{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T20:18:52Z","timestamp":1740169132614,"version":"3.37.3"},"reference-count":357,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"Brain Korea 21 Plus Program","award":["22A20130012814"]},{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Ministry of Science and ICT (MSIT), Korea, under the Information Technology Research Center (ITRC) support program","award":["IITP-2019-2016-0-00313"]},{"name":"Institute for Information & Communications Technology Planning & Evaluation"},{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["2018R1D1A1A09082266"],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.2964280","type":"journal-article","created":{"date-parts":[[2020,1,6]],"date-time":"2020-01-06T20:29:41Z","timestamp":1578342581000},"page":"8202-8250","source":"Crossref","is-referenced-by-count":233,"title":["Multimedia Internet of Things: A Comprehensive Survey"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2133-5286","authenticated-orcid":false,"given":"Ali","family":"Nauman","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5708-1532","authenticated-orcid":false,"given":"Yazdan Ahmad","family":"Qadri","sequence":"additional","affiliation":[]},{"given":"Muhammad","family":"Amjad","sequence":"additional","affiliation":[]},{"given":"Yousaf Bin","family":"Zikria","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6161-1310","authenticated-orcid":false,"given":"Muhammad Khalil","family":"Afzal","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8454-6980","authenticated-orcid":false,"given":"Sung Won","family":"Kim","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref275","DOI":"10.1109\/EMBC.2012.6346463"},{"doi-asserted-by":"publisher","key":"ref274","DOI":"10.24003\/emitter.v4i1.115"},{"doi-asserted-by":"publisher","key":"ref277","DOI":"10.1109\/Med-Hoc-Net.2011.5970484"},{"doi-asserted-by":"publisher","key":"ref276","DOI":"10.3390\/s110201383"},{"doi-asserted-by":"publisher","key":"ref271","DOI":"10.1109\/TIE.2010.2040630"},{"key":"ref270","doi-asserted-by":"crossref","first-page":"609","DOI":"10.1002\/wcm.736","article-title":"Simulation study of IEEE 802.15.4 LR-WPAN for industrial applications","volume":"10","author":"chen","year":"2010","journal-title":"Wireless Commun Mobile Comput"},{"doi-asserted-by":"publisher","key":"ref273","DOI":"10.1155\/2015\/213705"},{"doi-asserted-by":"publisher","key":"ref170","DOI":"10.1109\/ACCESS.2017.2689040"},{"doi-asserted-by":"publisher","key":"ref272","DOI":"10.23919\/ICACT.2017.7890187"},{"doi-asserted-by":"publisher","key":"ref172","DOI":"10.1109\/BigData.2015.7364075"},{"doi-asserted-by":"publisher","key":"ref171","DOI":"10.1109\/MMUL.2015.66"},{"doi-asserted-by":"publisher","key":"ref174","DOI":"10.12988\/ams.2013.311644"},{"doi-asserted-by":"publisher","key":"ref173","DOI":"10.1109\/MSP.2012.2219672"},{"doi-asserted-by":"publisher","key":"ref176","DOI":"10.1109\/ICSPCS.2017.8270509"},{"doi-asserted-by":"publisher","key":"ref175","DOI":"10.1109\/JIOT.2018.2837034"},{"doi-asserted-by":"publisher","key":"ref178","DOI":"10.1109\/JIOT.2017.2704605"},{"doi-asserted-by":"publisher","key":"ref177","DOI":"10.1109\/JSYST.2014.2313602"},{"doi-asserted-by":"publisher","key":"ref168","DOI":"10.1109\/WETICE.2017.59"},{"doi-asserted-by":"publisher","key":"ref169","DOI":"10.1109\/MCOM.2017.1600614"},{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1109\/TCSVT.2018.2808174"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1109\/ICICCT.2018.8473240"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1016\/j.comnet.2018.01.046"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1109\/MCOM.2018.1701219"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1016\/j.future.2018.02.046"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData.2017.11"},{"doi-asserted-by":"publisher","key":"ref357","DOI":"10.1109\/TNB.2018.2851951"},{"key":"ref267","article-title":"Performance evaluation of UWB sensor network with aloha multiple access scheme","author":"giuliano","year":"2005","journal-title":"Proc Int Workshop Wireless Ad hoc Networks (IWWAN)"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1109\/JIOT.2017.2671460"},{"doi-asserted-by":"publisher","key":"ref268","DOI":"10.1109\/INNOVATIONS.2011.5893815"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1109\/JIOT.2017.2762731"},{"doi-asserted-by":"publisher","key":"ref355","DOI":"10.1109\/MCOM.2019.8647105"},{"doi-asserted-by":"publisher","key":"ref269","DOI":"10.1109\/TII.2011.2166773"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1109\/WF-IoT.2016.7845393"},{"doi-asserted-by":"publisher","key":"ref356","DOI":"10.1109\/MCOM.2015.7060516"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1109\/ICT.2016.7500362"},{"doi-asserted-by":"publisher","key":"ref352","DOI":"10.1109\/JPROC.2018.2867835"},{"doi-asserted-by":"publisher","key":"ref288","DOI":"10.1186\/s13638-019-1498-x"},{"year":"2016","journal-title":"IEEE Standards Association","key":"ref351"},{"doi-asserted-by":"publisher","key":"ref287","DOI":"10.1109\/ACCESS.2018.2886216"},{"doi-asserted-by":"publisher","key":"ref354","DOI":"10.1109\/MMUL.2018.2879591"},{"doi-asserted-by":"publisher","key":"ref286","DOI":"10.1109\/JCN.2019.000022"},{"doi-asserted-by":"publisher","key":"ref353","DOI":"10.1109\/ACCESS.2018.2825980"},{"doi-asserted-by":"publisher","key":"ref285","DOI":"10.1049\/el.2018.0617"},{"doi-asserted-by":"publisher","key":"ref284","DOI":"10.3390\/su10041201"},{"key":"ref181","article-title":"Perpetual video camera for Internet-of-Things","author":"chen","year":"2012","journal-title":"Proc Visual Commun Image Process"},{"doi-asserted-by":"publisher","key":"ref283","DOI":"10.1080\/02564602.2016.1242387"},{"doi-asserted-by":"publisher","key":"ref180","DOI":"10.1016\/j.future.2017.07.063"},{"doi-asserted-by":"publisher","key":"ref350","DOI":"10.1109\/MCE.2018.2797658"},{"doi-asserted-by":"publisher","key":"ref282","DOI":"10.1109\/TCE.2010.5606276"},{"doi-asserted-by":"publisher","key":"ref281","DOI":"10.1109\/JSEN.2015.2442259"},{"doi-asserted-by":"publisher","key":"ref280","DOI":"10.1109\/JSYST.2013.2260653"},{"doi-asserted-by":"publisher","key":"ref185","DOI":"10.1109\/JIOT.2017.2779865"},{"doi-asserted-by":"publisher","key":"ref184","DOI":"10.1016\/j.future.2018.01.044"},{"doi-asserted-by":"publisher","key":"ref183","DOI":"10.1109\/ACCESS.2018.2823590"},{"doi-asserted-by":"publisher","key":"ref182","DOI":"10.1007\/s11042-016-4333-y"},{"key":"ref189","article-title":"Cloud computing: Issues and challenges Tharam","author":"dillon","year":"2010","journal-title":"Proc 24th IEEE Int Conf Adv Inf Netw Appl"},{"key":"ref188","article-title":"The NIST definition of cloud computing","volume":"15","author":"mell","year":"2009"},{"doi-asserted-by":"publisher","key":"ref187","DOI":"10.1109\/GCE.2008.4738445"},{"doi-asserted-by":"publisher","key":"ref186","DOI":"10.1007\/s00779-017-1058-5"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1109\/NOTERE.2016.7745826"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1109\/JIOT.2017.2701408"},{"doi-asserted-by":"publisher","key":"ref179","DOI":"10.1109\/TCAD.2017.2772896"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1109\/ISNCC.2017.8072007"},{"doi-asserted-by":"publisher","key":"ref348","DOI":"10.1109\/TCE.2016.7613201"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/JIOT.2017.2724762"},{"doi-asserted-by":"publisher","key":"ref349","DOI":"10.1109\/ACCESS.2018.2808326"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/JIOT.2016.2614007"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/ICISCT.2016.7777399"},{"doi-asserted-by":"publisher","key":"ref344","DOI":"10.1109\/JPROC.2018.2868995"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1016\/j.comcom.2016.03.004"},{"doi-asserted-by":"publisher","key":"ref345","DOI":"10.1109\/ACCESS.2017.2751586"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/TWC.2017.2743077"},{"doi-asserted-by":"publisher","key":"ref346","DOI":"10.1109\/ACCESS.2019.2909490"},{"key":"ref278","article-title":"On transmission efficiency of the multimedia service over IEEE 802.15.4 wireless sensor networks","author":"lin","year":"2011","journal-title":"Proc 13th Int Conf Adv Commun Technol (ICACT)"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1109\/JIOT.2015.2496161"},{"doi-asserted-by":"publisher","key":"ref347","DOI":"10.1109\/TWC.2016.2547378"},{"doi-asserted-by":"publisher","key":"ref279","DOI":"10.1109\/WiMOB.2013.6673402"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/JSEN.2016.2645709"},{"doi-asserted-by":"publisher","key":"ref293","DOI":"10.1109\/JSAC.2015.2481203"},{"doi-asserted-by":"publisher","key":"ref50","DOI":"10.1109\/ISWPC.2013.6707429"},{"doi-asserted-by":"publisher","key":"ref292","DOI":"10.1109\/ACCESS.2017.2664418"},{"doi-asserted-by":"publisher","key":"ref51","DOI":"10.1109\/MCOM.2017.7841465"},{"doi-asserted-by":"publisher","key":"ref295","DOI":"10.1109\/COMST.2018.2837161"},{"doi-asserted-by":"publisher","key":"ref294","DOI":"10.1109\/JIOT.2015.2480421"},{"doi-asserted-by":"publisher","key":"ref297","DOI":"10.1109\/ISEMANTIC.2018.8549814"},{"doi-asserted-by":"publisher","key":"ref296","DOI":"10.1109\/COMST.2018.2862350"},{"doi-asserted-by":"publisher","key":"ref299","DOI":"10.1109\/MCOM.2015.7263372"},{"doi-asserted-by":"publisher","key":"ref298","DOI":"10.1109\/ICICCT.2018.8473351"},{"doi-asserted-by":"publisher","key":"ref154","DOI":"10.1109\/ICCW.2015.7247433"},{"doi-asserted-by":"publisher","key":"ref153","DOI":"10.3390\/s16122057"},{"doi-asserted-by":"publisher","key":"ref156","DOI":"10.1109\/ICC.2017.7997261"},{"key":"ref155","first-page":"23","article-title":"How to manage multimedia traffic: Based on QoE or QoT?","volume":"16","author":"karaadi","year":"2018","journal-title":"ZTE Commun"},{"doi-asserted-by":"publisher","key":"ref150","DOI":"10.1109\/COMST.2018.2794358"},{"doi-asserted-by":"publisher","key":"ref291","DOI":"10.1109\/JIOT.2018.2807619"},{"year":"2008","journal-title":"Serie P Telephone Transmission Quality Telephone Installations Local Line Networks Vol Recommendation ITU-T P 910","key":"ref152"},{"doi-asserted-by":"publisher","key":"ref290","DOI":"10.1109\/JIOT.2017.2764475"},{"year":"2013","author":"brunnstr\u00f6m","article-title":"Qualinet white paper on definitions of quality of experience","key":"ref151"},{"doi-asserted-by":"publisher","key":"ref146","DOI":"10.1109\/ACOMP.2017.20"},{"doi-asserted-by":"publisher","key":"ref147","DOI":"10.1109\/TEMSCON.2017.7998399"},{"doi-asserted-by":"publisher","key":"ref148","DOI":"10.1109\/ICGCIoT.2015.7380724"},{"doi-asserted-by":"publisher","key":"ref149","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData.2016.68"},{"doi-asserted-by":"publisher","key":"ref289","DOI":"10.1007\/s00521-019-04416-1"},{"doi-asserted-by":"publisher","key":"ref59","DOI":"10.1109\/JSYST.2015.2469676"},{"doi-asserted-by":"publisher","key":"ref58","DOI":"10.1109\/JIOT.2017.2755620"},{"doi-asserted-by":"publisher","key":"ref57","DOI":"10.1109\/JIOT.2018.2872028"},{"doi-asserted-by":"publisher","key":"ref56","DOI":"10.1109\/JIOT.2017.2747900"},{"doi-asserted-by":"publisher","key":"ref55","DOI":"10.1109\/JIOT.2016.2615180"},{"doi-asserted-by":"publisher","key":"ref54","DOI":"10.1109\/CECNet.2012.6201508"},{"key":"ref53","article-title":"The study on the application of RFID-based mobile payment to the Internet of Things","author":"yang","year":"2011","journal-title":"Proc Int Conf Multimedia Technol"},{"doi-asserted-by":"publisher","key":"ref52","DOI":"10.1109\/UIC-ATC.2017.8397438"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1109\/JIOT.2016.2583465"},{"doi-asserted-by":"publisher","key":"ref167","DOI":"10.1109\/GLOCOM.2017.8254684"},{"doi-asserted-by":"publisher","key":"ref166","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData.2017.147"},{"doi-asserted-by":"publisher","key":"ref165","DOI":"10.1109\/ICIN.2011.6081100"},{"doi-asserted-by":"publisher","key":"ref164","DOI":"10.1109\/IWCMC.2017.7986484"},{"doi-asserted-by":"publisher","key":"ref163","DOI":"10.1109\/ACCESS.2018.2822401"},{"doi-asserted-by":"publisher","key":"ref162","DOI":"10.1109\/ACCESS.2018.2791560"},{"year":"1999","journal-title":"Quality of Service Technical White Paper","key":"ref161"},{"year":"2009","journal-title":"Definitions of Terms Related to Quality of Service Recommendation E 800","key":"ref160"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1016\/j.adhoc.2015.04.006"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1016\/j.future.2018.07.058"},{"year":"2018","author":"harwood","journal-title":"Postscapes","key":"ref6"},{"year":"2018","author":"novak","journal-title":"Paleofuture","key":"ref5"},{"year":"2018","journal-title":"IEEE Spectrum","key":"ref8"},{"doi-asserted-by":"publisher","key":"ref159","DOI":"10.1109\/BMSB.2017.7986131"},{"year":"2018","journal-title":"The Statisticain","key":"ref7"},{"doi-asserted-by":"publisher","key":"ref49","DOI":"10.1002\/9781119173601"},{"doi-asserted-by":"publisher","key":"ref157","DOI":"10.1109\/TNSE.2019.2897483"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/GIOTS.2017.8016221"},{"doi-asserted-by":"publisher","key":"ref158","DOI":"10.1109\/LCN.2010.5735733"},{"key":"ref46","article-title":"A survey on IoT based road traffic surveillance and accident detection system","author":"patel","year":"2017","journal-title":"Proc IEEE Int Conf Innov Power Adv Comput Technol"},{"doi-asserted-by":"publisher","key":"ref45","DOI":"10.1016\/j.comnet.2018.07.020"},{"key":"ref48","first-page":"477","article-title":"Biometric security and Internet of Things (IoT)","author":"obaidat","year":"2018","journal-title":"Biometric-Based Physical and Cybersecurity Systems"},{"doi-asserted-by":"publisher","key":"ref47","DOI":"10.1109\/MSPEC.2015.7049440"},{"doi-asserted-by":"publisher","key":"ref42","DOI":"10.1109\/ISCAS.2017.8050815"},{"doi-asserted-by":"publisher","key":"ref41","DOI":"10.1109\/WAINA.2015.65"},{"doi-asserted-by":"publisher","key":"ref44","DOI":"10.1016\/j.jnca.2018.09.014"},{"doi-asserted-by":"publisher","key":"ref43","DOI":"10.1109\/PCS.2013.6737766"},{"doi-asserted-by":"publisher","key":"ref320","DOI":"10.1109\/IBCAST.2017.7868145"},{"doi-asserted-by":"publisher","key":"ref321","DOI":"10.1109\/MNET.2018.1300246"},{"doi-asserted-by":"publisher","key":"ref73","DOI":"10.1109\/JPROC.2007.909914"},{"doi-asserted-by":"publisher","key":"ref72","DOI":"10.1109\/MNET.2011.5772059"},{"doi-asserted-by":"publisher","key":"ref71","DOI":"10.17487\/rfc4919"},{"doi-asserted-by":"publisher","key":"ref70","DOI":"10.1109\/TMSCS.2018.2886843"},{"doi-asserted-by":"publisher","key":"ref318","DOI":"10.1109\/SURV.2012.060912.00149"},{"doi-asserted-by":"publisher","key":"ref76","DOI":"10.1007\/s00530-003-0095-2"},{"key":"ref317","doi-asserted-by":"crossref","first-page":"623","DOI":"10.1109\/JPROC.2008.916362","article-title":"Event mining in multimedia streams","volume":"96","author":"xie","year":"2008","journal-title":"Proc IEEE"},{"doi-asserted-by":"publisher","key":"ref77","DOI":"10.1109\/TENCONSpring.2017.8070059"},{"key":"ref316","first-page":"2921","article-title":"Joint attributes and event analysis for multimedia event detection","volume":"29","author":"ma","year":"2018","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"doi-asserted-by":"publisher","key":"ref74","DOI":"10.1109\/FUTURETECH.2010.5482696"},{"doi-asserted-by":"publisher","key":"ref315","DOI":"10.1109\/ICASSP.2014.6854982"},{"doi-asserted-by":"publisher","key":"ref75","DOI":"10.1109\/MIS.2010.48"},{"doi-asserted-by":"publisher","key":"ref314","DOI":"10.1109\/ICASSP.2014.6854743"},{"year":"2007","author":"roush","journal-title":"MIT Technology Review TR10-Peering-Into-Videos-Future","key":"ref313"},{"doi-asserted-by":"publisher","key":"ref312","DOI":"10.1109\/TMM.2006.886384"},{"doi-asserted-by":"publisher","key":"ref78","DOI":"10.1109\/ICCPCCT.2018.8574285"},{"key":"ref311","article-title":"Performance and analysis of prioritization security for input-queued packet switches","author":"gnanajeyaraman","year":"2010","journal-title":"Proc Int Conf Commun Comput Intell (INCOCCI)"},{"doi-asserted-by":"publisher","key":"ref79","DOI":"10.1109\/SCORED.2017.8305418"},{"doi-asserted-by":"publisher","key":"ref319","DOI":"10.1109\/SURV.2008.080404"},{"doi-asserted-by":"publisher","key":"ref310","DOI":"10.1109\/ICC.2005.1494534"},{"doi-asserted-by":"publisher","key":"ref60","DOI":"10.1109\/JIOT.2017.2683200"},{"doi-asserted-by":"publisher","key":"ref62","DOI":"10.1109\/EMTC.2014.6996632"},{"doi-asserted-by":"publisher","key":"ref61","DOI":"10.1016\/j.comnet.2012.07.010"},{"doi-asserted-by":"publisher","key":"ref305","DOI":"10.1109\/MMUL.2013.33"},{"doi-asserted-by":"publisher","key":"ref63","DOI":"10.1109\/ACCESS.2018.2881533"},{"doi-asserted-by":"publisher","key":"ref304","DOI":"10.1109\/TMM.2016.2598092"},{"doi-asserted-by":"publisher","key":"ref64","DOI":"10.1109\/JIOT.2017.2782323"},{"doi-asserted-by":"publisher","key":"ref307","DOI":"10.1109\/TBC.2008.2005397"},{"doi-asserted-by":"publisher","key":"ref65","DOI":"10.1109\/iThings\/CPSCom.2011.125"},{"doi-asserted-by":"publisher","key":"ref306","DOI":"10.1109\/TVT.2017.2744600"},{"year":"2011","author":"shelby","article-title":"Constrained application protocol (CoAP)","key":"ref66"},{"doi-asserted-by":"publisher","key":"ref301","DOI":"10.1109\/ACCESS.2017.2731784"},{"doi-asserted-by":"publisher","key":"ref67","DOI":"10.1109\/ACCESS.2018.2796307"},{"doi-asserted-by":"publisher","key":"ref300","DOI":"10.1109\/ISM.2014.60"},{"doi-asserted-by":"publisher","key":"ref68","DOI":"10.1109\/ACCESS.2018.2842034"},{"doi-asserted-by":"publisher","key":"ref303","DOI":"10.1109\/MMUL.2019.2897471"},{"doi-asserted-by":"publisher","key":"ref69","DOI":"10.1109\/MCOM.2018.1700907"},{"doi-asserted-by":"publisher","key":"ref302","DOI":"10.1109\/TIP.2006.881966"},{"key":"ref309","article-title":"A multi-level block priority based instruction caching scheme for multimedia processors","author":"kang","year":"2001","journal-title":"Proc IEEE Workshop Signal Process Syst Design Implement (SIPS)"},{"doi-asserted-by":"publisher","key":"ref308","DOI":"10.1109\/CANET.2005.1598213"},{"doi-asserted-by":"publisher","key":"ref197","DOI":"10.1109\/INFOCOM.2017.8057143"},{"doi-asserted-by":"publisher","key":"ref198","DOI":"10.1109\/JIOT.2016.2578722"},{"doi-asserted-by":"publisher","key":"ref199","DOI":"10.15439\/2014F503"},{"doi-asserted-by":"publisher","key":"ref193","DOI":"10.1109\/TENCONSpring.2016.7519389"},{"doi-asserted-by":"publisher","key":"ref194","DOI":"10.1145\/3083187.3083192"},{"doi-asserted-by":"publisher","key":"ref195","DOI":"10.1109\/JIOT.2016.2519502"},{"doi-asserted-by":"publisher","key":"ref196","DOI":"10.1109\/COMSNETS.2017.7945433"},{"doi-asserted-by":"publisher","key":"ref95","DOI":"10.1109\/ISCIT.2012.6381043"},{"doi-asserted-by":"publisher","key":"ref94","DOI":"10.12988\/ces.2014.4685"},{"doi-asserted-by":"publisher","key":"ref190","DOI":"10.1016\/j.comcom.2016.03.012"},{"doi-asserted-by":"publisher","key":"ref93","DOI":"10.1109\/WF-IoT.2018.8355233"},{"doi-asserted-by":"publisher","key":"ref191","DOI":"10.1109\/TMM.2016.2600438"},{"doi-asserted-by":"publisher","key":"ref92","DOI":"10.1109\/MCOM.2011.6069709"},{"key":"ref192","article-title":"Cloudlet-based cyber foraging framework for distributed video surveillance provisioning","author":"ali","year":"2015","journal-title":"Proc World Congr Inf Commun Technol (WICT)"},{"doi-asserted-by":"publisher","key":"ref342","DOI":"10.1109\/MCOM.2018.1700660"},{"doi-asserted-by":"publisher","key":"ref91","DOI":"10.1109\/ICOMET.2018.8346327"},{"doi-asserted-by":"publisher","key":"ref343","DOI":"10.1109\/MNET.2018.8329617"},{"doi-asserted-by":"publisher","key":"ref90","DOI":"10.1109\/R10-HTC.2017.8288921"},{"doi-asserted-by":"publisher","key":"ref340","DOI":"10.1109\/MIC.2016.124"},{"doi-asserted-by":"publisher","key":"ref341","DOI":"10.1109\/TVT.2014.2310773"},{"doi-asserted-by":"publisher","key":"ref336","DOI":"10.1109\/TMM.2018.2890196"},{"doi-asserted-by":"publisher","key":"ref335","DOI":"10.1109\/TVT.2017.2762745"},{"doi-asserted-by":"publisher","key":"ref334","DOI":"10.1109\/JSYST.2015.2390597"},{"doi-asserted-by":"publisher","key":"ref333","DOI":"10.1109\/LSP.2008.2010821"},{"doi-asserted-by":"publisher","key":"ref98","DOI":"10.1109\/JIOT.2018.2877690"},{"doi-asserted-by":"publisher","key":"ref339","DOI":"10.1109\/TVT.2017.2715719"},{"doi-asserted-by":"publisher","key":"ref99","DOI":"10.1007\/s10916-014-0142-x"},{"doi-asserted-by":"publisher","key":"ref338","DOI":"10.1109\/TII.2017.2784100"},{"key":"ref96","article-title":"Vehicle toll payment system based on Internet of Things concept","author":"pasali","year":"2016","journal-title":"Proc 5th Medit Conf Embedded Comput"},{"doi-asserted-by":"publisher","key":"ref337","DOI":"10.1109\/IWCMC.2019.8766786"},{"doi-asserted-by":"publisher","key":"ref97","DOI":"10.1109\/AICCSA.2016.7945810"},{"doi-asserted-by":"publisher","key":"ref82","DOI":"10.1109\/JSEN.2017.2777786"},{"doi-asserted-by":"publisher","key":"ref81","DOI":"10.1109\/RAHA.2016.7931897"},{"key":"ref84","article-title":"Path planning of unmanned vehicle using potential field and lane detection","author":"baek","year":"2010","journal-title":"Proc SICE Annu Conf"},{"doi-asserted-by":"publisher","key":"ref83","DOI":"10.1109\/ICCPEIC.2018.8525196"},{"doi-asserted-by":"publisher","key":"ref330","DOI":"10.1109\/IWCMC.2018.8450276"},{"doi-asserted-by":"publisher","key":"ref331","DOI":"10.1109\/MWC.2017.1600360"},{"doi-asserted-by":"publisher","key":"ref80","DOI":"10.1109\/EIT.2018.8500246"},{"doi-asserted-by":"publisher","key":"ref332","DOI":"10.1109\/JSYST.2014.2377560"},{"doi-asserted-by":"publisher","key":"ref323","DOI":"10.1109\/TWC.2015.2477509"},{"doi-asserted-by":"publisher","key":"ref89","DOI":"10.1109\/SIU.2018.8404378"},{"doi-asserted-by":"publisher","key":"ref322","DOI":"10.1109\/COMST.2015.2401424"},{"doi-asserted-by":"publisher","key":"ref325","DOI":"10.1109\/ICSensT.2013.6727625"},{"doi-asserted-by":"publisher","key":"ref324","DOI":"10.1109\/TMM.2019.2923111"},{"doi-asserted-by":"publisher","key":"ref327","DOI":"10.1109\/DEST.2009.5276702"},{"doi-asserted-by":"publisher","key":"ref85","DOI":"10.1109\/WINCOM.2018.8629708"},{"doi-asserted-by":"publisher","key":"ref326","DOI":"10.1109\/TMM.2018.2882744"},{"doi-asserted-by":"publisher","key":"ref86","DOI":"10.1109\/IAEAC.2018.8577659"},{"doi-asserted-by":"publisher","key":"ref329","DOI":"10.1109\/ACCESS.2018.2875242"},{"doi-asserted-by":"publisher","key":"ref87","DOI":"10.1109\/ELEKTRO.2016.7512038"},{"doi-asserted-by":"publisher","key":"ref328","DOI":"10.1109\/ACCESS.2018.2881246"},{"key":"ref88","article-title":"Internet of Vehicles (10 V) for traffic management","author":"dandala","year":"2017","journal-title":"Proc IEEE Conf on Comm Comp and Signal Proc"},{"year":"2015","journal-title":"Fog Computing and the Internet of Things Extend the Cloud to Where the Things Are","key":"ref200"},{"doi-asserted-by":"publisher","key":"ref101","DOI":"10.1109\/SYSOSE.2017.7994971"},{"doi-asserted-by":"publisher","key":"ref100","DOI":"10.1016\/j.future.2018.09.024"},{"doi-asserted-by":"publisher","key":"ref209","DOI":"10.1109\/MCOM.2017.1600840"},{"doi-asserted-by":"publisher","key":"ref203","DOI":"10.1109\/JIOT.2016.2579198"},{"year":"2019","author":"linthicum","journal-title":"Cisco","key":"ref204"},{"doi-asserted-by":"publisher","key":"ref201","DOI":"10.1145\/2342509.2342513"},{"doi-asserted-by":"publisher","key":"ref202","DOI":"10.1002\/cpe.3485"},{"doi-asserted-by":"publisher","key":"ref207","DOI":"10.1109\/IEEE.EDGE.2017.12"},{"doi-asserted-by":"publisher","key":"ref208","DOI":"10.1109\/JIOT.2017.2709814"},{"doi-asserted-by":"publisher","key":"ref205","DOI":"10.1109\/JIOT.2016.2565516"},{"doi-asserted-by":"publisher","key":"ref206","DOI":"10.1109\/BigMM.2016.53"},{"doi-asserted-by":"publisher","key":"ref211","DOI":"10.1109\/WF-IoT.2015.7389116"},{"doi-asserted-by":"publisher","key":"ref210","DOI":"10.1109\/JIOT.2018.2802913"},{"doi-asserted-by":"publisher","key":"ref212","DOI":"10.1109\/DCOSS.2017.14"},{"doi-asserted-by":"publisher","key":"ref213","DOI":"10.1109\/MNET.2018.1700202"},{"doi-asserted-by":"publisher","key":"ref214","DOI":"10.1109\/ACCESS.2017.2682640"},{"doi-asserted-by":"publisher","key":"ref215","DOI":"10.1109\/TMM.2017.2764330"},{"key":"ref216","article-title":"Where’s the bear-automating wildlife image processing using IoT and edge cloud systems","author":"elias","year":"2017","journal-title":"Proc IEEE\/ACM 2nd Int Conf Internet-Things Design Implement (IoTDI)"},{"doi-asserted-by":"publisher","key":"ref217","DOI":"10.1109\/MCOM.2013.6461195"},{"doi-asserted-by":"publisher","key":"ref218","DOI":"10.1109\/MNET.2015.7113223"},{"doi-asserted-by":"publisher","key":"ref219","DOI":"10.1109\/ICOIN.2017.7899572"},{"doi-asserted-by":"publisher","key":"ref220","DOI":"10.1109\/LCNW.2015.7365931"},{"doi-asserted-by":"publisher","key":"ref222","DOI":"10.1109\/GLOCOM.2016.7841889"},{"doi-asserted-by":"publisher","key":"ref221","DOI":"10.1109\/JSYST.2016.2615761"},{"doi-asserted-by":"publisher","key":"ref229","DOI":"10.1109\/COMST.2017.2717482"},{"doi-asserted-by":"publisher","key":"ref228","DOI":"10.1109\/CC.2018.8290809"},{"doi-asserted-by":"publisher","key":"ref227","DOI":"10.1109\/WF-IoT.2015.7389122"},{"doi-asserted-by":"publisher","key":"ref226","DOI":"10.1109\/MCOM.2018.1700622"},{"doi-asserted-by":"publisher","key":"ref225","DOI":"10.1109\/COMST.2015.2402617"},{"doi-asserted-by":"publisher","key":"ref224","DOI":"10.1109\/JCN.2017.000094"},{"doi-asserted-by":"publisher","key":"ref223","DOI":"10.1109\/JIOT.2017.2746186"},{"doi-asserted-by":"publisher","key":"ref127","DOI":"10.1109\/COMSNETS.2018.8328244"},{"doi-asserted-by":"publisher","key":"ref126","DOI":"10.1109\/ICCE-China.2017.7990967"},{"doi-asserted-by":"publisher","key":"ref125","DOI":"10.1109\/ICASI.2018.8394552"},{"doi-asserted-by":"publisher","key":"ref124","DOI":"10.1109\/ACCESS.2016.2542800"},{"doi-asserted-by":"publisher","key":"ref129","DOI":"10.1109\/IOTA.2016.7562704"},{"doi-asserted-by":"publisher","key":"ref128","DOI":"10.1109\/TIMA.2017.8064783"},{"doi-asserted-by":"publisher","key":"ref130","DOI":"10.1109\/JSEN.2013.2262270"},{"doi-asserted-by":"publisher","key":"ref133","DOI":"10.1109\/FarEastCon.2018.8602651"},{"doi-asserted-by":"publisher","key":"ref134","DOI":"10.1109\/ICoAC.2014.7229707"},{"doi-asserted-by":"publisher","key":"ref131","DOI":"10.1109\/AEEICB.2017.7972368"},{"key":"ref132","article-title":"A context aware system for an IoT-based smart museum","author":"rao","year":"2017","journal-title":"Proc IEEE Int Multidisciplinary Conf Comput Energy Sci"},{"year":"0","author":"kushalnagar","journal-title":"Pv6 Over Low-Power Wireless Personal Area Networks (6LoWPANs) Overview Assumptions Problem Statement and Goals","key":"ref232"},{"doi-asserted-by":"publisher","key":"ref233","DOI":"10.17487\/rfc6550"},{"year":"2007","journal-title":"Traffic Routing Recommendation","key":"ref230"},{"year":"2007","author":"montenegro","journal-title":"Transmission of IPv6 Packets over IEEE 802 15 4 Networks","key":"ref231"},{"doi-asserted-by":"publisher","key":"ref239","DOI":"10.1109\/TMM.2018.2865661"},{"doi-asserted-by":"publisher","key":"ref238","DOI":"10.1109\/TGCN.2018.2839593"},{"doi-asserted-by":"publisher","key":"ref235","DOI":"10.3390\/jsan2020235"},{"doi-asserted-by":"publisher","key":"ref234","DOI":"10.1016\/j.comnet.2012.06.016"},{"doi-asserted-by":"publisher","key":"ref237","DOI":"10.1201\/9781351166041"},{"doi-asserted-by":"publisher","key":"ref236","DOI":"10.1002\/9781119173601.ch13"},{"doi-asserted-by":"publisher","key":"ref136","DOI":"10.1109\/ICTC.2012.6386766"},{"doi-asserted-by":"publisher","key":"ref135","DOI":"10.1109\/CSE.2013.126"},{"doi-asserted-by":"publisher","key":"ref138","DOI":"10.3991\/ijim.v8i2.3623"},{"doi-asserted-by":"publisher","key":"ref137","DOI":"10.1109\/ISCO.2017.7855968"},{"doi-asserted-by":"publisher","key":"ref139","DOI":"10.1088\/1757-899X\/343\/1\/012023"},{"doi-asserted-by":"publisher","key":"ref140","DOI":"10.1109\/MMUL.2018.011921235"},{"doi-asserted-by":"publisher","key":"ref141","DOI":"10.1109\/EUC.2018.00022"},{"doi-asserted-by":"publisher","key":"ref142","DOI":"10.1049\/iet-cps.2016.0023"},{"doi-asserted-by":"publisher","key":"ref143","DOI":"10.1109\/HONET.2018.8551336"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1016\/j.jksuci.2016.10.003"},{"doi-asserted-by":"publisher","key":"ref144","DOI":"10.1109\/ACCESS.2016.2514263"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1016\/j.comnet.2010.05.010"},{"doi-asserted-by":"publisher","key":"ref145","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData.2017.136"},{"doi-asserted-by":"publisher","key":"ref241","DOI":"10.1109\/ACCESS.2019.2894002"},{"doi-asserted-by":"publisher","key":"ref242","DOI":"10.1109\/JIOT.2018.2847243"},{"doi-asserted-by":"publisher","key":"ref243","DOI":"10.1109\/JCN.2018.000057"},{"doi-asserted-by":"publisher","key":"ref244","DOI":"10.1109\/ACCESS.2017.2712662"},{"doi-asserted-by":"publisher","key":"ref240","DOI":"10.1109\/ACCESS.2018.2817128"},{"doi-asserted-by":"publisher","key":"ref248","DOI":"10.1109\/CPSNA.2016.22"},{"doi-asserted-by":"publisher","key":"ref247","DOI":"10.1109\/TETC.2018.2847296"},{"doi-asserted-by":"publisher","key":"ref246","DOI":"10.1016\/j.future.2018.04.066"},{"key":"ref245","article-title":"TCNet: Trellis coded network—Implementation of QoS-aware routing protocols in WSNs","author":"filho","year":"2012","journal-title":"Proc IEEE Latin-Amer Conf Commun"},{"doi-asserted-by":"publisher","key":"ref249","DOI":"10.3390\/s151128603"},{"key":"ref109","article-title":"Design of a home surveillance system based on the Android platform","author":"fan","year":"2015","journal-title":"Proc IEEE Int Conf Fuzzy Syst Knowl Discovery"},{"doi-asserted-by":"publisher","key":"ref108","DOI":"10.1109\/ICCCE.2018.8539244"},{"doi-asserted-by":"publisher","key":"ref107","DOI":"10.1109\/iThings\/CPSCom.2011.130"},{"doi-asserted-by":"publisher","key":"ref106","DOI":"10.1109\/InfoSec.2015.7435497"},{"doi-asserted-by":"publisher","key":"ref105","DOI":"10.1109\/ICIP.2014.7025048"},{"doi-asserted-by":"publisher","key":"ref104","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00050"},{"doi-asserted-by":"publisher","key":"ref103","DOI":"10.1109\/ICAIOT.2015.7111535"},{"doi-asserted-by":"publisher","key":"ref102","DOI":"10.1109\/MWC.2017.1800100"},{"doi-asserted-by":"publisher","key":"ref111","DOI":"10.1109\/GHTC.2017.8239258"},{"doi-asserted-by":"publisher","key":"ref112","DOI":"10.1109\/TENCONSpring.2017.8070003"},{"key":"ref110","article-title":"A speech based approach to surveillance video retrieval","author":"zadeh","year":"2009","journal-title":"Proc IEEE Int Conf Adv Video Signal Based Surveill"},{"doi-asserted-by":"publisher","key":"ref250","DOI":"10.1016\/j.comcom.2014.04.002"},{"doi-asserted-by":"publisher","key":"ref251","DOI":"10.1109\/ACCESS.2018.2822551"},{"doi-asserted-by":"publisher","key":"ref254","DOI":"10.1109\/JIOT.2015.2478435"},{"doi-asserted-by":"publisher","key":"ref255","DOI":"10.1109\/IWCMC.2016.7577081"},{"doi-asserted-by":"publisher","key":"ref252","DOI":"10.1109\/WCM.2017.1700054"},{"doi-asserted-by":"publisher","key":"ref253","DOI":"10.1109\/IoT-SIU.2018.8519870"},{"doi-asserted-by":"publisher","key":"ref257","DOI":"10.1016\/j.pmcj.2017.01.010"},{"doi-asserted-by":"publisher","key":"ref256","DOI":"10.1109\/JIOT.2018.2817024"},{"doi-asserted-by":"publisher","key":"ref259","DOI":"10.1109\/WoWMoM.2018.8449816"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1002\/9781118647059"},{"doi-asserted-by":"publisher","key":"ref258","DOI":"10.1016\/j.comcom.2018.02.012"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/COMST.2015.2444095"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/COMST.2018.2803740"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/SURV.2012.111412.00051"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/JIOT.2016.2642643"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/ISSNIP.2015.7106958"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/EIT.2017.8053402"},{"doi-asserted-by":"publisher","key":"ref118","DOI":"10.1109\/PERCOMW.2017.7917523"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1016\/j.jnca.2016.05.013"},{"doi-asserted-by":"publisher","key":"ref117","DOI":"10.1109\/ICMLC.2016.7872973"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/COMST.2017.2751617"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/COMST.2017.2661201"},{"doi-asserted-by":"publisher","key":"ref119","DOI":"10.1109\/TMM.2017.2653770"},{"key":"ref114","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1109\/JSTSP.2014.2331916","article-title":"On-line multi-view video summarization for wireless video sensor network","volume":"9","author":"ou","year":"2015","journal-title":"IEEE J Sel Topics Signal Process"},{"doi-asserted-by":"publisher","key":"ref113","DOI":"10.1109\/ISCAS.2017.8050237"},{"doi-asserted-by":"publisher","key":"ref116","DOI":"10.1109\/IoTSMS.2018.8554533"},{"doi-asserted-by":"publisher","key":"ref115","DOI":"10.1109\/ICCE-TW.2015.7216912"},{"doi-asserted-by":"publisher","key":"ref120","DOI":"10.1145\/2789168.2790123"},{"doi-asserted-by":"publisher","key":"ref121","DOI":"10.1109\/iThings.2014.33"},{"key":"ref122","article-title":"A holistic SDN-capable session-plane tailored for efficient M-IoT smart surveillance applications","author":"silva","year":"2016","journal-title":"Proc IEEE GLOBECOM Workshops (GC Wkshps)"},{"doi-asserted-by":"publisher","key":"ref123","DOI":"10.1109\/INFCOMW.2017.8116478"},{"doi-asserted-by":"publisher","key":"ref260","DOI":"10.1109\/MNET.2017.1600067NM"},{"doi-asserted-by":"publisher","key":"ref261","DOI":"10.4108\/eai.26-10-2015.150597"},{"doi-asserted-by":"publisher","key":"ref262","DOI":"10.1109\/DCOSS.2014.45"},{"doi-asserted-by":"publisher","key":"ref263","DOI":"10.1109\/ISWCS.2010.5624516"},{"doi-asserted-by":"publisher","key":"ref264","DOI":"10.1016\/B978-0-7506-8393-7.00003-0"},{"doi-asserted-by":"publisher","key":"ref265","DOI":"10.1109\/MCOM.2010.5394030"},{"doi-asserted-by":"publisher","key":"ref266","DOI":"10.1016\/j.adhoc.2010.09.006"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/08950450.pdf?arnumber=8950450","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,24]],"date-time":"2023-09-24T19:55:47Z","timestamp":1695585347000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8950450\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":357,"URL":"https:\/\/doi.org\/10.1109\/access.2020.2964280","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2020]]}}}