{"id":"https://openalex.org/W2548327609","doi":"https://doi.org/10.1145/2988272.2988280","title":"Internet of Things","display_name":"Internet of Things","publication_year":2016,"publication_date":"2016-11-04","ids":{"openalex":"https://openalex.org/W2548327609","doi":"https://doi.org/10.1145/2988272.2988280","mag":"2548327609"},"language":"en","primary_location":{"id":"doi:10.1145/2988272.2988280","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2988272.2988280","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 12th ACM Symposium on QoS and Security for Wireless and Mobile Networks","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5001461899","display_name":"Sabrina Sicari","orcid":"https://orcid.org/0000-0002-6824-8075"},"institutions":[{"id":"https://openalex.org/I115752224","display_name":"University of Insubria","ror":"https://ror.org/00s409261","country_code":"IT","type":"education","lineage":["https://openalex.org/I115752224"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Sabrina Sicari","raw_affiliation_strings":["Universit\u00e0 degli Studi dell'Insubria, Varese, Italy"],"affiliations":[{"raw_affiliation_string":"Universit\u00e0 degli Studi dell'Insubria, Varese, Italy","institution_ids":["https://openalex.org/I115752224"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102714079","display_name":"Alessandra Rizzardi","orcid":"https://orcid.org/0000-0003-4765-5365"},"institutions":[{"id":"https://openalex.org/I115752224","display_name":"University of Insubria","ror":"https://ror.org/00s409261","country_code":"IT","type":"education","lineage":["https://openalex.org/I115752224"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Alessandra Rizzardi","raw_affiliation_strings":["Universit\u00e0 degli Studi dell'Insubria, Varese, Italy"],"affiliations":[{"raw_affiliation_string":"Universit\u00e0 degli Studi dell'Insubria, Varese, Italy","institution_ids":["https://openalex.org/I115752224"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023093130","display_name":"Daniele Miorandi","orcid":"https://orcid.org/0000-0002-3089-977X"},"institutions":[{"id":"https://openalex.org/I4210107393","display_name":"U-Hopper (Italy)","ror":"https://ror.org/01r3ms014","country_code":"IT","type":"company","lineage":["https://openalex.org/I4210107393"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Daniele Miorandi","raw_affiliation_strings":["U-Hopper, Trento, Italy"],"affiliations":[{"raw_affiliation_string":"U-Hopper, Trento, Italy","institution_ids":["https://openalex.org/I4210107393"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5033025864","display_name":"Alberto Coen\u2010Porisini","orcid":"https://orcid.org/0000-0002-3788-8926"},"institutions":[{"id":"https://openalex.org/I115752224","display_name":"University of Insubria","ror":"https://ror.org/00s409261","country_code":"IT","type":"education","lineage":["https://openalex.org/I115752224"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Alberto Coen-Porisini","raw_affiliation_strings":["Universit\u00e0 degli Studi dell'Insubria, Varese, Italy"],"affiliations":[{"raw_affiliation_string":"Universit\u00e0 degli Studi dell'Insubria, Varese, Italy","institution_ids":["https://openalex.org/I115752224"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5001461899"],"corresponding_institution_ids":["https://openalex.org/I115752224"],"apc_list":null,"apc_paid":null,"fwci":2.8954,"has_fulltext":false,"cited_by_count":21,"citation_normalized_percentile":{"value":0.91807381,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"129","last_page":"133"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.784213662147522},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7215395569801331},{"id":"https://openalex.org/keywords/key-management","display_name":"Key management","score":0.6794768571853638},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6785249710083008},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.5926262736320496},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.565345823764801},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5404580235481262},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.5095437169075012},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5037309527397156},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.48065316677093506},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.12900283932685852}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.784213662147522},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7215395569801331},{"id":"https://openalex.org/C17886624","wikidata":"https://www.wikidata.org/wiki/Q1320561","display_name":"Key management","level":3,"score":0.6794768571853638},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6785249710083008},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.5926262736320496},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.565345823764801},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5404580235481262},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.5095437169075012},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5037309527397156},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.48065316677093506},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.12900283932685852},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/2988272.2988280","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2988272.2988280","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 12th ACM Symposium on QoS and Security for Wireless and Mobile Networks","raw_type":"proceedings-article"},{"id":"pmh:oai:irinsubria.uninsubria.it:11383/2059561","is_oa":false,"landing_page_url":"http://hdl.handle.net/11383/2059561","pdf_url":null,"source":{"id":"https://openalex.org/S4377196351","display_name":"IrInSubria (University of Insubria)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I115752224","host_organization_name":"University of Insubria","host_organization_lineage":["https://openalex.org/I115752224"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/conferenceObject"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4300000071525574,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W1981885204","https://openalex.org/W1989109597","https://openalex.org/W2013699853","https://openalex.org/W2060412108","https://openalex.org/W2092160570","https://openalex.org/W2104927807","https://openalex.org/W2107619464","https://openalex.org/W2116269350","https://openalex.org/W2143578807","https://openalex.org/W2277678732","https://openalex.org/W4245906235"],"related_works":["https://openalex.org/W2383950765","https://openalex.org/W2386077283","https://openalex.org/W2372286639","https://openalex.org/W2998037312","https://openalex.org/W2379296961","https://openalex.org/W4321488702","https://openalex.org/W2126712200","https://openalex.org/W3181110568","https://openalex.org/W2385724650","https://openalex.org/W117581413"],"abstract_inverted_index":{"Security":[0],"threats":[1],"may":[2],"hinder":[3],"the":[4,9,23],"large":[5],"scale":[6],"adoption":[7],"of":[8,12,25,103],"emerging":[10],"Internet":[11],"Things":[13],"(IoT)":[14],"technologies.":[15],"Besides":[16],"efforts":[17],"have":[18],"already":[19],"been":[20],"made":[21],"in":[22,88,95,101],"direction":[24],"data":[26],"integrity":[27],"preservation,":[28],"confidentiality":[29],"and":[30,93,106],"privacy,":[31],"several":[32],"issues":[33],"are":[34,40,66,86],"still":[35],"open.":[36],"The":[37],"existing":[38],"solutions":[39],"mainly":[41],"based":[42],"on":[43],"encryption":[44],"techniques,":[45],"but":[46],"no":[47],"attention":[48],"is":[49],"actually":[50],"paid":[51],"to":[52,97],"key":[53,57,63,78],"management.":[54],"A":[55],"clever":[56],"distribution":[58],"system,":[59],"along":[60],"with":[61],"a":[62,70,89],"replacement":[64],"mechanism,":[65],"essentials":[67],"for":[68,82],"assuring":[69],"secure":[71],"approach.":[72],"In":[73],"this":[74],"paper,":[75],"two":[76],"popular":[77],"management":[79],"systems,":[80],"conceived":[81],"wireless":[83],"sensor":[84],"networks,":[85],"integrated":[87],"real":[90],"IoT":[91],"middleware":[92],"compared":[94],"order":[96],"evaluate":[98],"their":[99],"performance":[100],"terms":[102],"overhead,":[104],"delay":[105],"robustness":[107],"towards":[108],"malicious":[109],"attacks.":[110]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":6},{"year":2017,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-11-11T00:00:00"}
