{"id":"https://openalex.org/W3112636187","doi":"https://doi.org/10.1145/3427228.3427235","title":"SERENIoT: Distributed Network Security Policy Management and Enforcement for Smart Homes","display_name":"SERENIoT: Distributed Network Security Policy Management and Enforcement for Smart Homes","publication_year":2020,"publication_date":"2020-12-07","ids":{"openalex":"https://openalex.org/W3112636187","doi":"https://doi.org/10.1145/3427228.3427235","mag":"3112636187"},"language":"en","primary_location":{"id":"doi:10.1145/3427228.3427235","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3427228.3427235","pdf_url":null,"source":{"id":"https://openalex.org/S4306417673","display_name":"Annual Computer Security Applications Conference","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Annual Computer Security Applications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5047367078","display_name":"Corentin Thomasset","orcid":null},"institutions":[{"id":"https://openalex.org/I45683168","display_name":"Polytechnique Montr\u00e9al","ror":"https://ror.org/05f8d4e86","country_code":"CA","type":"education","lineage":["https://openalex.org/I45683168"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Corentin Thomasset","raw_affiliation_strings":["Polytechnique Montr\u00e9al, Canada"],"affiliations":[{"raw_affiliation_string":"Polytechnique Montr\u00e9al, Canada","institution_ids":["https://openalex.org/I45683168"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101557702","display_name":"David Barrera","orcid":"https://orcid.org/0000-0003-2319-9916"},"institutions":[{"id":"https://openalex.org/I67031392","display_name":"Carleton University","ror":"https://ror.org/02qtvee93","country_code":"CA","type":"education","lineage":["https://openalex.org/I67031392"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"David Barrera","raw_affiliation_strings":["Carleton Univeristy, Canada"],"affiliations":[{"raw_affiliation_string":"Carleton Univeristy, Canada","institution_ids":["https://openalex.org/I67031392"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5047367078"],"corresponding_institution_ids":["https://openalex.org/I45683168"],"apc_list":null,"apc_paid":null,"fwci":1.1085,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.76520509,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"542","last_page":"555"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7919362783432007},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.7516922950744629},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5856876969337463},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4792066514492035},{"id":"https://openalex.org/keywords/enforcement","display_name":"Enforcement","score":0.4651983678340912},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.42555859684944153},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3811055123806},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1347784698009491}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7919362783432007},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.7516922950744629},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5856876969337463},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4792066514492035},{"id":"https://openalex.org/C2779777834","wikidata":"https://www.wikidata.org/wiki/Q4202277","display_name":"Enforcement","level":2,"score":0.4651983678340912},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.42555859684944153},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3811055123806},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1347784698009491},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3427228.3427235","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3427228.3427235","pdf_url":null,"source":{"id":"https://openalex.org/S4306417673","display_name":"Annual Computer Security Applications Conference","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Annual Computer Security Applications Conference","raw_type":"proceedings-article"},{"id":"pmh:oai:publications.polymtl.ca:47089","is_oa":false,"landing_page_url":"https://publications.polymtl.ca/47089/","pdf_url":null,"source":{"id":"https://openalex.org/S4306401013","display_name":"PolyPublie (\u00c9cole Polytechnique de Montr\u00e9al)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I45683168","host_organization_name":"Polytechnique Montr\u00e9al","host_organization_lineage":["https://openalex.org/I45683168"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Communication de conf\u00e9rence"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1985987493","https://openalex.org/W2508433864","https://openalex.org/W2519006453","https://openalex.org/W2606774910","https://openalex.org/W2614230424","https://openalex.org/W2739845435","https://openalex.org/W2774693509","https://openalex.org/W2790697634","https://openalex.org/W2799758613","https://openalex.org/W2910518367","https://openalex.org/W2929305171","https://openalex.org/W2947969447","https://openalex.org/W2964023268","https://openalex.org/W2975176855","https://openalex.org/W3015806656","https://openalex.org/W3122864121","https://openalex.org/W4248175462","https://openalex.org/W4248587610"],"related_works":["https://openalex.org/W2389214306","https://openalex.org/W4235240664","https://openalex.org/W2965083567","https://openalex.org/W1838576100","https://openalex.org/W4226026301","https://openalex.org/W2095886385","https://openalex.org/W2889616422","https://openalex.org/W2089704382","https://openalex.org/W1983399550","https://openalex.org/W1869907491"],"abstract_inverted_index":{"Selectively":[0],"allowing":[1],"network":[2,46,143,191],"traffic":[3],"has":[4],"emerged":[5],"as":[6],"a":[7,91,100,131,182,188,193],"dominant":[8],"approach":[9],"for":[10,103,130,146],"securing":[11],"consumer":[12],"IoT":[13,23,107,148,190],"devices.":[14],"However,":[15],"determining":[16,104,126],"what":[17],"the":[18,82,86,115,122,127,135,142,158,172,176,200],"allowed":[19],"behavior":[20,87,129,144,155,164],"of":[21,45,70,114,124,141,154,160,185,205],"an":[22,28,58,106],"device":[24,108],"should":[25],"be":[26],"remains":[27],"open":[29],"challenge.":[30],"Proposals":[31],"to":[32,41,171],"date":[33],"have":[34],"relied":[35],"on":[36,187],"manufacturers":[37],"and":[38,85,150,192,203],"trusted":[39],"parties":[40],"provide":[42],"allow":[43,66,68,152,173],"lists":[44,69,153],"traffic,":[47],"but":[48,73],"these":[49],"proposals":[50],"require":[51],"manufacturer":[52],"involvement":[53],"or":[54],"placing":[55],"trust":[56],"in":[57,134,163],"additional":[59],"stakeholder.":[60],"Alternatively,":[61],"locally":[62],"monitoring":[63],"devices":[64,74,113,149],"can":[65],"building":[67],"observed":[71,145,156],"behavior,":[72],"may":[75,88],"not":[76],"exhaust":[77],"their":[78],"functionality":[79],"set":[80],"during":[81],"observation":[83],"period,":[84],"change":[89],"following":[90],"software":[92,166],"update":[93,177],"which":[94],"requires":[95],"re-training.":[96],"This":[97],"paper":[98],"proposes":[99],"blockchain-based":[101],"system":[102],"whether":[105],"is":[109,178],"behaving":[110],"like":[111],"other":[112],"same":[116],"type.":[117],"Our":[118],"system,":[119],"SERENIoT,":[120],"overcomes":[121],"challenge":[123],"initially":[125],"correct":[128],"device.":[132],"Nodes":[133],"SERENIoT":[136,186],"public":[137],"blockchain":[138],"submit":[139],"summaries":[140],"connected":[147],"build":[151],"by":[157],"majority":[159],"nodes.":[161],"Changes":[162],"through":[165],"updates":[167],"are":[168],"automatically":[169],"added":[170],"list":[174],"once":[175],"broadly":[179],"deployed.":[180],"Through":[181],"proof-of-concept":[183],"implementation":[184],"small":[189],"large-scale":[194],"Amazon":[195],"EC2":[196],"simulation,":[197],"we":[198],"evaluate":[199],"security,":[201],"scalability,":[202],"performance":[204],"our":[206],"system.":[207]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
