<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE article
  PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "http://jats.nlm.nih.gov/publishing/1.0/JATS-journalpublishing1.dtd">
<article article-type="research-article" dtd-version="1.0" specific-use="sps-1.7" xml:lang="en" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">
	<front>
		<journal-meta>
			<journal-id journal-id-type="publisher-id">rfing</journal-id>
			<journal-title-group>
				<journal-title>Revista Facultad de Ingeniería</journal-title>
				<abbrev-journal-title abbrev-type="publisher">Rev. Fac. Ing.</abbrev-journal-title>
			</journal-title-group>
			<issn pub-type="ppub">0121-1129</issn>
			<issn pub-type="epub">2357-5328</issn>
			<publisher>
				<publisher-name>Universidad Pedagógica y Tecnológica de Colombia</publisher-name>
			</publisher>
		</journal-meta>
		<article-meta>
			<article-id pub-id-type="doi">10.19053/01211129.v27.n47.2018.7807</article-id>
			<article-id pub-id-type="publisher-id">00009</article-id>
			<article-categories>
				<subj-group subj-group-type="heading">
					<subject>Artículos</subject>
				</subj-group>
			</article-categories>
			<title-group>
				<article-title>Smart Campus: Trends in cybersecurity and future development</article-title>
				<trans-title-group xml:lang="es">
					<trans-title>Campus inteligente: Tendencias en ciberseguridad y desarrollo futuro</trans-title>
				</trans-title-group>
				<trans-title-group xml:lang="pt">
					<trans-title>Campus inteligente: Tendências em cibersegurança e desenvolvimento futuro</trans-title>
				</trans-title-group>
			</title-group>
			<contrib-group>
				<contrib contrib-type="author">
					<name>
						<surname>Sánchez-Torres</surname>
						<given-names>Brayan</given-names>
					</name>
					<email>bsanchezt@ufpso.edu.co</email>
					<xref ref-type="aff" rid="aff1"><sup>1</sup></xref>
				</contrib>
				<contrib contrib-type="author">
					<name>
						<surname>Rodríguez-Rodríguez</surname>
						<given-names>Jesús Alberto</given-names>
					</name>
					<email>jarodriguezr@ufpso.edu.co</email>
					<xref ref-type="aff" rid="aff2"><sup>2</sup></xref>
				</contrib>
				<contrib contrib-type="author">
					<name>
						<surname>Rico-Bautista</surname>
						<given-names>Dewar Willmer</given-names>
					</name>
					<email>dwricob@ufpso.edu.co</email>
					<xref ref-type="aff" rid="aff3"><sup>3</sup></xref>
				</contrib>
				<contrib contrib-type="author">
					<name>
						<surname>Guerrero</surname>
						<given-names>César D.</given-names>
					</name>
					<email>cguerrer@unab.edu.co</email>
					<xref ref-type="aff" rid="aff4"><sup>4</sup></xref>
				</contrib>
			</contrib-group>
			<aff id="aff1">
				<label>1</label>
				<institution content-type="original"> Universidad Francisco de Paula Santander Ocaña (Ocaña-Norte de Santander, Colombia). bsanchezt@ufpso.edu.co. ORCID: 0000-0002-8579-6591.</institution>
				<institution content-type="normalized">Universidad Francisco de Paula Santander</institution>
				<institution content-type="orgname">Universidad Francisco de Paula Santander Ocaña</institution>
				<addr-line>
				<named-content content-type="city">Ocaña</named-content>
				<named-content content-type="state">Norte de Santander</named-content>
				</addr-line>
				<country country="CO">Colombia</country>
			</aff>
			<aff id="aff2">
				<label>2</label>
				<institution content-type="original"> Universidad Francisco de Paula Santander Ocaña (Ocaña-Norte de Santander, Colombia). jarodriguezr@ufpso.edu.co. ORCID: 0000-0002-2827-894X.</institution>
				<institution content-type="normalized">Universidad Francisco de Paula Santander</institution>
				<institution content-type="orgname">Universidad Francisco de Paula Santander Ocaña</institution>
				<addr-line>
				<named-content content-type="city">Ocaña</named-content>
				<named-content content-type="state">Norte de Santander</named-content>
				</addr-line>
				<country country="CO">Colombia</country>
			</aff>
			<aff id="aff3">
				<label>3</label>
				<institution content-type="original"> M. Sc. Universidad Francisco de Paula Santander Ocaña (Ocaña-Norte de Santander, Colombia). dwricob@ufpso.edu.co. ORCID: 0000-0002-1808-3874.</institution>
				<institution content-type="normalized">Universidad Francisco de Paula Santander</institution>
				<institution content-type="orgname">Universidad Francisco de Paula Santander Ocaña</institution>
				<addr-line>
				<named-content content-type="city">Ocaña</named-content>
				<named-content content-type="state">Norte de Santander</named-content>
				</addr-line>
				<country country="CO">Colombia</country>
			</aff>
			<aff id="aff4">
				<label>4</label>
				<institution content-type="original"> Ph.D. Universidad Autónoma de Bucaramanga (Bucaramanga-Santander, Colombia). cguerrer@unab.edu.co. ORCID: 0000-0002-3286-6226.</institution>
				<institution content-type="normalized">Universidad Autónoma de Bucaramanga</institution>
				<institution content-type="orgname">Universidad Autónoma de Bucaramanga</institution>
				<addr-line>
				<named-content content-type="city">Bucaramanga</named-content>
				<named-content content-type="state">Santander</named-content>
				</addr-line>
				<country country="CO">Colombia</country>
			</aff>
			<pub-date pub-type="epub-ppub">
				<season>Jan-Apr</season>
				<year>2018</year>
			</pub-date>
			<volume>27</volume>
			<issue>47</issue>
			<fpage>104</fpage>
			<lpage>112</lpage>
			<history>
				<date date-type="received">
					<day>19</day>
					<month>09</month>
					<year>2017</year>
				</date>
				<date date-type="accepted">
					<day>24</day>
					<month>12</month>
					<year>2017</year>
				</date>
			</history>
			<permissions>
				<license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/" xml:lang="en">
					<license-p>This is an open-access article distributed under the terms of the Creative Commons Attribution License</license-p>
				</license>
			</permissions>
			<abstract>
				<title>Abstract</title>
				<p>Smart Campus is an entity of any kind that uses technology and infrastructure to support and improve its processes, so people can use them better. This paper reviews the literature to contextualize the Internet of Things and its vital importance for the Smart Campus, as well as its relationship with the concepts of cybersecurity and wireless sensor network. We describe the various interrelationships, tendencies, and future development of a Smart Campus, as well as the differences and similarities with the emerging concept of Smart University. This review revealed that the Internet of Things is involved in all fields and can influence and improve the university's processes to contribute to decision-making, technological development, and academic learning. To conclude, Smart University focuses on improving the infrastructure of universities through technology, with the main purpose of enhancing the quality of the education provided by institutions.</p>
			</abstract>
			<trans-abstract xml:lang="es">
				<title>Resumen</title>
				<p>Un Smart Campus es una entidad de cualquier tipo que utiliza la tecnología para apoyar su infraestructura y sus procesos, con el fin de mejorarlos para el uso de las personas. El propósito de este trabajo es presentar una revisión de literatura, en donde se contextualiza el <italic>internet de las cosas</italic> y su vital importancia para el Smart Campus y su relación con los conceptos de ciberseguridad y red inalámbrica de sensores. Se presentan las diferentes interrelaciones, tendencias y desarrollo futuro del Smart Campus, así como las diferencias y similitudes con el concepto emergente de Smart University. Esta revisión reveló que el <italic>Internet de las cosas</italic> se involucra en todos los campos y puede influir en los procesos de una universidad para mejorarlos, ayudar en la toma de decisiones y apoyar el aprendizaje académico y el desarrollo tecnológico. Se concluye que Smart University no se queda en mejorar la infraestructura de las universidades a través de la tecnología, pues su fin principal es mejorar la calidad de la educación impartida por las instituciones.</p>
			</trans-abstract>
			<trans-abstract xml:lang="pt">
				<title>Resumo</title>
				<p>Um Smart Campus é uma entidade de qualquer tipo que utiliza a tecnologia para apoiar sua infraestrutura e seus processos, com o fim de melhorá-los para o uso das pessoas. O propósito deste trabalho é apresentar uma revisão de literatura, onde contextualiza-se a internet das coisas e sua vital importância para o Smart Campus e sua relação com os conceitos de cibersegurança e rede sem fio de sensores. Apresentam-se as diferentes interrelações, tendências e desenvolvimento futuro do Smart Campus, assim como as diferenças e semelhanças com o conceito emergente de Smart University. Esta revisão revelou que a Internet das coisas se envolveu em todos os campos e pode influir nos processos de uma universidade para melhorá-los, ajudar na tomada de decisões e apoiar a aprendizagem acadêmica e o desenvolvimento tecnológico. Conclui-se que Smart University não se limita a melhorar a infraestrutura das universidades através da tecnologia, pois seu fim principal é melhorar a qualidade da educação ministrada pelas instituições.</p>
			</trans-abstract>
			<kwd-group xml:lang="en">
				<title>Keywords:</title>
				<kwd>communication system security</kwd>
				<kwd>Internet of things</kwd>
				<kwd>security data</kwd>
				<kwd>smart campus</kwd>
				<kwd>wireless communication</kwd>
			</kwd-group>
			<kwd-group xml:lang="es">
				<title>Palabras clave:</title>
				<kwd>campus inteligente</kwd>
				<kwd>comunicación inalámbrica</kwd>
				<kwd>Internet de las cosas</kwd>
				<kwd>seguridad de los datos</kwd>
				<kwd>seguridad del sistema de comunicación</kwd>
			</kwd-group>
			<kwd-group xml:lang="pt">
				<title>Palavras chave:</title>
				<kwd>campus inteligente</kwd>
				<kwd>comunicação sem fio</kwd>
				<kwd>Internet das coisas</kwd>
				<kwd>segurança dos dados</kwd>
				<kwd>segurança do sistema de comunicação</kwd>
			</kwd-group>
			<counts>
				<fig-count count="0"/>
				<table-count count="0"/>
				<equation-count count="0"/>
				<ref-count count="63"/>
				<page-count count="09"/>
			</counts>
		</article-meta>
	</front>
	<body>
		<sec sec-type="intro">
			<title>I. INTRODUCTION</title>
			<p>Technology has generated main changes in society, like IoT (Internet of Things) is doing it nowadays. Technology enables objects to connect and thus offers control and better performance of things. IoT embraces everything, therefore, generates subfields of this concept. This article addresses the main IoT subfields and their applicability to generate future revolutions, as well as the use of IoT to improve the university's processes and overall education. The main objective of this article is to explain the applicability of IoT to develop Smart Campus and its influence on security, using as a referent the Universidad Francisco de Paula Santander Ocaña (UFPSO) located in the department of Norte de Santander, Colombia.</p>
			<p>The Internet of Things (IoT) is a complex network that connects millions of devices and people with multiple services and objectives, through multi-technology, multi-protocols, and multi-platforms <sup>[</sup><xref ref-type="bibr" rid="B1"><sup>1</sup></xref><sup>,</sup><xref ref-type="bibr" rid="B2"><sup>2</sup></xref><sup>]</sup>. The main vision of IoT is an intelligent world where the real, digital, and virtual converge to help all areas of daily life <sup>[</sup><xref ref-type="bibr" rid="B3"><sup>3</sup></xref><sup>,</sup><xref ref-type="bibr" rid="B4"><sup>4</sup></xref><sup>]</sup>. Society is full of changes and IoT might have an important role in future changes, but IoT will only be applicable when it becomes a much more developed, robust, resistant, safe, and easy to understand concept <sup>[</sup><xref ref-type="bibr" rid="B5"><sup>5</sup></xref><sup>,</sup><xref ref-type="bibr" rid="B6"><sup>6</sup></xref><sup>]</sup>.</p>
			<p>Understanding internet's governance as the development and application by governments <sup>[</sup><xref ref-type="bibr" rid="B7"><sup>7</sup></xref><sup>]</sup>, the private sector, and the civil society could argue whether this governance applies to IoT. However, it seems evident that the governance of IoT should be discussed along with the general Internet. Several IoT problems, such as security, interoperability standards, and protocols can be solved by implementing governance mechanisms, like occurs for the Internet in general <sup>[</sup><xref ref-type="bibr" rid="B8"><sup>8</sup></xref><sup>]</sup>.</p>
			<p>Applications developed under the IoT umbrella are more convenient to people, but if the security of the information is not guaranteed, problems would arise. In addition, IoT not only stores information, but also connects users between platforms, allowing an attacker to collect personal information from people and devices <sup>[</sup><xref ref-type="bibr" rid="B9"><sup>9</sup></xref><sup>,</sup><xref ref-type="bibr" rid="B10"><sup>10</sup></xref><sup>]</sup>. For instance, an IoT system was implemented to treat diabetes, which impacts directly the patient's daily welfare; because the system handles the patient's information, the network security is critical from a personal security perspective <sup>[</sup><xref ref-type="bibr" rid="B11"><sup>11</sup></xref><sup>]</sup>.</p>
			<p>This article is divided into three main sections: (i) the methodology used to select articles, magazines, books, and literary reviews; (ii) the literary review that analyzes the selected papers; and (iii) the conclusions based on the Smart Campus.</p>
		</sec>
		<sec sec-type="methods">
			<title>II. METHODOLOGY</title>
			<p>For this study, we used a descriptive methodology, beginning with a general database search on the subject by using the keyword &quot;IoT&quot;. Afterwards, we combined the main keyword with others to reduce the number of articles linked to our field of interest. <sup>[</sup><xref ref-type="bibr" rid="B12"><sup>12</sup></xref><sup>]</sup></p>
			<p>We used the ACM, Scopus, and ScienceDirect databases because they are among the most relevant resources the UFPSO can access. We considered articles, literature reviews, lectures, and books when selecting the documents to be analyzed. The search and selection process were determined by the following considerations:</p>
			<p>
				<list list-type="bullet">
					<list-item>
						<p>The main search keywords were Internet of Things (IoT), sensor networks (WSN), cybersecurity, and Smart Campus <sup>[</sup><xref ref-type="bibr" rid="B13"><sup>13</sup></xref><sup>-</sup><xref ref-type="bibr" rid="B15"><sup>15</sup></xref><sup>]</sup>.</p>
					</list-item>
					<list-item>
						<p>We limited the search to articles, journals, and reviews, among others, published since 2013 to analyze the most recent developments and research about this topic.</p>
					</list-item>
					<list-item>
						<p>We limited the research to the areas of computer science, energy, and engineering.</p>
					</list-item>
					<list-item>
						<p>Constraints related to authors or research journals were no taken into consideration to access more topics and concepts.</p>
					</list-item>
				</list>
			</p>
		</sec>
		<sec>
			<title>III. LITERATURE REVIEW</title>
			<p>IoT must have a security chain in the connections and in the privacy of the assets, which can be solved if it has security policies, restart mechanisms, secure software, and bug reporting systems, as well as methods to discover and reshape vulnerabilities <sup>[</sup><xref ref-type="bibr" rid="B16"><sup>16</sup></xref><sup>,</sup><xref ref-type="bibr" rid="B17"><sup>17</sup></xref><sup>]</sup>. The four main IoT connectivity models are (i) device-to-device, (ii) device to the cloud, (iii) device to gateway, and (iv) data exchange through back-end. These models give IoT flexibility in connecting their devices <sup>[</sup><xref ref-type="bibr" rid="B18"><sup>18</sup></xref><sup>]</sup>.</p>
			<p>The company BITAG suggests considering issues such as encryption, software update, and system validation against vulnerabilities when developing IoT, in addition to follow the best practices for security and encryption. Regarding the specific IoT system, it should have backup measures or continue working in case connection problems and power failures arise <sup>[</sup><xref ref-type="bibr" rid="B16"><sup>16</sup></xref><sup>]</sup>.</p>
			<p>The necessary requirements to offer quality IoT systems are (i) heterogeneity, which refers to the management of various devices, systems, and services, (ii) scalability to adapt to changes without losing the quality of the system, (iii) minimization of costs to apply economic but highly functional systems, (iv) flexibility to integrate new devices and reprogramming, (v) quality of service (QoS) that the system must offer to its stakeholders, and (vi) secure environment that offers robust communications, authentication, encryption, privacy, and confidential transfer <sup>[</sup><xref ref-type="bibr" rid="B19"><sup>19</sup></xref><sup>]</sup>.</p>
			<p>One of the most relevant technologies applied to IoT is the Internet protocol ipv6, which is one of the bases for its proper functioning. Since the ipv6 has a greater number of addresses, it can deal with all the devices expected to connect <sup>[</sup><xref ref-type="bibr" rid="B20"><sup>20</sup></xref><sup>]</sup>. Based on the IPV, the 6LowPAN is created, which is a standard that uses ipv6 to allow sensor networks to communicate with other IP devices <sup>[</sup><xref ref-type="bibr" rid="B21"><sup>21</sup></xref><sup>,</sup><xref ref-type="bibr" rid="B22"><sup>22</sup></xref><sup>]</sup>.</p>
			<sec>
				<title><italic>A. IoT evolution</italic></title>
				<p>IoT is a technology that advances at a rapid pace based on the automation of tasks; for this reason, analyzing the design principles for cloud environments is necessary, as well as taking advantage of known technologies such as sensors and standards, like W3C semantic sensor network ontology, a service provision scenario that can generate smart campuses <sup>[</sup><xref ref-type="bibr" rid="B23"><sup>23</sup></xref><sup>,</sup><xref ref-type="bibr" rid="B24"><sup>24</sup></xref><sup>]</sup>.</p>
			</sec>
			<sec>
				<title><italic>B. Wireless sensor networks</italic></title>
				<p>Wireless sensor networks (WSN) are composed by sensor nodes distributed to collect information. The constant flow of data handled in the wireless environment makes the system vulnerable to attacks at different levels; therefore, Suspect Detection Systems (SDS) are important for data protection <sup>[</sup><xref ref-type="bibr" rid="B25"><sup>25</sup></xref><sup>-</sup><xref ref-type="bibr" rid="B27"><sup>27</sup></xref><sup>]</sup>. One of the main disadvantages of the networks of nodes or sensors is the elevated energy consumption; an easy way to save energy is to make the devices to interact with the connection through rules or protocols, minimizing the connection time, and allowing the connection only for delivering urgent data <sup>[</sup><xref ref-type="bibr" rid="B28"><sup>28</sup></xref><sup>,</sup><xref ref-type="bibr" rid="B29"><sup>29</sup></xref><sup>]</sup>. Projects focused on connections between sensor networks have proposed the use of dynamic keys as a solution to offer more security when people log into devices that belong to the IoT system <sup>[</sup><xref ref-type="bibr" rid="B30"><sup>30</sup></xref><sup>,</sup><xref ref-type="bibr" rid="B31"><sup>31</sup></xref><sup>]</sup>.</p>
				<p>Sensor networks must have a QoS that supports and offers a reliable system. QoS is the ability to guarantee that the required service for the network is supported; although it can also be seen as the ability of the network to customize the treatment of specific classes of data. The characteristics that a network must meet to offer QoS to a network of sensors are priority, periodicity, term, availability, reliability, confidentiality, security, latency, variation, and recovery of failures <sup>[</sup><xref ref-type="bibr" rid="B32"><sup>32</sup></xref><sup>,</sup><xref ref-type="bibr" rid="B33"><sup>33</sup></xref><sup>]</sup>.</p>
			</sec>
			<sec>
				<title><italic>C. Cloud computing and big data</italic></title>
				<p>IoT collects a large amount of information from the sensors and handles the information that must be stored. According to the amount of compiled information, some researchers argue that a new family of data mining algorithms is necessary to help with the decision-making <sup>[</sup><xref ref-type="bibr" rid="B34"><sup>34</sup></xref><sup>,</sup><xref ref-type="bibr" rid="B35"><sup>35</sup></xref><sup>]</sup>. The cloud service storage model is one of the most accepted for working with big data through the web and networks. However, many cloud users are worried about the access that cloud operators have to their high sensitive data. For problems like this, cryptography with the Security-Aware Efficient Distributed Storage system, designed to obtain an efficient massive distributed storage service and high-level security protection, has been proposed to encrypt all the data and distribute it across the different servers in the cloud without causing large overhead and latency <sup>[</sup><xref ref-type="bibr" rid="B36"><sup>36</sup></xref><sup>,</sup><xref ref-type="bibr" rid="B37"><sup>37</sup></xref><sup>]</sup>.</p>
				<p>IoT aims to transform and improve the quality of health service by optimizing medical care, reducing costs, and providing good and fast care in urgency cases; this is achieved by cloud computing, taking advantage of wireless broadband coverage and the wide use of smartphones that allow monitoring and diagnosing the patient remotely <sup>[</sup><xref ref-type="bibr" rid="B38"><sup>38</sup></xref><sup>]</sup>. IoT processes aligned to the cloud generally work with a layer of cloud processing, which hosts a multi-agent architecture, a database, and an ontology used by agents to increase the general reliability and interoperability characteristics of cyber-physical systems, and a web server that allows any device with Internet connectivity to access stored data <sup>[</sup><xref ref-type="bibr" rid="B39"><sup>39</sup></xref><sup>,</sup><xref ref-type="bibr" rid="B40"><sup>40</sup></xref><sup>]</sup>.</p>
			</sec>
			<sec>
				<title><italic>D. IoT in data security</italic></title>
				<p>With the increasing number of devices connected to the internet, the chances of finding vulnerabilities increase, so the target of cybercriminals will be IoT devices. Due to a poor design, IoT devices may present vulnerabilities that expose the user's data leaving the information unprotected. The main issue is that people are becoming more dependent on IoT systems for many services. Therefore, these devices should be more secure <sup>[</sup><xref ref-type="bibr" rid="B18"><sup>18</sup></xref><sup>,</sup><xref ref-type="bibr" rid="B41"><sup>41</sup></xref><sup>,</sup><xref ref-type="bibr" rid="B42"><sup>42</sup></xref><sup>]</sup>.</p>
				<p>The major security problems of IoT focus on insecurities: (i) unsafe networks, because they are generally open, allowing intruders to access through the device's MAC address, perform &quot;Man in the Middle&quot; or &quot;Deny of Service&quot; attacks, (ii) authentication practices, because the hardware used in IoT often has limited capacities, which generates insecurity in connections, authentications, and dissemination of information <sup>[</sup><xref ref-type="bibr" rid="B43"><sup>43</sup></xref><sup>]</sup>.</p>
				<p>Security solutions have already been considered as frameworks that focus on security and privacy designed from other models, those models are adapted to work on IoT <sup>[</sup><xref ref-type="bibr" rid="B44"><sup>44</sup></xref><sup>,</sup><xref ref-type="bibr" rid="B45"><sup>45</sup></xref><sup>]</sup>. Below, we list several proposed solutions on security of IoT systems:</p>
				<p>
					<list list-type="bullet">
						<list-item>
							<p>Diverse ways to fortify security as a model of differential game that determines the optimal amount of network resources to invest in the security of the system. This proposal considered the vulnerability of the information as the main variable of the model <sup>[</sup><xref ref-type="bibr" rid="B46"><sup>46</sup></xref><sup>]</sup>.</p>
						</list-item>
						<list-item>
							<p>Solutions based on the study of anomalies to prevent attacks to the IoT system. These solutions work from a neural network that takes various data sets as input parameters, covering both valid and invalid cases, to detect any anomalous behavior and prevent its propagation. Furthermore, this solution acts as a health monitoring system for the IoT sensor nodes, analyzing the transmitted data and sending it to a base station, which in case of failure, the valid sensor node can stop functioning and transmit invalid data to a base station <sup>[</sup><xref ref-type="bibr" rid="B47"><sup>47</sup></xref><sup>]</sup>.</p>
						</list-item>
						<list-item>
							<p>One of the solutions designed for information security in IoT systems is the proxy, which controls the traffic generated by the devices in the network. The proxies proposed for this type of IoT systems use an algorithm that allows them to have their messages encrypted, delivering the data without knowing the recipient, thus offering one more level of security to the system. <sup>[</sup><xref ref-type="bibr" rid="B48"><sup>48</sup></xref><sup>]</sup>.</p>
						</list-item>
						<list-item>
							<p>The cloud has also been used for teaching cybersecurity, allowing teacher and student to use resources more appropriately, and providing controlled and safe environments by enabling instructors to monitor <sup>[</sup><xref ref-type="bibr" rid="B49"><sup>49</sup></xref><sup>,</sup><xref ref-type="bibr" rid="B50"><sup>50</sup></xref><sup>]</sup>. These types of cloud use can favor the development of Smart University; in addition, they have been used to develop systems in virtual environments that help learning and decision-making for developments focused on IoT <sup>[</sup><xref ref-type="bibr" rid="B51"><sup>51</sup></xref><sup>]</sup>.</p>
						</list-item>
						<list-item>
							<p>The chip AWS-ECC508 was designed to make devices safer at least for developers who use Amazon's IoT cloud, and to offer end-to-end security between the IoT device and the cloud infrastructure; the device uses Amazon's authentication system <sup>[</sup><xref ref-type="bibr" rid="B52"><sup>52</sup></xref><sup>]</sup>.</p>
						</list-item>
					</list>
				</p>
			</sec>
			<sec>
				<title><italic>E. Impact of IoT on energy consumption</italic></title>
				<p>IoT can contribute to the field of energy management, which is where companies and natural persons usually have the highest operating expenses. However, the regulation of energy use is linked to social responsibility of green areas, regulatory requirements, and financial results. In particular, IoT is great meeting these needs, with developments such as BMS that are centralized systems that monitor, control and record construction services systems, such as mechanical systems, elevators, electrical systems, HVACs, lighting, plumbing, security/surveillance, and contingency alarms. It is noteworthy that larger facilities can achieve greater relative efficiency gains, based on the idea that more wasted energy encourages more saving possibilities <sup>[</sup><xref ref-type="bibr" rid="B53"><sup>53</sup></xref><sup>,</sup><xref ref-type="bibr" rid="B54"><sup>54</sup></xref><sup>]</sup>.</p>
				<p>IoT revolutionized the energy sector, managing electrical networks with devices that transfer secondary workloads to low hours; where tariffs are lower, it is possible to save up to 20%, and to manage micro networks by using online devices <sup>[</sup><xref ref-type="bibr" rid="B55"><sup>55</sup></xref><sup>]</sup>. Managing energy through IoT allows thinking in terms of providing accurate information about the CO2 emissions resulted from the production processes. The energy awareness questions are grouped into three levels: conscious energy at the operation level, conscious energy at the product level, and conscious energy at the order level, which if treated with IoT can reduce the energy costs, and the CO2 emitted throughout the production <sup>[</sup><xref ref-type="bibr" rid="B56"><sup>56</sup></xref><sup>]</sup>.</p>
			</sec>
			<sec>
				<title><italic>F. Smart Campus and University</italic></title>
				<p>The Smart Campus, a concept that arose since the emergence of the new IoT fields, is an entity of any kind that uses technology and infrastructure to support and improve its processes, so people can use them better. The Smart University concept derived from the Smart Campus concept <sup>[</sup><xref ref-type="bibr" rid="B57"><sup>57</sup></xref><sup>]</sup>, and refers to the integration of computing in the cloud and the IoT, providing smart campuses that help managing, teaching, and researching in universities <sup>[</sup><xref ref-type="bibr" rid="B58"><sup>58</sup></xref><sup>,</sup><xref ref-type="bibr" rid="B59"><sup>59</sup></xref><sup>]</sup>.</p>
				<p>The main advantages of Smart University are (i) to know the traffic of people in relation to the university, (ii) to control the academic flow (classrooms, class hours, and faculties, among others), (iii) to analyze risks and decision making through statistics, (iv) to systematize all processes, and (v) to reduce energy consumption <sup>[</sup><xref ref-type="bibr" rid="B60"><sup>60</sup></xref><sup>]</sup>. For example, Wang <sup>[</sup><xref ref-type="bibr" rid="B61"><sup>61</sup></xref><sup>]</sup> proposed to construct green campus with IoT concepts, developing an architecture to manage the application systems that provide data to computer labs to facilitate the decision-making process, and thus reduce the energy consumption. Other examples are the project focused on developing architecture for an intelligent library based on RFID technology that protects and standardizes the selection of books in Donghua University <sup>[</sup><xref ref-type="bibr" rid="B62"><sup>62</sup></xref><sup>]</sup>, and Smart Uji that unifies all the information of the Jaume I University in Castellón, Spain, which is a Smart Campus focused on locating areas of interest and consulting useful information, through maps on responsive web pages; this Smart Campus serves as a foundation for implementing new functionalities in the university <sup>[</sup><xref ref-type="bibr" rid="B63"><sup>63</sup></xref><sup>]</sup>.</p>
				<p>IoT is involved in everything and influence the processes in a university, helping to improve them regarding the decision-making, technological development, and support in academic learning.</p>
			</sec>
		</sec>
		<sec sec-type="discussion">
			<title>IV. DISCUSSION</title>
			<p>Among the IoT fields, it is important to highlight the difference between Smart Campus and Smart University. According to their future projection, they might be fairly the same, but they have different approaches: Smart Universities focus on applications to improve infrastructure and the provision of academic services, whereas Smart Campus is applied by entities outside education with economic purposes.</p>
			<p>Many literature reviews consider that security is the weakest point of IoT, due to the standardization issues and to the fact that the technologies intended to solve IoT problems do not offer enough security for the information that may pass through the IoT system. However, solutions for each IoT problem are starting to arise, as we have expressed in this article. The next step is to implement and improve these possible solutions.</p>
			<p>Currently, encryption is proposed to solve the issues of information transmission through radio frequency; however, other potential solutions come with specific hardware, such as the AWS-ECC508 chip; the implementation of this solution will begin in the near future. Surely, in the future there will be web development frameworks that support IoT-based systems, specific frameworks for statistics, and information presentation, among other features that manage IoT systems; artificial intelligence will also help the treatment and decision-making of the data that IoT handles.</p>
		</sec>
		<sec sec-type="conclusions">
			<title>V. CONCLUSIONS</title>
			<p>Universities should pay attention to the following fast-growing IoT fields for developments in the IoT and Smart University: (i) health, (ii) industrial processes, (iii) agriculture, (iv) mobility, (v) safety, and (vi) smart homes.</p>
			<p>The Smart University generation focuses on improving the university infrastructure through technology, aiming at improving the quality of education provided by the institutions.</p>
			<p>The solutions given to safely develop IoT must be standardized because the independent realization of frameworks and methodologies can present a problem to focus security solutions.</p>
		</sec>
	</body>
	<back>
		<ack>
			<title>ACKNOWLEDGMENTS</title>
			<p>The authors thank the Universidad Francisco de Paula Santander Ocaña (UFPSO), in particular, the Division of Research and Extension (DIE) for the support developing this research. The authors would like to acknowledge the cooperation of the Center of Excellence and Appropriation on Internet of Things under project ID: FP44842-502-2015, supported by the Colombian Ministry of Information and Communication Technologies and the Colombian Agency of Science, Technology and Innovation.</p>
		</ack>
		<ref-list>
			<title>REFERENCES</title>
			<ref id="B1">
				<label>[1]</label>
				<mixed-citation>[1] Y. Medina-Cárdenas, and D. Rico-Bautista. &quot;Modelo de gestión de servicios para la universidad de pamplona: ITIL,&quot; <italic>Scientia et technica</italic>, vol. 2 (39), pp. 314-319, 2008.</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Medina-Cárdenas</surname>
							<given-names>Y</given-names>
						</name>
						<name>
							<surname>Rico-Bautista</surname>
							<given-names>D</given-names>
						</name>
					</person-group>
					<article-title>Modelo de gestión de servicios para la universidad de pamplona: ITIL</article-title>
					<source>Scientia et technica</source>
					<volume>2</volume>
					<issue>39</issue>
					<fpage>314</fpage>
					<lpage>319</lpage>
					<year>2008</year>
				</element-citation>
			</ref>
			<ref id="B2">
				<label>[2]</label>
				<mixed-citation>[2] Y. Medina-Cárdenas, D. Rico-Bautista, and Y. Areniz. Modelo estratégico para la gestión tecnológica en la organización: plan táctico de la calidad (ITIL &amp; ISO 20000), I. T. Metropolitano, Ed., Medellín: Fondo Editorial ITM, 2016, p. 90. DOI: <ext-link ext-link-type="uri" xlink:href="http://doi.org/10.22430/9789585414006">http://doi.org/10.22430/9789585414006</ext-link>.</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Medina-Cárdenas</surname>
							<given-names>Y</given-names>
						</name>
						<name>
							<surname>Rico-Bautista</surname>
							<given-names>D</given-names>
						</name>
						<name>
							<surname>Areniz</surname>
							<given-names>Y</given-names>
						</name>
					</person-group>
					<source>Modelo estratégico para la gestión tecnológica en la organización: plan táctico de la calidad (ITIL &amp; ISO 20000)</source>
					<person-group person-group-type="editor">
						<name>
							<surname>Metropolitano</surname>
							<given-names>I. T</given-names>
						</name>
					</person-group>
					<publisher-loc>Medellín</publisher-loc>
					<publisher-name>Fondo Editorial ITM</publisher-name>
					<year>2016</year>
					<fpage>90</fpage>
					<lpage>90</lpage>
					<ext-link ext-link-type="uri" xlink:href="http://doi.org/10.22430/9789585414006">http://doi.org/10.22430/9789585414006</ext-link>
				</element-citation>
			</ref>
			<ref id="B3">
				<label>[3]</label>
				<mixed-citation>[3] A. Liñán Colina, A. Vives, A. Bagula, M. Zennaro, and E. Pietrosemoli. Internet de las cosas, W. S. Science, Ed., 2015.</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Liñán Colina</surname>
							<given-names>A</given-names>
						</name>
						<name>
							<surname>Vives</surname>
							<given-names>A</given-names>
						</name>
						<name>
							<surname>Bagula</surname>
							<given-names>A</given-names>
						</name>
						<name>
							<surname>Zennaro</surname>
							<given-names>M</given-names>
						</name>
						<name>
							<surname>Pietrosemoli</surname>
							<given-names>E</given-names>
						</name>
					</person-group>
					<source>Internet de las cosas</source>
					<person-group person-group-type="editor">
						<name>
							<surname>Science</surname>
							<given-names>W. S</given-names>
						</name>
					</person-group>
					<year>2015</year>
				</element-citation>
			</ref>
			<ref id="B4">
				<label>[4]</label>
				<mixed-citation>[4] C. Restrepo, O. Salcedo-Parra, and J. Sánchez-Céspedes. &quot;Traffic model for the interconnection of networks and operators using MPLS-TE,&quot; <italic>Revista Facultad de Ingeniería</italic>, vol. 26 (44), pp. 87-96, 2017. DOI: <ext-link ext-link-type="uri" xlink:href="http://doi.org/10.19053/01211129.v26.n44.2017.5774">http://doi.org/10.19053/01211129.v26.n44.2017.5774</ext-link>.</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Restrepo</surname>
							<given-names>C</given-names>
						</name>
						<name>
							<surname>Salcedo-Parra</surname>
							<given-names>O</given-names>
						</name>
						<name>
							<surname>Sánchez-Céspedes</surname>
							<given-names>J</given-names>
						</name>
					</person-group>
					<article-title>Traffic model for the interconnection of networks and operators using MPLS-TE</article-title>
					<source>Revista Facultad de Ingeniería</source>
					<volume>26</volume>
					<issue>44</issue>
					<fpage>87</fpage>
					<lpage>96</lpage>
					<year>2017</year>
					<ext-link ext-link-type="uri" xlink:href="http://doi.org/10.19053/01211129.v26.n44.2017.5774">http://doi.org/10.19053/01211129.v26.n44.2017.5774</ext-link>
				</element-citation>
			</ref>
			<ref id="B5">
				<label>[5]</label>
				<mixed-citation>[5] L. Atzori, A. Lera, and G. Morabito, &quot;Understanding the Internet of Things: definition, potentials, and societal role of a fast evolving paradigm,&quot; <italic>Ad Hoc Networks</italic>, vol. 56, pp. 122-140, Mar. 2017. DOI: <ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1016/j.adhoc.2016.12.004">http://doi.org/10.1016/j.adhoc.2016.12.004</ext-link>.</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Atzori</surname>
							<given-names>L</given-names>
						</name>
						<name>
							<surname>Lera</surname>
							<given-names>A</given-names>
						</name>
						<name>
							<surname>Morabito</surname>
							<given-names>G</given-names>
						</name>
					</person-group>
					<article-title>Understanding the Internet of Things: definition, potentials, and societal role of a fast evolving paradigm</article-title>
					<source>Ad Hoc Networks</source>
					<volume>56</volume>
					<fpage>122</fpage>
					<lpage>140</lpage>
					<month>03</month>
					<year>2017</year>
					<ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1016/j.adhoc.2016.12.004">http://doi.org/10.1016/j.adhoc.2016.12.004</ext-link>
				</element-citation>
			</ref>
			<ref id="B6">
				<label>[6]</label>
				<mixed-citation>[6] A. Tejero López. &quot;Seguridad en el Internet de las cosas,&quot; Master Thesis, Universidad Politécnica de Madrid, 2014.</mixed-citation>
				<element-citation publication-type="thesis">
					<person-group person-group-type="author">
						<name>
							<surname>Tejero López</surname>
							<given-names>A</given-names>
						</name>
					</person-group>
					<source>Seguridad en el Internet de las cosas</source>
					<comment content-type="degree">Master Thesis</comment>
					<publisher-name>Universidad Politécnica de Madrid</publisher-name>
					<year>2014</year>
				</element-citation>
			</ref>
			<ref id="B7">
				<label>[7]</label>
				<mixed-citation>[7] L. Rueda, and D. Rico-Bautista. &quot;Modelamiento inicial de ciudades de países en vía de desarrollo, utilizando dinámica de sistemas,&quot; <italic>Scientia et technica</italic>, vol. 1 (34), pp. 421-426, 2007.</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Rueda</surname>
							<given-names>L</given-names>
						</name>
						<name>
							<surname>Rico-Bautista</surname>
							<given-names>D</given-names>
						</name>
					</person-group>
					<article-title>Modelamiento inicial de ciudades de países en vía de desarrollo, utilizando dinámica de sistemas</article-title>
					<source>Scientia et technica</source>
					<volume>1</volume>
					<issue>34</issue>
					<fpage>421</fpage>
					<lpage>426</lpage>
					<year>2007</year>
				</element-citation>
			</ref>
			<ref id="B8">
				<label>[8]</label>
				<mixed-citation>[8] V. Almeida, D. Doneda, and M. Montero. &quot;Governance Challenges for the Internet of Things,&quot; <italic>IEEE Internet Computing</italic>, vol. 19 (4), pp. 56-59, Jul. 2015. DOI: <ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1109/MIC.2015.86">http://doi.org/10.1109/MIC.2015.86</ext-link>.</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Almeida</surname>
							<given-names>V</given-names>
						</name>
						<name>
							<surname>Doneda</surname>
							<given-names>D</given-names>
						</name>
						<name>
							<surname>Montero</surname>
							<given-names>M</given-names>
						</name>
					</person-group>
					<article-title>Governance Challenges for the Internet of Things</article-title>
					<source>IEEE Internet Computing</source>
					<volume>19</volume>
					<issue>4</issue>
					<fpage>56</fpage>
					<lpage>59</lpage>
					<month>07</month>
					<year>2015</year>
					<ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1109/MIC.2015.86">http://doi.org/10.1109/MIC.2015.86</ext-link>
				</element-citation>
			</ref>
			<ref id="B9">
				<label>[9]</label>
				<mixed-citation>[9] Q. Jing, A. Vasilakos, J. Wan, J. Lu, and D. Qiu, &quot;Security of the Internet of Things: perspectives and challenges,&quot; <italic>Wireless Networks</italic>, vol. 20 (8), pp. 2481-2501, Nov. 2014. DOI: <ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1007/s11276-014-0761-7">http://doi.org/10.1007/s11276-014-0761-7</ext-link>.</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Jing</surname>
							<given-names>Q</given-names>
						</name>
						<name>
							<surname>Vasilakos</surname>
							<given-names>A</given-names>
						</name>
						<name>
							<surname>Wan</surname>
							<given-names>J</given-names>
						</name>
						<name>
							<surname>Lu</surname>
							<given-names>J</given-names>
						</name>
						<name>
							<surname>Qiu</surname>
							<given-names>D</given-names>
						</name>
					</person-group>
					<article-title>Security of the Internet of Things: perspectives and challenges</article-title>
					<source>Wireless Networks</source>
					<volume>20</volume>
					<issue>8</issue>
					<fpage>2481</fpage>
					<lpage>2501</lpage>
					<month>11</month>
					<year>2014</year>
					<ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1007/s11276-014-0761-7">http://doi.org/10.1007/s11276-014-0761-7</ext-link>
				</element-citation>
			</ref>
			<ref id="B10">
				<label>[10]</label>
				<mixed-citation>[10] K. Kobara. &quot;Cyber physical security for Industrial Control Systems and IoT,&quot; IEICE Transactions on Information and Systems, vol. E99.D (4), pp. 787-795, 2016. DOI: <ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1587/transinf.2015ICI0001">http://doi.org/10.1587/transinf.2015ICI0001</ext-link>.</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Kobara</surname>
							<given-names>K</given-names>
						</name>
					</person-group>
					<article-title>Cyber physical security for Industrial Control Systems and IoT</article-title>
					<source>IEICE Transactions on Information and Systems</source>
					<volume>E99</volume>
					<issue>4</issue>
					<fpage>787</fpage>
					<lpage>795</lpage>
					<year>2016</year>
					<ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1587/transinf.2015ICI0001">http://doi.org/10.1587/transinf.2015ICI0001</ext-link>
				</element-citation>
			</ref>
			<ref id="B11">
				<label>[11]</label>
				<mixed-citation>[11] S. Thiel, J. Mitchell, and J. Williams, &quot;Coordination or Collision? the Intersection of Diabetes Care, Cybersecurity, and Cloud-Based Computing,&quot; <italic>Journal of Diabetes Science and Technology</italic>, vol. 11 (2), pp. 195-197, Mar. 2017. DOI: <ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1177/1932296816676189">http://doi.org/10.1177/1932296816676189</ext-link>.</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Thiel</surname>
							<given-names>S</given-names>
						</name>
						<name>
							<surname>Mitchell</surname>
							<given-names>J</given-names>
						</name>
						<name>
							<surname>Williams</surname>
							<given-names>J</given-names>
						</name>
					</person-group>
					<article-title>Coordination or Collision? the Intersection of Diabetes Care, Cybersecurity, and Cloud-Based Computing</article-title>
					<source>Journal of Diabetes Science and Technology</source>
					<volume>11</volume>
					<issue>2</issue>
					<fpage>195</fpage>
					<lpage>197</lpage>
					<month>03</month>
					<year>2017</year>
					<ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1177/1932296816676189">http://doi.org/10.1177/1932296816676189</ext-link>
				</element-citation>
			</ref>
			<ref id="B12">
				<label>[12]</label>
				<mixed-citation>[12] M. Callejas-Cuervo, L. Martínez-Tejada, and A. Alarcón-Aldana. &quot;Emotion recognition techniques using physiological signals and video games -Systematic review-,&quot; <italic>Revista Facultad de Ingeniería</italic>, vol. 26 (46), pp. 19-28, 2017. DOI: <ext-link ext-link-type="uri" xlink:href="http://doi.org/10.19053/01211129.v26.n46.2017.7310">http://doi.org/10.19053/01211129.v26.n46.2017.7310</ext-link>.</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Callejas-Cuervo</surname>
							<given-names>M</given-names>
						</name>
						<name>
							<surname>Martínez-Tejada</surname>
							<given-names>L</given-names>
						</name>
						<name>
							<surname>Alarcón-Aldana</surname>
							<given-names>A</given-names>
						</name>
					</person-group>
					<article-title>Emotion recognition techniques using physiological signals and video games -Systematic review</article-title>
					<source>Revista Facultad de Ingeniería</source>
					<volume>26</volume>
					<issue>46</issue>
					<fpage>19</fpage>
					<lpage>28</lpage>
					<year>2017</year>
					<ext-link ext-link-type="uri" xlink:href="http://doi.org/10.19053/01211129.v26.n46.2017.7310">http://doi.org/10.19053/01211129.v26.n46.2017.7310</ext-link>
				</element-citation>
			</ref>
			<ref id="B13">
				<label>[13]</label>
				<mixed-citation>[13] P. Aves, S. da Silva Santos, and J. Abreu de Faria, &quot;Proposta de modelo explicativo das perceções sobre gestão e políticas públicas em matéria de cibersegurança e cibercrime,&quot; <italic>Sociologia: Revista da Faculdade de Letras da Universidade do Porto</italic>, vol. 23, pp. 95-113, 2017.</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Aves</surname>
							<given-names>P</given-names>
						</name>
						<name>
							<surname>da Silva Santos</surname>
							<given-names>S</given-names>
						</name>
						<name>
							<surname>Abreu de Faria</surname>
							<given-names>J</given-names>
						</name>
					</person-group>
					<article-title>Proposta de modelo explicativo das perceções sobre gestão e políticas públicas em matéria de cibersegurança e cibercrime</article-title>
					<source>Sociologia: Revista da Faculdade de Letras da Universidade do Porto</source>
					<volume>23</volume>
					<fpage>95</fpage>
					<lpage>113</lpage>
					<year>2017</year>
				</element-citation>
			</ref>
			<ref id="B14">
				<label>[14]</label>
				<mixed-citation>[14] M. Sastoque-Caro, G. Puerto-Leguizamón, and C. Suárez-Fajardo. &quot;Oportunidades para la implementación de radio definida por software en redes de sensores,&quot; <italic>Revista Facultad de Ingeniería</italic>, vol. 26 (45), pp. 137-148, 2017. DOI: <ext-link ext-link-type="uri" xlink:href="http://doi.org/10.19053/01211129.v26.n45.2017.6422">http://doi.org/10.19053/01211129.v26.n45.2017.6422</ext-link>.</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Sastoque-Caro</surname>
							<given-names>M</given-names>
						</name>
						<name>
							<surname>Puerto-Leguizamón</surname>
							<given-names>G</given-names>
						</name>
						<name>
							<surname>Suárez-Fajardo</surname>
							<given-names>C</given-names>
						</name>
					</person-group>
					<article-title>Oportunidades para la implementación de radio definida por software en redes de sensores</article-title>
					<source>Revista Facultad de Ingeniería</source>
					<volume>26</volume>
					<issue>45</issue>
					<fpage>137</fpage>
					<lpage>148</lpage>
					<year>2017</year>
					<ext-link ext-link-type="uri" xlink:href="http://doi.org/10.19053/01211129.v26.n45.2017.6422">http://doi.org/10.19053/01211129.v26.n45.2017.6422</ext-link>
				</element-citation>
			</ref>
			<ref id="B15">
				<label>[15]</label>
				<mixed-citation>[15] P. Alves, S. da Silva, and J. de Faria. &quot;Clusters de Percepções sobre cibersegurança e cibercriminalidade em Portugal e as suas implicações para a implementação de políticas públicas nesse domínio,&quot; <italic>Revista da FAE</italic>, vol. 19 (2), pp. 22-37, 2016.</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Alves</surname>
							<given-names>P</given-names>
						</name>
						<name>
							<surname>da Silva</surname>
							<given-names>S</given-names>
						</name>
						<name>
							<surname>de Faria</surname>
							<given-names>J</given-names>
						</name>
					</person-group>
					<article-title>Clusters de Percepções sobre cibersegurança e cibercriminalidade em Portugal e as suas implicações para a implementação de políticas públicas nesse domínio</article-title>
					<source>Revista da FAE</source>
					<volume>19</volume>
					<issue>2</issue>
					<fpage>22</fpage>
					<lpage>37</lpage>
					<year>2016</year>
				</element-citation>
			</ref>
			<ref id="B16">
				<label>[16]</label>
				<mixed-citation>[16] BITAG. Internet of Things (IoT) Security and Privacy Recommendations, Broadband Internet Technical Advisory Group Technical Working Group Report, BITAG, 2016.</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<collab>BITAG</collab>
					</person-group>
					<source>Internet of Things (IoT) Security and Privacy Recommendations, Broadband Internet Technical Advisory Group Technical Working Group Report</source>
					<publisher-name>BITAG</publisher-name>
					<year>2016</year>
				</element-citation>
			</ref>
			<ref id="B17">
				<label>[17]</label>
				<mixed-citation>[17] H. Ning, H. Liu, and L. T. Yang. &quot;Cyberentity Security in the Internet of Things,&quot; <italic>Computer</italic>, vol. 46 (4), pp. 46-53, Apr. 2013. DOI: <ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1109/MC.2013.74">http://doi.org/10.1109/MC.2013.74</ext-link>.</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Ning</surname>
							<given-names>H</given-names>
						</name>
						<name>
							<surname>Liu</surname>
							<given-names>H</given-names>
						</name>
						<name>
							<surname>Yang</surname>
							<given-names>L. T</given-names>
						</name>
					</person-group>
					<article-title>Cyberentity Security in the Internet of Things</article-title>
					<source>Computer</source>
					<volume>46</volume>
					<issue>4</issue>
					<fpage>46</fpage>
					<lpage>53</lpage>
					<month>04</month>
					<year>2013</year>
					<ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1109/MC.2013.74">http://doi.org/10.1109/MC.2013.74</ext-link>
				</element-citation>
			</ref>
			<ref id="B18">
				<label>[18]</label>
				<mixed-citation>[18] K. Rose, S. Eldridge, and L. Chapin. La internet de las cosas-una breve reseña, I. Society, Ed., 2015.</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Rose</surname>
							<given-names>K</given-names>
						</name>
						<name>
							<surname>Eldridge</surname>
							<given-names>S</given-names>
						</name>
						<name>
							<surname>Chapin</surname>
							<given-names>L</given-names>
						</name>
					</person-group>
					<source>La internet de las cosas-una breve reseña</source>
					<person-group person-group-type="editor">
						<name>
							<surname>Society</surname>
							<given-names>I</given-names>
						</name>
					</person-group>
					<year>2015</year>
				</element-citation>
			</ref>
			<ref id="B19">
				<label>[19]</label>
				<mixed-citation>[19] E. Borgia, &quot;The Internet of Things vision: Key features, applications and open issues,&quot; <italic>Computer Communications</italic>, vol. 54, pp. 1-31, Dec. 2014. DOI: <ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1016/j.comcom.2014.09.008">http://doi.org/10.1016/j.comcom.2014.09.008</ext-link>.</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Borgia</surname>
							<given-names>E</given-names>
						</name>
					</person-group>
					<article-title>The Internet of Things vision: Key features, applications and open issues</article-title>
					<source>Computer Communications</source>
					<volume>54</volume>
					<fpage>1</fpage>
					<lpage>31</lpage>
					<month>12</month>
					<year>2014</year>
					<ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1016/j.comcom.2014.09.008">http://doi.org/10.1016/j.comcom.2014.09.008</ext-link>
				</element-citation>
			</ref>
			<ref id="B20">
				<label>[20]</label>
				<mixed-citation>[20] J. Lobo, and D. Rico-Bautista. &quot;Implementación de la seguridad del protocolo de internet Versión 6,&quot; <italic>Revista GTI</italic>, vol. 11 (29), pp. 35 - 46, 2012.</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Lobo</surname>
							<given-names>J</given-names>
						</name>
						<name>
							<surname>Rico-Bautista</surname>
							<given-names>D</given-names>
						</name>
					</person-group>
					<article-title>Implementación de la seguridad del protocolo de internet Versión 6</article-title>
					<source>Revista GTI</source>
					<volume>11</volume>
					<issue>29</issue>
					<fpage>35 </fpage>
					<lpage> 46</lpage>
					<year>2012</year>
				</element-citation>
			</ref>
			<ref id="B21">
				<label>[21]</label>
				<mixed-citation>[21] I. Robles, and A. Acosta. &quot;IPv6 y el Internet de las Cosas (IoT),&quot; in <italic>Cisco Support Community Expert Series Webcast</italic>, 2016.</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Robles</surname>
							<given-names>I</given-names>
						</name>
						<name>
							<surname>Acosta</surname>
							<given-names>A</given-names>
						</name>
					</person-group>
					<chapter-title>IPv6 y el Internet de las Cosas (IoT)</chapter-title>
					<source>Cisco Support Community Expert Series Webcast</source>
					<year>2016</year>
				</element-citation>
			</ref>
			<ref id="B22">
				<label>[22]</label>
				<mixed-citation>[22] L.-O. Vargas, G. Romaniello, M. Vucinic, M. Favre, A. Banciu, R. Guizzetti, C. Planat, P. Urard, M. Heusse, F. Rousseau, O. Alphand, É. Dublé, and A. Duda. &quot;GreenNet: An Energy-Harvesting IP-Enabled Wireless Sensor Network,&quot; <italic>IEEE Internet of Things Journal</italic>, vol. 2 (5), pp. 412 - 426, 2015. DOI: <ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1109/JIOT.2015.2425431">http://doi.org/10.1109/JIOT.2015.2425431</ext-link>.</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Vargas</surname>
							<given-names>L.-O</given-names>
						</name>
						<name>
							<surname>Romaniello</surname>
							<given-names>G</given-names>
						</name>
						<name>
							<surname>Vucinic</surname>
							<given-names>M</given-names>
						</name>
						<name>
							<surname>Favre</surname>
							<given-names>M</given-names>
						</name>
						<name>
							<surname>Banciu</surname>
							<given-names>A</given-names>
						</name>
						<name>
							<surname>Guizzetti</surname>
							<given-names>R</given-names>
						</name>
						<name>
							<surname>Planat</surname>
							<given-names>C</given-names>
						</name>
						<name>
							<surname>Urard</surname>
							<given-names>P</given-names>
						</name>
						<name>
							<surname>Heusse</surname>
							<given-names>M</given-names>
						</name>
						<name>
							<surname>Rousseau</surname>
							<given-names>F</given-names>
						</name>
						<name>
							<surname>Alphand</surname>
							<given-names>O</given-names>
						</name>
						<name>
							<surname>Dublé</surname>
							<given-names>É</given-names>
						</name>
						<name>
							<surname>Duda</surname>
							<given-names>A</given-names>
						</name>
					</person-group>
					<article-title>GreenNet: An Energy-Harvesting IP-Enabled Wireless Sensor Network</article-title>
					<source>IEEE Internet of Things Journal</source>
					<volume>2</volume>
					<issue>5</issue>
					<fpage>412 </fpage>
					<lpage> 426</lpage>
					<year>2015</year>
					<ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1109/JIOT.2015.2425431">http://doi.org/10.1109/JIOT.2015.2425431</ext-link>
				</element-citation>
			</ref>
			<ref id="B23">
				<label>[23]</label>
				<mixed-citation>[23] J. Soldatos, and N. Kefalakis, &quot;Design principles for utility-driven services and cloud-based computing modelling for the Internet of Things,&quot; <italic>International Journal of Web and Grid Services</italic>, vol. 10 (2-3), pp. 139-167, 2014. DOI: <ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1504/IJWGS.2014.060254">http://doi.org/10.1504/IJWGS.2014.060254</ext-link>.</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Soldatos</surname>
							<given-names>J</given-names>
						</name>
						<name>
							<surname>Kefalakis</surname>
							<given-names>N</given-names>
						</name>
					</person-group>
					<article-title>Design principles for utility-driven services and cloud-based computing modelling for the Internet of Things</article-title>
					<source>International Journal of Web and Grid Services</source>
					<volume>10</volume>
					<issue>2-3</issue>
					<fpage>139</fpage>
					<lpage>167</lpage>
					<year>2014</year>
					<ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1504/IJWGS.2014.060254">http://doi.org/10.1504/IJWGS.2014.060254</ext-link>
				</element-citation>
			</ref>
			<ref id="B24">
				<label>[24]</label>
				<mixed-citation>[24] S. Sicari, A. Rizzardi, L. A. Grieco, and A. Coen Porisini. &quot;Security, privacy and trust in the Internet of Things: The road ahead,&quot; <italic>Computer Networks</italic>, vol. 76, pp. 146-164, Jun. 2015. DOI: <ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1016/j.comnet.2014.11.008">http://doi.org/10.1016/j.comnet.2014.11.008</ext-link>.</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Sicari</surname>
							<given-names>S</given-names>
						</name>
						<name>
							<surname>Rizzardi</surname>
							<given-names>A</given-names>
						</name>
						<name>
							<surname>Grieco</surname>
							<given-names>L. A</given-names>
						</name>
						<name>
							<surname>Coen Porisini</surname>
							<given-names>A</given-names>
						</name>
					</person-group>
					<article-title>Security, privacy and trust in the Internet of Things: The road ahead</article-title>
					<source>Computer Networks</source>
					<volume>76</volume>
					<fpage>146</fpage>
					<lpage>164</lpage>
					<month>06</month>
					<year>2015</year>
					<ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1016/j.comnet.2014.11.008">http://doi.org/10.1016/j.comnet.2014.11.008</ext-link>
				</element-citation>
			</ref>
			<ref id="B25">
				<label>[25]</label>
				<mixed-citation>[25] N. A. Alrajeh, S. Khan, and B. Shams, &quot;Intrusion Detection Systems in Wireless Sensor Networks: A Review,&quot; <italic>International Journal of Distributed Sensor Networks</italic>, vol. 9 (5), pp. 1-7, May. 2013. DOI: <ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1155/2013/167575">http://doi.org/10.1155/2013/167575</ext-link>.</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Alrajeh</surname>
							<given-names>N. A</given-names>
						</name>
						<name>
							<surname>Khan</surname>
							<given-names>S</given-names>
						</name>
						<name>
							<surname>Shams</surname>
							<given-names>B</given-names>
						</name>
					</person-group>
					<article-title>Intrusion Detection Systems in Wireless Sensor Networks: A Review</article-title>
					<source>International Journal of Distributed Sensor Networks</source>
					<volume>9</volume>
					<issue>5</issue>
					<fpage>1</fpage>
					<lpage>7</lpage>
					<month>05</month>
					<year>2013</year>
					<ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1155/2013/167575">http://doi.org/10.1155/2013/167575</ext-link>
				</element-citation>
			</ref>
			<ref id="B26">
				<label>[26]</label>
				<mixed-citation>[26] T. Cao Minh, A self-organizing management platform for wireless sensor networks, Universitat Pompeu Fabra, 2014.</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Cao Minh</surname>
							<given-names>T</given-names>
						</name>
					</person-group>
					<source>A self-organizing management platform for wireless sensor networks</source>
					<publisher-name>Universitat Pompeu Fabra</publisher-name>
					<year>2014</year>
				</element-citation>
			</ref>
			<ref id="B27">
				<label>[27]</label>
				<mixed-citation>[27] N. Cong Luong, D. Thai Hoang, P. Wang, D. Niyato, D. In Kim, and Z. Han, &quot;Data Collection and Wireless Communication in Internet of Things (IoT) Using Economic Analysis and Pricing Models: A Survey,&quot; <italic>IEEE Communications Surveys &amp; Tutorials</italic>, vol. 18 (4), pp. 2546 - 2590, 2016. DOI: <ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1109/COMST.2016.2582841">http://doi.org/10.1109/COMST.2016.2582841</ext-link>.</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Cong Luong</surname>
							<given-names>N</given-names>
						</name>
						<name>
							<surname>Thai Hoang</surname>
							<given-names>D</given-names>
						</name>
						<name>
							<surname>Wang</surname>
							<given-names>P</given-names>
						</name>
						<name>
							<surname>Niyato</surname>
							<given-names>D</given-names>
						</name>
					</person-group>
					<person-group person-group-type="author">
						<name>
							<surname>Kim</surname>
							<given-names/>
						</name>
						<name>
							<surname>Han</surname>
							<given-names>Z</given-names>
						</name>
					</person-group>
					<article-title>Data Collection and Wireless Communication in Internet of Things (IoT) Using Economic Analysis and Pricing Models: A Survey</article-title>
					<source>IEEE Communications Surveys &amp; Tutorials</source>
					<volume>18</volume>
					<issue>4</issue>
					<fpage>2546 </fpage>
					<lpage> 2590</lpage>
					<year>2016</year>
					<ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1109/COMST.2016.2582841">http://doi.org/10.1109/COMST.2016.2582841</ext-link>
				</element-citation>
			</ref>
			<ref id="B28">
				<label>[28]</label>
				<mixed-citation>[28] P. Bellavista, G. Cardone, A. Corradi, and L. Foschini. &quot;Convergence of MANET and WSN in IoT Urban Scenarios,&quot; <italic>IEEE Sensors Journal</italic>, vol. 13 (10), pp. 3558-3567, Oct. 2013. DOI: <ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1109/JSEN.2013.2272099">http://doi.org/10.1109/JSEN.2013.2272099</ext-link>.</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Bellavista</surname>
							<given-names>P</given-names>
						</name>
						<name>
							<surname>Cardone</surname>
							<given-names>G</given-names>
						</name>
						<name>
							<surname>Corradi</surname>
							<given-names>A</given-names>
						</name>
						<name>
							<surname>Foschini</surname>
							<given-names>L</given-names>
						</name>
					</person-group>
					<article-title>Convergence of MANET and WSN in IoT Urban Scenarios</article-title>
					<source>IEEE Sensors Journal</source>
					<volume>13</volume>
					<issue>10</issue>
					<fpage>3558</fpage>
					<lpage>3567</lpage>
					<month>10</month>
					<year>2013</year>
					<ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1109/JSEN.2013.2272099">http://doi.org/10.1109/JSEN.2013.2272099</ext-link>
				</element-citation>
			</ref>
			<ref id="B29">
				<label>[29]</label>
				<mixed-citation>[29] M. Barceló Lladó, Wireless Sensor Networks in the Future Internet of Things: Density, Mobility, Heterogeneity and Integration, Universitat Autónoma de Barcelona, 2015.</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Barceló Lladó</surname>
							<given-names>M</given-names>
						</name>
					</person-group>
					<source>Wireless Sensor Networks in the Future Internet of Things: Density, Mobility, Heterogeneity and Integration</source>
					<publisher-name>Universitat Autónoma de Barcelona</publisher-name>
					<year>2015</year>
				</element-citation>
			</ref>
			<ref id="B30">
				<label>[30]</label>
				<mixed-citation>[30] C. C. Chang, W. Y. Hsueh, and T. F. Cheng, &quot;A Dynamic User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks,&quot; <italic>Wireless Personal Communications</italic>, vol. 89 (2), pp. 447-465, Jul. 2016. DOI: <ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1007/s11277-016-3281-1">http://doi.org/10.1007/s11277-016-3281-1</ext-link>.</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Chang</surname>
							<given-names>C. C</given-names>
						</name>
						<name>
							<surname>Hsueh</surname>
							<given-names>W. Y</given-names>
						</name>
						<name>
							<surname>Cheng</surname>
							<given-names>T. F</given-names>
						</name>
					</person-group>
					<article-title>A Dynamic User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks</article-title>
					<source>Wireless Personal Communications</source>
					<volume>89</volume>
					<issue>2</issue>
					<fpage>447</fpage>
					<lpage>465</lpage>
					<month>07</month>
					<year>2016</year>
					<ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1007/s11277-016-3281-1">http://doi.org/10.1007/s11277-016-3281-1</ext-link>
				</element-citation>
			</ref>
			<ref id="B31">
				<label>[31]</label>
				<mixed-citation>[31] F. Ishmanov, and Y. Bin Zikria, &quot;Trust Mechanisms to Secure Routing in Wireless Sensor Networks: Current State of the Research and Open Research Issues,&quot; <italic>Journal of Sensors</italic>, vol. 2017, Article ID 4724852, Feb. 2017. DOI: <ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1155/2017/4724852">http://doi.org/10.1155/2017/4724852</ext-link>.</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Ishmanov</surname>
							<given-names>F</given-names>
						</name>
						<name>
							<surname>Bin Zikria</surname>
							<given-names>Y</given-names>
						</name>
					</person-group>
					<article-title>Trust Mechanisms to Secure Routing in Wireless Sensor Networks: Current State of the Research and Open Research Issues</article-title>
					<source>Journal of Sensors</source>
					<pub-id pub-id-type="other">4724852</pub-id>
					<month>02</month>
					<year>2017</year>
					<ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1155/2017/4724852">http://doi.org/10.1155/2017/4724852</ext-link>
				</element-citation>
			</ref>
			<ref id="B32">
				<label>[32]</label>
				<mixed-citation>[32] J. Hing Fong Chen Gallardo. Un middleware fiable para el desarrollo de aplicaciones sobre redes inalámbricas de sensores y actores, Universidad de Málaga, 2014.</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Hing Fong Chen Gallardo</surname>
							<given-names>J</given-names>
						</name>
					</person-group>
					<source>Un middleware fiable para el desarrollo de aplicaciones sobre redes inalámbricas de sensores y actores</source>
					<publisher-name>Universidad de Málaga</publisher-name>
					<year>2014</year>
				</element-citation>
			</ref>
			<ref id="B33">
				<label>[33]</label>
				<mixed-citation>[33] M. Guizani, D. He, K. Ren, J. Rodrigues, S. Chan, and Y. Zhang, &quot;Security and privacy in emerging networks: Part 1,&quot; <italic>IEEE Communications Magazine</italic>, vol. 53 (4), pp. 18-19, 2015. DOI: <ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1109/MCOM.2015.7081098">http://doi.org/10.1109/MCOM.2015.7081098</ext-link>.</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Guizani</surname>
							<given-names>M</given-names>
						</name>
						<name>
							<surname>He</surname>
							<given-names>D</given-names>
						</name>
						<name>
							<surname>Ren</surname>
							<given-names>K</given-names>
						</name>
						<name>
							<surname>Rodrigues</surname>
							<given-names>J</given-names>
						</name>
						<name>
							<surname>Chan</surname>
							<given-names>S</given-names>
						</name>
						<name>
							<surname>Zhang</surname>
							<given-names>Y</given-names>
						</name>
					</person-group>
					<article-title>Security and privacy in emerging networks: Part 1</article-title>
					<source>IEEE Communications Magazine</source>
					<volume>53</volume>
					<issue>4</issue>
					<fpage>18</fpage>
					<lpage>19</lpage>
					<year>2015</year>
					<ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1109/MCOM.2015.7081098">http://doi.org/10.1109/MCOM.2015.7081098</ext-link>
				</element-citation>
			</ref>
			<ref id="B34">
				<label>[34]</label>
				<mixed-citation>[34] F. Alama, R. Mehmoodb, I. Katiba, and A. Albeshria, &quot;Analysis of Eight Data Mining Algorithms for Smarter Internet of Things (IoT),&quot; <italic>Procedia Computer Science</italic>, vol. 98, pp. 437-442, 2016. DOI: <ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1016/j.procs.2016.09.068">http://doi.org/10.1016/j.procs.2016.09.068</ext-link>.</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Alama</surname>
							<given-names>F</given-names>
						</name>
						<name>
							<surname>Mehmoodb</surname>
							<given-names>R</given-names>
						</name>
						<name>
							<surname>Katiba</surname>
							<given-names>I</given-names>
						</name>
						<name>
							<surname>Albeshria</surname>
							<given-names>A</given-names>
						</name>
					</person-group>
					<article-title>Analysis of Eight Data Mining Algorithms for Smarter Internet of Things (IoT)</article-title>
					<source>Procedia Computer Science</source>
					<volume>98</volume>
					<fpage>437</fpage>
					<lpage>442</lpage>
					<year>2016</year>
					<ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1016/j.procs.2016.09.068">http://doi.org/10.1016/j.procs.2016.09.068</ext-link>
				</element-citation>
			</ref>
			<ref id="B35">
				<label>[35]</label>
				<mixed-citation>[35] T. Tsai, S. Huang, and Y. Tseng, &quot;SIBSC: Separable Identity-Based Signcryption for Resource-Constrained Devices,&quot; <italic>Informatica (Netherlands)</italic>, vol. 28 (1), pp. 193-214, 2017. DOI: <ext-link ext-link-type="uri" xlink:href="http://doi.org/10.15388/Informatica.2017.126">http://doi.org/10.15388/Informatica.2017.126</ext-link>.</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Tsai</surname>
							<given-names>T</given-names>
						</name>
						<name>
							<surname>Huang</surname>
							<given-names>S</given-names>
						</name>
						<name>
							<surname>Tseng</surname>
							<given-names>Y</given-names>
						</name>
					</person-group>
					<article-title>SIBSC: Separable Identity-Based Signcryption for Resource-Constrained Devices</article-title>
					<source>Informatica (Netherlands)</source>
					<volume>28</volume>
					<issue>1</issue>
					<fpage>193</fpage>
					<lpage>214</lpage>
					<year>2017</year>
					<ext-link ext-link-type="uri" xlink:href="http://doi.org/10.15388/Informatica.2017.126">http://doi.org/10.15388/Informatica.2017.126</ext-link>
				</element-citation>
			</ref>
			<ref id="B36">
				<label>[36]</label>
				<mixed-citation>[36] Y. Li, K. Gai, L. Qiu, M. Qiu, and H. Zhao, &quot;Intelligent cryptography approach for secure distributed big data storage in cloud computing,&quot; <italic>Information Sciences</italic>, vol. 387, pp. 103-115, 2017. DOI: <ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1016/j.ins.2016.09.005">http://doi.org/10.1016/j.ins.2016.09.005</ext-link>.</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Li</surname>
							<given-names>Y</given-names>
						</name>
						<name>
							<surname>Gai</surname>
							<given-names>K</given-names>
						</name>
						<name>
							<surname>Qiu</surname>
							<given-names>L</given-names>
						</name>
						<name>
							<surname>Qiu</surname>
							<given-names>M</given-names>
						</name>
						<name>
							<surname>Zhao</surname>
							<given-names>H</given-names>
						</name>
					</person-group>
					<article-title>Intelligent cryptography approach for secure distributed big data storage in cloud computing</article-title>
					<source>Information Sciences</source>
					<volume>387</volume>
					<fpage>103</fpage>
					<lpage>115</lpage>
					<year>2017</year>
					<ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1016/j.ins.2016.09.005">http://doi.org/10.1016/j.ins.2016.09.005</ext-link>
				</element-citation>
			</ref>
			<ref id="B37">
				<label>[37]</label>
				<mixed-citation>[37] I. Weber, S. Nepal, and L. Zhu, &quot;Developing Dependable and Secure Cloud Applications,&quot; <italic>IEEE Internet Computing</italic>, vol. 20 (3), pp. 74-79, 2016. DOI: <ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1109/MIC.2016.67">http://doi.org/10.1109/MIC.2016.67</ext-link>.</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Weber</surname>
							<given-names>I</given-names>
						</name>
						<name>
							<surname>Nepal</surname>
							<given-names>S</given-names>
						</name>
						<name>
							<surname>Zhu</surname>
							<given-names>L</given-names>
						</name>
					</person-group>
					<article-title>Developing Dependable and Secure Cloud Applications</article-title>
					<source>IEEE Internet Computing</source>
					<volume>20</volume>
					<issue>3</issue>
					<fpage>74</fpage>
					<lpage>79</lpage>
					<year>2016</year>
					<ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1109/MIC.2016.67">http://doi.org/10.1109/MIC.2016.67</ext-link>
				</element-citation>
			</ref>
			<ref id="B38">
				<label>[38]</label>
				<mixed-citation>[38] M. A. AL-Zoube, and Y. Alqudah, &quot;Mobile Cloud Computing Framework For Patients' Health Data Analysis,&quot; <italic>Biomedical Engineering - Applications, Basis and Communications</italic>, vol. 26 (2), Article ID 1450020, 2014. DOI: <ext-link ext-link-type="uri" xlink:href="http://doi.org/10.4015/S1016237214500203">http://doi.org/10.4015/S1016237214500203</ext-link>.</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>AL-Zoube</surname>
							<given-names>M. A</given-names>
						</name>
						<name>
							<surname>Alqudah</surname>
							<given-names>Y</given-names>
						</name>
					</person-group>
					<article-title>Mobile Cloud Computing Framework For Patients' Health Data Analysis</article-title>
					<source>Biomedical Engineering - Applications, Basis and Communications</source>
					<volume>26</volume>
					<issue>2</issue>
					<pub-id pub-id-type="other">1450020</pub-id>
					<year>2014</year>
					<ext-link ext-link-type="uri" xlink:href="http://doi.org/10.4015/S1016237214500203">http://doi.org/10.4015/S1016237214500203</ext-link>
				</element-citation>
			</ref>
			<ref id="B39">
				<label>[39]</label>
				<mixed-citation>[39] T. Sanislav, S. Zeadally, and G. D. Mois, &quot;A Cloud-Integrated, Multilayered, Agent-Based Cyber-Physical System Architecture,&quot; <italic>Computer</italic>, vol. 50 (4), pp. 27-37, 2017. DOI: <ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1109/MC.2017.113">http://doi.org/10.1109/MC.2017.113</ext-link>.</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Sanislav</surname>
							<given-names>T</given-names>
						</name>
						<name>
							<surname>Zeadally</surname>
							<given-names>S</given-names>
						</name>
						<name>
							<surname>Mois</surname>
							<given-names>G. D</given-names>
						</name>
					</person-group>
					<article-title>A Cloud-Integrated, Multilayered, Agent-Based Cyber-Physical System Architecture</article-title>
					<source>Computer</source>
					<volume>50</volume>
					<issue>4</issue>
					<fpage>27</fpage>
					<lpage>37</lpage>
					<year>2017</year>
					<ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1109/MC.2017.113">http://doi.org/10.1109/MC.2017.113</ext-link>
				</element-citation>
			</ref>
			<ref id="B40">
				<label>[40]</label>
				<mixed-citation>[40] F. Wu, L. Xu, S. Kumari, and X. Li, &quot;A privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security,&quot; <italic>Journal of Ambient Intelligence and Humanized Computing</italic>, vol. 8 (1), pp. 101-116, Feb. 2017. DOI: <ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1007/s12652-016-0345-8">http://doi.org/10.1007/s12652-016-0345-8</ext-link>.</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Wu</surname>
							<given-names>F</given-names>
						</name>
						<name>
							<surname>Xu</surname>
							<given-names>L</given-names>
						</name>
						<name>
							<surname>Kumari</surname>
							<given-names>S</given-names>
						</name>
						<name>
							<surname>Li</surname>
							<given-names>X</given-names>
						</name>
					</person-group>
					<article-title>A privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security</article-title>
					<source>Journal of Ambient Intelligence and Humanized Computing</source>
					<volume>8</volume>
					<issue>1</issue>
					<fpage>101</fpage>
					<lpage>116</lpage>
					<month>02</month>
					<year>2017</year>
					<ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1007/s12652-016-0345-8">http://doi.org/10.1007/s12652-016-0345-8</ext-link>
				</element-citation>
			</ref>
			<ref id="B41">
				<label>[41]</label>
				<mixed-citation>[41] Q. M. Ashraf, and M. H. Habaebi, &quot;Autonomic schemes for threat mitigation in Internet of Things,&quot; <italic>Journal of Network and Computer Applications</italic>, vol. 49, pp. 112-127, 2015. DOI: <ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1016/j.jnca.2014.11.011">http://doi.org/10.1016/j.jnca.2014.11.011</ext-link>.</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Ashraf</surname>
							<given-names>Q. M</given-names>
						</name>
						<name>
							<surname>Habaebi</surname>
							<given-names>M. H</given-names>
						</name>
					</person-group>
					<article-title>Autonomic schemes for threat mitigation in Internet of Things</article-title>
					<source>Journal of Network and Computer Applications</source>
					<volume>49</volume>
					<fpage>112</fpage>
					<lpage>127</lpage>
					<year>2015</year>
					<ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1016/j.jnca.2014.11.011">http://doi.org/10.1016/j.jnca.2014.11.011</ext-link>
				</element-citation>
			</ref>
			<ref id="B42">
				<label>[42]</label>
				<mixed-citation>[42] F. Luo, J. Zhao, Z. Y. Dong, Y. Chen, Y. Xu, X. Zhang, and P. K. Wong, &quot;Cloud-Based Information Infrastructure for Next-Generation Power Grid: Conception, Architecture, and Applications,&quot; <italic>IEEE Transactions on Smart Grid</italic>, vol. 7 (4), pp. 1896 - 1912, 2016. DOI: <ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1109/TSG.2015.2452293">http://doi.org/10.1109/TSG.2015.2452293</ext-link>.</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Luo</surname>
							<given-names>F</given-names>
						</name>
						<name>
							<surname>Zhao</surname>
							<given-names>J</given-names>
						</name>
						<name>
							<surname>Dong</surname>
							<given-names>Z. Y</given-names>
						</name>
						<name>
							<surname>Chen</surname>
							<given-names>Y</given-names>
						</name>
						<name>
							<surname>Xu</surname>
							<given-names>Y</given-names>
						</name>
						<name>
							<surname>Zhang</surname>
							<given-names>X</given-names>
						</name>
						<name>
							<surname>Wong</surname>
							<given-names>P. K</given-names>
						</name>
					</person-group>
					<article-title>Cloud-Based Information Infrastructure for Next-Generation Power Grid: Conception, Architecture, and Applications</article-title>
					<source>IEEE Transactions on Smart Grid</source>
					<volume>7</volume>
					<issue>4</issue>
					<fpage>1896 </fpage>
					<lpage> 1912</lpage>
					<year>2016</year>
					<ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1109/TSG.2015.2452293">http://doi.org/10.1109/TSG.2015.2452293</ext-link>
				</element-citation>
			</ref>
			<ref id="B43">
				<label>[43]</label>
				<mixed-citation>[43] C. Kolias, A. Stavrou, J. Voas, I. Bojanova, and R. Kuhn, &quot;Learning Internet-of-Things Security &quot;Hands-On&quot;, <italic>IEEE Security and Privacy</italic>, vol. 14 (6), pp. 37-46, Nov. 2016. DOI: <ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1109/MSP.2016.118">http://doi.org/10.1109/MSP.2016.118</ext-link>.</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Kolias</surname>
							<given-names>C</given-names>
						</name>
						<name>
							<surname>Stavrou</surname>
							<given-names>A</given-names>
						</name>
						<name>
							<surname>Voas</surname>
							<given-names>J</given-names>
						</name>
						<name>
							<surname>Bojanova</surname>
							<given-names>I</given-names>
						</name>
						<name>
							<surname>Kuhn</surname>
							<given-names>R</given-names>
						</name>
					</person-group>
					<article-title>Learning Internet-of-Things Security &quot;Hands-On</article-title>
					<source>IEEE Security and Privacy</source>
					<volume>14</volume>
					<issue>6</issue>
					<fpage>37</fpage>
					<lpage>46</lpage>
					<month>11</month>
					<year>2016</year>
					<ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1109/MSP.2016.118">http://doi.org/10.1109/MSP.2016.118</ext-link>
				</element-citation>
			</ref>
			<ref id="B44">
				<label>[44]</label>
				<mixed-citation>[44] J. L. Hernández Ramos, Development of a security and privacy framework for the internet of things, Universidad de Murcia, 2016.</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Hernández Ramos</surname>
							<given-names>J. L</given-names>
						</name>
					</person-group>
					<source>Development of a security and privacy framework for the internet of things</source>
					<publisher-name>Universidad de Murcia</publisher-name>
					<year>2016</year>
				</element-citation>
			</ref>
			<ref id="B45">
				<label>[45]</label>
				<mixed-citation>[45] G. Yongan, Z. Hongbo, and Y. Longxian, &quot;Smart Service System(SSS): A Novel Architecture Enabling Coordination of Heterogeneous Networking Technologies and Devices for Internet of Things,&quot; <italic>China Communications</italic>, vol. 14 (3), pp. 130-144, Mar. 2017. DOI: <ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1109/CC.2017.7897329">http://doi.org/10.1109/CC.2017.7897329</ext-link>.</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Yongan</surname>
							<given-names>G</given-names>
						</name>
						<name>
							<surname>Hongbo</surname>
							<given-names>Z</given-names>
						</name>
						<name>
							<surname>Longxian</surname>
							<given-names>Y</given-names>
						</name>
					</person-group>
					<article-title>Smart Service System(SSS): A Novel Architecture Enabling Coordination of Heterogeneous Networking Technologies and Devices for Internet of Things</article-title>
					<source>China Communications</source>
					<volume>14</volume>
					<issue>3</issue>
					<fpage>130</fpage>
					<lpage>144</lpage>
					<month>03</month>
					<year>2017</year>
					<ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1109/CC.2017.7897329">http://doi.org/10.1109/CC.2017.7897329</ext-link>
				</element-citation>
			</ref>
			<ref id="B46">
				<label>[46]</label>
				<mixed-citation>[46] Y. Ding, X. W. Zhou, Z. M. Cheng, and F. H. Ling, &quot;A Security Differential Game Model for Sensor Networks in Context of the Internet of Things,&quot; <italic>Wireless Personal Communications</italic>, vol. 72 (1), pp. 375-388, Sep. 2013. DOI: <ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1007/s11277-013-1018-y">http://doi.org/10.1007/s11277-013-1018-y</ext-link>.</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Ding</surname>
							<given-names>Y</given-names>
						</name>
						<name>
							<surname>Zhou</surname>
							<given-names>X. W</given-names>
						</name>
						<name>
							<surname>Cheng</surname>
							<given-names>Z. M</given-names>
						</name>
						<name>
							<surname>Ling</surname>
							<given-names>F. H</given-names>
						</name>
					</person-group>
					<article-title>A Security Differential Game Model for Sensor Networks in Context of the Internet of Things</article-title>
					<source>Wireless Personal Communications</source>
					<volume>72</volume>
					<issue>1</issue>
					<fpage>375</fpage>
					<lpage>388</lpage>
					<month>09</month>
					<year>2013</year>
					<ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1007/s11277-013-1018-y">http://doi.org/10.1007/s11277-013-1018-y</ext-link>
				</element-citation>
			</ref>
			<ref id="B47">
				<label>[47]</label>
				<mixed-citation>[47] A. Saeed, A. Ahmadinia, A. Javed, and H. Larijani, &quot;Intelligent Intrusion Detection in Low-Power IoTs,&quot; <italic>ACM Transactions on Internet Technology</italic>, vol. 16 (4), Art. 27, Dec. 2016. DOI: <ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1145/2990499">http://doi.org/10.1145/2990499</ext-link>.</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Saeed</surname>
							<given-names>A</given-names>
						</name>
						<name>
							<surname>Ahmadinia</surname>
							<given-names>A</given-names>
						</name>
						<name>
							<surname>Javed</surname>
							<given-names>A</given-names>
						</name>
						<name>
							<surname>Larijani</surname>
							<given-names>H</given-names>
						</name>
					</person-group>
					<article-title>Intelligent Intrusion Detection in Low-Power IoTs</article-title>
					<source>ACM Transactions on Internet Technology</source>
					<volume>16</volume>
					<issue>4</issue>
					<month>12</month>
					<year>2016</year>
					<ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1145/2990499">http://doi.org/10.1145/2990499</ext-link>
				</element-citation>
			</ref>
			<ref id="B48">
				<label>[48]</label>
				<mixed-citation>[48] D. Díaz-Sánchez, R. S. Sherratt, P. Arias, F. Almenárez Mendoza, and A. Marín, &quot;Secure store and forward proxy for dynamic IoT applications over M2M networks,&quot; <italic>IEEE Transactions on Consumer Electronics</italic>, vol. 62 (4), pp. 389-397, Nov. 2016. DOI: <ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1109/TCE.2016.7838091">http://doi.org/10.1109/TCE.2016.7838091</ext-link>.</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Díaz-Sánchez</surname>
							<given-names>D</given-names>
						</name>
						<name>
							<surname>Sherratt</surname>
							<given-names>R. S</given-names>
						</name>
						<name>
							<surname>Arias</surname>
							<given-names>P</given-names>
						</name>
						<name>
							<surname>Almenárez Mendoza</surname>
							<given-names>F</given-names>
						</name>
						<name>
							<surname>Marín</surname>
							<given-names>A</given-names>
						</name>
					</person-group>
					<article-title>Secure store and forward proxy for dynamic IoT applications over M2M networks</article-title>
					<source>IEEE Transactions on Consumer Electronics</source>
					<volume>62</volume>
					<issue>4</issue>
					<fpage>389</fpage>
					<lpage>397</lpage>
					<month>11</month>
					<year>2016</year>
					<ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1109/TCE.2016.7838091">http://doi.org/10.1109/TCE.2016.7838091</ext-link>
				</element-citation>
			</ref>
			<ref id="B49">
				<label>[49]</label>
				<mixed-citation>[49] K. Salah, M. Hammoud, and S. Zeadally, &quot;Teaching Cybersecurity Using the Cloud,&quot; <italic>IEEE Transactions on Learning Technologies</italic>, vol. 8 (4), pp. 383 - 392, Oct. 2015. DOI: <ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1109/TLT.2015.2424692">http://doi.org/10.1109/TLT.2015.2424692</ext-link>.</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Salah</surname>
							<given-names>K</given-names>
						</name>
						<name>
							<surname>Hammoud</surname>
							<given-names>M</given-names>
						</name>
						<name>
							<surname>Zeadally</surname>
							<given-names>S</given-names>
						</name>
					</person-group>
					<article-title>Teaching Cybersecurity Using the Cloud</article-title>
					<source>IEEE Transactions on Learning Technologies</source>
					<volume>8</volume>
					<issue>4</issue>
					<fpage>383 </fpage>
					<lpage> 392</lpage>
					<month>10</month>
					<year>2015</year>
					<ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1109/TLT.2015.2424692">http://doi.org/10.1109/TLT.2015.2424692</ext-link>
				</element-citation>
			</ref>
			<ref id="B50">
				<label>[50]</label>
				<mixed-citation>[50] M. Coccoli, P. Maresca, L. Stanganelli, and A. Guercio, &quot;An experience of collaboration using a PaaS for the smarter university model,&quot; <italic>Journal of Visual Languages and Computing</italic>, vol. 31, pp. 275-282, 2015. DOI: <ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1016/j.jvlc.2015.10.014">http://doi.org/10.1016/j.jvlc.2015.10.014</ext-link>.</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Coccoli</surname>
							<given-names>M</given-names>
						</name>
						<name>
							<surname>Maresca</surname>
							<given-names>P</given-names>
						</name>
						<name>
							<surname>Stanganelli</surname>
							<given-names>L</given-names>
						</name>
						<name>
							<surname>Guercio</surname>
							<given-names>A</given-names>
						</name>
					</person-group>
					<article-title>An experience of collaboration using a PaaS for the smarter university model</article-title>
					<source>Journal of Visual Languages and Computing</source>
					<volume>31</volume>
					<fpage>275</fpage>
					<lpage>282</lpage>
					<year>2015</year>
					<ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1016/j.jvlc.2015.10.014">http://doi.org/10.1016/j.jvlc.2015.10.014</ext-link>
				</element-citation>
			</ref>
			<ref id="B51">
				<label>[51]</label>
				<mixed-citation>[51] A. Furfaro, L. Argento, A. Parise, and A. Piccolo, &quot;Using virtual environments for the assessment of cybersecurity issues in IoT scenarios,&quot; <italic>Simulation Modelling Practice and Theory</italic>, vol. 73, pp. 43-54, 2017. DOI: <ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1016/j.simpat.2016.09.007">http://doi.org/10.1016/j.simpat.2016.09.007</ext-link>.</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Furfaro</surname>
							<given-names>A</given-names>
						</name>
						<name>
							<surname>Argento</surname>
							<given-names>L</given-names>
						</name>
						<name>
							<surname>Parise</surname>
							<given-names>A</given-names>
						</name>
						<name>
							<surname>Piccolo</surname>
							<given-names>A</given-names>
						</name>
					</person-group>
					<article-title>Using virtual environments for the assessment of cybersecurity issues in IoT scenarios</article-title>
					<source>Simulation Modelling Practice and Theory</source>
					<volume>73</volume>
					<fpage>43</fpage>
					<lpage>54</lpage>
					<year>2017</year>
					<ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1016/j.simpat.2016.09.007">http://doi.org/10.1016/j.simpat.2016.09.007</ext-link>
				</element-citation>
			</ref>
			<ref id="B52">
				<label>[52]</label>
				<mixed-citation>[52] S. Cass, &quot;A chip to protect the internet of things [Resources_Beyond the datasheet],&quot; <italic>IEEE Spectrum</italic>, vol. 54 (1), pp. 20-21, 2017. DOI: <ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1109/MSPEC.2017.7802735">http://doi.org/10.1109/MSPEC.2017.7802735</ext-link>.</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Cass</surname>
							<given-names>S</given-names>
						</name>
					</person-group>
					<article-title>A chip to protect the internet of things [Resources_Beyond the datasheet]</article-title>
					<source>IEEE Spectrum</source>
					<volume>54</volume>
					<issue>1</issue>
					<fpage>20</fpage>
					<lpage>21</lpage>
					<year>2017</year>
					<ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1109/MSPEC.2017.7802735">http://doi.org/10.1109/MSPEC.2017.7802735</ext-link>
				</element-citation>
			</ref>
			<ref id="B53">
				<label>[53]</label>
				<mixed-citation>[53] D. Minoli, K. Sohraby, and B. Occhiogrosso, &quot;IoT Considerations, Requirements, and Architectures for Smart Buildings-Energy Optimization and Next-Generation Building Management Systems,&quot; <italic>IEEE Internet of Things Journal</italic>, vol. 4 (1), pp. 269-283, 2017. DOI: <ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1109/JIOT.2017.2647881">http://doi.org/10.1109/JIOT.2017.2647881</ext-link>.</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Minoli</surname>
							<given-names>D</given-names>
						</name>
						<name>
							<surname>Sohraby</surname>
							<given-names>K</given-names>
						</name>
						<name>
							<surname>Occhiogrosso</surname>
							<given-names>B</given-names>
						</name>
					</person-group>
					<article-title>IoT Considerations, Requirements, and Architectures for Smart Buildings-Energy Optimization and Next-Generation Building Management Systems</article-title>
					<source>IEEE Internet of Things Journal</source>
					<volume>4</volume>
					<issue>1</issue>
					<fpage>269</fpage>
					<lpage>283</lpage>
					<year>2017</year>
					<ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1109/JIOT.2017.2647881">http://doi.org/10.1109/JIOT.2017.2647881</ext-link>
				</element-citation>
			</ref>
			<ref id="B54">
				<label>[54]</label>
				<mixed-citation>[54] Y. Simmhan, S. Aman, A. Kumbhare, R. Liu, S. Stevens, Q. Zhou, and V. Prasanna, &quot;Cloud-Based Software Platform for Big Data Analytics in Smart Grids,&quot; <italic>Computing in Science and Engineering</italic>, vol. 15 (4), pp. 38-47, 2013. DOI: <ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1109/MCSE.2013.39">http://doi.org/10.1109/MCSE.2013.39</ext-link>.</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Simmhan</surname>
							<given-names>Y</given-names>
						</name>
						<name>
							<surname>Aman</surname>
							<given-names>S</given-names>
						</name>
						<name>
							<surname>Kumbhare</surname>
							<given-names>A</given-names>
						</name>
						<name>
							<surname>Liu</surname>
							<given-names>R</given-names>
						</name>
						<name>
							<surname>Stevens</surname>
							<given-names>S</given-names>
						</name>
						<name>
							<surname>Zhou</surname>
							<given-names>Q</given-names>
						</name>
						<name>
							<surname>Prasanna</surname>
							<given-names>V</given-names>
						</name>
					</person-group>
					<article-title>Cloud-Based Software Platform for Big Data Analytics in Smart Grids</article-title>
					<source>Computing in Science and Engineering</source>
					<volume>15</volume>
					<issue>4</issue>
					<fpage>38</fpage>
					<lpage>47</lpage>
					<year>2013</year>
					<ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1109/MCSE.2013.39">http://doi.org/10.1109/MCSE.2013.39</ext-link>
				</element-citation>
			</ref>
			<ref id="B55">
				<label>[55]</label>
				<mixed-citation>[55] Bankinter, Internet de las cosas en un mundo conectado de objetos, Bakinter, Ed., 2011.</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Bankinter</surname>
							<given-names/>
						</name>
					</person-group>
					<source>Internet de las cosas en un mundo conectado de objetos</source>
					<publisher-name>Bakinter</publisher-name>
					<year>2011</year>
				</element-citation>
			</ref>
			<ref id="B56">
				<label>[56]</label>
				<mixed-citation>[56] F. Shrouf, Utilizing the Internet of Things to promote energy awareness and efficiency at discrete production processes: Practices and methodology, E.T.S.I. Industriales (UPM), 2015.</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Shrouf</surname>
							<given-names>F</given-names>
						</name>
					</person-group>
					<source>Utilizing the Internet of Things to promote energy awareness and efficiency at discrete production processes: Practices and methodology</source>
					<publisher-name>.T.S.I. Industriales (UPM)</publisher-name>
					<year>2015</year>
				</element-citation>
			</ref>
			<ref id="B57">
				<label>[57]</label>
				<mixed-citation>[57] D. Rico-Bautista, J. Parra-Valencia, and C. D. Guerrero, &quot;IOT: Una aproximación desde ciudad inteligente a universidad inteligente,&quot; <italic>Revista Ingenio UFPSO</italic>, vol. 13 (1), pp. 9-20, 2017.</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Rico-Bautista</surname>
							<given-names>D</given-names>
						</name>
						<name>
							<surname>Parra-Valencia</surname>
							<given-names>J</given-names>
						</name>
						<name>
							<surname>Guerrero</surname>
							<given-names>C. D</given-names>
						</name>
					</person-group>
					<article-title>IOT: Una aproximación desde ciudad inteligente a universidad inteligente</article-title>
					<source>Revista Ingenio UFPSO</source>
					<volume>13</volume>
					<issue>1</issue>
					<fpage>9</fpage>
					<lpage>20</lpage>
					<year>2017</year>
				</element-citation>
			</ref>
			<ref id="B58">
				<label>[58]</label>
				<mixed-citation>[58] X. Nie, &quot;Constructing Smart Campus Based on the cloud computing and the internet of things,&quot; in <italic>2nd</italic> 
 <italic>International Conference on Computer Science and Electronics Engineering</italic>, 2013. DOI: <ext-link ext-link-type="uri" xlink:href="http://doi.org/10.2991/iccsee.2013.395">http://doi.org/10.2991/iccsee.2013.395</ext-link>.</mixed-citation>
				<element-citation publication-type="confproc">
					<person-group person-group-type="author">
						<name>
							<surname>Nie</surname>
							<given-names>X</given-names>
						</name>
					</person-group>
					<source>Constructing Smart Campus Based on the cloud computing and the internet of things</source>
					<conf-name>2ndInternational Conference on Computer Science and Electronics Engineering</conf-name>
					<year>2013</year>
					<ext-link ext-link-type="uri" xlink:href="http://doi.org/10.2991/iccsee.2013.395">http://doi.org/10.2991/iccsee.2013.395</ext-link>
				</element-citation>
			</ref>
			<ref id="B59">
				<label>[59]</label>
				<mixed-citation>[59] T. Marcos Alves, C. André da Costa, R. da Rosa Righi, and J. L. Victória Barbosa, &quot;Exploring the Social Internet of Things concept in a Univeristy Campus using NFC,&quot; in <italic>41st</italic> 
 <italic>Latin American Computing Conference</italic>, 2015.</mixed-citation>
				<element-citation publication-type="confproc">
					<person-group person-group-type="author">
						<name>
							<surname>Marcos Alves</surname>
							<given-names>T</given-names>
						</name>
						<name>
							<surname>André da Costa</surname>
							<given-names>C</given-names>
						</name>
						<name>
							<surname>da Rosa Righi</surname>
							<given-names>R</given-names>
						</name>
						<name>
							<surname>Victória Barbosa</surname>
							<given-names>J. L</given-names>
						</name>
					</person-group>
					<source>Exploring the Social Internet of Things concept in a Univeristy Campus using NFC</source>
					<conf-name>41stLatin American Computing Conference</conf-name>
					<year>2015</year>
				</element-citation>
			</ref>
			<ref id="B60">
				<label>[60]</label>
				<mixed-citation>[60] M. Cata, &quot;Smart university, a new concept in the internet of things,&quot; in <italic>14th</italic> 
 <italic>RoEduNet International Conference - Networking in Education and Research</italic>, 2015. DOI: <ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1109/RoEduNet.2015.7311993">http://doi.org/10.1109/RoEduNet.2015.7311993</ext-link>.</mixed-citation>
				<element-citation publication-type="confproc">
					<person-group person-group-type="author">
						<name>
							<surname>Cata</surname>
							<given-names>M</given-names>
						</name>
					</person-group>
					<source>Smart university, a new concept in the internet of things</source>
					<conf-name>14thRoEduNet International Conference - Networking in Education and Research</conf-name>
					<year>2015</year>
					<ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1109/RoEduNet.2015.7311993">http://doi.org/10.1109/RoEduNet.2015.7311993</ext-link>
				</element-citation>
			</ref>
			<ref id="B61">
				<label>[61]</label>
				<mixed-citation>[61] H.-I. Wang, &quot;Constructing the green campus within the internet of things architecture,&quot; <italic>International Journal of Distributed Sensor Networks</italic>, vol. 10 (3), pp. 1-8, Mar. 2014. DOI: <ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1155/2014/804627">http://doi.org/10.1155/2014/804627</ext-link>.</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Wang</surname>
							<given-names>H.-I</given-names>
						</name>
					</person-group>
					<article-title>Constructing the green campus within the internet of things architecture</article-title>
					<source>International Journal of Distributed Sensor Networks</source>
					<volume>10</volume>
					<issue>3</issue>
					<fpage>1</fpage>
					<lpage>8</lpage>
					<month>03</month>
					<year>2014</year>
					<ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1155/2014/804627">http://doi.org/10.1155/2014/804627</ext-link>
				</element-citation>
			</ref>
			<ref id="B62">
				<label>[62]</label>
				<mixed-citation>[62] Y. Luo, J. Cao, and J. Qian, &quot;Exploration and construction of smart library based on RFID technology,&quot; <italic>Advanced Materials Research</italic>, vol. 765-767, pp. 1743-1746, Sep. 2013. DOI: <ext-link ext-link-type="uri" xlink:href="http://doi.org/10.4028/www.scientific.net/AMR.765-767.1743">http://doi.org/10.4028/www.scientific.net/AMR.765-767.1743</ext-link>.</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Luo</surname>
							<given-names>Y</given-names>
						</name>
						<name>
							<surname>Cao</surname>
							<given-names>J</given-names>
						</name>
						<name>
							<surname>Qian</surname>
							<given-names>J</given-names>
						</name>
					</person-group>
					<article-title>Exploration and construction of smart library based on RFID technology</article-title>
					<source>Advanced Materials Research</source>
					<volume>765-767</volume>
					<fpage>1743</fpage>
					<lpage>1746</lpage>
					<month>09</month>
					<year>2013</year>
					<ext-link ext-link-type="uri" xlink:href="http://doi.org/10.4028/www.scientific.net/AMR.765-767.1743">http://doi.org/10.4028/www.scientific.net/AMR.765-767.1743</ext-link>
				</element-citation>
			</ref>
			<ref id="B63">
				<label>[63]</label>
				<mixed-citation>[63] M. Benedito-Bordonau, D. Gargallo, J. Avariento, A. Sanchis, M. Gould, and J. Huerta, UJI Smart Campus, Centro Nacional de Información Geográfica, 2013.</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Benedito-Bordonau</surname>
							<given-names>M</given-names>
						</name>
						<name>
							<surname>Gargallo</surname>
							<given-names>D</given-names>
						</name>
						<name>
							<surname>Avariento</surname>
							<given-names>J</given-names>
						</name>
						<name>
							<surname>Sanchis</surname>
							<given-names>A</given-names>
						</name>
						<name>
							<surname>Gould</surname>
							<given-names>M</given-names>
						</name>
						<name>
							<surname>Huerta</surname>
							<given-names>J</given-names>
						</name>
					</person-group>
					<source>UJI Smart Campus</source>
					<publisher-name>Centro Nacional de Información Geográfica</publisher-name>
					<year>2013</year>
				</element-citation>
			</ref>
		</ref-list>
		<fn-group>
			<fn fn-type="other" id="fn1">
				<label>Para citar este artículo:</label>
				<p> B. Sánchez-Torres, J. A. Rodríguez-Rodríguez, D. W. Rico-Bautista, and C. D. Guerrero, &quot;Smart Campus: Trends in cybersecurity and future development,&quot; <italic>Revista Facultad de Ingeniería,</italic> vol. 27 (47), pp. 93-101, Jan. 2018</p>
			</fn>
			<fn fn-type="other" id="fn2">
				<label>AUTHORS' CONTRIBUTIONS</label>
				<p> Sánchez-Torres and Rodríguez-Rodríguez conducted the search, the recompilation and the analysis of the papers referenced in this article, and contributed to write the manuscript. Rico-Bautista and Guerrero helped writing the manuscript and reviewed it. All authors read and approved the final manuscript.</p>
			</fn>
		</fn-group>
	</back>
</article>