{"id":"https://openalex.org/W4361200104","doi":"https://doi.org/10.23919/icact56868.2023.10079641","title":"Review of Internet of Things security protocols \u2013 A Bibliometric Analysis","display_name":"Review of Internet of Things security protocols \u2013 A Bibliometric Analysis","publication_year":2023,"publication_date":"2023-02-19","ids":{"openalex":"https://openalex.org/W4361200104","doi":"https://doi.org/10.23919/icact56868.2023.10079641"},"language":"en","primary_location":{"id":"doi:10.23919/icact56868.2023.10079641","is_oa":false,"landing_page_url":"https://doi.org/10.23919/icact56868.2023.10079641","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 25th International Conference on Advanced Communication Technology (ICACT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5090203330","display_name":"Gardner Mwansa","orcid":"https://orcid.org/0000-0003-3827-9783"},"institutions":[{"id":"https://openalex.org/I92579986","display_name":"Walter Sisulu University","ror":"https://ror.org/02svzjn28","country_code":"ZA","type":"education","lineage":["https://openalex.org/I92579986"]}],"countries":["ZA"],"is_corresponding":true,"raw_author_name":"Gardner Mwansa","raw_affiliation_strings":["Walter Sisulu University,Department of Information Technology,East London,South Africa","Department of Information Technology, Walter Sisulu University, East London, South Africa"],"affiliations":[{"raw_affiliation_string":"Walter Sisulu University,Department of Information Technology,East London,South Africa","institution_ids":["https://openalex.org/I92579986"]},{"raw_affiliation_string":"Department of Information Technology, Walter Sisulu University, East London, South Africa","institution_ids":["https://openalex.org/I92579986"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5067275320","display_name":"Ntima Mabanza","orcid":null},"institutions":[{"id":"https://openalex.org/I110603874","display_name":"Central University of Technology","ror":"https://ror.org/033z08192","country_code":"ZA","type":"education","lineage":["https://openalex.org/I110603874"]}],"countries":["ZA"],"is_corresponding":false,"raw_author_name":"Ntima Mabanza","raw_affiliation_strings":["Central University of Technology,Department of Information Technology,Bloemfontein,South Africa","Department of Information Technology, Central University of Technology, Bloemfontein, South Africa"],"affiliations":[{"raw_affiliation_string":"Central University of Technology,Department of Information Technology,Bloemfontein,South Africa","institution_ids":["https://openalex.org/I110603874"]},{"raw_affiliation_string":"Department of Information Technology, Central University of Technology, Bloemfontein, South Africa","institution_ids":["https://openalex.org/I110603874"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5090203330"],"corresponding_institution_ids":["https://openalex.org/I92579986"],"apc_list":null,"apc_paid":null,"fwci":0.4589,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.63227554,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"394","last_page":"400"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9753999710083008,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9753999710083008,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9524000287055969,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9485999941825867,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6758987307548523},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.6481432318687439},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.526006817817688},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5247045755386353},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.5099645853042603},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.5070226192474365},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.4915033280849457},{"id":"https://openalex.org/keywords/internet-security","display_name":"Internet security","score":0.451038658618927},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.41236376762390137},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.345866322517395},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.2518092095851898},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.20284122228622437}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6758987307548523},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.6481432318687439},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.526006817817688},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5247045755386353},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.5099645853042603},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.5070226192474365},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.4915033280849457},{"id":"https://openalex.org/C22111027","wikidata":"https://www.wikidata.org/wiki/Q1070427","display_name":"Internet security","level":4,"score":0.451038658618927},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.41236376762390137},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.345866322517395},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.2518092095851898},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.20284122228622437},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/icact56868.2023.10079641","is_oa":false,"landing_page_url":"https://doi.org/10.23919/icact56868.2023.10079641","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 25th International Conference on Advanced Communication Technology (ICACT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4300000071525574,"id":"https://metadata.un.org/sdg/17","display_name":"Partnerships for the goals"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1548644355","https://openalex.org/W2068452509","https://openalex.org/W2561342496","https://openalex.org/W2755950973","https://openalex.org/W2768718335","https://openalex.org/W2786075294","https://openalex.org/W2888505697","https://openalex.org/W2889430088","https://openalex.org/W2939359430","https://openalex.org/W2955014922","https://openalex.org/W3008629209","https://openalex.org/W3015471529","https://openalex.org/W3045855741","https://openalex.org/W3137875885","https://openalex.org/W4236661749","https://openalex.org/W4250810012"],"related_works":["https://openalex.org/W4244478748","https://openalex.org/W4311097251","https://openalex.org/W4223488648","https://openalex.org/W4205786897","https://openalex.org/W2134969820","https://openalex.org/W2251605416","https://openalex.org/W3150465815","https://openalex.org/W1997222214","https://openalex.org/W2070395303","https://openalex.org/W3020139090"],"abstract_inverted_index":{"The":[0,175],"upsurge":[1],"of":[2,11,18,52,94,96,114,128,135,154,156,170,191,206,234,236,262,281],"the":[3,16,39,42,92,102,126,129,152,161,178,199,211,232,246,279,282],"fourth":[4],"industrial":[5],"revolution":[6],"brings":[7],"about":[8,64],"an":[9,50],"emergence":[10],"cloud-based":[12],"technologies":[13],"such":[14],"as":[15,273],"Internet":[17,95,134,155,190,235,261],"Things":[19,97,136,157,192,237,263],"(IoT).":[20],"By":[21],"design,":[22],"these":[23,222],"devices":[24,71,283],"and":[25,88,165,172,195,201,210],"systems":[26,264],"are":[27],"bound":[28],"to":[29,46,61,68,108,133,250],"operate":[30],"in":[31,49,91,151,189,204,231,242,245,259,277],"complex":[32],"environments":[33],"that":[34,104,124,182,229],"require":[35],"secure":[36],"assurances":[37],"at":[38],"same":[40],"time":[41],"need":[43],"for":[44,160],"mechanisms":[45],"achieve":[47],"resilience":[48,276],"event":[51],"threats":[53],"or":[54],"attacks.":[55],"Little":[56],"attention":[57],"has":[58,227],"been":[59],"paid":[60],"finding":[62],"evidence":[63],"security":[65,98,137,158,193,238],"protocols":[66,159,194,239],"designed":[67],"support":[69],"IoT":[70],"from":[72,168,177],"cyber-attacks.":[73],"To":[74],"accomplish":[75],"this,":[76],"however,":[77],"would":[78],"necessitate":[79],"a":[80,111,121],"literature":[81],"review":[82,122,223],"study":[83,123,226],"on":[84,148,188,221],"current":[85],"trends,":[86],"concerns,":[87],"ongoing":[89],"research":[90,131,186,207,230],"field":[93,153,233],"protocols.":[99,138],"This":[100],"is":[101,184,196,216,240,257],"void":[103],"this":[105,118,225],"paper":[106,116,119,208],"aims":[107],"fill":[109],"through":[110,265],"bibliometric":[112,140,179],"analysis":[113,141,180],"scientific":[115,149],"publications.Hence,":[117],"presents":[120],"assesses":[125],"status":[127],"existing":[130],"relating":[132],"A":[139],"was":[142],"carried":[143],"out":[144],"using":[145],"R":[146],"Studio":[147],"publications":[150,209],"period":[162],"between":[163],"2016":[164],"2022":[166],"retrieved":[167],"Web":[169],"Science":[171],"Scopus":[173],"databases.":[174],"results":[176],"showed":[181],"there":[183],"active":[185],"going":[187],"dominated":[197],"by":[198],"American":[200],"Asian":[202],"continents":[203],"terms":[205],"collaboration":[212],"network":[213],"while":[214],"Africa":[215],"still":[217,241],"lacking":[218],"behind.":[219],"Based":[220],"results,":[224],"established":[228],"its":[243],"infancy":[244],"African":[247],"continent":[248],"compared":[249],"other":[251],"continents.":[252],"In":[253],"addition,":[254],"more":[255,275],"work":[256],"needed":[258],"securing":[260,278],"continued":[266],"protocol":[267],"development":[268],"including":[269],"standardised":[270],"guidelines":[271],"so":[272],"advance":[274],"operations":[280]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
