{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T00:12:18Z","timestamp":1740183138635,"version":"3.37.3"},"reference-count":45,"publisher":"Association for Computing Machinery (ACM)","issue":"1","funder":[{"name":"Ripple Graduate Fellowship"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Internet Things"],"published-print":{"date-parts":[[2024,2,29]]},"abstract":"Due to the limited resources of Internet of Things (IoT) devices, Symmetric Key Cryptography (SKC) is typically favored over resource-intensive Public Key Cryptography (PKC) to secure communication between IoT devices. To utilize SKC, devices need to execute a key exchange protocol to establish a session key before initiating communication. However, existing SKC-based key exchange protocols assume that communication devices have a pre-shared secret or there are trusted intermediaries between them; neither is always realistic in IoT.<\/jats:p>\n We introduce a new SKC-based key exchange protocol for IoT devices. While also intermediary based, our protocol fundamentally departs from existing intermediary-based solutions in that intermediaries between two key exchange devices may be malicious, and moreover, our protocol can detect cheating behaviors and identify malicious intermediaries. We prove our protocol is secure under the universally composable model, and show that it can detect malicious intermediaries with probability 1.0. We implemented and evaluated our protocol on different IoT devices. We show that our protocol has significant improvements in computation time and energy cost. Compared to the PKC-based protocols ECDH, DH, and RSA, our protocol is 2.3 to 1,591 times faster on one of the two key exchange devices and 0.7 to 4.67 times faster on the other.<\/jats:p>","DOI":"10.1145\/3632408","type":"journal-article","created":{"date-parts":[[2023,11,20]],"date-time":"2023-11-20T11:54:40Z","timestamp":1700481280000},"page":"1-31","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Resilient Intermediary-Based Key Exchange Protocol for IoT"],"prefix":"10.1145","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5441-4848","authenticated-orcid":false,"given":"Zhangxiang","family":"Hu","sequence":"first","affiliation":[{"name":"University of Oregon, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5308-5672","authenticated-orcid":false,"given":"Jun","family":"Li","sequence":"additional","affiliation":[{"name":"University of Oregon, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-1090-0702","authenticated-orcid":false,"given":"Christopher","family":"Wilson","sequence":"additional","affiliation":[{"name":"University of Oregon, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,1,13]]},"reference":[{"key":"e_1_3_1_2_2","first-page":"Lecture Notes i","volume-title":"Advances in Cryptology\u2014EUROCRYPT 2015","author":"Afshar Arash","year":"2015","unstructured":"Arash Afshar, Zhangxiang Hu, Payman Mohassel, and Mike Rosulek. 2015. How to efficiently evaluate RAM programs with malicious security. In Advances in Cryptology\u2014EUROCRYPT 2015. Lecture Notes in Computer Science, Vol. 9056. Springer, 702\u2013729."},{"key":"e_1_3_1_3_2","article-title":"A survey on 5G networks for the Internet of Things: Communication technologies and challenges","author":"Akpakwu Godfrey Anuga","year":"2017","unstructured":"Godfrey Anuga Akpakwu, Bruno J. Silva, Gerhard P. Hancke, and Adnan M. Abu-Mahfouz. 2017. A survey on 5G networks for the Internet of Things: Communication technologies and challenges. IEEE Access 6 (2017), 3619\u20133647.","journal-title":"IEEE Access"},{"key":"e_1_3_1_4_2","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1016\/j.comnet.2016.02.011","article-title":"Taking advantage of jamming in wireless networks: A survey","volume":"99","author":"Al-Mefleh Haithem","year":"2016","unstructured":"Haithem Al-Mefleh and Osameh Al-Kofahi. 2016. Taking advantage of jamming in wireless networks: A survey. Computer Networks 99 (2016), 99\u2013124.","journal-title":"Computer Networks"},{"key":"e_1_3_1_5_2","volume-title":"Proceedings of the 20th Annual Network and Distributed System Security Symposium (NDSS \u201913)","author":"Ateniese Giuseppe","year":"2013","unstructured":"Giuseppe Ateniese, Giuseppe Bianchi, Angelo Capossele, and Chiara Petrioli. 2013. Low-cost standard signatures in wireless sensor networks: A case for reviving pre-computation techniques? In Proceedings of the 20th Annual Network and Distributed System Security Symposium (NDSS \u201913)."},{"key":"e_1_3_1_6_2","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2010.05.010","article-title":"The Internet of Things: A survey","author":"Atzori Luigi","year":"2010","unstructured":"Luigi Atzori, Antonio Iera, and Giacomo Morabito. 2010. The Internet of Things: A survey. Computer Networks 54, 15 (2010), 2787\u20132805.","journal-title":"Computer Networks"},{"key":"e_1_3_1_7_2","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.SP.800-57p1r2006","volume-title":"Recommendation for Key Management: Part 1: General","author":"Barker Elaine","year":"2006","unstructured":"Elaine Barker, William Burr, William Polk, and Miles Smid. 2006. Recommendation for Key Management: Part 1: General. National Institute of Standards and Technology."},{"key":"e_1_3_1_8_2","doi-asserted-by":"crossref","unstructured":"Mihir Bellare Ran Canetti and Hugo Krawczyk. 1998. A modular approach to the design and analysis of authentication and key exchange protocols. In Proceedings of the 30th Annual ACM Symposium on Theory of Computing (STOC \u201998) . 419\u2013428. https:\/\/eprint.iacr.org\/1998\/009","DOI":"10.1145\/276698.276854"},{"key":"e_1_3_1_9_2","first-page":"207","volume-title":"Public Key Cryptography","author":"Bernstein Daniel J.","year":"2006","unstructured":"Daniel J. Bernstein. 2006. Curve25519: New Diffie-Hellman speed records. In Public Key Cryptography. Springer, Berlin, Heidelberg, 207\u2013228."},{"key":"e_1_3_1_10_2","article-title":"Universally composable security: A new paradigm for cryptographic protocols","author":"Canetti Ran","year":"2000","unstructured":"Ran Canetti. 2000. Universally composable security: A new paradigm for cryptographic protocols. In Proceedings of the 42nd IEEE Symposium on Foundations of Computer Science. https:\/\/eprint.iacr.org\/2000\/067","journal-title":"In Proceedings of the 42nd IEEE Symposium on Foundations of Computer Science"},{"key":"e_1_3_1_11_2","article-title":"Analysis of key-exchange protocols and their use for building secure channels","author":"Canetti Ran","year":"2001","unstructured":"Ran Canetti and Hugo Krawczyk. 2001. Analysis of key-exchange protocols and their use for building secure channels. In Advances in Cryptology\u2014EUROCRYPT 2001. Lecture Notes in Computer Science, Vol. 2045. Springer, 453\u2013474. https:\/\/eprint.iacr.org\/2001\/040","journal-title":"In Advances in Cryptology\u2014EUROCRYPT 2001. Lecture Notes in Computer Science, Vol. 2045. Springer, 453\u2013474"},{"key":"e_1_3_1_12_2","doi-asserted-by":"crossref","unstructured":"Ran Canetti and Hugo Krawczyk. 2002. Universally composable notions of key exchange and secure channels. In Advances in Cryptology\u2014EUROCRYPT 2002 . Lecture Notes in Computer Science Vol. 2332. Springer 337\u2013351. https:\/\/eprint.iacr.org\/2002\/059","DOI":"10.1007\/3-540-46035-7_22"},{"key":"e_1_3_1_13_2","doi-asserted-by":"crossref","first-page":"214","DOI":"10.1007\/978-3-662-48797-6_10","volume-title":"Advances in Cryptology\u2014ASIACRYPT 2015","author":"Costello Craig","year":"2015","unstructured":"Craig Costello and Patrick Longa. 2015. FourQ: Four-dimensional decompositions on a Q-curve over the Mersenne prime. In Advances in Cryptology\u2014ASIACRYPT 2015. Lecture Notes in Computer Science, Vol. 9452. Springer, 214\u2013235."},{"key":"e_1_3_1_14_2","article-title":"Security challenges to smart agriculture: Current state, key issues, and future directions","author":"Zanella Angelita Rettore de Araujo","year":"2020","unstructured":"Angelita Rettore de Araujo Zanella, Eduardo da Silva, and Luiz Carlos Pessoa Albini. 2020. Security challenges to smart agriculture: Current state, key issues, and future directions. Array 8 (2020), 100048.","journal-title":"Array"},{"key":"e_1_3_1_15_2","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1007\/3-540-39200-9_32","volume-title":"Advances in Cryptology\u2014EUROCRYPT 2003","author":"Raimondo Mario Di","year":"2003","unstructured":"Mario Di Raimondo and Rosario Gennaro. 2003. Provably secure threshold password-authenticated key exchange. In Advances in Cryptology\u2014EUROCRYPT 2003. Lecture Notes in Computer Science, Vol. 2656. Springer, 507\u2013523."},{"key":"e_1_3_1_16_2","article-title":"Internet of Things for the future of smart agriculture: A comprehensive survey of emerging technologies","author":"Friha Othmane","year":"2021","unstructured":"Othmane Friha, Mohamed Amine Ferrag, Lei Shu, Leandros Maglaras, and Xiaochan Wang. 2021. Internet of Things for the future of smart agriculture: A comprehensive survey of emerging technologies. IEEE\/CAA Journal of Automatica Sinica 8, 4 (2021), 718\u2013752.","journal-title":"IEEE\/CAA Journal of Automatica Sinica"},{"key":"e_1_3_1_17_2","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1145\/2413176.2413206","volume-title":"Proceedings of the 8th International Conference on Emerging Networking Experiments and Technologies","author":"Handigol Nikhil","year":"2012","unstructured":"Nikhil Handigol, Brandon Heller, Vimalkumar Jeyakumar, Bob Lantz, and Nick McKeown. 2012. Reproducible network experiments using container-based emulation. In Proceedings of the 8th International Conference on Emerging Networking Experiments and Technologies. 253\u2013264."},{"key":"e_1_3_1_18_2","first-page":"197","volume-title":"Proceedings of the Symposium on Security and Privacy","author":"Chan Haowen","year":"2003","unstructured":"Haowen Chan, A. Perrig, and D. Song. 2003. Random key predistribution schemes for sensor networks. In Proceedings of the Symposium on Security and Privacy. 197\u2013213."},{"key":"e_1_3_1_19_2","volume-title":"Proceedings of the 12th ACM Conference on Data and Application Security and Privacy","author":"Hu Zhangxiang","year":"2022","unstructured":"Zhangxiang Hu, Jun Li, Samuel Mergendahl, and Christopher Wilson. 2022. Toward a resilient key exchange protocol for IoT. In Proceedings of the 12th ACM Conference on Data and Application Security and Privacy."},{"key":"e_1_3_1_20_2","first-page":"284","volume-title":"Proceedings of the 11th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON \u201914)","author":"Hummen R.","year":"2014","unstructured":"R. Hummen, H. Shafagh, S. Raza, T. Voig, and K. Wehrle. 2014. Delegation-based authentication and authorization for the IP-based Internet of Things. In Proceedings of the 11th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON \u201914). 284\u2013292."},{"key":"e_1_3_1_21_2","first-page":"44","volume-title":"Proceedings of the 21st Annual ACM Symposium on Theory of Computing","author":"Impagliazzo R.","year":"1989","unstructured":"R. Impagliazzo and S. Rudich. 1989. Limits on the provable consequences of one-way permutations. In Proceedings of the 21st Annual ACM Symposium on Theory of Computing. 44\u201361."},{"key":"e_1_3_1_22_2","doi-asserted-by":"crossref","first-page":"523","DOI":"10.1109\/HPCSim.2016.7568379","volume-title":"Proceedings of the International Conference on High Performance Computing Simulation (HPCS \u201916)","author":"Iqbal M. A.","year":"2016","unstructured":"M. A. Iqbal and M. Bayoumi. 2016. Secure end-to-end key establishment protocol for resource-constrained healthcare sensors in the context of IoT. In Proceedings of the International Conference on High Performance Computing Simulation (HPCS \u201916). 523\u2013530."},{"key":"e_1_3_1_23_2","volume-title":"Proceedings of the IEEE Workshop on Large Scale Real Time and Embedded Systems (LARTES \u201902)","author":"Lai Bocheng","year":"2002","unstructured":"Bocheng Lai, Sungha Kim, and Ingrid Verbauwhede. 2002. Scalable session key construction protocol for wireless sensor networks. In Proceedings of the IEEE Workshop on Large Scale Real Time and Embedded Systems (LARTES \u201902)."},{"key":"e_1_3_1_24_2","first-page":"499","article-title":"A study on security vulnerability management in electric power industry IoT","author":"Lee Sang-Gi","year":"2016","unstructured":"Sang-Gi Lee, Sei-Yoon Lee, and Jeong-Chul Kim. 2016. A study on security vulnerability management in electric power industry IoT. Journal of Digital Contents Society 2016 (2016), 499\u2013507.","journal-title":"Journal of Digital Contents Society"},{"issue":"4","key":"e_1_3_1_25_2","doi-asserted-by":"crossref","first-page":"676","DOI":"10.1109\/TDSC.2018.2840979","article-title":"Securely connecting wearables to ambient displays with user intent","volume":"17","author":"Liang X.","year":"2020","unstructured":"X. Liang, R. Peterson, and D. Kotz. 2020. Securely connecting wearables to ambient displays with user intent. Transactions on Dependable and Secure Computing 17, 4 (2020), 676\u2013690.","journal-title":"Transactions on Dependable and Secure Computing"},{"key":"e_1_3_1_26_2","first-page":"52","volume-title":"Proceedings of the 26th Annual International Conference on Advances in Cryptology","author":"Lindell Yehuda","year":"2007","unstructured":"Yehuda Lindell and Benny Pinkas. 2007. An efficient protocol for secure two-party computation in the presence of malicious adversaries. In Proceedings of the 26th Annual International Conference on Advances in Cryptology. 52\u201378."},{"key":"e_1_3_1_27_2","volume-title":"Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS \u201903).","author":"Liu Donggang","year":"2003","unstructured":"Donggang Liu and Peng Ning. 2003. Establishing pairwise keys in distributed sensor networks. In Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS \u201903)."},{"key":"e_1_3_1_28_2","volume-title":"Advances in Cryptology\u2014CRYPTO 2002","author":"MacKenzie P.","year":"2002","unstructured":"P. MacKenzie, Thomas Shrimpton, and M. Jakobsson. 2002. Threshold password-authenticated key exchange: Extended abstract. In Advances in Cryptology\u2014CRYPTO 2002. Lecture Notes in Computer Science, Vol. 2442. Springer, 385\u2013400."},{"key":"e_1_3_1_29_2","doi-asserted-by":"crossref","DOI":"10.1109\/COMST.2017.2745201","article-title":"A survey on mobile edge computing: The communication perspective","author":"Mao Yuyi","year":"2017","unstructured":"Yuyi Mao, Changsheng You, Jun Zhang, Kaibin Huang, and Khaled B. Letaief. 2017. A survey on mobile edge computing: The communication perspective. IEEE Communications Surveys & Tutorials. Early Access, August 2017.","journal-title":"IEEE Communications Surveys & Tutorials."},{"key":"e_1_3_1_30_2","article-title":"A survey of Internet of Things communication using ICN: A use case perspective","author":"Nour Boubakr","year":"2019","unstructured":"Boubakr Nour, Kashif Sharif, Fan Li, Sujit Biswas, Hassine Moungla, Mohsen Guizani, and Yu Wang. 2019. A survey of Internet of Things communication using ICN: A use case perspective. Computer Communications 142-143 (2019), 95\u2013123.","journal-title":"Computer Communications"},{"key":"e_1_3_1_31_2","first-page":"65","volume-title":"Proceedings of the Workshop on Internet of Things Security and Privacy","author":"Ozmen Muslum Ozgur","year":"2017","unstructured":"Muslum Ozgur Ozmen and Attila A. Yavuz. 2017. Low-cost standard public key cryptography services for wireless IoT systems. In Proceedings of the Workshop on Internet of Things Security and Privacy. 65\u201370."},{"key":"e_1_3_1_32_2","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1145\/3307334.3326100","volume-title":"Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys \u201919).","author":"Pierson Timothy J.","year":"2019","unstructured":"Timothy J. Pierson, Travis Peters, Ronald Peterson, and David Kotz. 2019. CloseTalker: Secure, short-range ad hoc wireless communication. In Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys \u201919).340\u2013352. DOI:10.1145\/3307334.3326100"},{"key":"e_1_3_1_33_2","first-page":"711","volume-title":"Proceedings of the 2nd World Forum on Internet of Things (WF-IoT \u201915)","author":"Porambage P.","year":"2015","unstructured":"P. Porambage, A. Braeken, A. Gurtov, M. Ylianttila, and S. Spinsante. 2015. Secure end-to-end communication for constrained devices in IoT-enabled ambient assisted living systems. In Proceedings of the 2nd World Forum on Internet of Things (WF-IoT \u201915). 711\u2013714."},{"key":"e_1_3_1_34_2","first-page":"2677","volume-title":"Proceedings of the International Conference on Communication Workshop (ICCW \u201915)","author":"Porambage P.","year":"2015","unstructured":"P. Porambage, A. Braeken, P. Kumar, A. Gurtov, and M. Ylianttila. 2015. Proxy-based end-to-end key establishment protocol for the Internet of Things. In Proceedings of the International Conference on Communication Workshop (ICCW \u201915). 2677\u20132682."},{"key":"e_1_3_1_35_2","first-page":"1","volume-title":"Proceedings of the International Symposium on a World of Wireless, Mobile, and Multimedia Networks (WoWMoM \u201912)","author":"Saied Y. B.","year":"2012","unstructured":"Y. B. Saied and A. Olivereau. 2012. D-HIP: A distributed key exchange scheme for HIP-based Internet of Things. In Proceedings of the International Symposium on a World of Wireless, Mobile, and Multimedia Networks (WoWMoM \u201912). 1\u20137."},{"key":"e_1_3_1_36_2","doi-asserted-by":"crossref","first-page":"172","DOI":"10.23919\/ICACT.2018.8323686","volume-title":"Proceedings of the 20th International Conference on Advanced Communication Technology (ICACT \u201918)","author":"Seralathan Yogeesh","year":"2018","unstructured":"Yogeesh Seralathan, Tae Tom Oh, Suyash Jadhav, Jonathan Myers, Jaehoon Paul Jeong, Young Ho Kim, and Jeong Neyo Kim. 2018. IoT security vulnerability: A case study of a web camera. In Proceedings of the 20th International Conference on Advanced Communication Technology (ICACT \u201918). 172\u2013177."},{"key":"e_1_3_1_37_2","unstructured":"Stefaan Seys and Bart Preneel. 2002. Key establishment and authentication suite to counter DoS attacks in distributed sensor networks. Unpublished Manuscript."},{"issue":"11","key":"e_1_3_1_38_2","first-page":"612","article-title":"How to share a secret","volume":"22","author":"Shamir Adi","year":"1979","unstructured":"Adi Shamir. 1979. How to share a secret. Communication 22, 11 (Nov. 1979), 612\u2013613.","journal-title":"Communication"},{"key":"e_1_3_1_39_2","doi-asserted-by":"crossref","DOI":"10.1016\/j.rser.2019.109663","article-title":"Smart home technologies in Europe: A critical review of concepts, benefits, risks and policies","author":"Sovacool Benjamin K.","year":"2020","unstructured":"Benjamin K. Sovacool and Dylan D. Furszyfer Del Rio. 2020. Smart home technologies in Europe: A critical review of concepts, benefits, risks and policies. Renewable and Sustainable Energy Reviews 120 (2020), 109663.","journal-title":"Renewable and Sustainable Energy Reviews"},{"key":"e_1_3_1_40_2","article-title":"Review of the Internet of Things communication technologies in smart agriculture and challenges","author":"Tao Wen","year":"2021","unstructured":"Wen Tao, Liang Zhao, Guangwen Wang, and Ruobing Liang. 2021. Review of the Internet of Things communication technologies in smart agriculture and challenges. Computers and Electronics in Agriculture 189 (2021), 106352.","journal-title":"Computers and Electronics in Agriculture"},{"key":"e_1_3_1_41_2","article-title":"A survey on smart agriculture: Development modes, technologies, and security and privacy challenges","author":"Yang Xing","year":"2021","unstructured":"Xing Yang, Lei Shu, Jianing Chen, Mohamed Amine Ferrag, Jun Wu, Edmond Nurellari, and Kai Huang. 2021. A survey on smart agriculture: Development modes, technologies, and security and privacy challenges. IEEE\/CAA Journal of Automatica Sinica 8, 2 (2021), 273\u2013302.","journal-title":"IEEE\/CAA Journal of Automatica Sinica"},{"key":"e_1_3_1_42_2","article-title":"Ultra lightweight multiple-time digital signature for the Internet of Things devices","author":"Yavuz Attila Altay","year":"2019","unstructured":"Attila Altay Yavuz and Muslum Ozgur Ozmen. 2019. Ultra lightweight multiple-time digital signature for the Internet of Things devices. IEEE Transactions on Services Computing. Early Access, July 2019.","journal-title":"IEEE Transactions on Services Computing."},{"key":"e_1_3_1_43_2","first-page":"1","volume-title":"Proceedings of the Conference on Computer Communications","author":"Zhang J.","year":"2017","unstructured":"J. Zhang, Z. Wang, Z. Yang, and Q. Zhang. 2017. Proximity based IoT device authentication. In Proceedings of the Conference on Computer Communications. 1\u20139."},{"key":"e_1_3_1_44_2","first-page":"230","volume-title":"Proceedings of the IEEE 7th International Conference on Service-Oriented Computing and Applications","author":"Zhang Zhi-Kai","year":"2014","unstructured":"Zhi-Kai Zhang, Michael Cheng Yi Cho, Chia-Wei Wang, Chia-Wei Hsu, Chong-Kuan Chen, and Shiuhpyng Shieh. 2014. IoT security: Ongoing challenges and research opportunities. In Proceedings of the IEEE 7th International Conference on Service-Oriented Computing and Applications. 230\u2013234."},{"key":"e_1_3_1_45_2","volume-title":"Proceedings of the 2021 IEEE International Symposium on Circuits and Systems (ISCAS \u201921)","author":"Zheng Yue","year":"2021","unstructured":"Yue Zheng and Chip-Hong Chang. 2021. Secure mutual authentication and key-exchange protocol between PUF-embedded IoT endpoints. In Proceedings of the 2021 IEEE International Symposium on Circuits and Systems (ISCAS \u201921)."},{"key":"e_1_3_1_46_2","article-title":"PUF-based mutual authentication and key exchange protocol for peer-to-peer IoT applications","author":"Zheng Yue","year":"2022","unstructured":"Yue Zheng, Wenye Liu, Chongyan Gu, and Chip-Hong Chang. 2022. PUF-based mutual authentication and key exchange protocol for peer-to-peer IoT applications. IEEE Transactions on Dependable and Secure Computing. Early Access, January 2022.","journal-title":"IEEE Transactions on Dependable and Secure Computing."}],"container-title":["ACM Transactions on Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3632408","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,13]],"date-time":"2024-01-13T12:12:51Z","timestamp":1705147971000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3632408"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,13]]},"references-count":45,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,2,29]]}},"alternative-id":["10.1145\/3632408"],"URL":"https:\/\/doi.org\/10.1145\/3632408","relation":{},"ISSN":["2691-1914","2577-6207"],"issn-type":[{"type":"print","value":"2691-1914"},{"type":"electronic","value":"2577-6207"}],"subject":[],"published":{"date-parts":[[2024,1,13]]},"assertion":[{"value":"2023-03-20","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-10-23","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-01-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}