{"id":"https://openalex.org/W2911021154","doi":"https://doi.org/10.1109/iotais.2018.8600862","title":"Large Data Download Method for IoT Machines Using LPWAN and General User\u2019s Smartphones","display_name":"Large Data Download Method for IoT Machines Using LPWAN and General User\u2019s Smartphones","publication_year":2018,"publication_date":"2018-11-01","ids":{"openalex":"https://openalex.org/W2911021154","doi":"https://doi.org/10.1109/iotais.2018.8600862","mag":"2911021154"},"language":"en","primary_location":{"id":"doi:10.1109/iotais.2018.8600862","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iotais.2018.8600862","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE International Conference on Internet of Things and Intelligence System (IOTAIS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102302012","display_name":"Takeshi Ogawa","orcid":null},"institutions":[{"id":"https://openalex.org/I165522056","display_name":"Tokyo Denki University","ror":"https://ror.org/01pa62v70","country_code":"JP","type":"education","lineage":["https://openalex.org/I165522056"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Takeshi Ogawa","raw_affiliation_strings":["Dept. of Information System, Tokyo Denki University, Tokyo, 120-8551, Japan"],"affiliations":[{"raw_affiliation_string":"Dept. of Information System, Tokyo Denki University, Tokyo, 120-8551, Japan","institution_ids":["https://openalex.org/I165522056"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031188382","display_name":"Taichi Yoshimura","orcid":null},"institutions":[{"id":"https://openalex.org/I165522056","display_name":"Tokyo Denki University","ror":"https://ror.org/01pa62v70","country_code":"JP","type":"education","lineage":["https://openalex.org/I165522056"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Taichi Yoshimura","raw_affiliation_strings":["Dept. of Information System, Tokyo Denki University, Tokyo, 120-8551, Japan"],"affiliations":[{"raw_affiliation_string":"Dept. of Information System, Tokyo Denki University, Tokyo, 120-8551, Japan","institution_ids":["https://openalex.org/I165522056"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5050853408","display_name":"Noriharu Miyaho","orcid":null},"institutions":[{"id":"https://openalex.org/I165522056","display_name":"Tokyo Denki University","ror":"https://ror.org/01pa62v70","country_code":"JP","type":"education","lineage":["https://openalex.org/I165522056"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Noriharu Miyaho","raw_affiliation_strings":["Dept. of Information System, Tokyo Denki University, Tokyo, 120-8551, Japan"],"affiliations":[{"raw_affiliation_string":"Dept. of Information System, Tokyo Denki University, Tokyo, 120-8551, Japan","institution_ids":["https://openalex.org/I165522056"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5102302012"],"corresponding_institution_ids":["https://openalex.org/I165522056"],"apc_list":null,"apc_paid":null,"fwci":0.1845,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.5837777,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"59","last_page":"65"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12079","display_name":"IoT Networks and Protocols","score":0.9930999875068665,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9898999929428101,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/lpwan","display_name":"LPWAN","score":0.9861973524093628},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.8064135313034058},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7807831764221191},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7515037059783936},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6203615665435791},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5599060654640198},{"id":"https://openalex.org/keywords/terminal","display_name":"Terminal (telecommunication)","score":0.5240573883056641},{"id":"https://openalex.org/keywords/wide-area-network","display_name":"Wide area network","score":0.3752918541431427},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.37255001068115234},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.23279047012329102},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10469818115234375}],"concepts":[{"id":"https://openalex.org/C2776445043","wikidata":"https://www.wikidata.org/wiki/Q20706829","display_name":"LPWAN","level":3,"score":0.9861973524093628},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.8064135313034058},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7807831764221191},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7515037059783936},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6203615665435791},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5599060654640198},{"id":"https://openalex.org/C2779664074","wikidata":"https://www.wikidata.org/wiki/Q3518405","display_name":"Terminal (telecommunication)","level":2,"score":0.5240573883056641},{"id":"https://openalex.org/C2776238582","wikidata":"https://www.wikidata.org/wiki/Q11384","display_name":"Wide area network","level":2,"score":0.3752918541431427},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.37255001068115234},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.23279047012329102},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10469818115234375}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iotais.2018.8600862","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iotais.2018.8600862","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE International Conference on Internet of Things and Intelligence System (IOTAIS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W45510470","https://openalex.org/W1572481965","https://openalex.org/W2020596971","https://openalex.org/W2114623221","https://openalex.org/W2135560014","https://openalex.org/W2151467984","https://openalex.org/W2300484078","https://openalex.org/W2800642566","https://openalex.org/W6698074783"],"related_works":["https://openalex.org/W2780275797","https://openalex.org/W2787604381","https://openalex.org/W2805348733","https://openalex.org/W2995268047","https://openalex.org/W2976440832","https://openalex.org/W3138242362","https://openalex.org/W2993037392","https://openalex.org/W2901309327","https://openalex.org/W3134784882","https://openalex.org/W3125356464"],"abstract_inverted_index":{"By":[0],"applying":[1],"low":[2,73],"power":[3,27],"wide":[4],"area":[5],"network":[6,178],"(LPWAN)":[7],"to":[8,42,48,53,66,88],"communication":[9,21],"between":[10,122],"a":[11,50,55,78,127,132,169],"machine":[12,31,68,89],"and":[13,23,141,143],"the":[14,24,30,38,43,67,70,91,99,102,105,109,116,119,123,138,145,149,184,187],"cloud,":[15],"it":[16,45],"can":[17,32],"be":[18,34,62,174],"anticipated":[19],"that":[20,162],"costs":[22],"amount":[25,57],"of":[26,40,58,93,118,135,151,186],"consumed":[28],"by":[29,64,84,114,168,176,193],"both":[33],"reduced.":[35],"However,":[36],"considering":[37],"addition":[39],"functions":[41],"machine,":[44],"is":[46,96,191],"necessary":[47],"have":[49],"technology":[51],"able":[52],"transfer":[54],"large":[56,80],"data,":[59],"which":[60,172,190],"cannot":[61,173],"transferred":[63],"LPWAN,":[65],"from":[69,86],"cloud":[71,87,103],"at":[72,144],"cost.":[74],"In":[75,98,154],"this":[76,156],"paper,":[77],"novel":[79],"data":[81,110,128],"download":[82],"method":[83],"Wi-Fi":[85],"using":[90],"terminals":[92,107],"general":[94],"users":[95],"proposed.":[97],"proposed":[100,188],"method,":[101,189],"selects":[104],"delivery":[106,152],"satisfying":[108],"arrival":[111,129],"rate":[112,130],"requirement":[113],"analyzing":[115],"correlation":[117],"movement":[120],"history":[121],"terminals.":[124,153],"It":[125],"guarantees":[126],"with":[131],"higher":[133],"degree":[134],"accuracy":[136],"than":[137],"existing":[139,177],"DTN":[140],"CC-DTN,":[142],"same":[146],"time":[147],"minimizes":[148],"number":[150],"addition,":[155],"paper":[157],"shows":[158],"an":[159],"authentication":[160,179],"procedure":[161],"prevents":[163],"DoS":[164],"attacks":[165],"on":[166],"LPWAN":[167],"spoofing":[170],"terminal,":[171],"prevented":[175],"technology.":[180],"Also,":[181],"we":[182],"report":[183],"effectiveness":[185],"confirmed":[192],"numerical":[194],"calculation.":[195]},"counts_by_year":[{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
