{"id":"https://openalex.org/W4312735235","doi":"https://doi.org/10.1109/pkia56009.2022.9952223","title":"Towards Automated PKI Trust Transfer for IoT","display_name":"Towards Automated PKI Trust Transfer for IoT","publication_year":2022,"publication_date":"2022-09-09","ids":{"openalex":"https://openalex.org/W4312735235","doi":"https://doi.org/10.1109/pkia56009.2022.9952223"},"language":"en","primary_location":{"id":"doi:10.1109/pkia56009.2022.9952223","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pkia56009.2022.9952223","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE International Conference on Public Key Infrastructure and its Applications (PKIA)","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2306.16562","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5062055941","display_name":"Joel H\u00f6glund","orcid":"https://orcid.org/0000-0002-9491-8183"},"institutions":[{"id":"https://openalex.org/I2800664555","display_name":"RISE Research Institutes of Sweden","ror":"https://ror.org/03nnxqz81","country_code":"SE","type":"other","lineage":["https://openalex.org/I2800664555"]}],"countries":["SE"],"is_corresponding":true,"raw_author_name":"Joel Hoglund","raw_affiliation_strings":["RISE Research Institutes of Sweden,Kista,Stockholm,16440"],"affiliations":[{"raw_affiliation_string":"RISE Research Institutes of Sweden,Kista,Stockholm,16440","institution_ids":["https://openalex.org/I2800664555"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001344842","display_name":"Shahid Raza","orcid":"https://orcid.org/0000-0001-8192-0893"},"institutions":[{"id":"https://openalex.org/I2800664555","display_name":"RISE Research Institutes of Sweden","ror":"https://ror.org/03nnxqz81","country_code":"SE","type":"other","lineage":["https://openalex.org/I2800664555"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Shahid Raza","raw_affiliation_strings":["RISE Research Institutes of Sweden,Kista,Stockholm,16440"],"affiliations":[{"raw_affiliation_string":"RISE Research Institutes of Sweden,Kista,Stockholm,16440","institution_ids":["https://openalex.org/I2800664555"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5040271780","display_name":"Martin Furuhed","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Martin Furuhed","raw_affiliation_strings":["Technology Nexus Secured Business Solutions, Sweden,H&#x00E4;gersten,Stockholm,12626"],"affiliations":[{"raw_affiliation_string":"Technology Nexus Secured Business Solutions, Sweden,H&#x00E4;gersten,Stockholm,12626","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5062055941"],"corresponding_institution_ids":["https://openalex.org/I2800664555"],"apc_list":null,"apc_paid":null,"fwci":0.9547,"has_fulltext":true,"cited_by_count":3,"citation_normalized_percentile":{"value":0.81766202,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":"547","issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/maintainability","display_name":"Maintainability","score":0.741592526435852},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7314131259918213},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.6966641545295715},{"id":"https://openalex.org/keywords/vendor","display_name":"Vendor","score":0.6549152135848999},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5525036454200745},{"id":"https://openalex.org/keywords/transfer","display_name":"Transfer (computing)","score":0.5076991319656372},{"id":"https://openalex.org/keywords/public-key-infrastructure","display_name":"Public key infrastructure","score":0.5036880373954773},{"id":"https://openalex.org/keywords/lock","display_name":"Lock (firearm)","score":0.4961138665676117},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4577556848526001},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4375608563423157},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.42166250944137573},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.41185474395751953},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3626960515975952},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.16977491974830627},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.15639469027519226},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.13207006454467773},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.12354156374931335}],"concepts":[{"id":"https://openalex.org/C160713754","wikidata":"https://www.wikidata.org/wiki/Q1389965","display_name":"Maintainability","level":2,"score":0.741592526435852},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7314131259918213},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.6966641545295715},{"id":"https://openalex.org/C2777338717","wikidata":"https://www.wikidata.org/wiki/Q1762621","display_name":"Vendor","level":2,"score":0.6549152135848999},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5525036454200745},{"id":"https://openalex.org/C2776175482","wikidata":"https://www.wikidata.org/wiki/Q1195816","display_name":"Transfer (computing)","level":2,"score":0.5076991319656372},{"id":"https://openalex.org/C72648740","wikidata":"https://www.wikidata.org/wiki/Q658476","display_name":"Public key infrastructure","level":4,"score":0.5036880373954773},{"id":"https://openalex.org/C174839445","wikidata":"https://www.wikidata.org/wiki/Q1134386","display_name":"Lock (firearm)","level":2,"score":0.4961138665676117},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4577556848526001},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4375608563423157},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.42166250944137573},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.41185474395751953},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3626960515975952},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.16977491974830627},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.15639469027519226},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.13207006454467773},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.12354156374931335},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.0},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/pkia56009.2022.9952223","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pkia56009.2022.9952223","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE International Conference on Public Key Infrastructure and its Applications (PKIA)","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:2306.16562","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2306.16562","pdf_url":"https://arxiv.org/pdf/2306.16562","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2306.16562","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2306.16562","pdf_url":"https://arxiv.org/pdf/2306.16562","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.5099999904632568}],"awards":[{"id":"https://openalex.org/G1357117299","display_name":null,"funder_award_id":"101020259","funder_id":"https://openalex.org/F4320332999","funder_display_name":"Horizon 2020 Framework Programme"},{"id":"https://openalex.org/G3418842755","display_name":null,"funder_award_id":"830927","funder_id":"https://openalex.org/F4320332999","funder_display_name":"Horizon 2020 Framework Programme"},{"id":"https://openalex.org/G7331901853","display_name":null,"funder_award_id":"EU H2020","funder_id":"https://openalex.org/F4320332999","funder_display_name":"Horizon 2020 Framework Programme"}],"funders":[{"id":"https://openalex.org/F4320332999","display_name":"Horizon 2020 Framework Programme","ror":"https://ror.org/00k4n6c32"}],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4312735235.pdf"},"referenced_works_count":21,"referenced_works":["https://openalex.org/W1506423323","https://openalex.org/W2029693536","https://openalex.org/W2122440889","https://openalex.org/W2291547752","https://openalex.org/W2512955429","https://openalex.org/W2907963949","https://openalex.org/W2936671818","https://openalex.org/W2973072926","https://openalex.org/W2987635953","https://openalex.org/W2990160442","https://openalex.org/W3013624431","https://openalex.org/W3013719659","https://openalex.org/W3132594723","https://openalex.org/W3132859921","https://openalex.org/W4211041565","https://openalex.org/W4224440075","https://openalex.org/W4230077612","https://openalex.org/W4321019180","https://openalex.org/W6725565169","https://openalex.org/W6761217099","https://openalex.org/W6850492868"],"related_works":["https://openalex.org/W2160765347","https://openalex.org/W1784325190","https://openalex.org/W2505444316","https://openalex.org/W2372410743","https://openalex.org/W2064378805","https://openalex.org/W1920256783","https://openalex.org/W2367316285","https://openalex.org/W2068377759","https://openalex.org/W2386133149","https://openalex.org/W2371482553"],"abstract_inverted_index":{"IoT":[0,29,55],"deployments":[1],"grow":[2],"in":[3],"numbers":[4],"and":[5,7,13,46,59],"size":[6],"questions":[8],"of":[9,28,44,71],"long":[10],"time":[11],"support":[12],"maintainability":[14],"become":[15],"increasingly":[16],"important.":[17],"To":[18],"prevent":[19],"vendor":[20],"lock-in,":[21],"standard":[22],"compliant":[23],"capabilities":[24],"to":[25,75],"transfer":[26,43],"control":[27],"devices":[30,56],"between":[31],"service":[32],"providers":[33],"must":[34],"be":[35],"offered.":[36],"We":[37,67],"propose":[38],"a":[39],"lightweight":[40],"protocol":[41],"for":[42,52],"control,":[45],"we":[47],"show":[48],"that":[49,77],"the":[50,53,60,69,72,78],"overhead":[51,64],"involved":[54],"is":[57,65],"small":[58],"overall":[61],"required":[62],"manual":[63],"minimal.":[66],"analyse":[68],"fulfilment":[70],"security":[73],"requirements":[74,80],"verify":[76],"stipulated":[79],"are":[81],"satisfied.":[82]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2}],"updated_date":"2026-03-25T14:56:36.534964","created_date":"2023-01-05T00:00:00"}
