{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,31]],"date-time":"2024-08-31T05:49:18Z","timestamp":1725083358990},"reference-count":162,"publisher":"Elsevier BV","issue":"2","license":[{"start":{"date-parts":[[2018,4,1]],"date-time":"2018-04-01T00:00:00Z","timestamp":1522540800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2017,1,12]],"date-time":"2017-01-12T00:00:00Z","timestamp":1484179200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Digital Communications and Networks"],"published-print":{"date-parts":[[2018,4]]},"DOI":"10.1016\/j.dcan.2017.04.003","type":"journal-article","created":{"date-parts":[[2017,4,13]],"date-time":"2017-04-13T12:01:24Z","timestamp":1492084884000},"page":"118-137","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":324,"title":["A roadmap for security challenges in the Internet of Things"],"prefix":"10.1016","volume":"4","author":[{"given":"Arbia","family":"Riahi Sfar","sequence":"first","affiliation":[]},{"given":"Enrico","family":"Natalizio","sequence":"additional","affiliation":[]},{"given":"Yacine","family":"Challal","sequence":"additional","affiliation":[]},{"given":"Zied","family":"Chtourou","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"7","key":"10.1016\/j.dcan.2017.04.003_bib1","doi-asserted-by":"crossref","first-page":"1645","DOI":"10.1016\/j.future.2013.01.010","article-title":"Internet of things (Iot): a vision, architectural elements, and future directions","volume":"29","author":"Gubbi","year":"2013","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.dcan.2017.04.003_bib2","unstructured":"H. Sundmaeker, P. Guillemin, P. Friess, S. Woelffle (Eds.), Vision and Challenges for Realising the Internet of Things, 2010."},{"key":"10.1016\/j.dcan.2017.04.003_bib3","doi-asserted-by":"crossref","unstructured":"B. Zhu, A. Joseph, S. Sastry, A taxonomy of cyber attacks on scada systems, in: Proceedings of the 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing, ITHINGSCPSCOM\u201911, IEEE Computer Society, Washington, D.C., USA, 2011, pp. 380\u2013388.","DOI":"10.1109\/iThings\/CPSCom.2011.34"},{"key":"10.1016\/j.dcan.2017.04.003_bib4","unstructured":"Y. Challal, Securite de l\u2019internet des objets: vers une approche cognitive et systemique, Hdr, Universite de Technologie de Compiegne, 2012."},{"key":"10.1016\/j.dcan.2017.04.003_bib5","doi-asserted-by":"crossref","unstructured":"A. Riahi, Y. Challal, E. Natalizio, Z. Chtourou, A. Bouabdallah, A systemic approach for iot security, in: Proceedings of the DCOSS, IEEE, 2013, pp. 351\u2013355.","DOI":"10.1109\/DCOSS.2013.78"},{"issue":"15","key":"10.1016\/j.dcan.2017.04.003_bib6","doi-asserted-by":"crossref","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","article-title":"The internet of things: a survey","volume":"54","author":"Atzori","year":"2010","journal-title":"Comput. Netw."},{"issue":"7","key":"10.1016\/j.dcan.2017.04.003_bib7","doi-asserted-by":"crossref","first-page":"1497","DOI":"10.1016\/j.adhoc.2012.02.016","article-title":"Survey internet of things: vision, applications and research challenges","volume":"10","author":"Miorandi","year":"2012","journal-title":"Ad Hoc Netw."},{"key":"10.1016\/j.dcan.2017.04.003_bib8","series-title":"Managing and Mining Sensor Data","first-page":"383","article-title":"The internet of things: a survey from the data-centric perspective","author":"Aggarwal","year":"2013"},{"issue":"9","key":"10.1016\/j.dcan.2017.04.003_bib9","doi-asserted-by":"crossref","first-page":"2194","DOI":"10.3837\/tiis.2013.09.007","article-title":"Accurate performance evaluation of internet multicast architectures: hierarchical and fully distributed vs. service-centric","volume":"7","author":"Said","year":"2013","journal-title":"TIIS"},{"key":"10.1016\/j.dcan.2017.04.003_bib10","unstructured":"C. Perera, A.B. Zaslavsky, P. Christen, D. Georgakopoulos, Context Aware Computing for the Internet of Things: A Survey, CoRR abs\/1305.0982."},{"key":"10.1016\/j.dcan.2017.04.003_bib11","unstructured":"O. Vermesan, P. Friess, P. Guillemin, S. Gusmeroli, H. Sundmaeker, A. Bassi, I.S. Jubert, M. Mazura, M. Harrison, M. Eisenhauer, P. Doody, Internet of Things Strategic Research Roadmap, Tech. Rep., IERC Cluster SRA, 2011."},{"key":"10.1016\/j.dcan.2017.04.003_bib12","first-page":"1","article-title":"Security for the internet of things: a survey of existing protocols and open research issues","volume":"99","author":"Granjal","year":"2015","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"10.1016\/j.dcan.2017.04.003_bib13","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1016\/j.comnet.2014.11.008","article-title":"Security, privacy and trust in internet of things: the road ahead","volume":"76","author":"Sicari","year":"2015","journal-title":"Comput. Netw."},{"key":"10.1016\/j.dcan.2017.04.003_bib14","unstructured":"J. Pescatore, G. Shpantzer, Securing the Internet of Things Survey, InfoSec Reading Room."},{"issue":"7","key":"10.1016\/j.dcan.2017.04.003_bib15","doi-asserted-by":"crossref","first-page":"1069","DOI":"10.3390\/s16071069","article-title":"Internet of things: a review of surveys based on context aware intelligent services","volume":"16","author":"Gil","year":"2016","journal-title":"Sensors"},{"key":"10.1016\/j.dcan.2017.04.003_bib16","doi-asserted-by":"crossref","unstructured":"A. Riahi, E. Natalizio, Y. Challal, N. Mitton, A. Iera, A systemic and cognitive approach for IoT security, in: Proceedings of the International Conference on Computing, Networking and Communications (ICNC 2014), Honolulu, United States, 2014, Invited Paper.","DOI":"10.1109\/ICCNC.2014.6785328"},{"issue":"6","key":"10.1016\/j.dcan.2017.04.003_bib17","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1109\/MSP.2006.167","article-title":"Systemic security management","volume":"4","author":"Kiely","year":"2006","journal-title":"IEEE Secur. Priv."},{"key":"10.1016\/j.dcan.2017.04.003_bib18","unstructured":"R. Publishers (Ed.), Principles of Inductive Near Field Communications for Internet of Things, 2011."},{"issue":"12","key":"10.1016\/j.dcan.2017.04.003_bib19","first-page":"3111","article-title":"Artificial immunity-based security response model for the internet of things","volume":"8","author":"Liu","year":"2013","journal-title":"JCP"},{"key":"10.1016\/j.dcan.2017.04.003_bib20","doi-asserted-by":"crossref","unstructured":"C. Liu, J. Yang, R. Chen, Y. Zhang, J. Zeng, Research on immunity-based intrusion detection technology for the internet of things., in: Y. Ding, H. Wang, N. Xiong, K. Hao, L. Wang (Eds.), Proceedings of the ICNC, IEEE, 2011, pp. 212\u2013216.","DOI":"10.1109\/ICNC.2011.6022060"},{"key":"10.1016\/j.dcan.2017.04.003_bib21","unstructured":"J. Pescatore, Securing the Internet of Things Survey: A Sans Analyst Survey, Tech. Rep., SANS Institute, January 2014."},{"issue":"1","key":"10.1016\/j.dcan.2017.04.003_bib22","doi-asserted-by":"crossref","first-page":"531","DOI":"10.1109\/COMST.2016.2610963","article-title":"Networking for big data: a survey","volume":"19","author":"Yu","year":"2017","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"10.1016\/j.dcan.2017.04.003_bib23","doi-asserted-by":"crossref","first-page":"2751","DOI":"10.1109\/ACCESS.2016.2577036","article-title":"Big privacy: challenges and opportunities of privacy study in the age of big data","volume":"4","author":"Yu","year":"2016","journal-title":"IEEE Access"},{"key":"10.1016\/j.dcan.2017.04.003_bib24","doi-asserted-by":"crossref","unstructured":"P. Samarati, L. Sweeney, Generalizing data to provide anonymity when disclosing information, in: Proceedings of the 17th ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS 1998), Seattle, WA, USA, 1998.","DOI":"10.1145\/275487.275508"},{"issue":"6","key":"10.1016\/j.dcan.2017.04.003_bib25","doi-asserted-by":"crossref","first-page":"1010","DOI":"10.1109\/69.971193","article-title":"Protecting respondents identities in microdata release","volume":"13","author":"Samarati","year":"2001","journal-title":"IEEE Trans. Knowl.\u00a0Data Eng."},{"issue":"7","key":"10.1016\/j.dcan.2017.04.003_bib26","first-page":"1807","article-title":"A\u00a0tree based location privacy approach against multi-precision continuous attacks in the internet of things","volume":"9","author":"Liu","year":"2012","journal-title":"J.\u00a0Inf. Comput. Sci."},{"issue":"11","key":"10.1016\/j.dcan.2017.04.003_bib27","first-page":"3071","article-title":"An algorithm of k-anonymity for data releasing based on fine-grained generalization","volume":"9","author":"Xu","year":"2012","journal-title":"J.\u00a0Inf. Comput. Sci."},{"key":"10.1016\/j.dcan.2017.04.003_bib28","doi-asserted-by":"crossref","unstructured":"A. Machanavajjhala, D. Kifer, J. Gehrke, M. Venkitasubramaniam, L-diversity: privacy beyond k-anonymity, in: Proceedings of the ACM Transactions on Knowledge Discovery from Data TKDD, 1(1), 2007, p. 146.","DOI":"10.1145\/1217299.1217302"},{"key":"10.1016\/j.dcan.2017.04.003_bib29","doi-asserted-by":"crossref","unstructured":"N. Li, T. Li, S. Venkatasubramanian, t-C loseness: privacy beyond k-anonymity and l-diversity, in: Proceedings of the 23rd International Conference on Data Engineering (ICDE 2007), IEEE, 2007, pp. 106\u2013115.","DOI":"10.1109\/ICDE.2007.367856"},{"issue":"2","key":"10.1016\/j.dcan.2017.04.003_bib30","first-page":"278","article-title":"Closeness: privacy measure for data publishing using multiple sensitive attributes","volume":"2","author":"NarasimhaRao","year":"2012","journal-title":"Int. J. Eng. Sci. Adv. Technol."},{"issue":"11","key":"10.1016\/j.dcan.2017.04.003_bib31","doi-asserted-by":"crossref","first-page":"1623","DOI":"10.1109\/TKDE.2009.190","article-title":"From t-closeness-like privacy to postrandomization via information theory","volume":"22","author":"Rebollo-Monedero","year":"2010","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"10.1016\/j.dcan.2017.04.003_bib32","unstructured":"M.R.S. Abyaneh, Security analysis of lightweight schemes for rfid systems, Tech. Rep., Dissertation for the Degree of Philosophiae Doctor, University of Bergen Norway, 2012."},{"key":"10.1016\/j.dcan.2017.04.003_bib33","unstructured":"M. Cazorla, K. Marquet, M. Minier, Survey and benchmark of lightweight block ciphers for wireless sensor networks, in: P. Samarati (Ed.), Proceedings of the SECRYPT, SciTePress, 2013, pp. 543\u2013548."},{"key":"10.1016\/j.dcan.2017.04.003_bib34","doi-asserted-by":"crossref","unstructured":"K.A. McKay, L. Bassham, M.S. Turan, N. Mouha, Report on Lightweight Cryptography, draft nistir 8114, Tech. Rep., National Institute of Standards and Technology, August 2016.","DOI":"10.6028\/NIST.IR.8114"},{"issue":"1","key":"10.1016\/j.dcan.2017.04.003_bib35","doi-asserted-by":"crossref","DOI":"10.1177\/1550147716682738","article-title":"Evaluating energy efficiency of internet of things software architecture based on reusable software components","volume":"13","author":"Kim","year":"2017","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"10.1016\/j.dcan.2017.04.003_bib36","unstructured":"C.H. Lim, T. Korkishko, Mcrypton \u2013 a lightweight block cipher for security of low-cost rfid tags and sensors, in: J. Song, T. Kwon, M. Yung (Eds.), Proceedings of the WISA, Vol. 3786 of Lecture Notes in Computer Science, Springer, 2005, pp. 243\u2013258."},{"key":"10.1016\/j.dcan.2017.04.003_bib37","unstructured":"D. Hong, J. Sung, S. Hong, J. Lim, S. Lee, B. Koo, C. Lee, D. Chang, J. Lee, K. Jeong, H. Kim, J. Kim, S. Chee, Hight: a new block cipher suitable for low-resource device, in: L. Goubin, M. Matsui (Eds.), Proceedings of the 8th International Workshop on Cryptographic Hardware and Embedded Systems \u2013 CHES 2006, Yokohama, Japan, October 10\u201313, 2006,\u00a0Vol. 4249 of Lecture Notes in Computer Science, Springer, 2006, pp. 46\u201359."},{"key":"10.1016\/j.dcan.2017.04.003_bib38","unstructured":"F. Mace, F.-X. Standaert, J.-J. Quisquater, Asic implementations of the block cipher sea for constrained applications, in: Proceedings of the Third International Conference on RFID Security \u2013 RFIDSec 2007, 2007, pp. 103\u2013114."},{"key":"10.1016\/j.dcan.2017.04.003_bib39","unstructured":"G. Leander, C. Paar, A. Poschmann, K. Schramm, New lightweight des variants, in: A. Biryukov (Ed.), Proceedings of the FSE, Vol. 4593 of Lecture Notes in Computer Science, Springer, 2007, pp. 196\u2013210."},{"key":"10.1016\/j.dcan.2017.04.003_bib40","unstructured":"T. Shirai, K. Shibutani, T. Akishita, S. Moriai, T. Iwata, The 128-bit blockcipher clefia (extended abstract), in: A. Biryukov (Ed.), Proceedings of the FSE, Vol. 4593 of Lecture Notes in Computer Science, Springer, 2007, pp. 181\u2013195."},{"key":"10.1016\/j.dcan.2017.04.003_bib41","unstructured":"A. Bogdanov, L.R. Knudsen, G. Leander, C. Paar, A. Poschmann, M.J.B. Robshaw, Y. Seurin, C. Vikkelsoe, Present: an ultra-lightweight block cipher, in: P. Paillier, I. Verbauwhede (Eds.), Proceedings of the CHES, Vol. 4727 of Lecture Notes in Computer Science, Springer, 2007, pp. 450\u2013466."},{"key":"10.1016\/j.dcan.2017.04.003_bib42","unstructured":"C.D. Cannire, O. Dunkelman, M. Knezevic, Katan and ktantan \u2013 a family of small and efficient hardware-oriented block ciphers, in: C. Clavier, K. Gaj (Eds.), Proceedings of the CHES, Vol. 5747 of Lecture Notes in Computer Science, Springer, 2009, pp. 272\u2013288."},{"key":"10.1016\/j.dcan.2017.04.003_bib43","doi-asserted-by":"crossref","unstructured":"G.N. Khan, J. Yu, F. Yuan, Xtea based secure authentication protocol for rfid systems, in: H. Wang, J. Li, G.N. Rouskas, X. Zhou (Eds.), Proceedings of the ICCCN, IEEE, 2011, pp. 1\u20136.","DOI":"10.1109\/ICCCN.2011.6005765"},{"key":"10.1016\/j.dcan.2017.04.003_bib44","unstructured":"3rd Generation Partnership Project, Specification of the 3GPP Confidentiality and Integrity Algorithms \u2013 Document 2: KASUMI Specification (Release 6), Tech. Rep. 3GPP TS 35.202 V6.1.0 (2005\u201309), 2005."},{"key":"10.1016\/j.dcan.2017.04.003_bib45","unstructured":"J. Guo, T. Peyrin, A. Poschmann, M.J.B. Robshaw, The led block cipher, in: B. Preneel, T. Takagi (Eds.), Proceedings of the CHES, Vol. 6917 of Lecture Notes in Computer Science, Springer, 2011, pp. 326\u2013341."},{"key":"10.1016\/j.dcan.2017.04.003_bib46","unstructured":"Z. Gong, S. Nikova, Y.W. Law, Klein: a new family of lightweight block ciphers, in: A. Juels, C. Paar (Eds.), Proceedings of the RFIDSec, Vol. 7055 of Lecture Notes in Computer Science, Springer, 2011, pp. 1\u201318."},{"key":"10.1016\/j.dcan.2017.04.003_bib47","unstructured":"K. Shibutani, T. Isobe, H. Hiwatari, A. Mitsuda, T. Akishita, T. Shirai, Piccolo: an ultra-lightweight blockcipher, in: B. Preneel, T. Takagi (Eds.), Proceedings of the CHES, Vol. 6917 of Lecture Notes in Computer Science, Springer, 2011, pp. 342\u2013357."},{"key":"10.1016\/j.dcan.2017.04.003_bib48","unstructured":"W. Wu, L. Zhang, Lblock: a lightweight block cipher, in: J. Lopez, G. Tsudik (Eds.), ACNS, Vol. 6715 of Lecture Notes in Computer Science, 2011, pp. 327\u2013344."},{"key":"10.1016\/j.dcan.2017.04.003_bib49","unstructured":"R. Beaulieu, D. Shors, J. Smith, S. Treatman-Clark, B. Weeks, L. Wingers, Simon and speck: block ciphers for the internet of things, Cryptology ePrint Archive, Report 2015\/585, 2015. \u3008http:\/\/eprint.iacr.org\/2015\/585\u3009."},{"key":"10.1016\/j.dcan.2017.04.003_bib50","unstructured":"Q. Chai, G. Gong, A cryptanalysis of hummingbird-2: the differential sequence analysis, IACR Cryptology ePrint Archive 2012, 2012, p. 233."},{"issue":"1","key":"10.1016\/j.dcan.2017.04.003_bib51","doi-asserted-by":"crossref","first-page":"975","DOI":"10.3390\/s140100975","article-title":"Efficient hardware implementation of the lightweight block encryption algorithm lea","volume":"14","author":"Lee","year":"2014","journal-title":"Sensors"},{"issue":"1","key":"10.1016\/j.dcan.2017.04.003_bib52","first-page":"29","article-title":"Survey on lightweight primitives and protocols for rfid in wireless sensor networks","volume":"6","author":"Manjulata","year":"2014","journal-title":"Int. J. Commun. Netw. Inf. Secur."},{"issue":"1","key":"10.1016\/j.dcan.2017.04.003_bib53","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1504\/IJWMC.2007.013798","article-title":"Grain: a stream cipher for constrained environments","volume":"2","author":"Hell","year":"2007","journal-title":"Int. J. Wirel. Mob. Comput."},{"key":"10.1016\/j.dcan.2017.04.003_bib54","unstructured":"C.D. Canniere, B. Preneel, Trivium Specifications, eSTREAM, ECRYPT Stream Cipher Project."},{"issue":"1","key":"10.1016\/j.dcan.2017.04.003_bib55","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1016\/j.compeleceng.2011.11.022","article-title":"A\u00a0comparative study of hardware architectures for lightweight block ciphers","volume":"38","author":"Kitsos","year":"2012","journal-title":"Comput. Electr. Eng."},{"key":"10.1016\/j.dcan.2017.04.003_bib56","series-title":"WG-8: A Lightweight Stream Cipher for Resource-Constrained Smart Devices","first-page":"617","author":"Fan","year":"2013"},{"key":"10.1016\/j.dcan.2017.04.003_bib57","first-page":"1","article-title":"Espresso: a stream cipher for 5g wireless communication systems","author":"Dubrova","year":"2015","journal-title":"Cryptogr. Commun."},{"key":"10.1016\/j.dcan.2017.04.003_bib58","doi-asserted-by":"crossref","unstructured":"M. David, D.C. Ranasinghe, T. Larsen, A2u2: a stream cipher for printed electronics rfid tags, in: Proceedings of the IEEE International Conference on RFID (IEEE RFID 2011), Orlando, Florida, USA, 2011.","DOI":"10.1109\/RFID.2011.5764619"},{"key":"10.1016\/j.dcan.2017.04.003_bib59","doi-asserted-by":"crossref","unstructured":"D. Watanabe, T. Owada, K. Okamoto, Y. Igarashi, T. Kaneko, Update on enocoro stream cipher, in: Proceedings of the ISITA, IEEE, 2010, pp. 778\u2013783.","DOI":"10.1109\/ISITA.2010.5649627"},{"key":"10.1016\/j.dcan.2017.04.003_bib60","doi-asserted-by":"crossref","unstructured":"C. Manifavas, G. Hatzivasilis, K. Fysarakis, K. Rantos, Lightweight cryptography for embedded systems \u2013 a comparative analysis, in: Proceedings of the DPM\/SETOP, 2013, pp. 333\u2013349.","DOI":"10.1007\/978-3-642-54568-9_21"},{"key":"10.1016\/j.dcan.2017.04.003_bib61","unstructured":"A. Bogdanov, G. Leander, C. Paar, A. Poschmann, M.J.B. Robshaw, Y. Seurin, Hash functions and rfid tags: Mind the gap, in: E. Oswald, P. Rohatgi (Eds.), Proceedings of the CHES, Vol. 5154 of Lecture Notes in Computer Science, Springer, 2008, pp. 283\u2013299."},{"key":"10.1016\/j.dcan.2017.04.003_bib62","unstructured":"A. Shamir, Squash \u2013 a new mac with provable security properties for highly constrained devices such as rfid tags, in: K. Nyberg (Ed.), Proceedings of the FSE, Vol. 5086 of Lecture Notes in Computer Science, Springer, 2008, pp. 144\u2013157."},{"key":"10.1016\/j.dcan.2017.04.003_bib63","unstructured":"E.B. Kavun, T. Yalin, A lightweight implementation of keccak hash function for radio-frequency identification applications, in: S.B.O. Yalcin (Ed.), Proceedings of the RFIDSec, Vol. 6370 of Lecture Notes in Computer Science, Springer, 2010, pp. 258\u2013269."},{"issue":"1","key":"10.1016\/j.dcan.2017.04.003_bib64","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1049\/iet-cdt.2008.0165","article-title":"Low-cost digital signature architecture suitable for radio frequency identification tags","volume":"4","author":"O\u2019Neill","year":"2010","journal-title":"IET Comput. Digit. Tech."},{"key":"10.1016\/j.dcan.2017.04.003_bib65","unstructured":"J.-P. Aumasson, L. Henzen, W. Meier, M. Naya-Plasencia, Quark: a lightweight hash, in: S. Mangard, F.-X. Standaert (Eds.), Proceedings of the CHES, Vol. 6225 of Lecture Notes in Computer Science, Springer, 2010, pp. 1\u201315."},{"key":"10.1016\/j.dcan.2017.04.003_bib66","doi-asserted-by":"crossref","unstructured":"S. Badel, N. Dagtekin, J. Nakahara, K. Ouafi, N. Reffe, P. Sepehrdad, P. Susil, S. Vaudenay, Armadillo: A multi-purpose cryptographic primitive dedicated to hardware, in: Proceedings of the CHES, 2010, pp. 398\u2013412.","DOI":"10.1007\/978-3-642-15031-9_27"},{"key":"10.1016\/j.dcan.2017.04.003_bib67","unstructured":"J. Guo, T. Peyrin, A. Poschmann, The photon family of lightweight hash functions, in: P. Rogaway (Ed.), Proceedings of the CRYPTO, Vol. 6841 of Lecture Notes in Computer Science, Springer, 2011, pp. 222\u2013239."},{"key":"10.1016\/j.dcan.2017.04.003_bib68","unstructured":"A. Bogdanov, M. Knezevic, G. Leander, D. Toz, K. Varici, I. Verbauwhede, spongent: A lightweight hash function, in: B. Preneel, T. Takagi (Eds.), Proceedings of the CHES, Vol. 6917 of Lecture Notes in Computer Science, Springer, 2011, pp. 312\u2013325."},{"key":"10.1016\/j.dcan.2017.04.003_bib69","unstructured":"D. Bernstein, Cubehash: A Simple Hash Function. \u3008http:\/\/cubehash.cr.yp.to\/\u3009."},{"key":"10.1016\/j.dcan.2017.04.003_bib70","unstructured":"T.P. Berger, J. D\u2019Hayer, K. Marquet, M. Minier, G. T. 0002, The gluon family: A lightweight hash function family based on fcsrs, in: A. Mitrokotsa, S. Vaudenay (Eds.), Proceedings of the AFRICACRYPT, Vol. 7374 of Lecture Notes in Computer Science, Springer, 2012, pp. 306\u2013323."},{"key":"10.1016\/j.dcan.2017.04.003_bib71","unstructured":"X. Guo, P. Schaumont, The technology dependence of lightweight hash implementation cost, in: Proceedings of the ECRYPT Workshop on Lightweight Cryptography (LC2011), 2011."},{"key":"10.1016\/j.dcan.2017.04.003_bib72","unstructured":"J. Fan, L. Batina, I. Verbauwhede, Hecc goes embedded: an area-efficient implementation of hecc, in: R.M. Avanzi, L. Keliher, F. Sica (Eds.), Selected Areas in Cryptography, Vol. 5381 of Lecture Notes in Computer Science, Springer, 2008, pp. 387\u2013400."},{"key":"10.1016\/j.dcan.2017.04.003_bib73","doi-asserted-by":"crossref","unstructured":"J. Hoffstein, J. Pipher, J.H. Silverman, Ntru: a ring-based public key cryptosystem, in: Lecture Notes in Computer Science, Springer-Verlag, 1998, pp. 267\u2013288.","DOI":"10.1007\/BFb0054868"},{"key":"10.1016\/j.dcan.2017.04.003_bib74","doi-asserted-by":"crossref","unstructured":"M.-J.O. Saarinen, The bluejay ultra-lightweight hybrid cryptosystem, in: Proceedings of the IEEE Symposium on Security and Privacy Workshops, IEEE Computer Society, 2012, pp. 27\u201332.","DOI":"10.1109\/SPW.2012.11"},{"key":"10.1016\/j.dcan.2017.04.003_bib75","doi-asserted-by":"crossref","unstructured":"W. Che, H. Deng, W. Tan, J. Wang, A Random Number Generator for Application in RFID Tags, Springer Berlin Heidelberg, 2008, Ch. 16, pp. 279\u2013287.","DOI":"10.1007\/978-3-540-71641-9_16"},{"key":"10.1016\/j.dcan.2017.04.003_bib76","doi-asserted-by":"crossref","unstructured":"J. Melia-Segui, J. Garcia-Alfaro, J. Herrera-Joancomarti, Analysis and improvement of a pseudorandom number generator for EPC Gen2 tags, in: Proceedings of the 1st International Workshop on Lightweight Cryptography for Resource-Constrained Devices \u2013 WLC\u201910, Lecture Notes in Computer Science, Springer, Tenerife, Canary Islands, Spain, 2010.","DOI":"10.1007\/978-3-642-14992-4_4"},{"issue":"1","key":"10.1016\/j.dcan.2017.04.003_bib77","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1016\/j.csi.2007.11.013","article-title":"Lamed - a prng for epc class-1 generation-2 rfid specification","volume":"31","author":"Peris-Lopez","year":"2009","journal-title":"Comput. Stand. Interfaces"},{"key":"10.1016\/j.dcan.2017.04.003_bib78","series-title":"A\u00a0Random Number Generator for Application in RFID Tags","first-page":"279","author":"Che","year":"2008"},{"issue":"1","key":"10.1016\/j.dcan.2017.04.003_bib79","doi-asserted-by":"crossref","first-page":"82","DOI":"10.20533\/ijrfidsc.2046.3715.2013.0011","article-title":"Warbler: a lightweight pseudorandom number generator for EPC C1 Gen2 passive RFID tags","volume":"2","author":"Mandal","year":"2013","journal-title":"Int. J. RFID Secur. Cryptogr."},{"key":"10.1016\/j.dcan.2017.04.003_bib80","series-title":"Analysis and Improvement of a Pseudorandom Number Generator for EPC Gen2 Tags","first-page":"34","author":"Melia-Segui","year":"2010"},{"key":"10.1016\/j.dcan.2017.04.003_bib81","doi-asserted-by":"crossref","unstructured":"A. Juels, R.L. Rivest, M. Szydlo, The blocker tag: selective blocking of rfid tags for consumer privacy, in: Proceedings of the 8th ACM Conference on Computer and Communications Security, ACM Press, USA, 2003, pp. 103\u2013111.","DOI":"10.1145\/948109.948126"},{"key":"10.1016\/j.dcan.2017.04.003_bib82","series-title":"RFID Handbook: Applications, Technology, Security, and Privacy","author":"Ahson","year":"2008"},{"key":"10.1016\/j.dcan.2017.04.003_bib83","doi-asserted-by":"crossref","unstructured":"A. Juels, J.G. Brainard, Soft blocking: flexible blocker tags on the cheap, in: V. Atluri, P.F. Syverson, S.D.C. di Vimercati (Eds.), Proceedings of the WPES, ACM, 2004, pp. 1\u20137.","DOI":"10.1145\/1029179.1029181"},{"issue":"6","key":"10.1016\/j.dcan.2017.04.003_bib84","doi-asserted-by":"crossref","first-page":"413","DOI":"10.1007\/s00779-008-0213-4","article-title":"A\u00a0survey of RFID privacy approaches","volume":"13","author":"Langheinrich","year":"2009","journal-title":"Pers. Ubiquitous Comput."},{"issue":"3","key":"10.1016\/j.dcan.2017.04.003_bib85","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1109\/MSP.2005.78","article-title":"Rfid privacy: an overview of problems and proposed solutions","volume":"3","author":"Garfinkel","year":"2005","journal-title":"IEEE Secur. Priv."},{"issue":"11","key":"10.1016\/j.dcan.2017.04.003_bib86","doi-asserted-by":"crossref","first-page":"15582","DOI":"10.3390\/s131115582","article-title":"Data management for the internet of things: design primitives and solution","volume":"13","author":"Abu-Elkheir","year":"2013","journal-title":"Sensors"},{"key":"10.1016\/j.dcan.2017.04.003_bib87","series-title":"RFID and Sensor Networks: Architectures, Protocols, Security, and Integrations, Wireless Networks and Mobile Communications","author":"Zhang","year":"2010"},{"key":"10.1016\/j.dcan.2017.04.003_bib88","doi-asserted-by":"crossref","unstructured":"Y. Sang, H. Shen, Y. Inoguchi, Y. Tan, N.\u00a0Xiong, Secure data aggregation in wireless sensor networks: a survey, in: Proceedings of the Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2006), IEEE Computer Society, 4\u20137 December 2006, Taipei, Taiwan, 2006, pp. 315\u2013320.","DOI":"10.1109\/PDCAT.2006.96"},{"issue":"8","key":"10.1016\/j.dcan.2017.04.003_bib89","doi-asserted-by":"crossref","first-page":"2724","DOI":"10.1016\/j.adhoc.2013.05.009","article-title":"A\u00a0novel batch-based group key management protocol applied to the internet of things","volume":"11","author":"Veltri","year":"2013","journal-title":"Ad Hoc Netw."},{"key":"10.1016\/j.dcan.2017.04.003_bib90","unstructured":"J. van den Hoven (Chair Ethics Subgroup IoT Expert\u00a0Group), Fact Sheet Ethics Subgroup IoT, version 4.0, Tech. Rep., Delft University of Technology, 2012."},{"issue":"4","key":"10.1016\/j.dcan.2017.04.003_bib91","doi-asserted-by":"crossref","first-page":"562","DOI":"10.1109\/SURV.2011.092110.00088","article-title":"A\u00a0survey on trust management for mobile ad hoc networks","volume":"13","author":"Cho","year":"2011","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"10.1016\/j.dcan.2017.04.003_bib92","series-title":"Can We Trust Trust? Trust: Making and Breaking Cooperative Relations (electronic edition)","first-page":"213","author":"Gambetta","year":"2000"},{"key":"10.1016\/j.dcan.2017.04.003_bib93","unstructured":"D.H. Mcknight, N.L. Chervany, The meanings of trust, Tech. Rep., 1996."},{"key":"10.1016\/j.dcan.2017.04.003_bib94","doi-asserted-by":"crossref","unstructured":"S. Etalle, J. den Hartog, S. Marsh, Trust and punishment, in: F. Davide (Ed.), Autonomics, Vol. 302 of ACM International Conference Proceeding Series, ACM, 2007, p. 5.","DOI":"10.4108\/ICST.AUTONOMICS2007.2107"},{"key":"10.1016\/j.dcan.2017.04.003_bib95","unstructured":"G. Suryanarayana, R.N. Taylor, A Survey of Trust Management and Resource Discovery Technologies in Peer-to-Peer Applications, Tech. Rep. uci-isr-04-6,\u00a0The University of California, Irvine, California, USA, 2004."},{"issue":"1","key":"10.1016\/j.dcan.2017.04.003_bib96","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1145\/2522968.2522980","article-title":"Trust management of services in cloud environments: obstacles and solutions","volume":"46","author":"Noor","year":"2013","journal-title":"ACM Comput. Surv."},{"issue":"1\u20132","key":"10.1016\/j.dcan.2017.04.003_bib97","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1007\/s10723-005-5465-x","article-title":"Trusted grid computing with security binding and trust integration","volume":"3","author":"Song","year":"2005","journal-title":"J.\u00a0Grid Comput."},{"key":"10.1016\/j.dcan.2017.04.003_bib98","unstructured":"R. Chen, W. Yeager, Poblano A Distributed Trust Model for Peer-to-Peer Networks, Springer."},{"key":"10.1016\/j.dcan.2017.04.003_bib99","unstructured":"B. Bhargava, A.B. Can, B. Bhargava, Sort: A Self-Organizing Trust Model for Peer-to-Peer Systems, 2006."},{"key":"10.1016\/j.dcan.2017.04.003_bib100","doi-asserted-by":"crossref","unstructured":"Y. Wang, V. Varadharajan, Role-based recommendation and trust evaluation, in: Proceedings of the CEC\/EEE, IEEE Computer Society, 2007, pp. 278\u2013288.","DOI":"10.1109\/CEC-EEE.2007.83"},{"key":"10.1016\/j.dcan.2017.04.003_bib101","doi-asserted-by":"crossref","unstructured":"E. Damiani, S.D.C. di Vimercati, S. Paraboschi, P. Samarati, F. Violante, A reputation-based approach for choosing reliable resources in peer-to-peer networks, in: V. Atluri (Ed.), Proceedings of the ACM Conference on Computer and Communications Security, ACM, 2002, pp. 207\u2013216.","DOI":"10.1145\/586110.586138"},{"key":"10.1016\/j.dcan.2017.04.003_bib102","doi-asserted-by":"crossref","unstructured":"S.D. Kamvar, M.T. Schlosser, H. Garcia-Molina, The eigentrust algorithm for reputation management in p2p networks, in: Proceedings of the Twelfth International World Wide Web Conference, 2003.","DOI":"10.1145\/775152.775242"},{"issue":"7","key":"10.1016\/j.dcan.2017.04.003_bib103","doi-asserted-by":"crossref","first-page":"843","DOI":"10.1109\/TKDE.2004.1318566","article-title":"Peertrust: supporting reputation-based trust for peer-to-peer electronic communities","volume":"16","author":"Xiong","year":"2004","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"10.1016\/j.dcan.2017.04.003_bib104","doi-asserted-by":"crossref","unstructured":"R. Aringhieri, Assessing efficiency of trust management in peer-to-peer systems, in: Proceedings of the WETICE, IEEE Computer Society, 2005, pp. 368\u2013374.","DOI":"10.1109\/WETICE.2005.20"},{"issue":"9","key":"10.1016\/j.dcan.2017.04.003_bib105","doi-asserted-by":"crossref","first-page":"1217","DOI":"10.1016\/j.jpdc.2006.04.003","article-title":"Securing decentralized reputation management using trustguard","volume":"66","author":"Srivatsa","year":"2006","journal-title":"J.\u00a0Parallel Distrib. Comput."},{"key":"10.1016\/j.dcan.2017.04.003_bib106","unstructured":"R. Zhou, K. Hwang, Trust overlay networks for global reputation aggregation in p2p grid computing, in: Proceedings of the IPDPS, IEEE, 2006."},{"key":"10.1016\/j.dcan.2017.04.003_bib107","unstructured":"X. Liu, A. Datta, A trust prediction approach capturing agents dynamic behavior, in: T. Walsh (Ed.), Proceedings of the IJCAI, IJCAI\/AAAI, 2011, pp. 2147\u20132152."},{"key":"10.1016\/j.dcan.2017.04.003_bib108","unstructured":"Y. Aytas, H. Ferhatosmanoglu, zgr Ulusoy, Link Recommendation in p2p Social Networks, 2012."},{"issue":"7","key":"10.1016\/j.dcan.2017.04.003_bib109","doi-asserted-by":"crossref","first-page":"904","DOI":"10.1016\/j.future.2006.12.001","article-title":"Sabotage-tolerance and trust management in desktop grid computing","volume":"23","author":"Domingues","year":"2007","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.dcan.2017.04.003_bib110","unstructured":"F. Azzedin, M. Maheswaran, Integrating trust into grid resource management systems, in: Proceedings of the ICPP, IEEE Computer Society, 2002, pp. 47\u201354."},{"key":"10.1016\/j.dcan.2017.04.003_bib111","unstructured":"F. Azzedin, M. Maheswaran, Towards trust-aware resource management in grid computing systems, in: Proceedings of the CCGRID, IEEE Computer Society, 2002, pp. 452\u2013457."},{"key":"10.1016\/j.dcan.2017.04.003_bib112","unstructured":"F. Azzedin, M. Maheswaran, A trust brokering system and its application to resource management in public-resource grids, in: Proceedings of the IPDPS, IEEE Computer Society, 2004."},{"key":"10.1016\/j.dcan.2017.04.003_bib113","unstructured":"C. Lin, V. Varadharajan, Y.W. 0002, V. Pruthi, Enhancing grid security with trust management, in: Proceedings of the IEEE SCC, IEEE Computer Society, 2004, pp. 303\u2013310."},{"issue":"1","key":"10.1016\/j.dcan.2017.04.003_bib114","first-page":"1","article-title":"A\u00a0trust evaluation model for qos guarantee in cloud systems","volume":"3","author":"Kim","year":"2010","journal-title":"Int. J. Grid Distrib. Comput."},{"key":"10.1016\/j.dcan.2017.04.003_bib115","doi-asserted-by":"crossref","unstructured":"K. Ramachandran, H. Lutfiyya, M. Perry, Decentralized resource availability prediction for a desktop grid, in: Proceedings of the CCGRID, IEEE, 2010, pp. 643\u2013648.","DOI":"10.1109\/CCGRID.2010.54"},{"key":"10.1016\/j.dcan.2017.04.003_bib116","unstructured":"Anjali, S. Khurana, M. Sharma, Efficient grid resource selection based on performance measures, Int. J. Comput. Sci. Commun. Technol. \u2013 TECHNIA 4 (2)."},{"key":"10.1016\/j.dcan.2017.04.003_bib117","doi-asserted-by":"crossref","unstructured":"H. Skogsrud, B. Benatallah, F. Casati, F. Toumani, Managing impacts of security protocol changes in service-oriented applications, in: Proceedings of the ICSE, IEEE Computer Society, 2007, pp. 468\u2013477.","DOI":"10.1109\/ICSE.2007.49"},{"issue":"2","key":"10.1016\/j.dcan.2017.04.003_bib118","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1109\/MC.2009.56","article-title":"Modeling trust negotiation for web services","volume":"42","author":"Skogsrud","year":"2009","journal-title":"IEEE Comput."},{"key":"10.1016\/j.dcan.2017.04.003_bib119","doi-asserted-by":"crossref","unstructured":"S. Park, L. Liu, C. Pu, M. Srivatsa, J. Zhang, Resilient trust management for web service integration, in: Proceedings of the ICWS, IEEE Computer Society, 2005, pp. 499\u2013506.","DOI":"10.1109\/ICWS.2005.99"},{"key":"10.1016\/j.dcan.2017.04.003_bib120","unstructured":"F. Skopik, D. Schall, S. Dustdar, Start trusting strangers? Bootstrapping and prediction of trust, in: G. Vossen, D.D.E. Long, J.X. Yu (Eds.), Proceedings of the WISE, Vol. 5802 of Lecture Notes in Computer Science, Springer, 2009, pp. 275\u2013289."},{"key":"10.1016\/j.dcan.2017.04.003_bib121","doi-asserted-by":"crossref","unstructured":"W. Conner, A. Iyengar, T.A. Mikalsen, I. Rouvellou, K. Nahrstedt, A trust management framework for service-oriented environments, in: J.\u00a0Quemada, G. Len, Y.S. Maarek, W. Nejdl (Eds.), Proceedings of the WWW, ACM, 2009, pp. 891\u2013900.","DOI":"10.1145\/1526709.1526829"},{"issue":"1","key":"10.1016\/j.dcan.2017.04.003_bib122","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/s11280-008-0056-y","article-title":"Rater credibility assessment in web services interactions","volume":"12","author":"Malik","year":"2009","journal-title":"World Wide Web"},{"issue":"4","key":"10.1016\/j.dcan.2017.04.003_bib123","doi-asserted-by":"crossref","first-page":"885","DOI":"10.1007\/s00778-009-0138-1","article-title":"Rateweb: reputation assessment for trust establishment among web services","volume":"18","author":"Malik","year":"2009","journal-title":"VLDB J."},{"issue":"1","key":"10.1016\/j.dcan.2017.04.003_bib124","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/MIC.2009.17","article-title":"Reputation bootstrapping for trust establishment among web services","volume":"13","author":"Malik","year":"2009","journal-title":"IEEE Internet Comput."},{"key":"10.1016\/j.dcan.2017.04.003_bib125","doi-asserted-by":"crossref","unstructured":"F. Skopik, D. Schall, S. Dustdar, Trustworthy interaction balancing in mixed service-oriented systems, in: S.Y. Shin, S. Ossowski, M. Schumacher, M.J. Palakal, C.-C. Hung (Eds.), Proceedings of the SAC, ACM, 2010, pp. 799\u2013806.","DOI":"10.1145\/1774088.1774255"},{"key":"10.1016\/j.dcan.2017.04.003_bib126","unstructured":"N. Santos, K.P. Gummadi, R. Rodrigues, Towards trusted cloud computing, in: Proceedings of the HOTCLOUD, 2009."},{"key":"10.1016\/j.dcan.2017.04.003_bib127","doi-asserted-by":"crossref","unstructured":"J. Yao, S. Chen, C. Wang, D. Levy, J. Zic, Accountability as a service for the cloud, in: Proceedings of the IEEE SCC, IEEE Computer Society, 2010, pp. 81\u201388.","DOI":"10.1109\/SCC.2010.83"},{"key":"10.1016\/j.dcan.2017.04.003_bib128","unstructured":"F.J. Krautheim, D.S. Phatak, A.T. Sherman, Introducing the trusted virtual environment module: a new mechanism for rooting trust in cloud computing, in: A. Acquisti, S.W. Smith, A.-R. Sadeghi (Eds.), Proceedings of the TRUST, Vol. 6101 of Lecture Notes in Computer Science, Springer, 2010, pp. 211\u2013227."},{"key":"10.1016\/j.dcan.2017.04.003_bib129","doi-asserted-by":"crossref","unstructured":"S.M. Habib, S. Ries, M. Muhlhauser, Towards a trust management system for cloud computing, in: Proceedings of the 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, TRUSTCOM\u201911, IEEE Computer Society, Washington, DC, USA, 2011, pp. 933\u2013939. https:\/\/doi.org\/10.1109\/TrustCom.2011.129.","DOI":"10.1109\/TrustCom.2011.129"},{"key":"10.1016\/j.dcan.2017.04.003_bib130","doi-asserted-by":"crossref","unstructured":"P.D. Manuel, S.T. Selvi, M.I.A.-E. Barr, Trust management system for grid and cloud resources, in: Proceedings of the International Conference on Advanced Computing, 2009. https:\/\/doi.org\/10.1109\/ICADVC.2009.5378187.","DOI":"10.1109\/ICADVC.2009.5378187"},{"key":"10.1016\/j.dcan.2017.04.003_bib131","unstructured":"T.H. Noor, Q.Z. Sheng, Credibility-based trust management for services in cloud environments, in: G. Kappel, Z. Maamar, H.R.M. Nezhad (Eds.), Proceedings of the ICSOC, Vol. 7084 of Lecture Notes in Computer Science, Springer, 2011, pp. 328\u2013343."},{"key":"10.1016\/j.dcan.2017.04.003_bib132","unstructured":"T.H. Noor, Q.Z. Sheng, Trust as a service: a framework for trust management in cloud environments, in: Proceedings of the WISE, Vol. 6997 of Lecture Notes in Computer Science, Springer, 2011, pp. 314\u2013321."},{"issue":"2","key":"10.1016\/j.dcan.2017.04.003_bib133","first-page":"6","article-title":"Integrating trust management and access control in data-intensive web applications","volume":"6","author":"di Vimercati","year":"2012","journal-title":"Trans. Web"},{"key":"10.1016\/j.dcan.2017.04.003_bib134","unstructured":"C.E. Briguez, F.M. Sagui, M. Capobianco, A.G. Maguitman, System Architecture for Trust-Based News Recommenders on the Web, in: Proceedings of the XVII Workshop de Agentes y Sistemas Inteligentes \u2013 CACIC 2011: XVII Congreso Argentino de Ciencias de la Computaci\u00f3n, La Plata, Buenos Aires, Argentina, 2011."},{"key":"10.1016\/j.dcan.2017.04.003_bib135","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1016\/j.knosys.2010.10.007","article-title":"A\u00a0syntactical approach for interpersonal trust prediction in social web applications: combining contextual and structural data","volume":"26","author":"Zolfaghar","year":"2012","journal-title":"Knowl.-Based Syst."},{"key":"10.1016\/j.dcan.2017.04.003_bib136","unstructured":"V.D. Gligor, J.M. Wing, Towards a theory of trust in networks of humans and computers, in: B. Christianson, B. Crispo, J.A. Malcolm, F. Stajano (Eds.), Proceedings of the Security Protocols Workshop, Vol. 7114 of Lecture Notes in Computer Science, Springer, 2011, pp. 223\u2013242."},{"issue":"11","key":"10.1016\/j.dcan.2017.04.003_bib137","doi-asserted-by":"crossref","first-page":"1193","DOI":"10.1109\/LCOMM.2011.090911.111340","article-title":"Siot: giving a social structure to the internet of things","volume":"15","author":"Atzori","year":"2011","journal-title":"IEEE Commun. Lett."},{"key":"10.1016\/j.dcan.2017.04.003_bib138","doi-asserted-by":"crossref","unstructured":"M. Nitti, R. Girau, L. Atzori, A. Iera, G. Morabito, A subjective model for trustworthiness evaluation in the social internet of things, in: Proceedings of the PIMRC, IEEE, 2012, pp. 18\u201323.","DOI":"10.1109\/PIMRC.2012.6362662"},{"key":"10.1016\/j.dcan.2017.04.003_bib139","unstructured":"C. Pastrone, D. Rotondi, A. Skarmeta, H. Sundmaeker, O. Vermesan, S. Ziegler, P.T. Kirstein, S. Varakliotis, A. Al-Hezmi, Z. Xueli, L. Yang, T. Ye, X. Pengfei, W. Dongya, Z. Xu, M. Wenjing, Internet of things, eu-china joint white paper on internet-of-things identification, Tech. Rep., European Research Cluster on the Internet of Things, November 2014."},{"issue":"1","key":"10.1016\/j.dcan.2017.04.003_bib140","first-page":"33","article-title":"An ultra light authentication protocol resistant to passive attacks under the gen-2 specification","volume":"25","author":"Peris-Lopez","year":"2009","journal-title":"J.\u00a0Inf. Sci. Eng."},{"issue":"7","key":"10.1016\/j.dcan.2017.04.003_bib141","first-page":"1099","article-title":"Rapid identification authentication protocol for mobile nodes in internet of things with privacy protection","volume":"7","author":"Miao","year":"2012","journal-title":"J.\u00a0Netw."},{"issue":"9","key":"10.1016\/j.dcan.2017.04.003_bib142","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1109\/MC.2011.291","article-title":"Securing the internet of things","volume":"44","author":"Roman","year":"2011","journal-title":"Computer"},{"key":"10.1016\/j.dcan.2017.04.003_bib143","series-title":"Advances in Elliptic Curve Cryptography, London Mathematical Society Lecture Note Series","author":"Blake","year":"2005"},{"key":"10.1016\/j.dcan.2017.04.003_bib144","series-title":"Energy Harvesting Systems: Principles, Modeling and Applications","author":"Tom","year":"2010"},{"key":"10.1016\/j.dcan.2017.04.003_bib145","unstructured":"D.N. Duc, J. Kim, K. Kim, Scalable grouping-proof protocol for rfid tags, in: Proceedings of the Symposium on Cryptography and Information Security, Takamatsu, Japan, 2010."},{"issue":"4","key":"10.1016\/j.dcan.2017.04.003_bib146","doi-asserted-by":"crossref","first-page":"336","DOI":"10.4236\/am.2012.34051","article-title":"A\u00a0privacy-preserving grouping proof protocol based on ecc with untraceability for rfid","volume":"3","author":"Ko","year":"2012","journal-title":"Appl. Math."},{"issue":"3","key":"10.1016\/j.dcan.2017.04.003_bib147","doi-asserted-by":"crossref","first-page":"877","DOI":"10.1016\/j.jnca.2010.04.014","article-title":"Design of a secure distance-bounding channel for rfid","volume":"34","author":"Hancke","year":"2011","journal-title":"J.\u00a0Netw. Comput. Appl."},{"key":"10.1016\/j.dcan.2017.04.003_bib148","unstructured":"A. Fernndez-Mir, R. Trujillo-Rasua, J. Castell-Roca, J. Domingo-Ferrer, A scalable rfid authentication protocol supporting ownership transfer and controlled delegation, in: A. Juels, C. Paar (Eds.), Proceedings of the RFID, Security and Privacy \u2013 7th International Workshop, RFIDSec 2011, Amherst, USA, June 26\u201328, 2011, Revised Selected Papers, Vol. 7055 of Lecture Notes in Computer Science, Springer, 2011, pp. 147\u2013162."},{"key":"10.1016\/j.dcan.2017.04.003_bib149","doi-asserted-by":"crossref","unstructured":"J.B. Rachel Greenstadt, Cognitive security for personal devices, in: Proceedings of the ACM Workshop on Artificial Intelligence and Security, ACM Conference on Computer and Communications Security, ACM, 2008, pp. 27\u201330.","DOI":"10.1145\/1456377.1456383"},{"key":"10.1016\/j.dcan.2017.04.003_bib150","series-title":"Access Control and Authentication in the Internet of Things Environment","first-page":"283","author":"Ranjan","year":"2016"},{"key":"10.1016\/j.dcan.2017.04.003_bib151","doi-asserted-by":"crossref","unstructured":"K.A. McKay, L. Bassham, M.S. Turan, N. Mouha, Report on Lightweight Cryptography, draft nistir 8114, Tech. Rep., National Institute of Standards and Technology, August 2016.","DOI":"10.6028\/NIST.IR.8114"},{"issue":"2","key":"10.1016\/j.dcan.2017.04.003_bib152","doi-asserted-by":"crossref","first-page":"150","DOI":"10.3390\/jsan3020150","article-title":"A\u00a0survey of access control models in wireless sensor networks","volume":"3","author":"Maw","year":"2014","journal-title":"J.\u00a0Sens. Actuator Netw."},{"key":"10.1016\/j.dcan.2017.04.003_bib153","doi-asserted-by":"crossref","unstructured":"D. Kulkarni, A. Tripathi, Context-aware role-based access control in pervasive computing systems, in: Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, SACMAT\u201908, ACM, New York, NY, USA, 2008, pp. 113\u2013122. https:\/\/doi.org\/10.1145\/1377836.1377854. \u3008http:\/\/doi.acm.org\/10.1145\/1377836.1377854\u3009.","DOI":"10.1145\/1377836.1377854"},{"key":"10.1016\/j.dcan.2017.04.003_bib154","doi-asserted-by":"crossref","unstructured":"H.A. Maw, H. Xiao, B. Christianson, J.A. Malcolm, An evaluation of break-the-glass access control model for medical data in wireless sensor networks, in: Proceedings of the 2014 IEEE 16th International Conference on e-Health Networking, Applications and Services (Healthcom), 2014, pp. 130\u2013135 https:\/\/doi.org\/10.1109\/HealthCom.2014.7001829.","DOI":"10.1109\/HealthCom.2014.7001829"},{"key":"10.1016\/j.dcan.2017.04.003_bib155","doi-asserted-by":"crossref","unstructured":"I. Bouij-Pasquier, A.A. Ouahman, A.A.E. Kalam, M.O. de Montfort, Smartorbac security and privacy in the internet of things, in: Proceedings of the 12th IEEE\/ACS International Conference of Computer Systems and Applications, AICCSA 2015, Marrakech, Morocco, November 17\u201320 2015,\u00a0pp. 1\u20138. https:\/\/doi.org\/10.1109\/AICCSA.2015.7507098.","DOI":"10.1109\/AICCSA.2015.7507098"},{"issue":"4","key":"10.1016\/j.dcan.2017.04.003_bib156","doi-asserted-by":"crossref","first-page":"673","DOI":"10.1109\/TPDS.2010.130","article-title":"Fdac: toward fine-grained distributed data access control in wireless sensor networks","volume":"22","author":"Yu","year":"2011","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"10.1016\/j.dcan.2017.04.003_bib157","doi-asserted-by":"crossref","unstructured":"S. Ruj, A. Nayak, I. Stojmenovic, Distributed fine-grained access control in wireless sensor networks, in: Proceedings of the 2011 IEEE International Parallel Distributed Processing Symposium, 2011, pp. 352\u2013362. https:\/\/doi.org\/10.1109\/IPDPS.2011.42.","DOI":"10.1109\/IPDPS.2011.42"},{"issue":"5","key":"10.1016\/j.dcan.2017.04.003_bib158","doi-asserted-by":"crossref","first-page":"1235","DOI":"10.1007\/s11276-011-0345-8","article-title":"Fine-grained data access control for distributed sensor networks","volume":"17","author":"Hur","year":"2011","journal-title":"Wirel. Netw."},{"key":"10.1016\/j.dcan.2017.04.003_bib159","doi-asserted-by":"crossref","unstructured":"H.A. Maw, H. Xiao, B. Christianson, An adaptive access control model for medical data in wireless sensor networks, in: Proceedings of the IEEE 15th International Conference on e-Health Networking, Applications and Services, Healthcom 2013, Lisbon, Portugal, October 9\u201312 2013, pp. 303\u2013309 https:\/\/doi.org\/10.1109\/HealthCom.2013.6720690.","DOI":"10.1109\/HealthCom.2013.6720690"},{"issue":"8","key":"10.1016\/j.dcan.2017.04.003_bib160","doi-asserted-by":"crossref","first-page":"1427","DOI":"10.1109\/TPDS.2011.299","article-title":"Distributed privacy-preserving access control in sensor networks","volume":"23","author":"Zhang","year":"2012","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"10","key":"10.1016\/j.dcan.2017.04.003_bib161","doi-asserted-by":"crossref","first-page":"3472","DOI":"10.1109\/TWC.2011.072511.102283","article-title":"Distributed access control with privacy support in wireless sensor networks","volume":"10","author":"He","year":"2011","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"10.1016\/j.dcan.2017.04.003_bib162","unstructured":"S.T. Tim\u00a0Polk, Security challenges for the internet of things, in: Proceedings of the Workshop on Interconnecting Smart Objects with the Internet, 2011."}],"container-title":["Digital Communications and Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2352864817300214?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2352864817300214?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,11,26]],"date-time":"2020-11-26T21:31:03Z","timestamp":1606426263000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2352864817300214"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4]]},"references-count":162,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2018,4]]}},"alternative-id":["S2352864817300214"],"URL":"https:\/\/doi.org\/10.1016\/j.dcan.2017.04.003","relation":{},"ISSN":["2352-8648"],"issn-type":[{"value":"2352-8648","type":"print"}],"subject":[],"published":{"date-parts":[[2018,4]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"A roadmap for security challenges in the Internet of Things","name":"articletitle","label":"Article Title"},{"value":"Digital Communications and Networks","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.dcan.2017.04.003","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2017 Chongqing University of Posts and Telecommunications. Production and hosting by Elsevier B.V.","name":"copyright","label":"Copyright"}]}}