{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,19]],"date-time":"2024-06-19T11:58:30Z","timestamp":1718798310207},"reference-count":47,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2016,11,1]],"date-time":"2016-11-01T00:00:00Z","timestamp":1477958400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Consumer Electron."],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1109\/tce.2016.7838091","type":"journal-article","created":{"date-parts":[[2017,2,7]],"date-time":"2017-02-07T20:32:58Z","timestamp":1486499578000},"page":"389-397","source":"Crossref","is-referenced-by-count":9,"title":["Secure store and forward proxy for dynamic IoT applications over M2M networks"],"prefix":"10.1109","volume":"62","author":[{"given":"Daniel","family":"D\u00edaz-S\u00e1nchez","sequence":"first","affiliation":[]},{"given":"R. Simon","family":"Sherratt","sequence":"additional","affiliation":[]},{"given":"Florina","family":"Almenarez","sequence":"additional","affiliation":[]},{"given":"Patricia","family":"Arias","sequence":"additional","affiliation":[]},{"given":"Andr\u00e9s","family":"Mar\u00edn","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","author":"bender","year":"1993","journal-title":"PROFIBUS the Fieldbus for Industrial Automation"},{"key":"ref38","author":"modbus","year":"2004","journal-title":"ModBus Application Protocol Specification"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/DCOSS.2012.55"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6347"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2014.6845044"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2011.5741143"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-009-9697-0"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2011.291"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/SIOT.2015.8"},{"key":"ref34","article-title":"6LoWPAN extension for IPsec","author":"raza","year":"2011","journal-title":"Proceedings of IAB and IETF Workshop on Interconnecting Smart Objects with the Internet"},{"key":"ref10","first-page":"1","article-title":"Is there a need for a cloud platform for European smart cities?","author":"ballon","year":"2011","journal-title":"Proc IIMC eChallenges e-2011"},{"key":"ref40","article-title":"Securing industrial control system: an end-to-end integrity verification approach","author":"keoh","year":"2015","journal-title":"Proc Industrial Control System Security Workshop"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1177\/089443930101900107"},{"key":"ref12","author":"holler","year":"2014","journal-title":"From Machine- To-Machine to the Internet of Things"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1327512.1327513"},{"key":"ref14","author":"evans","year":"2011","journal-title":"The Internet of Things How the next Evolution of the Internet Is Changing Everything"},{"key":"ref15","year":"2016","journal-title":"Global Mobile Data Traffic Forecast Update 2015–2020"},{"key":"ref16","first-page":"380","article-title":"Basic principles of machine-to-machine communication and its impact on telecommunications industry","author":"galeti?","year":"2011","journal-title":"Proc 34th IEEE International Convention on Information and Communication Technology Electronics and Microelectronics"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6461195"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7252"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE.2016.7430505"},{"key":"ref28","first-page":"1403","article-title":"A time synchronization technique for CoAP-based home automation systems","volume":"61","author":"son","year":"2010","journal-title":"IEEE Trans Consum Electron"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1177\/1354856507084420"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/SIU.2015.7130101"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2306328"},{"key":"ref6","doi-asserted-by":"crossref","DOI":"10.3390\/wsf-4-f004","article-title":"Smart cities: contradicting definitions and unclear measures","author":"cavada","year":"2014","journal-title":"Proc of the 4th World Sustainability Forum"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2011.5741147"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/IB2Com.2011.6217900"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/PerComW.2014.6815273"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1080\/17508975.2011.586671"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1016\/j.jnca.2016.02.016","article-title":"Machine-to-Machine (M2M) communications: a survey","volume":"66","author":"verma","year":"2016","journal-title":"J Network and Computer Applications"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1080\/13604810802479126"},{"key":"ref1","first-page":"97","article-title":"That ‘internet of things’ thing","volume":"22","author":"ashton","year":"2009","journal-title":"RFID J"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/SIU.2016.7496087"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2009.5174403"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539701398521"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2010.5606276"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.17487\/RFC7641"},{"key":"ref21","year":"2006","journal-title":"Part 15 4 Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (WPANs)"},{"key":"ref42","first-page":"127","article-title":"Divertible protocols and atomic proxy cryptography","author":"blaze","year":"1998","journal-title":"Proc Eurocrypt Espoo"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3390\/s16060831"},{"key":"ref41","first-page":"54","article-title":"Proxy cryptosystems: delegation of the power to decrypt ciphertexts","volume":"e80 a","author":"mambo","year":"1997","journal-title":"IEICE Trans Fund Electronics Communications and Computer Science"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2012.11.002"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2012.6427551"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4919"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/1127345.1127346"},{"key":"ref25","author":"fielding","year":"2000","journal-title":"Architectural Styles and the Design of Network-Based Software Architectures"}],"container-title":["IEEE Transactions on Consumer Electronics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/30\/7838079\/07838091.pdf?arnumber=7838091","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:02:10Z","timestamp":1642003330000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7838091\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11]]},"references-count":47,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tce.2016.7838091","relation":{},"ISSN":["0098-3063"],"issn-type":[{"value":"0098-3063","type":"print"}],"subject":[],"published":{"date-parts":[[2016,11]]}}}