{"id":"https://openalex.org/W2431854803","doi":"https://doi.org/10.1109/isias.2015.7492741","title":"Introduction to the Internet of Things security: Standardization and research challenges","display_name":"Introduction to the Internet of Things security: Standardization and research challenges","publication_year":2015,"publication_date":"2015-12-01","ids":{"openalex":"https://openalex.org/W2431854803","doi":"https://doi.org/10.1109/isias.2015.7492741","mag":"2431854803"},"language":"en","primary_location":{"id":"doi:10.1109/isias.2015.7492741","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isias.2015.7492741","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 11th International Conference on Information Assurance and Security (IAS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5040006846","display_name":"Salim Elbouanani","orcid":null},"institutions":[{"id":"https://openalex.org/I119856527","display_name":"Cadi Ayyad University","ror":"https://ror.org/04xf6nm78","country_code":"MA","type":"education","lineage":["https://openalex.org/I119856527"]}],"countries":["MA"],"is_corresponding":true,"raw_author_name":"Salim Elbouanani","raw_affiliation_strings":["Computer Science Dept., University Cadi Ayyad UCA, Marrakesh, Morocco"],"affiliations":[{"raw_affiliation_string":"Computer Science Dept., University Cadi Ayyad UCA, Marrakesh, Morocco","institution_ids":["https://openalex.org/I119856527"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061707914","display_name":"My Ahmed El Kiram","orcid":null},"institutions":[{"id":"https://openalex.org/I119856527","display_name":"Cadi Ayyad University","ror":"https://ror.org/04xf6nm78","country_code":"MA","type":"education","lineage":["https://openalex.org/I119856527"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"My Ahmed El Kiram","raw_affiliation_strings":["Computer Science Dept, University Cadi Ayyad, UCA, Marrakesh, Morocco"],"affiliations":[{"raw_affiliation_string":"Computer Science Dept, University Cadi Ayyad, UCA, Marrakesh, Morocco","institution_ids":["https://openalex.org/I119856527"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5033457025","display_name":"Omar Achbarou","orcid":"https://orcid.org/0000-0001-7173-7219"},"institutions":[{"id":"https://openalex.org/I119856527","display_name":"Cadi Ayyad University","ror":"https://ror.org/04xf6nm78","country_code":"MA","type":"education","lineage":["https://openalex.org/I119856527"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Omar Achbarou","raw_affiliation_strings":["Computer Science Dept., University Cadi Ayyad UCA, Marrakesh, Morocco"],"affiliations":[{"raw_affiliation_string":"Computer Science Dept., University Cadi Ayyad UCA, Marrakesh, Morocco","institution_ids":["https://openalex.org/I119856527"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5040006846"],"corresponding_institution_ids":["https://openalex.org/I119856527"],"apc_list":null,"apc_paid":null,"fwci":2.9954,"has_fulltext":false,"cited_by_count":20,"citation_normalized_percentile":{"value":0.92453002,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"32","last_page":"37"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9933000206947327,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/standardization","display_name":"Standardization","score":0.7437671422958374},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.7402636408805847},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7055742740631104},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6199868321418762},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5181437730789185},{"id":"https://openalex.org/keywords/work","display_name":"Work (physics)","score":0.5102770328521729},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.47760888934135437},{"id":"https://openalex.org/keywords/point","display_name":"Point (geometry)","score":0.42885392904281616},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.32520657777786255},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.25763189792633057},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.11440920829772949}],"concepts":[{"id":"https://openalex.org/C188087704","wikidata":"https://www.wikidata.org/wiki/Q369577","display_name":"Standardization","level":2,"score":0.7437671422958374},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.7402636408805847},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7055742740631104},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6199868321418762},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5181437730789185},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.5102770328521729},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.47760888934135437},{"id":"https://openalex.org/C28719098","wikidata":"https://www.wikidata.org/wiki/Q44946","display_name":"Point (geometry)","level":2,"score":0.42885392904281616},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.32520657777786255},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.25763189792633057},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.11440920829772949},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isias.2015.7492741","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isias.2015.7492741","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 11th International Conference on Information Assurance and Security (IAS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W856334294","https://openalex.org/W1999939110","https://openalex.org/W2013724238","https://openalex.org/W2055504014","https://openalex.org/W2072641892","https://openalex.org/W2105103777","https://openalex.org/W2111619626","https://openalex.org/W2140260379","https://openalex.org/W2143591442","https://openalex.org/W2166919658","https://openalex.org/W2170780561","https://openalex.org/W2184887167","https://openalex.org/W2232887944","https://openalex.org/W2325877089","https://openalex.org/W2351425503","https://openalex.org/W2475978233","https://openalex.org/W2564566221","https://openalex.org/W2602956630","https://openalex.org/W2913575586","https://openalex.org/W6623571914","https://openalex.org/W6730999400","https://openalex.org/W6736178439"],"related_works":["https://openalex.org/W2378767206","https://openalex.org/W1540871478","https://openalex.org/W328308450","https://openalex.org/W282641168","https://openalex.org/W2376963063","https://openalex.org/W2066396794","https://openalex.org/W2366734808","https://openalex.org/W2002476357","https://openalex.org/W2391444248","https://openalex.org/W2390716080"],"abstract_inverted_index":{"The":[0,18],"transition":[1],"from":[2],"the":[3,7,22,26,37,46,51,57,67,80,85,88,128,146],"current":[4],"Internet":[5,8],"to":[6,64,84,108,118,131,136],"of":[9,28],"things":[10],"(IoT)":[11],"is":[12,15,25,105],"inevitable":[13],"and":[14,31,39,59,111,122,130,143],"already":[16],"necessary.":[17],"main":[19],"aspect":[20],"about":[21],"IoT":[23,52,129],"paradigm":[24],"integration":[27],"several":[29],"technologies":[30,61],"standards.":[32],"However,":[33],"what":[34],"places":[35],"have":[36],"security":[38,65,86,142],"privacy":[40,144],"in":[41,66,87],"this":[42],"paradigm?":[43],"We":[44],"present":[45],"necessary":[47],"background":[48],"by":[49,79],"introducing":[50],"paradigm.":[53],"Then,":[54],"we":[55,70,95],"summarize":[56],"standards":[58],"enabling":[60],"that":[62,75],"refer":[63],"IoT.":[68,89,147],"Furthermore,":[69],"point":[71],"some":[72,97],"major":[73],"issues":[74],"should":[76],"be":[77],"faced":[78],"research":[81,114,140],"community":[82],"related":[83],"Finally,":[90],"based":[91],"on":[92,145],"our":[93],"evaluation,":[94],"highlight":[96],"possible":[98],"directions":[99],"for":[100],"future":[101],"research.":[102],"Our":[103],"goal":[104],"not":[106],"only":[107],"analyze,":[109],"compare":[110],"consolidate":[112],"past":[113],"work":[115],"but":[116],"also":[117],"appreciate":[119],"their":[120,124],"findings":[121],"discuss":[123],"applicability":[125],"towards":[126],"securing":[127],"provide":[132],"a":[133,138],"solid":[134],"base":[135],"start":[137],"scientific":[139],"around":[141]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2022,"cited_by_count":3},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":6},{"year":2018,"cited_by_count":7},{"year":2017,"cited_by_count":2}],"updated_date":"2026-01-13T01:12:25.745995","created_date":"2025-10-10T00:00:00"}
