openalex.org/W1598195095","https://openalex.org/W2625564278"],"abstract_inverted_index":{"Internet":[0],"of":[1,14],"things":[2],"(IoT)":[3],"is":[4,26],"a":[5,67],"quickly":[6],"rising":[7],"paradigm":[8],"that":[9,16],"covers":[10],"an":[11],"important":[12],"set":[13],"technologies":[15],"are":[17,35],"expected":[18],"to":[19,56],"be":[20],"the":[21,58],"next":[22],"information":[23],"revolution.":[24],"IoT":[25],"closely":[27],"connected":[28],"with":[29],"people,":[30],"therefore":[31],"privacy":[32,72],"and":[33,46,65],"security":[34],"major":[36],"issues.":[37],"In":[38],"this":[39],"paper,":[40],"we":[41],"summarize":[42],"current":[43],"open":[44],"challenges":[45],"present":[47],"our":[48],"position":[49],"on":[50],"future":[51],"research":[52],"directions.":[53],"We":[54],"suggest":[55],"borrow":[57],"\"peer":[59],"approval\"":[60],"scheme":[61],"from":[62],"social":[63],"networks":[64],"establish":[66],"centralized":[68],"system":[69],"for":[70],"user":[71],"control.":[73]},"counts_by_year":[{"year":2022,"cited_by_count":3},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
