{"id":"https://openalex.org/W4416799969","doi":"https://doi.org/10.1109/snpd65828.2025.11254024","title":"A Proposal of Protection System for Home IoT network based on the awareness strategy","display_name":"A Proposal of Protection System for Home IoT network based on the awareness strategy","publication_year":2025,"publication_date":"2025-06-25","ids":{"openalex":"https://openalex.org/W4416799969","doi":"https://doi.org/10.1109/snpd65828.2025.11254024"},"language":null,"primary_location":{"id":"doi:10.1109/snpd65828.2025.11254024","is_oa":false,"landing_page_url":"https://doi.org/10.1109/snpd65828.2025.11254024","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE/ACIS 29th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Kazungu Ronald","orcid":null},"institutions":[{"id":"https://openalex.org/I27429435","display_name":"Kyoto Institute of Technology","ror":"https://ror.org/00965ax52","country_code":"JP","type":"education","lineage":["https://openalex.org/I27429435"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Kazungu Ronald","raw_affiliation_strings":["Kyoto Institute of Technology,Distributed Sytems Management Lab,Department of Information Science,Japan"],"affiliations":[{"raw_affiliation_string":"Kyoto Institute of Technology,Distributed Sytems Management Lab,Department of Information Science,Japan","institution_ids":["https://openalex.org/I27429435"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5080535160","display_name":"Hideo Masuda","orcid":"https://orcid.org/0000-0002-8797-8970"},"institutions":[{"id":"https://openalex.org/I27429435","display_name":"Kyoto Institute of Technology","ror":"https://ror.org/00965ax52","country_code":"JP","type":"education","lineage":["https://openalex.org/I27429435"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Hideo Masuda","raw_affiliation_strings":["Kyoto Institute of Technology,Center for ICT Services,Japan"],"affiliations":[{"raw_affiliation_string":"Kyoto Institute of Technology,Center for ICT Services,Japan","institution_ids":["https://openalex.org/I27429435"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I27429435"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.40838177,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"517","last_page":"523"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.357699990272522,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.357699990272522,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.04800000041723251,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.045899998396635056,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/mqtt","display_name":"MQTT","score":0.6629999876022339},{"id":"https://openalex.org/keywords/gateway","display_name":"Gateway (web page)","score":0.423799991607666},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.4032000005245209},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.38679999113082886},{"id":"https://openalex.org/keywords/firewall","display_name":"Firewall (physics)","score":0.37279999256134033},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.36419999599456787},{"id":"https://openalex.org/keywords/default-gateway","display_name":"Default gateway","score":0.3630000054836273},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.35679998993873596},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.35339999198913574},{"id":"https://openalex.org/keywords/security-policy","display_name":"Security policy","score":0.35100001096725464}],"concepts":[{"id":"https://openalex.org/C132868160","wikidata":"https://www.wikidata.org/wiki/Q10322548","display_name":"MQTT","level":3,"score":0.6629999876022339},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.649399995803833},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6399000287055969},{"id":"https://openalex.org/C2777710495","wikidata":"https://www.wikidata.org/wiki/Q5527195","display_name":"Gateway (web page)","level":2,"score":0.423799991607666},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.4032000005245209},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.38679999113082886},{"id":"https://openalex.org/C77714075","wikidata":"https://www.wikidata.org/wiki/Q5452017","display_name":"Firewall (physics)","level":5,"score":0.37279999256134033},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.36419999599456787},{"id":"https://openalex.org/C187713609","wikidata":"https://www.wikidata.org/wiki/Q2465461","display_name":"Default gateway","level":2,"score":0.3630000054836273},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.35679998993873596},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.35339999198913574},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.35100001096725464},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.34220001101493835},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3409000039100647},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.3343999981880188},{"id":"https://openalex.org/C2780771206","wikidata":"https://www.wikidata.org/wiki/Q3271761","display_name":"Safeguard","level":2,"score":0.33169999718666077},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3287999927997589},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.31220000982284546},{"id":"https://openalex.org/C93518851","wikidata":"https://www.wikidata.org/wiki/Q180160","display_name":"Metadata","level":2,"score":0.30809998512268066},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.3070000112056732},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.2953000068664551},{"id":"https://openalex.org/C2780233690","wikidata":"https://www.wikidata.org/wiki/Q535347","display_name":"Transparency (behavior)","level":2,"score":0.2815000116825104},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.28029999136924744},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.2757999897003174},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.2752000093460083},{"id":"https://openalex.org/C2777103469","wikidata":"https://www.wikidata.org/wiki/Q1231558","display_name":"Smart city","level":3,"score":0.2711000144481659},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.2680000066757202},{"id":"https://openalex.org/C50747538","wikidata":"https://www.wikidata.org/wiki/Q7001032","display_name":"Network forensics","level":3,"score":0.2653999924659729},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.2648000121116638},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.26460000872612},{"id":"https://openalex.org/C14185376","wikidata":"https://www.wikidata.org/wiki/Q30232","display_name":"Agile software development","level":2,"score":0.2533000111579895},{"id":"https://openalex.org/C22111027","wikidata":"https://www.wikidata.org/wiki/Q1070427","display_name":"Internet security","level":4,"score":0.2502000033855438}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/snpd65828.2025.11254024","is_oa":false,"landing_page_url":"https://doi.org/10.1109/snpd65828.2025.11254024","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE/ACIS 29th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"The":[0],"exponential":[1],"growth":[2],"of":[3,5,51,68,81,88,118,133,197,224,246,255,262,270],"Internet":[4],"Things":[6],"(IoT)":[7],"devices":[8],"has":[9,28],"introduced":[10],"transformative":[11],"capabilities":[12],"across":[13],"various":[14],"domains":[15],"for":[16,125,155,186],"example,":[17],"smart":[18],"homes,":[19],"industrial":[20],"systems,":[21],"and":[22,32,48,66,84,95,103,116,151,189,214,229,235,249],"healthcare":[23],"environments.":[24,210],"However,":[25],"this":[26],"expansion":[27],"also":[29,112],"resulted":[30],"in":[31,42,238,265],"accompanied":[33],"by":[34,227],"a":[35,49,93,119,168,182],"rapidly":[36],"evolving":[37,206],"threat":[38],"landscape,":[39],"where":[40],"vulnerabilities":[41],"device":[43,82,236],"firmware,":[44],"weak":[45],"network":[46,164],"configurations,":[47],"lack":[50],"centralized":[52],"control":[53],"mechanisms":[54],"leave":[55],"IoT":[56,69,105,127,209,225,271],"deployments":[57],"highly":[58],"susceptible":[59],"to":[60,74,101,146,162,177,181,204,220,231],"exploitation.":[61],"Ensuring":[62],"the":[63,79,86,114,131,195,205,217,222,241,244,256,260,267],"security,":[64],"availability,":[65],"resilience":[67],"networks":[70,226],"is":[71],"therefore":[72],"imperative":[73],"safeguard":[75],"sensitive":[76],"data,":[77],"ensure":[78],"integrity":[80],"interactions,":[83],"mitigate":[85],"risk":[87],"unauthorized":[89],"access.This":[90],"paper":[91,111],"presents":[92,113],"lightweight":[94,120],"resilient":[96],"Security":[97,121,137],"Module":[98,123,139],"Gateway":[99,122,138],"designed":[100],"monitor":[102],"manage":[104],"communication":[106],"with":[107,173],"external":[108],"vendors.":[109],"This":[110],"design":[115],"implementation":[117],"tailored":[124],"home":[126],"networks,":[128],"built":[129],"on":[130,194],"principles":[132],"awareness-based":[134],"protection.The":[135],"proposed":[136],"optionally":[140],"employs":[141],"tools":[142],"such":[143],"as":[144,252],"RaspAP":[145],"enable":[147],"local":[148],"wireless":[149],"access":[150],"supports":[152],"IP":[153],"masquerading":[154],"outbound":[156],"communication.":[157],"And":[158],"it":[159],"integrates":[160],"nProbe":[161],"capture":[163],"traffic":[165,179],"flows":[166],"while":[167],"custom":[169],"Python":[170],"script":[171],"interfaces":[172],"an":[174],"MQTT":[175],"publisher":[176],"transmit":[178],"metadata":[180],"remote":[183],"ntopng":[184],"server":[185],"real-time":[187],"visualization":[188],"analysis.The":[190],"awareness":[191,251,257],"strategy":[192,218],"centers":[193],"context":[196],"aware":[198],"security":[199,233,250,268],"measures":[200],"that":[201],"dynamically":[202],"adapt":[203],"conditions":[207],"within":[208],"Leveraging":[211],"behavioral":[212],"analysis":[213],"anomaly":[215],"detection,":[216],"aims":[219],"enhance":[221],"protection":[223],"identifying":[228],"responding":[230],"potential":[232],"incidents":[234],"failure":[237],"real-time.":[239],"Additionally,":[240],"research":[242],"explores":[243],"integration":[245],"user":[247],"education":[248],"essential":[253],"components":[254],"strategy,":[258],"recognizing":[259],"role":[261],"end":[263],"users":[264],"maintaining":[266],"posture":[269],"devices.":[272]},"counts_by_year":[],"updated_date":"2026-04-17T18:11:37.981687","created_date":"2025-11-28T00:00:00"}
