{"id":"https://openalex.org/W4416381331","doi":"https://doi.org/10.1109/jiot.2025.3633459","title":"Secure IoT Communication and Policy Enforcement Framework (SCOPE)","display_name":"Secure IoT Communication and Policy Enforcement Framework (SCOPE)","publication_year":2025,"publication_date":"2025-11-17","ids":{"openalex":"https://openalex.org/W4416381331","doi":"https://doi.org/10.1109/jiot.2025.3633459"},"language":null,"primary_location":{"id":"doi:10.1109/jiot.2025.3633459","is_oa":true,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3633459","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.1109/jiot.2025.3633459","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5025466319","display_name":"\u0130qra Mustafa","orcid":"https://orcid.org/0000-0002-6047-6882"},"institutions":[{"id":"https://openalex.org/I42934936","display_name":"Dublin City University","ror":"https://ror.org/04a1a1e81","country_code":"IE","type":"education","lineage":["https://openalex.org/I42934936"]}],"countries":["IE"],"is_corresponding":true,"raw_author_name":"Iqra Mustafa","raw_affiliation_strings":["Insight SFI Research Centre for Data Analytics, School of Computing, Dublin City University, Glasnevin, Dublin, Ireland","School of Computing, Insight SFI Research Centre for Data Analytics, Dublin City University, Glasnevin, Dublin, Ireland"],"affiliations":[{"raw_affiliation_string":"Insight SFI Research Centre for Data Analytics, School of Computing, Dublin City University, Glasnevin, Dublin, Ireland","institution_ids":["https://openalex.org/I42934936"]},{"raw_affiliation_string":"School of Computing, Insight SFI Research Centre for Data Analytics, Dublin City University, Glasnevin, Dublin, Ireland","institution_ids":["https://openalex.org/I42934936"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5120364747","display_name":"Asma Salimi","orcid":null},"institutions":[{"id":"https://openalex.org/I42934936","display_name":"Dublin City University","ror":"https://ror.org/04a1a1e81","country_code":"IE","type":"education","lineage":["https://openalex.org/I42934936"]}],"countries":["IE"],"is_corresponding":false,"raw_author_name":"Asma Salimi","raw_affiliation_strings":["Insight SFI Research Centre for Data Analytics, School of Computing, Dublin City University, Glasnevin, Dublin, Ireland","School of Computing, Insight SFI Research Centre for Data Analytics, Dublin City University, Glasnevin, Dublin, Ireland"],"affiliations":[{"raw_affiliation_string":"Insight SFI Research Centre for Data Analytics, School of Computing, Dublin City University, Glasnevin, Dublin, Ireland","institution_ids":["https://openalex.org/I42934936"]},{"raw_affiliation_string":"School of Computing, Insight SFI Research Centre for Data Analytics, Dublin City University, Glasnevin, Dublin, Ireland","institution_ids":["https://openalex.org/I42934936"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5037894524","display_name":"Michael Scriney","orcid":"https://orcid.org/0000-0001-6813-2630"},"institutions":[{"id":"https://openalex.org/I42934936","display_name":"Dublin City University","ror":"https://ror.org/04a1a1e81","country_code":"IE","type":"education","lineage":["https://openalex.org/I42934936"]}],"countries":["IE"],"is_corresponding":false,"raw_author_name":"Michael Scriney","raw_affiliation_strings":["Insight SFI Research Centre for Data Analytics, School of Computing, Dublin City University, Glasnevin, Dublin, Ireland","School of Computing, Insight SFI Research Centre for Data Analytics, Dublin City University, Glasnevin, Dublin, Ireland"],"affiliations":[{"raw_affiliation_string":"Insight SFI Research Centre for Data Analytics, School of Computing, Dublin City University, Glasnevin, Dublin, Ireland","institution_ids":["https://openalex.org/I42934936"]},{"raw_affiliation_string":"School of Computing, Insight SFI Research Centre for Data Analytics, Dublin City University, Glasnevin, Dublin, Ireland","institution_ids":["https://openalex.org/I42934936"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5025466319"],"corresponding_institution_ids":["https://openalex.org/I42934936"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.18612548,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"13","issue":"3","first_page":"4546","last_page":"4563"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.2590000033378601,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.2590000033378601,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.1745000034570694,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.16009999811649323,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5446000099182129},{"id":"https://openalex.org/keywords/signcryption","display_name":"Signcryption","score":0.515500009059906},{"id":"https://openalex.org/keywords/forward-secrecy","display_name":"Forward secrecy","score":0.4754999876022339},{"id":"https://openalex.org/keywords/enforcement","display_name":"Enforcement","score":0.42989999055862427},{"id":"https://openalex.org/keywords/revocation-list","display_name":"Revocation list","score":0.4097999930381775},{"id":"https://openalex.org/keywords/revocation","display_name":"Revocation","score":0.40939998626708984},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3801000118255615},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.34940001368522644},{"id":"https://openalex.org/keywords/public-key-infrastructure","display_name":"Public key infrastructure","score":0.34450000524520874},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.33959999680519104}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7785999774932861},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7039999961853027},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5446000099182129},{"id":"https://openalex.org/C155527597","wikidata":"https://www.wikidata.org/wiki/Q1727777","display_name":"Signcryption","level":4,"score":0.515500009059906},{"id":"https://openalex.org/C205009425","wikidata":"https://www.wikidata.org/wiki/Q935662","display_name":"Forward secrecy","level":4,"score":0.4754999876022339},{"id":"https://openalex.org/C2779777834","wikidata":"https://www.wikidata.org/wiki/Q4202277","display_name":"Enforcement","level":2,"score":0.42989999055862427},{"id":"https://openalex.org/C147296133","wikidata":"https://www.wikidata.org/wiki/Q196765","display_name":"Revocation list","level":5,"score":0.4097999930381775},{"id":"https://openalex.org/C2775892892","wikidata":"https://www.wikidata.org/wiki/Q6509517","display_name":"Revocation","level":3,"score":0.40939998626708984},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3801000118255615},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.376800000667572},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.34940001368522644},{"id":"https://openalex.org/C72648740","wikidata":"https://www.wikidata.org/wiki/Q658476","display_name":"Public key infrastructure","level":4,"score":0.34450000524520874},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.33959999680519104},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.3249000012874603},{"id":"https://openalex.org/C93636275","wikidata":"https://www.wikidata.org/wiki/Q196776","display_name":"Certificate authority","level":4,"score":0.3248000144958496},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.3221000134944916},{"id":"https://openalex.org/C2778156585","wikidata":"https://www.wikidata.org/wiki/Q174053","display_name":"Relay","level":3,"score":0.32109999656677246},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.31630000472068787},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.3084000051021576},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.29899999499320984},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.2903999984264374},{"id":"https://openalex.org/C139089976","wikidata":"https://www.wikidata.org/wiki/Q2142273","display_name":"Trusted third party","level":2,"score":0.2809999883174896},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.27720001339912415},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.27410000562667847},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.2687999904155731},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.26649999618530273},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.26579999923706055},{"id":"https://openalex.org/C22927095","wikidata":"https://www.wikidata.org/wiki/Q1784206","display_name":"Stateful firewall","level":3,"score":0.2639999985694885},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.2637999951839447},{"id":"https://openalex.org/C20136886","wikidata":"https://www.wikidata.org/wiki/Q749647","display_name":"Interoperability","level":2,"score":0.2606000006198883},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.2581999897956848},{"id":"https://openalex.org/C134066672","wikidata":"https://www.wikidata.org/wiki/Q1424639","display_name":"Payload (computing)","level":3,"score":0.25600001215934753},{"id":"https://openalex.org/C2779950589","wikidata":"https://www.wikidata.org/wiki/Q7544035","display_name":"Smart contract","level":3,"score":0.2554999887943268},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.25119999051094055}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2025.3633459","is_oa":true,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3633459","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1109/jiot.2025.3633459","is_oa":true,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3633459","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G270116276","display_name":null,"funder_award_id":"PDOC/23/06/01","funder_id":"https://openalex.org/F4320320854","funder_display_name":"Marine Institute"}],"funders":[{"id":"https://openalex.org/F4320320854","display_name":"Marine Institute","ror":"https://ror.org/05581wm82"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W2029693536","https://openalex.org/W2061624419","https://openalex.org/W2286649377","https://openalex.org/W2609208653","https://openalex.org/W2619579631","https://openalex.org/W2962740246","https://openalex.org/W2971484169","https://openalex.org/W2980191379","https://openalex.org/W3016097478","https://openalex.org/W3039166361","https://openalex.org/W3142742079","https://openalex.org/W3173193949","https://openalex.org/W4206333283","https://openalex.org/W4298027840","https://openalex.org/W4312736366","https://openalex.org/W4319988666","https://openalex.org/W4321843907","https://openalex.org/W4379260199","https://openalex.org/W4382060614","https://openalex.org/W4387743877","https://openalex.org/W4387834972","https://openalex.org/W4388221731","https://openalex.org/W4388646158","https://openalex.org/W4390665482","https://openalex.org/W4396980290","https://openalex.org/W4401211368","https://openalex.org/W4401459825","https://openalex.org/W4402890779","https://openalex.org/W4402987481","https://openalex.org/W4404962716","https://openalex.org/W4405374508","https://openalex.org/W4406614020","https://openalex.org/W4408802497","https://openalex.org/W4410001173","https://openalex.org/W4411554605"],"related_works":[],"abstract_inverted_index":{"Time-sensitive":[0],"Internet":[1],"of":[2],"Things":[3],"(IoT)":[4],"deployments":[5],"need":[6],"fine-grained,":[7],"auditable":[8,187],"authorisation":[9,32,53,136,188],"without":[10,79,178],"exposing":[11],"payloads":[12],"to":[13,113,180],"intermediaries":[14,39],"or":[15,183],"embedding":[16],"access":[17],"policy":[18,182],"in":[19],"cipher-text.":[20],"The":[21,42,161],"Secure":[22],"IoT":[23,128],"Communication":[24],"and":[25,64,68,76,83,102,108,140,149,167,198],"Policy":[26],"Enforcement":[27],"(SCOPE)":[28],"framework":[29,44],"separates":[30],"on-ledger":[31,135],"from":[33],"end-to-end":[34,87,133],"content":[35],"protection":[36],"while":[37],"keeping":[38],"minimally":[40],"trusted.":[41],"SCOPE":[43],"comprises":[45],"a":[46,55,69,89,120,169],"Broker":[47],"Smart":[48],"Contract":[49],"(BSC)":[50],"that":[51,60,73],"records":[52],"decisions,":[54],"decentralised":[56],"Trusted":[57],"Authority":[58],"(TA)":[59],"issues":[61],"committee":[62],"attestations":[63],"epoch-scoped":[65],"revocation":[66],"snapshots,":[67],"stateless":[70],"edge":[71,129],"relay":[72,184],"verifies":[74],"requests":[75],"forwards":[77],"ciphertext":[78],"decryption.":[80],"Payload":[81],"confidentiality":[82],"integrity":[84],"are":[85],"provided":[86],"by":[88],"pairing-free":[90],"authenticated":[91],"encryption":[92],"with":[93,98,111,158],"associated":[94],"data":[95],"(AEAD)":[96],"channel":[97,177],"ephemeral":[99],"key":[100],"agreement":[101],"disciplined":[103],"nonces,":[104],"yielding":[105],"replay":[106],"resistance":[107],"forward":[109],"secrecy":[110],"respect":[112],"the":[114,181],"sender\u2019s":[115],"key.":[116],"A":[117],"prototype":[118],"on":[119,126],"permissioned":[121],"distributed":[122],"ledger":[123],"runtime,":[124],"evaluated":[125],"an":[127],"testbed,":[130],"demonstrates":[131],"sub-second":[132],"operation,":[134],"within":[137],"500":[138],"ms,":[139],"lower":[141],"computational":[142],"latency":[143],"than":[144],"pairing-based":[145],"Ciphertext-Policy":[146],"Attribute-Based":[147,150],"Encryption":[148],"Signcryption":[151],"(CP-ABE/ABSC)":[152],"baselines,":[153],"including":[154],"BLUMA":[155],"(multi-authority":[156],"CP-ABE":[157],"hidden":[159],"policy).":[160],"design":[162],"is":[163],"portable":[164],"across":[165],"ledgers":[166],"supports":[168],"drop-in":[170],"post-quantum":[171],"key-encapsulation":[172],"mechanism":[173],"plus":[174],"AEAD":[175],"(KEM+AEAD)":[176],"changes":[179],"planes,":[185],"enabling":[186],"for":[189],"multi-stakeholder":[190],"settings":[191],"such":[192],"as":[193],"smart":[194],"ports,":[195],"industrial":[196],"automation,":[197],"e-health.":[199]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-11-17T00:00:00"}
