{"id":"https://openalex.org/W4378176537","doi":"https://doi.org/10.1631/fitee.2200368","title":"Privacy and security federated reference architecture for Internet of Things","display_name":"Privacy and security federated reference architecture for Internet of Things","publication_year":2023,"publication_date":"2023-04-01","ids":{"openalex":"https://openalex.org/W4378176537","doi":"https://doi.org/10.1631/fitee.2200368"},"language":"en","primary_location":{"id":"doi:10.1631/fitee.2200368","is_oa":false,"landing_page_url":"https://doi.org/10.1631/fitee.2200368","pdf_url":null,"source":{"id":"https://openalex.org/S4210189857","display_name":"Frontiers of Information Technology & Electronic Engineering","issn_l":"2095-9184","issn":["2095-9184","2095-9230"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers of Information Technology &amp; Electronic Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5109608653","display_name":"Musab Kamal","orcid":null},"institutions":[{"id":"https://openalex.org/I929597975","display_name":"National University of Sciences and Technology","ror":"https://ror.org/03w2j5y17","country_code":"PK","type":"education","lineage":["https://openalex.org/I929597975"]}],"countries":["PK"],"is_corresponding":true,"raw_author_name":"Musab Kamal","raw_affiliation_strings":["Department of Information Security, National University of Sciences and Technology, Islamabad, 44000, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Information Security, National University of Sciences and Technology, Islamabad, 44000, Pakistan","institution_ids":["https://openalex.org/I929597975"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051478435","display_name":"Imran Rashid","orcid":"https://orcid.org/0000-0001-8958-672X"},"institutions":[{"id":"https://openalex.org/I929597975","display_name":"National University of Sciences and Technology","ror":"https://ror.org/03w2j5y17","country_code":"PK","type":"education","lineage":["https://openalex.org/I929597975"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Imran Rashid","raw_affiliation_strings":["Department of Information Security, National University of Sciences and Technology, Islamabad, 44000, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Information Security, National University of Sciences and Technology, Islamabad, 44000, Pakistan","institution_ids":["https://openalex.org/I929597975"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032009749","display_name":"Waseem Iqbal","orcid":"https://orcid.org/0000-0002-3616-2621"},"institutions":[{"id":"https://openalex.org/I929597975","display_name":"National University of Sciences and Technology","ror":"https://ror.org/03w2j5y17","country_code":"PK","type":"education","lineage":["https://openalex.org/I929597975"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Waseem Iqbal","raw_affiliation_strings":["Department of Information Security, National University of Sciences and Technology, Islamabad, 44000, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Information Security, National University of Sciences and Technology, Islamabad, 44000, Pakistan","institution_ids":["https://openalex.org/I929597975"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011590923","display_name":"Muhammad Haroon Siddiqui","orcid":"https://orcid.org/0000-0001-8933-7336"},"institutions":[{"id":"https://openalex.org/I929597975","display_name":"National University of Sciences and Technology","ror":"https://ror.org/03w2j5y17","country_code":"PK","type":"education","lineage":["https://openalex.org/I929597975"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Muhammad Haroon Siddiqui","raw_affiliation_strings":["Department of Information Security, National University of Sciences and Technology, Islamabad, 44000, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Information Security, National University of Sciences and Technology, Islamabad, 44000, Pakistan","institution_ids":["https://openalex.org/I929597975"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081241379","display_name":"Sohaib Z. Khan","orcid":"https://orcid.org/0000-0001-9023-2689"},"institutions":[{"id":"https://openalex.org/I929597975","display_name":"National University of Sciences and Technology","ror":"https://ror.org/03w2j5y17","country_code":"PK","type":"education","lineage":["https://openalex.org/I929597975"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Sohaib Khan","raw_affiliation_strings":["Department of Information Security, National University of Sciences and Technology, Islamabad, 44000, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Information Security, National University of Sciences and Technology, Islamabad, 44000, Pakistan","institution_ids":["https://openalex.org/I929597975"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101982427","display_name":"Ijaz Ahmad","orcid":"https://orcid.org/0000-0002-6152-8947"},"institutions":[{"id":"https://openalex.org/I4210148924","display_name":"Majan College","ror":"https://ror.org/04dzesb62","country_code":"OM","type":"education","lineage":["https://openalex.org/I4210148924"]}],"countries":["OM"],"is_corresponding":false,"raw_author_name":"Ijaz Ahmad","raw_affiliation_strings":["Faculty of Information Technology, Majan University College, Muscat, 112, Oman"],"affiliations":[{"raw_affiliation_string":"Faculty of Information Technology, Majan University College, Muscat, 112, Oman","institution_ids":["https://openalex.org/I4210148924"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5109608653"],"corresponding_institution_ids":["https://openalex.org/I929597975"],"apc_list":null,"apc_paid":null,"fwci":2.8128,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.90947013,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"24","issue":"4","first_page":"481","last_page":"508"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9916999936103821,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9916999936103821,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13243","display_name":"Innovation in Digital Healthcare Systems","score":0.9886000156402588,"subfield":{"id":"https://openalex.org/subfields/3605","display_name":"Health Information Management"},"field":{"id":"https://openalex.org/fields/36","display_name":"Health Professions"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}},{"id":"https://openalex.org/T14484","display_name":"Technology and Data Analysis","score":0.972599983215332,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7376549243927002},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6726759672164917},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.6626195311546326},{"id":"https://openalex.org/keywords/reference-architecture","display_name":"Reference architecture","score":0.6593909859657288},{"id":"https://openalex.org/keywords/interoperability","display_name":"Interoperability","score":0.632077693939209},{"id":"https://openalex.org/keywords/applications-architecture","display_name":"Applications architecture","score":0.5411734580993652},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.4936996400356293},{"id":"https://openalex.org/keywords/enterprise-information-security-architecture","display_name":"Enterprise information security architecture","score":0.46635428071022034},{"id":"https://openalex.org/keywords/solution-architecture","display_name":"Solution architecture","score":0.45364144444465637},{"id":"https://openalex.org/keywords/standardization","display_name":"Standardization","score":0.4347495436668396},{"id":"https://openalex.org/keywords/space-based-architecture","display_name":"Space-based architecture","score":0.42218565940856934},{"id":"https://openalex.org/keywords/systems-architecture","display_name":"Systems architecture","score":0.309825599193573},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.27237823605537415},{"id":"https://openalex.org/keywords/software-architecture","display_name":"Software architecture","score":0.21947386860847473},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.09667140245437622}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7376549243927002},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6726759672164917},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.6626195311546326},{"id":"https://openalex.org/C55356503","wikidata":"https://www.wikidata.org/wiki/Q2136675","display_name":"Reference architecture","level":4,"score":0.6593909859657288},{"id":"https://openalex.org/C20136886","wikidata":"https://www.wikidata.org/wiki/Q749647","display_name":"Interoperability","level":2,"score":0.632077693939209},{"id":"https://openalex.org/C41065761","wikidata":"https://www.wikidata.org/wiki/Q2193309","display_name":"Applications architecture","level":4,"score":0.5411734580993652},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.4936996400356293},{"id":"https://openalex.org/C31139447","wikidata":"https://www.wikidata.org/wiki/Q5380386","display_name":"Enterprise information security architecture","level":2,"score":0.46635428071022034},{"id":"https://openalex.org/C26063835","wikidata":"https://www.wikidata.org/wiki/Q7558977","display_name":"Solution architecture","level":5,"score":0.45364144444465637},{"id":"https://openalex.org/C188087704","wikidata":"https://www.wikidata.org/wiki/Q369577","display_name":"Standardization","level":2,"score":0.4347495436668396},{"id":"https://openalex.org/C55627697","wikidata":"https://www.wikidata.org/wiki/Q7572175","display_name":"Space-based architecture","level":5,"score":0.42218565940856934},{"id":"https://openalex.org/C98025372","wikidata":"https://www.wikidata.org/wiki/Q477538","display_name":"Systems architecture","level":3,"score":0.309825599193573},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.27237823605537415},{"id":"https://openalex.org/C35869016","wikidata":"https://www.wikidata.org/wiki/Q846636","display_name":"Software architecture","level":3,"score":0.21947386860847473},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.09667140245437622},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1631/fitee.2200368","is_oa":false,"landing_page_url":"https://doi.org/10.1631/fitee.2200368","pdf_url":null,"source":{"id":"https://openalex.org/S4210189857","display_name":"Frontiers of Information Technology & Electronic Engineering","issn_l":"2095-9184","issn":["2095-9184","2095-9230"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers of Information Technology &amp; Electronic Engineering","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.4000000059604645,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W122260415","https://openalex.org/W2126311411","https://openalex.org/W2134295053","https://openalex.org/W2136431085","https://openalex.org/W2321786871","https://openalex.org/W2548313808","https://openalex.org/W2575270978","https://openalex.org/W2604813584","https://openalex.org/W2725998698","https://openalex.org/W2765739766","https://openalex.org/W2785446263","https://openalex.org/W2800306076","https://openalex.org/W2883082709","https://openalex.org/W2885623796","https://openalex.org/W2894202404","https://openalex.org/W2903806156","https://openalex.org/W2964303615","https://openalex.org/W2964490279","https://openalex.org/W2977833371","https://openalex.org/W2997946530","https://openalex.org/W3015401217","https://openalex.org/W3030941702","https://openalex.org/W3047508871","https://openalex.org/W3087285748","https://openalex.org/W3093740656","https://openalex.org/W3106059286","https://openalex.org/W3135010207","https://openalex.org/W3163183564","https://openalex.org/W3170087796","https://openalex.org/W3194392063","https://openalex.org/W4211252641","https://openalex.org/W6922848877"],"related_works":["https://openalex.org/W4238407057","https://openalex.org/W2902876962","https://openalex.org/W2976480616","https://openalex.org/W1559164516","https://openalex.org/W4226237158","https://openalex.org/W2742781925","https://openalex.org/W4249951124","https://openalex.org/W2372256883","https://openalex.org/W2774636489","https://openalex.org/W2356280685"],"abstract_inverted_index":{"Physical":[0],"objects":[1],"are":[2],"getting":[3],"connected":[4,39],"to":[5,47,74,85,124,151],"the":[6,13,16,30,51,68,77,92,103,106,122,128,156,159,163,169,179,190,199,202,213],"Internet":[7,17],"at":[8],"an":[9,167,219],"exceptional":[10],"rate,":[11],"making":[12],"idea":[14],"of":[15,18,32,55,70,95,108,158,201],"Things":[19],"(IoT)":[20],"a":[21,196],"reality.":[22],"The":[23,97],"IoT":[24,63,71,98,129,148,171,191],"ecosystem":[25],"is":[26,195],"evident":[27],"everywhere":[28],"in":[29,76,132,162,189],"form":[31],"smart":[33],"homes,":[34],"health":[35],"care":[36],"systems,":[37],"wearables,":[38],"vehicles,":[40],"and":[41,53,59,88,118,126,136,144,183,187],"industries.":[42],"This":[43,120],"has":[44,100],"given":[45],"rise":[46],"risks":[48],"associated":[49],"with":[50,110,134],"privacy":[52,87,135,181],"security":[54,89,137,172],"systems.":[56],"Security":[57],"issues":[58],"cyber":[60],"attacks":[61,188],"on":[62,155],"devices":[64],"may":[65],"potentially":[66],"hinder":[67],"growth":[69],"products":[72],"due":[73],"deficiencies":[75],"architecture.":[78,204],"To":[79],"counter":[80],"these":[81],"issues,":[82],"we":[83,142],"need":[84,123],"implement":[86],"right":[90],"from":[91],"building":[93],"blocks":[94],"IoT.":[96],"architecture":[99,109,131,174,211,214],"evolved":[101],"over":[102],"years,":[104],"improving":[105],"stack":[107],"new":[111],"solutions":[112],"such":[113],"as":[114],"scalability,":[115],"management,":[116],"interoperability,":[117],"extensibility.":[119],"emphasizes":[121],"standardize":[125],"organize":[127],"reference":[130,149,173,210],"federation":[133],"concerns.":[138],"In":[139],"this":[140],"study,":[141],"examine":[143],"analyze":[145],"12":[146],"existing":[147],"architectures":[150],"identify":[152],"their":[153],"shortcomings":[154],"basis":[157],"requirements":[160],"addressed":[161],"standards.":[164],"We":[165,205],"propose":[166],"architecture,":[168],"privacy-federated":[170],"(PF-IoT-SRA),":[175],"which":[176],"interprets":[177],"all":[178],"involved":[180],"metrics":[182],"counters":[184],"major":[185],"threats":[186],"communication":[192],"environment.":[193],"It":[194],"step":[197],"toward":[198],"standardization":[200],"domain":[203],"effectively":[206],"validate":[207],"our":[208],"proposed":[209],"using":[212],"trade-off":[215],"analysis":[216],"method":[217],"(ATAM),":[218],"industry-recognized":[220],"scenario-based":[221],"approach.":[222]},"counts_by_year":[{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2023-05-26T00:00:00"}
