{"id":"https://openalex.org/W3196182435","doi":"https://doi.org/10.3233/jcs-210027","title":"<tt>AntibIoTic</tt>: The Fog-enhanced distributed security system to protect the (legacy) Internet of Things","display_name":"<tt>AntibIoTic</tt>: The Fog-enhanced distributed security system to protect the (legacy) Internet of Things","publication_year":2021,"publication_date":"2021-08-11","ids":{"openalex":"https://openalex.org/W3196182435","doi":"https://doi.org/10.3233/jcs-210027","mag":"3196182435"},"language":"en","primary_location":{"id":"doi:10.3233/jcs-210027","is_oa":true,"landing_page_url":"https://doi.org/10.3233/jcs-210027","pdf_url":"https://content.iospress.com:443/download/journal-of-computer-security/jcs210027?id=journal-of-computer-security%2Fjcs210027","source":{"id":"https://openalex.org/S106992369","display_name":"Journal of Computer Security","issn_l":"0926-227X","issn":["0926-227X","1875-8924"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://content.iospress.com:443/download/journal-of-computer-security/jcs210027?id=journal-of-computer-security%2Fjcs210027","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5049334028","display_name":"Michele De Donno","orcid":"https://orcid.org/0000-0001-9056-9281"},"institutions":[{"id":"https://openalex.org/I96673099","display_name":"Technical University of Denmark","ror":"https://ror.org/04qtj9h94","country_code":"DK","type":"education","lineage":["https://openalex.org/I96673099"]}],"countries":["DK"],"is_corresponding":false,"raw_author_name":"Michele De Donno","raw_affiliation_strings":["DTU Compute, Technical University of Denmark, Denmark. E-mails:\u00a0,\u00a0,\u00a0"],"affiliations":[{"raw_affiliation_string":"DTU Compute, Technical University of Denmark, Denmark. E-mails:\u00a0,\u00a0,\u00a0","institution_ids":["https://openalex.org/I96673099"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018416804","display_name":"Xenofon Fafoutis","orcid":"https://orcid.org/0000-0002-9871-0013"},"institutions":[{"id":"https://openalex.org/I96673099","display_name":"Technical University of Denmark","ror":"https://ror.org/04qtj9h94","country_code":"DK","type":"education","lineage":["https://openalex.org/I96673099"]}],"countries":["DK"],"is_corresponding":false,"raw_author_name":"Xenofon Fafoutis","raw_affiliation_strings":["DTU Compute, Technical University of Denmark, Denmark. E-mails:\u00a0,\u00a0,\u00a0"],"affiliations":[{"raw_affiliation_string":"DTU Compute, Technical University of Denmark, Denmark. E-mails:\u00a0,\u00a0,\u00a0","institution_ids":["https://openalex.org/I96673099"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5006444565","display_name":"Nicola Dragoni","orcid":"https://orcid.org/0000-0001-9575-2990"},"institutions":[{"id":"https://openalex.org/I96673099","display_name":"Technical University of Denmark","ror":"https://ror.org/04qtj9h94","country_code":"DK","type":"education","lineage":["https://openalex.org/I96673099"]}],"countries":["DK"],"is_corresponding":true,"raw_author_name":"Nicola Dragoni","raw_affiliation_strings":["DTU Compute, Technical University of Denmark, Denmark. E-mails:\u00a0,\u00a0,\u00a0"],"affiliations":[{"raw_affiliation_string":"DTU Compute, Technical University of Denmark, Denmark. E-mails:\u00a0,\u00a0,\u00a0","institution_ids":["https://openalex.org/I96673099"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5006444565"],"corresponding_institution_ids":["https://openalex.org/I96673099"],"apc_list":null,"apc_paid":null,"fwci":0.1528,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.50591825,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"30","issue":"5","first_page":"689","last_page":"725"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10444","display_name":"Context-Aware Activity Recognition Systems","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9916999936103821,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7883638143539429},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6563050746917725},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6495801210403442},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6431594491004944},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5621053576469421},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5368106365203857},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4662702679634094},{"id":"https://openalex.org/keywords/default-gateway","display_name":"Default gateway","score":0.43942031264305115},{"id":"https://openalex.org/keywords/host","display_name":"Host (biology)","score":0.437055379152298},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.16571831703186035}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7883638143539429},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6563050746917725},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6495801210403442},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6431594491004944},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5621053576469421},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5368106365203857},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4662702679634094},{"id":"https://openalex.org/C187713609","wikidata":"https://www.wikidata.org/wiki/Q2465461","display_name":"Default gateway","level":2,"score":0.43942031264305115},{"id":"https://openalex.org/C126831891","wikidata":"https://www.wikidata.org/wiki/Q221673","display_name":"Host (biology)","level":2,"score":0.437055379152298},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.16571831703186035},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3233/jcs-210027","is_oa":true,"landing_page_url":"https://doi.org/10.3233/jcs-210027","pdf_url":"https://content.iospress.com:443/download/journal-of-computer-security/jcs210027?id=journal-of-computer-security%2Fjcs210027","source":{"id":"https://openalex.org/S106992369","display_name":"Journal of Computer Security","issn_l":"0926-227X","issn":["0926-227X","1875-8924"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Security","raw_type":"journal-article"},{"id":"pmh:oai:pure.atira.dk:publications/c44875f0-400e-4446-bc8c-4028436e26e7","is_oa":true,"landing_page_url":"https://orbit.dtu.dk/en/publications/c44875f0-400e-4446-bc8c-4028436e26e7","pdf_url":null,"source":{"id":"https://openalex.org/S4306400705","display_name":"Technical University of Denmark, DTU Orbit (Technical University of Denmark, DTU)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I96673099","host_organization_name":"Technical University of Denmark","host_organization_lineage":["https://openalex.org/I96673099"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"De Donno , M , Fafoutis , X &amp; Dragoni , N 2022 , ' AntibIoTic: the Fog-enhanced distributed security system to protect the (legacy) Internet of Things ' , Journal of Computer Security , vol. 30 , no. 5 , pp. 689-725 . https://doi.org/10.3233/JCS-210027","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3233/jcs-210027","is_oa":true,"landing_page_url":"https://doi.org/10.3233/jcs-210027","pdf_url":"https://content.iospress.com:443/download/journal-of-computer-security/jcs210027?id=journal-of-computer-security%2Fjcs210027","source":{"id":"https://openalex.org/S106992369","display_name":"Journal of Computer Security","issn_l":"0926-227X","issn":["0926-227X","1875-8924"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Security","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17","score":0.5}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3196182435.pdf","grobid_xml":"https://content.openalex.org/works/W3196182435.grobid-xml"},"referenced_works_count":63,"referenced_works":["https://openalex.org/W1827145905","https://openalex.org/W2077121139","https://openalex.org/W2105103777","https://openalex.org/W2114623221","https://openalex.org/W2180023424","https://openalex.org/W2289689155","https://openalex.org/W2330269052","https://openalex.org/W2401503174","https://openalex.org/W2482930083","https://openalex.org/W2562159446","https://openalex.org/W2738961882","https://openalex.org/W2748266636","https://openalex.org/W2760063353","https://openalex.org/W2775533747","https://openalex.org/W2788455797","https://openalex.org/W2792628397","https://openalex.org/W2793723077","https://openalex.org/W2795042312","https://openalex.org/W2796934112","https://openalex.org/W2800212654","https://openalex.org/W2803971618","https://openalex.org/W2889253201","https://openalex.org/W2899346060","https://openalex.org/W2902106343","https://openalex.org/W2926525016","https://openalex.org/W2927807985","https://openalex.org/W2935047029","https://openalex.org/W2942653132","https://openalex.org/W2943086164","https://openalex.org/W2951931263","https://openalex.org/W2965735005","https://openalex.org/W2966713853","https://openalex.org/W2966900784","https://openalex.org/W2968774960","https://openalex.org/W2969335168","https://openalex.org/W2969468102","https://openalex.org/W2973280956","https://openalex.org/W2976388545","https://openalex.org/W2979561210","https://openalex.org/W2980821238","https://openalex.org/W2987654321","https://openalex.org/W2994515354","https://openalex.org/W2999105360","https://openalex.org/W3001047098","https://openalex.org/W3006112862","https://openalex.org/W3007330250","https://openalex.org/W3011027433","https://openalex.org/W3013753322","https://openalex.org/W3017752721","https://openalex.org/W3020687048","https://openalex.org/W3022162203","https://openalex.org/W3024340288","https://openalex.org/W3031842551","https://openalex.org/W3039274670","https://openalex.org/W3040775698","https://openalex.org/W3040916395","https://openalex.org/W3104526589","https://openalex.org/W3105068263","https://openalex.org/W3166145521","https://openalex.org/W4205752810","https://openalex.org/W4236993474","https://openalex.org/W4241622335","https://openalex.org/W4289670770"],"related_works":["https://openalex.org/W4245926026","https://openalex.org/W4311097251","https://openalex.org/W2586548817","https://openalex.org/W2625093826","https://openalex.org/W4410295802","https://openalex.org/W4200598720","https://openalex.org/W2921026492","https://openalex.org/W4247463117","https://openalex.org/W4361251261","https://openalex.org/W2389214306"],"abstract_inverted_index":{"The":[0,60,98],"Internet":[1],"of":[2,13,64,68,85,152,169],"Things":[3],"(IoT)":[4],"is":[5,62],"evolving":[6],"our":[7],"society;":[8],"however,":[9],"the":[10,80,83,86,139,150,170,189],"growing":[11],"adoption":[12],"IoT":[14,32,55,87,96,125,153],"devices":[15],"in":[16,149],"many":[17],"scenarios":[18],"brings":[19],"security":[20,25,46,104],"and":[21,72,89,118,133,136,146,158,179,183],"privacy":[22],"implications.":[23],"Current":[24],"solutions":[26],"are":[27],"either":[28],"unsuitable":[29],"for":[30,123],"every":[31],"scenario":[33],"or":[34],"provide":[35],"only":[36],"partial":[37],"security.":[38,154],"This":[39,155],"paper":[40],"presents":[41],"AntibIoTic":[42,127],"2.0,":[43],"a":[44,65,75,90],"distributed":[45,111],"system":[47,61,100],"that":[48,175,187],"relies":[49],"on":[50,94,138,163],"Fog":[51,70,76],"computing":[52],"to":[53,120,143],"secure":[54],"devices,":[56],"including":[57],"legacy":[58,124],"ones.":[59],"composed":[63],"backbone,":[66],"made":[67],"core":[69],"nodes":[71],"Cloud":[73],"server,":[74],"node":[77],"acting":[78],"at":[79],"edge":[81],"as":[82],"gateway":[84],"network,":[88],"lightweight":[91],"agent":[92],"running":[93],"each":[95],"device.":[97],"proposed":[99],"offers":[101],"fine-grained,":[102],"host-level":[103],"coupled":[105],"with":[106],"network-level":[107],"protection,":[108],"while":[109],"its":[110,177,181],"nature":[112],"makes":[113],"it":[114,141,193],"scalable,":[115],"versatile,":[116],"lightweight,":[117],"easy":[119],"deploy,":[121],"also":[122,130],"deployments.":[126],"2.0":[128],"can":[129],"publish":[131],"anonymized":[132],"aggregated":[134],"data":[135],"statistics":[137],"deployments":[140],"secures,":[142],"increase":[144],"awareness":[145],"push":[147],"cooperations":[148],"area":[151],"manuscript":[156],"recaps":[157],"largely":[159],"expands":[160],"previous":[161],"works":[162],"AntibIoTic,":[164],"providing":[165],"an":[166,172,184],"enhanced":[167],"design":[168],"system,":[171],"extended":[173],"proof-of-concept":[174],"proves":[176],"feasibility":[178],"shows":[180],"operation,":[182],"experimental":[185],"evaluation":[186],"reports":[188],"low":[190],"computational":[191],"overhead":[192],"causes.":[194]},"counts_by_year":[{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2021-08-30T00:00:00"}
