{"id":"https://openalex.org/W2200485565","doi":"https://doi.org/10.1109/ictc.2015.7354752","title":"Security considerations for secure and trustworthy smart home system in the IoT environment","display_name":"Security considerations for secure and trustworthy smart home system in the IoT environment","publication_year":2015,"publication_date":"2015-10-01","ids":{"openalex":"https://openalex.org/W2200485565","doi":"https://doi.org/10.1109/ictc.2015.7354752","mag":"2200485565"},"language":"en","primary_location":{"id":"doi:10.1109/ictc.2015.7354752","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ictc.2015.7354752","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 International Conference on Information and Communication Technology Convergence (ICTC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5055397906","display_name":"Jin\u2010Hee Han","orcid":"https://orcid.org/0000-0002-2139-5596"},"institutions":[{"id":"https://openalex.org/I142401562","display_name":"Electronics and Telecommunications Research Institute","ror":"https://ror.org/03ysstz10","country_code":"KR","type":"facility","lineage":["https://openalex.org/I142401562","https://openalex.org/I2801339556","https://openalex.org/I4210144908","https://openalex.org/I4387152098"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Jin-Hee Han","raw_affiliation_strings":["Cyber Security System Research Department, Electronics and Telecommunications Research Institute, Daejeon, Republic of Korea","Mobile Security Research Section, Cyber Security System Research Department, Electronics and Telecommunications Research Institute, Daejeon, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Cyber Security System Research Department, Electronics and Telecommunications Research Institute, Daejeon, Republic of Korea","institution_ids":["https://openalex.org/I142401562"]},{"raw_affiliation_string":"Mobile Security Research Section, Cyber Security System Research Department, Electronics and Telecommunications Research Institute, Daejeon, Republic of Korea","institution_ids":["https://openalex.org/I142401562"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102179104","display_name":"Yong-Sung Jeon","orcid":null},"institutions":[{"id":"https://openalex.org/I142401562","display_name":"Electronics and Telecommunications Research Institute","ror":"https://ror.org/03ysstz10","country_code":"KR","type":"facility","lineage":["https://openalex.org/I142401562","https://openalex.org/I2801339556","https://openalex.org/I4210144908","https://openalex.org/I4387152098"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"YongSung Jeon","raw_affiliation_strings":["Cyber Security System Research Department, Electronics and Telecommunications Research Institute, Daejeon, Republic of Korea","Mobile Security Research Section, Cyber Security System Research Department, Electronics and Telecommunications Research Institute, Daejeon, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Cyber Security System Research Department, Electronics and Telecommunications Research Institute, Daejeon, Republic of Korea","institution_ids":["https://openalex.org/I142401562"]},{"raw_affiliation_string":"Mobile Security Research Section, Cyber Security System Research Department, Electronics and Telecommunications Research Institute, Daejeon, Republic of Korea","institution_ids":["https://openalex.org/I142401562"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5064475605","display_name":"Jeong\u2010Nyeo Kim","orcid":null},"institutions":[{"id":"https://openalex.org/I142401562","display_name":"Electronics and Telecommunications Research Institute","ror":"https://ror.org/03ysstz10","country_code":"KR","type":"facility","lineage":["https://openalex.org/I142401562","https://openalex.org/I2801339556","https://openalex.org/I4210144908","https://openalex.org/I4387152098"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"JeongNyeo Kim","raw_affiliation_strings":["Cyber Security System Research Department, Electronics and Telecommunications Research Institute, Daejeon, Republic of Korea","Cyber Security System Research Department, Cyber Security Research Division, Electronics and Telecommunications Research Institute, Daejeon, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Cyber Security System Research Department, Electronics and Telecommunications Research Institute, Daejeon, Republic of Korea","institution_ids":["https://openalex.org/I142401562"]},{"raw_affiliation_string":"Cyber Security System Research Department, Cyber Security Research Division, Electronics and Telecommunications Research Institute, Daejeon, Republic of Korea","institution_ids":["https://openalex.org/I142401562"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5055397906"],"corresponding_institution_ids":["https://openalex.org/I142401562"],"apc_list":null,"apc_paid":null,"fwci":3.661,"has_fulltext":false,"cited_by_count":52,"citation_normalized_percentile":{"value":0.93750489,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1116","last_page":"1118"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10444","display_name":"Context-Aware Activity Recognition Systems","score":0.9914000034332275,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13243","display_name":"Innovation in Digital Healthcare Systems","score":0.9800000190734863,"subfield":{"id":"https://openalex.org/subfields/3605","display_name":"Health Information Management"},"field":{"id":"https://openalex.org/fields/36","display_name":"Health Professions"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.788257360458374},{"id":"https://openalex.org/keywords/trustworthiness","display_name":"Trustworthiness","score":0.6484778523445129},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.6441658735275269},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6075151562690735},{"id":"https://openalex.org/keywords/home-automation","display_name":"Home automation","score":0.5633050203323364},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.5444392561912537},{"id":"https://openalex.org/keywords/home-security","display_name":"Home security","score":0.5024547576904297},{"id":"https://openalex.org/keywords/wearable-computer","display_name":"Wearable computer","score":0.4769243597984314},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.4570181667804718},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.42557308077812195},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.22195401787757874},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.1770835816860199},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.11599075794219971}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.788257360458374},{"id":"https://openalex.org/C153701036","wikidata":"https://www.wikidata.org/wiki/Q659974","display_name":"Trustworthiness","level":2,"score":0.6484778523445129},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.6441658735275269},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6075151562690735},{"id":"https://openalex.org/C507571656","wikidata":"https://www.wikidata.org/wiki/Q848436","display_name":"Home automation","level":2,"score":0.5633050203323364},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5444392561912537},{"id":"https://openalex.org/C2779750879","wikidata":"https://www.wikidata.org/wiki/Q22908936","display_name":"Home security","level":2,"score":0.5024547576904297},{"id":"https://openalex.org/C150594956","wikidata":"https://www.wikidata.org/wiki/Q1334829","display_name":"Wearable computer","level":2,"score":0.4769243597984314},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.4570181667804718},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.42557308077812195},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.22195401787757874},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.1770835816860199},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.11599075794219971},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ictc.2015.7354752","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ictc.2015.7354752","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 International Conference on Information and Communication Technology Convergence (ICTC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W1964661113","https://openalex.org/W2029375650","https://openalex.org/W2072641892","https://openalex.org/W2104927807","https://openalex.org/W2111619626"],"related_works":["https://openalex.org/W3161928361","https://openalex.org/W4205726527","https://openalex.org/W3111735654","https://openalex.org/W74097913","https://openalex.org/W3158356294","https://openalex.org/W4206112541","https://openalex.org/W2920725863","https://openalex.org/W4382774465","https://openalex.org/W2104360586","https://openalex.org/W4382315589"],"abstract_inverted_index":{"Recently,":[0],"smart":[1,64,105],"home":[2,65,106],"appliances":[3],"and":[4,62,78],"wearable":[5],"devices":[6,14,31],"have":[7,21],"been":[8],"developed":[9],"through":[10,41],"many":[11],"companies.":[12],"Most":[13],"can":[15],"be":[16,68,76,86],"interacted":[17],"with":[18],"various":[19],"sensors,":[20],"communication":[22],"function":[23],"to":[24,39,49,85],"connect":[25],"the":[26,50,53,56,72,95,99,104],"Internet":[27],"by":[28],"themselves.":[29],"Those":[30],"will":[32,75],"provide":[33],"a":[34,42],"wide":[35],"range":[36],"of":[37,45,52,80,98],"services":[38],"users":[40],"mutual":[43],"exchange":[44],"information.":[46],"However,":[47],"due":[48],"nature":[51],"IoT":[54],"environment,":[55],"appropriate":[57],"security":[58,73,81,96],"functions":[59],"for":[60],"secure":[61],"trustworthy":[63],"service":[66],"should":[67],"applied":[69],"extensively":[70],"because":[71],"threats":[74,82],"increased":[77],"impact":[79],"is":[83],"likely":[84],"expanded.":[87],"Therefore,":[88],"in":[89],"this":[90],"paper,":[91],"we":[92],"describe":[93],"specifically":[94],"requirements":[97],"components":[100],"that":[101],"make":[102],"up":[103],"system.":[107]},"counts_by_year":[{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":10},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":8},{"year":2019,"cited_by_count":12},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":5},{"year":2016,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
