{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,9]],"date-time":"2024-07-09T08:23:13Z","timestamp":1720513393601},"reference-count":66,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2018,7,1]],"date-time":"2018-07-01T00:00:00Z","timestamp":1530403200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["2016R1A2B4011069"],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Applied Soft Computing"],"published-print":{"date-parts":[[2018,7]]},"DOI":"10.1016\/j.asoc.2017.05.020","type":"journal-article","created":{"date-parts":[[2017,5,17]],"date-time":"2017-05-17T05:30:28Z","timestamp":1494999028000},"page":"811-820","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":18,"special_numbering":"C","title":["An effective handling of secure data stream in IoT"],"prefix":"10.1016","volume":"68","author":[{"given":"Jaejin","family":"Jang","sequence":"first","affiliation":[]},{"given":"Im.Y","family":"Jung","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0003-1831-0309","authenticated-orcid":false,"given":"Jong Hyuk","family":"Park","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"2","key":"10.1016\/j.asoc.2017.05.020_bib0005","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1007\/s11036-013-0489-0","article-title":"Big data: a survey","volume":"19","author":"Chen","year":"2014","journal-title":"Mob. Netw. Appl."},{"issue":"August","key":"10.1016\/j.asoc.2017.05.020_bib0010","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1016\/j.future.2014.08.007","article-title":"External integrity verification for outsourced big data in cloud and IoT: a big picture","volume":"49","author":"Liu","year":"2015","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.asoc.2017.05.020_bib0015","first-page":"127","article-title":"Research on data mining models for the internet of things","author":"Shen","year":"2010","journal-title":"Int. Conf. Image Anal. Signal Process"},{"issue":"1","key":"10.1016\/j.asoc.2017.05.020_bib0020","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1109\/SURV.2013.103013.00206","article-title":"Data mining for internet of things: a survey","volume":"16","author":"Tsai","year":"2014","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"10.1016\/j.asoc.2017.05.020_bib0025","doi-asserted-by":"crossref","DOI":"10.1155\/2015\/431047","article-title":"Data mining for the internet of things: literature review and challenges","author":"Chen","year":"2015","journal-title":"Int. J. Distrib. Sens. Netw."},{"issue":"2","key":"10.1016\/j.asoc.2017.05.020_bib0030","doi-asserted-by":"crossref","DOI":"10.1145\/2481244.2481246","article-title":"Mining big data: current status, and forecast to the future","volume":"14","author":"Fan","year":"2012","journal-title":"SIGKDD Explor."},{"key":"10.1016\/j.asoc.2017.05.020_bib0035","first-page":"212","article-title":"A knowledge-based approach for real-time IoT data stream annotation and processing","author":"Kolozali","year":"2014","journal-title":"2014 IEEE International Conference on Internet of Things (iThings 2014), Green Computing and Communications (GreenCom2014), and Cyber-Physical-Social Computing (CPSCom 2014)"},{"key":"10.1016\/j.asoc.2017.05.020_bib0040","first-page":"54","article-title":"Energy-efficient dynamic traffic offloading and reconfiguration of networked data centers for big data stream mobile computing: review, challenges, and a case study","author":"Baccarelli","year":"2016","journal-title":"IEEE Network March\/April 2016"},{"key":"10.1016\/j.asoc.2017.05.020_bib0045","article-title":"Sensing as a service and big data","author":"Zaslavsky","year":"2012","journal-title":"International Conference on Advances in Cloud Computing (ACC)"},{"issue":"6","key":"10.1016\/j.asoc.2017.05.020_bib0050","doi-asserted-by":"crossref","first-page":"1447","DOI":"10.1109\/TPDS.2013.295","article-title":"Elastic scaling for data stream processing","volume":"25","author":"Gedik","year":"2014","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"10.1016\/j.asoc.2017.05.020_bib0055","article-title":"A survey on different trends in data streams","author":"Lakshmi","year":"2010","journal-title":"International Conference on Networking and Information Technology (ICNIT)"},{"issue":"2","key":"10.1016\/j.asoc.2017.05.020_bib0060","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1007\/s10619-005-3296-1","article-title":"Stream cube: an architecture for multi-dimensional analysis of data streams","volume":"18","author":"Han","year":"2005","journal-title":"Distrib. Parallel Databases"},{"issue":"3","key":"10.1016\/j.asoc.2017.05.020_bib0065","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1552303.1552305","article-title":"Stream data clustering based on grid density and attraction","volume":"3","author":"Tu","year":"2009","journal-title":"ACM Trans. Knowl. Discov. Data (TKDD)"},{"key":"10.1016\/j.asoc.2017.05.020_bib0070","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1016\/j.protcy.2013.12.483","article-title":"Data mining \u2013 past, present and future \u2013 a typical survey on data streams","volume":"12","author":"PhridviRaj","year":"2014","journal-title":"Procedia Technol."},{"key":"10.1016\/j.asoc.2017.05.020_bib0075","doi-asserted-by":"crossref","DOI":"10.1145\/1281192.1281210","article-title":"Density-based clustering for real-time stream data","author":"Chen","year":"2007","journal-title":"13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining"},{"issue":"1","key":"10.1016\/j.asoc.2017.05.020_bib0080","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2674026.2674028","article-title":"Open challenges for data stream mining research","volume":"16","author":"Krempl","year":"2014","journal-title":"ACM SIGKDD Explor. Newslett."},{"key":"10.1016\/j.asoc.2017.05.020_bib0085","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1145\/2783258.2783372","article-title":"Efficient online evaluation of big data stream classifiers","author":"Bifet","year":"2015","journal-title":"21st ACM SIGKDD International Conference on Knowledge Discovery and Data Mining"},{"issue":"2","key":"10.1016\/j.asoc.2017.05.020_bib0090","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1145\/776985.776986","article-title":"Issues in data stream management","volume":"32","author":"Golab","year":"2003","journal-title":"ACM SIGMOD Rec."},{"key":"10.1016\/j.asoc.2017.05.020_bib0095","first-page":"1","article-title":"Models and issues in data stream systems","author":"Babcock","year":"2002","journal-title":"ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems"},{"issue":"1","key":"10.1016\/j.asoc.2017.05.020_bib0100","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1109\/TKDE.2013.109","article-title":"Data mining with big data","volume":"26","author":"Wu","year":"2014","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"2","key":"10.1016\/j.asoc.2017.05.020_bib0105","first-page":"275","article-title":"Using mobile data collectors to enhance energy efficiency and reliability in delay tolerant wireless sensor networks","volume":"12","author":"Yasmine-Derdour","year":"2016","journal-title":"J. Inf. Process. Syst."},{"issue":"4","key":"10.1016\/j.asoc.2017.05.020_bib0110","article-title":"A review on stochastic approach for dynamic power management in wireless sensor networks","volume":"5","author":"Pughat","year":"2015","journal-title":"Hum. Cent. Comput. Inf. Sci."},{"key":"10.1016\/j.asoc.2017.05.020_bib0115","series-title":"IEEE 802.3 \u2018Standard for Ethernet\u2019 Marks 30 Years of Innovation and Global Market Growth","author":"I.S. Association","year":"2013"},{"key":"10.1016\/j.asoc.2017.05.020_bib0120","author":"I.S. for Information Technology","year":"2007"},{"key":"10.1016\/j.asoc.2017.05.020_bib0125","author":"I.S. for Information Technology","year":"2013"},{"key":"10.1016\/j.asoc.2017.05.020_bib0130","series-title":"Z-Wave Transceivers \u2013 Specification of Spectrum Related Components","author":"Z.-W.A.R. ZAD12837","year":"2014"},{"key":"10.1016\/j.asoc.2017.05.020_bib0135","series-title":"IEEE P802.15.4-REVc\/D00(Revision IEEE Std 802.15.4-2011)","author":"I.D.S. for Low-rate Wireless Personal Area Networks (WPANs)","year":"2015"},{"issue":"11","key":"10.1016\/j.asoc.2017.05.020_bib0140","doi-asserted-by":"crossref","DOI":"10.1109\/LCOMM.2011.092011.111314","article-title":"Modeling the maximum throughput of bluetooth low energy in an error-prone link","volume":"15","author":"Gomez","year":"2011","journal-title":"IEEE Commun. Lett."},{"key":"10.1016\/j.asoc.2017.05.020_bib0145","series-title":"RFC 894: Standard for the Transmission of IP Datagrams over Ethernet Networks","author":"Hornig","year":"1984"},{"key":"10.1016\/j.asoc.2017.05.020_bib0150","series-title":"RFC 4994: Transmission of IPv6 Packets over IEEE 802.15.4 Networks","author":"Melorose","year":"2015"},{"key":"10.1016\/j.asoc.2017.05.020_bib0155","series-title":"IETF Draft: Transmission of IPv6 Packets over BLUETOOTH Low Energy","author":"Nieminen","year":"2013"},{"issue":"13","key":"10.1016\/j.asoc.2017.05.020_bib0160","article-title":"Performance evaluation of data aggregation for cluster-based wireless sensor network","volume":"3","author":"Sinha","year":"2013","journal-title":"Hum. Cent. Comput. Inf. Sci."},{"key":"10.1016\/j.asoc.2017.05.020_bib0165","article-title":"Raspberry pi as internet of things hardware: performances and constraints","author":"Vujovi\u0107","year":"2014","journal-title":"International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)"},{"key":"10.1016\/j.asoc.2017.05.020_bib0170","first-page":"1","article-title":"Powering IoT devices: a novel design and analysis technique","volume":"7","author":"Technique","year":"2016","journal-title":"J. Converg."},{"key":"10.1016\/j.asoc.2017.05.020_bib0175","series-title":"RFC 4919: IPv6 Over Low-power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals","author":"Kushalnagar","year":"2007"},{"key":"10.1016\/j.asoc.2017.05.020_bib0180","series-title":"RFC 2460: Internet Protocol, Version 6 (IPv6) Specification","author":"Deering","year":"1998"},{"key":"10.1016\/j.asoc.2017.05.020_bib0185","first-page":"287","article-title":"6LoWPAN compressed DTLS for CoAP","author":"Raza","year":"2012","journal-title":"IEEE International Conference on Distributed Computing in Sensor Systems"},{"key":"10.1016\/j.asoc.2017.05.020_bib0190","article-title":"Distributed code constructions for the entire Slepian\u2013Wolf rate region for arbitrarily correlated sources","author":"Schonberg","year":"2004","journal-title":"Data Compression Conference"},{"key":"10.1016\/j.asoc.2017.05.020_bib0195","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1109\/TIT.1962.1057683","article-title":"Low-density parity-check codes","volume":"8","author":"Gallager","year":"1962","journal-title":"IRE Trans. Inf. Theory"},{"key":"10.1016\/j.asoc.2017.05.020_bib0200","series-title":"Low-density Parity-check Code, Decoding","author":"Wikimedia.org","year":"2017"},{"issue":"2","key":"10.1016\/j.asoc.2017.05.020_bib0205","article-title":"DLSeF: a dynamic key-length-based efficient real-time security verification model for big data stream","volume":"6","author":"Puthal","year":"2016","journal-title":"ACM Trans. Embed. Comput. Syst. (TECS)"},{"key":"10.1016\/j.asoc.2017.05.020_bib0210","article-title":"Securing communication in 6LoWPAN with compressed IPsec","author":"Raza","year":"2011","journal-title":"International Conference on Distributed Computing in Sensor Systems"},{"key":"10.1016\/j.asoc.2017.05.020_bib0215","series-title":"IPSec Overview Part Two: Modes and transforms","author":"Mason","year":"2002"},{"key":"10.1016\/j.asoc.2017.05.020_bib0220","series-title":"RFC 6282: Compression Format for IPv6 Datagrams over IEEE 802.15.4 Based Networks","author":"Melorose","year":"2015"},{"key":"10.1016\/j.asoc.2017.05.020_bib0225","series-title":"Measuring Entropy: Information Theory, cS 463\/480 Lecture","author":"Lawlor","year":"2015"},{"key":"10.1016\/j.asoc.2017.05.020_bib0230","unstructured":"O.F. Inc., Openssl Command, http:\/\/www.openssl.org."},{"key":"10.1016\/j.asoc.2017.05.020_bib0235","series-title":"Cryptography and Network Security: Principles and Practices","author":"Stallings","year":"2006"},{"key":"10.1016\/j.asoc.2017.05.020_bib0240","series-title":"Cryptography and Network Security (SIE)","author":"Forouzan","year":"2011"},{"issue":"10","key":"10.1016\/j.asoc.2017.05.020_bib0245","doi-asserted-by":"crossref","DOI":"10.1109\/LCOMM.2002.804244","article-title":"Compression of binary sources with side information at the decoder using LDPC codes","volume":"6","author":"Liveris","year":"2002","journal-title":"IEEE Commun. Lett."},{"key":"10.1016\/j.asoc.2017.05.020_bib0250","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1090\/dimacs\/066\/16","article-title":"Noiseless data compression with low-density parity-check codes","volume":"66","author":"Caire","year":"2004","journal-title":"Adv. Netw. Inf. Theory"},{"issue":"10","key":"10.1016\/j.asoc.2017.05.020_bib0255","doi-asserted-by":"crossref","first-page":"2992","DOI":"10.1109\/TSP.2004.833860","article-title":"On compressing encrypted data","volume":"52","author":"Johnson","year":"2004","journal-title":"IEEE Trans. Signal Process."},{"issue":"3","key":"10.1016\/j.asoc.2017.05.020_bib0260","first-page":"23","article-title":"Smoothing and optimal compression of encrypted gray scale images","volume":"2","author":"Kishore","year":"2012","journal-title":"Int. J. Eng. Res. Appl. (IJERA)"},{"key":"10.1016\/j.asoc.2017.05.020_bib0265","article-title":"Lossless compression of encrypted grey-level and color images","author":"Lazzeretti","year":"2008","journal-title":"European Signal Processing Conference (EUSIPCO)"},{"key":"10.1016\/j.asoc.2017.05.020_bib0270","article-title":"Apache Flink: unified stream and batch processing in a single engine","author":"Carbone","year":"2015","journal-title":"IEEE International Conference on Data Engineering (ICDE)"},{"key":"10.1016\/j.asoc.2017.05.020_bib0275","article-title":"SOUL: an edge-cloud system for mobile applications in a sensor-rich world","author":"Jang","year":"2016","journal-title":"IEEE\/ACM Symposium on Edge Computing"},{"key":"10.1016\/j.asoc.2017.05.020_bib0280","article-title":"Energy-optimal batching periods for asynchronous multistage data processing on sensor nodes: foundations and an mPlatform case study","author":"Wang","year":"2010","journal-title":"IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS)"},{"key":"10.1016\/j.asoc.2017.05.020_bib0285","article-title":"Message batching in wireless sensor networks \u2013 a perturbation analysis approach","author":"Ning","year":"2010","journal-title":"IEEE Conference on Decision and Control"},{"issue":"1","key":"10.1016\/j.asoc.2017.05.020_bib0290","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1504\/IJWMC.2007.013798","article-title":"Grain: a stream cipher for constrained environments","volume":"2","author":"Hell","year":"2007","journal-title":"Int. J. Wirel. Mob. Comput."},{"key":"10.1016\/j.asoc.2017.05.020_bib0295","series-title":"TRIVIUM Specifications","author":"Canniere","year":"2005"},{"key":"10.1016\/j.asoc.2017.05.020_bib0300","author":"Babbage","year":"2006","journal-title":"The stream cipher MICKEY 2.0, eCRYPT Stream Cipher Project"},{"key":"10.1016\/j.asoc.2017.05.020_bib0305","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-37949-9_54","article-title":"WG-8: a lightweight stream cipher for resource-constrained smart devices","author":"Fan","year":"2013","journal-title":"International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness"},{"key":"10.1016\/j.asoc.2017.05.020_bib0310","unstructured":"SHT75 Datasheet, http:\/\/legacy.caricoos.org."},{"key":"10.1016\/j.asoc.2017.05.020_bib0315","unstructured":"N. Semiconductor, nRF5 SDK for IoT, https:\/\/www.nordicsemi.com\/eng\/Products\/Bluetooth-low-energy\/nRF5-SDK-for-IoT."},{"key":"10.1016\/j.asoc.2017.05.020_bib0320","series-title":"Software for Low Density Parity Check Codes","author":"Neal","year":"2012"},{"key":"10.1016\/j.asoc.2017.05.020_bib0325","series-title":"Online Decorrelation of Humidity and Temperature in Chemical Sensors for Continuous Monitoring, Chemometrics and Intelligent Laboratory Systems","author":"Huerta","year":"2016"},{"key":"10.1016\/j.asoc.2017.05.020_bib0330","doi-asserted-by":"crossref","first-page":"2561","DOI":"10.1016\/j.jpdc.2014.01.003","article-title":"Trends in big data analytics","volume":"74","author":"Kambatla","year":"2014","journal-title":"J. Parallel Distrib. Comput."}],"container-title":["Applied Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1568494617302739?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1568494617302739?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2022,7,28]],"date-time":"2022-07-28T17:04:43Z","timestamp":1659027883000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1568494617302739"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7]]},"references-count":66,"alternative-id":["S1568494617302739"],"URL":"https:\/\/doi.org\/10.1016\/j.asoc.2017.05.020","relation":{},"ISSN":["1568-4946"],"issn-type":[{"value":"1568-4946","type":"print"}],"subject":[],"published":{"date-parts":[[2018,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"An effective handling of secure data stream in IoT","name":"articletitle","label":"Article Title"},{"value":"Applied Soft Computing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.asoc.2017.05.020","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2017 Published by Elsevier B.V.","name":"copyright","label":"Copyright"}]}}