{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,5,2]],"date-time":"2024-05-02T05:06:33Z","timestamp":1714626393581},"reference-count":57,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[2018,4,1]],"date-time":"2018-04-01T00:00:00Z","timestamp":1522540800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"funder":[{"DOI":"10.13039\/501100003406","name":"Tekes","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003406","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Telematics and Informatics"],"published-print":{"date-parts":[[2018,4]]},"DOI":"10.1016\/j.tele.2017.09.020","type":"journal-article","created":{"date-parts":[[2017,10,11]],"date-time":"2017-10-11T12:46:41Z","timestamp":1507726001000},"page":"82-92","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":29,"title":["Towards gadget-free internet services: A roadmap of the Naked world"],"prefix":"10.1016","volume":"35","author":[{"given":"Ijaz","family":"Ahmad","sequence":"first","affiliation":[]},{"given":"Tanesh","family":"Kumar","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0003-4786-030X","authenticated-orcid":false,"given":"Madhusanka","family":"Liyanage","sequence":"additional","affiliation":[]},{"given":"Mika","family":"Ylianttila","sequence":"additional","affiliation":[]},{"given":"Timo","family":"Koskela","sequence":"additional","affiliation":[]},{"given":"Timo","family":"Braysy","sequence":"additional","affiliation":[]},{"given":"Antti","family":"Anttonen","sequence":"additional","affiliation":[]},{"given":"Vesa","family":"Pentikinen","sequence":"additional","affiliation":[]},{"given":"Juha- Pekka","family":"Soininen","sequence":"additional","affiliation":[]},{"given":"Jyrki","family":"Huusko","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"4","key":"10.1016\/j.tele.2017.09.020_b0005","doi-asserted-by":"crossref","first-page":"2317","DOI":"10.1109\/COMST.2015.2474118","article-title":"Security in Software Defined Networks: a Survey","volume":"17","author":"Ahmad","year":"2015","journal-title":"IEEE Commun. Surveys Tutorials"},{"issue":"2","key":"10.1016\/j.tele.2017.09.020_b0010","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1002\/bltj.20295","article-title":"Applications for the converged communications world: Challenges and emerging technologies","volume":"13","author":"A\u00efdan","year":"2008","journal-title":"Bell Labs Tech. J."},{"key":"10.1016\/j.tele.2017.09.020_b0015","unstructured":"Aikio, J. Pentik\u00e4inen, V., H\u00e4iki\u00f6, J., H\u00e4kkil\u00e4, J., Colley, A., 2016. On the road to digital paradise: The Naked Approach. URL http:\/\/www.nakedapproach.fi."},{"issue":"3","key":"10.1016\/j.tele.2017.09.020_b0020","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1023\/B:ETIN.0000006918.22060.1f","article-title":"A piece of yourself: ethical issues in biometric identification","volume":"5","author":"Alterman","year":"2003","journal-title":"Ethics Inf. Technol."},{"issue":"4","key":"10.1016\/j.tele.2017.09.020_b0025","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1145\/1721654.1721672","article-title":"A view of cloud computing","volume":"53","author":"Armbrust","year":"2010","journal-title":"Commun. ACM"},{"key":"10.1016\/j.tele.2017.09.020_b0030","unstructured":"Gage, J., 1984. The Network is the Computer -still. URL https:\/\/blogs.oracle.com\/vreality\/the-network-is-the-computer-still."},{"key":"10.1016\/j.tele.2017.09.020_b0035","unstructured":"Beck, M.T., Werner, M., Feld, S., Schimper, S., 2014. Mobile edge computing: A taxonomy. In: Proc. of the Sixth International Conference on Advances in Future Internet, Citeseer."},{"issue":"3","key":"10.1016\/j.tele.2017.09.020_b0040","first-page":"13","article-title":"Biometric authentication: a review","volume":"2","author":"Bhattacharyya","year":"2009","journal-title":"Int. J. u-and e-Service Sci. Technol."},{"key":"10.1016\/j.tele.2017.09.020_b0045","doi-asserted-by":"crossref","unstructured":"Bonomi, F., Milito, R., Zhu, J., Addepalli, S., 2012. Fog Computing and Its Role in the Internet of Things. In: Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, MCC \u201912, ACM, New York, NY, USA, pp. 13\u201316. doi: https:\/\/doi.org\/10.1145\/2342509.2342513.","DOI":"10.1145\/2342509.2342513"},{"issue":"1","key":"10.1016\/j.tele.2017.09.020_b0050","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.cviu.2005.05.005","article-title":"A survey of approaches and challenges in 3D and multi-modal 3D + 2D face recognition","volume":"101","author":"Bowyer","year":"2006","journal-title":"Comput. Vis. Image Underst."},{"issue":"2","key":"10.1016\/j.tele.2017.09.020_b0055","doi-asserted-by":"crossref","first-page":"528","DOI":"10.1016\/j.tele.2016.09.010","article-title":"The underlying factors of the perceived usefulness of using smart wearable devices for disaster applications","volume":"34","author":"Cheng","year":"2017","journal-title":"Telematics Inform."},{"issue":"5","key":"10.1016\/j.tele.2017.09.020_b0060","doi-asserted-by":"crossref","first-page":"862","DOI":"10.1016\/j.comnet.2009.10.017","article-title":"A survey of network virtualization","volume":"54","author":"Chowdhury","year":"2010","journal-title":"Comput. Netw."},{"key":"10.1016\/j.tele.2017.09.020_b0065","series-title":"Biometric recognition: challenges and opportunities","author":"Committee","year":"2010"},{"key":"10.1016\/j.tele.2017.09.020_b0070","doi-asserted-by":"crossref","unstructured":"Corradi, A., Montanari, R., Tibaldi, D., 2004. Context-based access control for ubiquitous service provisioning, in: Computer Software and Applications Conference, 2004. COMPSAC 2004. In: Proceedings of the 28th Annual International, pp. 444\u2013451 vol. 1. doi: https:\/\/doi.org\/10.1109\/CMPSAC.2004.1342877.","DOI":"10.1109\/CMPSAC.2004.1342877"},{"issue":"1","key":"10.1016\/j.tele.2017.09.020_b0075","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1016\/S1403-3664(02)00114-7","article-title":"The human perspective of the wireless world","volume":"26","author":"Crisler","year":"2003","journal-title":"Comput. Commun."},{"issue":"1","key":"10.1016\/j.tele.2017.09.020_b0080","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1007\/s007790170019","article-title":"Understanding and using context","volume":"5","author":"Dey","year":"2001","journal-title":"Personal Ubiquitous Comput."},{"issue":"1","key":"10.1016\/j.tele.2017.09.020_b0085","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1016\/j.future.2012.05.023","article-title":"Mobile cloud computing: a survey","volume":"29","author":"Fernando","year":"2013","journal-title":"Future Generation Computer Systems"},{"issue":"2","key":"10.1016\/j.tele.2017.09.020_b0090","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1016\/j.ijinfomgt.2014.10.007","article-title":"Beyond the hype: Big data concepts, methods, and analytics","volume":"35","author":"Gandomi","year":"2015","journal-title":"Int. J. Inf. Manage."},{"issue":"5","key":"10.1016\/j.tele.2017.09.020_b0095","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1145\/2831347.2831354","article-title":"Edge-centric computing: Vision and challenges","volume":"45","author":"Garcia Lopez","year":"2015","journal-title":"SIGCOMM Comput. Commun. Rev."},{"issue":"1","key":"10.1016\/j.tele.2017.09.020_b0100","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1016\/j.tele.2010.05.005","article-title":"Adding value to the network: Mobile operators\u2019 experiments with software-as-a-service and platform-as-a-service models","volume":"28","author":"Gon\u00e7alves","year":"2011","journal-title":"Telematics Inform."},{"issue":"1","key":"10.1016\/j.tele.2017.09.020_b0105","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1177\/1932296815622453","article-title":"A Digital Ecosystem of Diabetes Data and Technology: Services, Systems, and Tools Enabled by Wearables Sensors and Apps","volume":"10","author":"Heintzman","year":"2016","journal-title":"J. Diab. Sci. Technol."},{"key":"10.1016\/j.tele.2017.09.020_b0110","unstructured":"Hu, Y.C., Patel, M., Sabella, D., Sprecher, N., Young, V., 2015. Mobile Edge Computing-A Key Technology Towards 5G, ETSI White Paper 11."},{"issue":"1","key":"10.1016\/j.tele.2017.09.020_b0115","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1109\/TCSVT.2003.818349","article-title":"An introduction to biometric recognition","volume":"14","author":"Jain","year":"2004","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"2","key":"10.1016\/j.tele.2017.09.020_b0120","doi-asserted-by":"crossref","first-page":"1443","DOI":"10.1109\/TII.2014.2306384","article-title":"An IoT-Oriented Data Storage Framework in Cloud Computing Platform","volume":"10","author":"Jiang","year":"2014","journal-title":"IEEE Trans. Industr. Inf."},{"issue":"2","key":"10.1016\/j.tele.2017.09.020_b0125","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1109\/JSAC.2005.861395","article-title":"RFID security and privacy: a research survey","volume":"24","author":"Juels","year":"2006","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"4","key":"10.1016\/j.tele.2017.09.020_b0130","doi-asserted-by":"crossref","first-page":"597","DOI":"10.1109\/TVCG.2013.29","article-title":"Drumming in Immersive Virtual Reality: The Body Shapes the Way We Play","volume":"19","author":"Kilteni","year":"2013","journal-title":"IEEE Trans. Visual Comput. Graphics"},{"key":"10.1016\/j.tele.2017.09.020_b0135","doi-asserted-by":"crossref","unstructured":"Klopfenstein, L.C., Delpriori, S., Malatini, S., Bogliolo, A., 2017. The rise of bots: A survey of conversational interfaces, patterns, and paradigms. In: Proceedings of the 2017 Conference on Designing Interactive Systems, DIS \u201917, ACM, New York, NY, USA, 2017, pp. 555\u2013565. doi: https:\/\/doi.org\/10.1145\/3064663.3064672.","DOI":"10.1145\/3064663.3064672"},{"key":"10.1016\/j.tele.2017.09.020_b0140","doi-asserted-by":"crossref","unstructured":"Kumar, T., Liyanage, M., Braeken, A., Ylianttila, M., 2017. Identity privacy preserving biometric based authentication scheme for naked healthcare environment, ICC.","DOI":"10.1109\/ICC.2017.7996966"},{"issue":"2","key":"10.1016\/j.tele.2017.09.020_b0145","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1016\/j.cogsys.2006.07.004","article-title":"Cognitive architectures: Research issues and challenges","volume":"10","author":"Langley","year":"2009","journal-title":"Cognitive Systems Research"},{"key":"10.1016\/j.tele.2017.09.020_b0150","first-page":"173","article-title":"Smart tv interaction system using face and hand gesture recognition","volume":"2013","author":"Lee","year":"2013","journal-title":"IEEE Int. Conf. Consumer Electron. (ICCE)"},{"key":"10.1016\/j.tele.2017.09.020_b0155","article-title":"5G-user centric network","volume":"1","author":"Liu","year":"2015","journal-title":"2015 Asia-Pacific Microwave Conference (APMC)"},{"key":"10.1016\/j.tele.2017.09.020_b0160","doi-asserted-by":"crossref","unstructured":"Liu, F., Tan, C.-W., Lim, E.T., Choi, B., 1998. Traversing knowledge networks: an algorithmic historiography of extant literature on the Internet of Things (IoT), Journal of Management Analytics 1\u201332. doi: https:\/\/doi.org\/10.1080\/23270012.2016.1214540.","DOI":"10.1080\/23270012.2016.1214540"},{"key":"10.1016\/j.tele.2017.09.020_b0165","series-title":"Software Defined Mobile Networks (SDMN): Beyond LTE Network Architecture","author":"Liyanage","year":"2015"},{"key":"10.1016\/j.tele.2017.09.020_b0170","unstructured":"Luan, T.H., Gao, L., Li, Z., Xiang, Y., Sun, L., 2006. Fog computing: Focusing on mobile users at the edge, CoRR abs\/1502.01815."},{"key":"10.1016\/j.tele.2017.09.020_b0175","doi-asserted-by":"crossref","unstructured":"Lymberis, A., 2003. Smart wearables for remote health monitoring, from prevention to rehabilitation: current R D, future challenges. In: Information Technology Applications in Biomedicine, 2003. 4th International IEEE EMBS Special Topic Conference on, 2003, pp. 272\u2013275. doi: https:\/\/doi.org\/10.1109\/ITAB.2003.1222530.","DOI":"10.1109\/ITAB.2003.1222530"},{"key":"10.1016\/j.tele.2017.09.020_b0180","first-page":"19","article-title":"A hybrid reader tranceiver design for industrial internet of things","volume":"2","author":"Mao","year":"2016","journal-title":"J. Ind. Inf. Integr."},{"key":"10.1016\/j.tele.2017.09.020_b0185","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1016\/j.jnca.2014.09.015","article-title":"Combining data naming and context awareness for pervasive networks","volume":"50","author":"Mendes","year":"2015","journal-title":"J. Net. Comput. Appl."},{"key":"10.1016\/j.tele.2017.09.020_b0190","doi-asserted-by":"crossref","unstructured":"Mittal, S., Rai, J.K., 2016. Wadoro: An autonomous mobile robot for surveillance. In: 2016 IEEE 1st International Conference on Power Electronics, Intelligent Control and Energy Systems (ICPEICES), pp. 1\u20136. doi: https:\/\/doi.org\/10.1109\/ICPEICES.2016.7853652.","DOI":"10.1109\/ICPEICES.2016.7853652"},{"issue":"3","key":"10.1016\/j.tele.2017.09.020_b0195","doi-asserted-by":"crossref","first-page":"510","DOI":"10.1109\/JSAC.2016.2525418","article-title":"Internet of things in the 5G Era: enablers, architecture, and business models","volume":"34","author":"Palattella","year":"2016","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"10.1016\/j.tele.2017.09.020_b0200","doi-asserted-by":"crossref","unstructured":"Pascoe, J., 1998. Adding generic contextual capabilities to wearable computers, in: Wearable Computers. Digest of Papers. In: Second International Symposium on, 1998, pp. 92\u201399. doi: https:\/\/doi.org\/10.1109\/ISWC.1998.729534.","DOI":"10.1109\/ISWC.1998.729534"},{"issue":"1","key":"10.1016\/j.tele.2017.09.020_b0205","doi-asserted-by":"crossref","first-page":"414","DOI":"10.1109\/SURV.2013.042313.00197","article-title":"Context aware computing for the internet of things: a survey","volume":"16","author":"Perera","year":"2014","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"1","key":"10.1016\/j.tele.2017.09.020_b0210","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10462-012-9356-9","article-title":"Vision based hand gesture recognition for human computer interaction: a survey","volume":"43","author":"Rautaray","year":"2015","journal-title":"Artif. Intell. Rev."},{"key":"10.1016\/j.tele.2017.09.020_b0215","series-title":"Ambient intelligence: a novel paradigm","author":"Remagnino","year":"2005"},{"issue":"1","key":"10.1016\/j.tele.2017.09.020_b0220","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1016\/j.cose.2011.10.006","article-title":"Building safe paas clouds: A survey on security in multitenant software platforms","volume":"31","author":"Rodero-Merino","year":"2012","journal-title":"Comput. Secur."},{"issue":"5","key":"10.1016\/j.tele.2017.09.020_b0225","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1109\/MCOM.2014.6898939","article-title":"Cloud technologies for flexible 5G radio access networks","volume":"52","author":"Rost","year":"2014","journal-title":"IEEE Commun. Mag."},{"issue":"2","key":"10.1016\/j.tele.2017.09.020_b0230","first-page":"66","article-title":"Toward green and soft: a 5G perspective, Communications Magazine","volume":"52","author":"Rowell","year":"2014","journal-title":"IEEE"},{"key":"10.1016\/j.tele.2017.09.020_b0235","doi-asserted-by":"crossref","unstructured":"Saleh, A., Borger, J., Raman, N., 2008. Converged communication services and competition in consumer markets, in: Networks 2008 - The 13th International Telecommunications Network Strategy and Planning Symposium, Vol. Supplement, pp. 1\u201310. doi: https:\/\/doi.org\/10.1109\/NETWKS.2008.6231317.","DOI":"10.1109\/NETWKS.2008.4763686"},{"issue":"2","key":"10.1016\/j.tele.2017.09.020_b0240","doi-asserted-by":"crossref","first-page":"443","DOI":"10.1007\/s13369-016-2241-0","article-title":"Multimodal biometric systems: a comparative study","volume":"42","author":"Sarhan","year":"2017","journal-title":"Arabian Journal for Science and Engineering"},{"issue":"4","key":"10.1016\/j.tele.2017.09.020_b0245","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1109\/98.943998","article-title":"Pervasive computing: vision and challenges","volume":"8","author":"Satyanarayanan","year":"2001","journal-title":"IEEE Pers. Commun."},{"issue":"6","key":"10.1016\/j.tele.2017.09.020_b0250","doi-asserted-by":"crossref","first-page":"29:1","DOI":"10.1145\/2688203","article-title":"Introduction to the special issue on physiological computing for human-computer interaction","volume":"21","author":"Silva","year":"2015","journal-title":"ACM Trans. Comput.-Hum. Interact."},{"key":"10.1016\/j.tele.2017.09.020_b0255","doi-asserted-by":"crossref","unstructured":"Takashina, T., Aoki, K., Maekawa, A., Tsukamoto, C., Kawai, H., Yamariku, Y., Tsuruta, K., Shimokawa, M., Kokumai, Y., Koike, H., 2015. Smart curtain as interactive display in living space. In: SIGGRAPH Asia 2015 Posters, SA \u201915, ACM, New York, NY, USA, pp. 32:1\u201332:1. doi: https:\/\/doi.org\/10.1145\/2820926.2820971.","DOI":"10.1145\/2820926.2820971"},{"key":"10.1016\/j.tele.2017.09.020_b0260","unstructured":"Worsey, J.N., 2016. Face recognition in an unconstrained environment for monitoring student attendance."},{"key":"10.1016\/j.tele.2017.09.020_b0265","first-page":"31","article-title":"Semantic input method of Chinese word senses for semantic document exchange in e-business","volume":"3","author":"Xiao","year":"2016","journal-title":"J. Ind. Inf. Integr."},{"issue":"4","key":"10.1016\/j.tele.2017.09.020_b0270","doi-asserted-by":"crossref","first-page":"2233","DOI":"10.1109\/TII.2014.2300753","article-title":"Internet of things in industries: a survey","volume":"10","author":"Xu","year":"2014","journal-title":"IEEE Trans. Industr. Inf."},{"issue":"2","key":"10.1016\/j.tele.2017.09.020_b0275","first-page":"121","article-title":"An emerging technology - wearable wireless sensor networks with applications in human health condition monitoring","volume":"2","author":"Yan","year":"2015","journal-title":"J. Manage. Anal."},{"key":"10.1016\/j.tele.2017.09.020_b0280","doi-asserted-by":"crossref","unstructured":"Yi, S., Li, C., Li, Q., 2015. A Survey of Fog Computing: Concepts, Applications and Issues, in: Proceedings of the 2015 Workshop on Mobile Big Data, Mobidata \u201915, ACM, New York, NY, USA, pp. 37\u201342. doi: https:\/\/doi.org\/10.1145\/2757384.2757397.","DOI":"10.1145\/2757384.2757397"},{"issue":"11","key":"10.1016\/j.tele.2017.09.020_b0285","doi-asserted-by":"crossref","first-page":"2876","DOI":"10.1016\/j.patcog.2009.04.017","article-title":"Face recognition across pose: a review","volume":"42","author":"Zhang","year":"2009","journal-title":"Pattern Recogn."}],"container-title":["Telematics and Informatics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0736585316305597?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0736585316305597?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2022,7,2]],"date-time":"2022-07-02T07:56:14Z","timestamp":1656748574000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0736585316305597"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4]]},"references-count":57,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,4]]}},"alternative-id":["S0736585316305597"],"URL":"https:\/\/doi.org\/10.1016\/j.tele.2017.09.020","relation":{},"ISSN":["0736-5853"],"issn-type":[{"value":"0736-5853","type":"print"}],"subject":[],"published":{"date-parts":[[2018,4]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Towards gadget-free internet services: A roadmap of the Naked world","name":"articletitle","label":"Article Title"},{"value":"Telematics and Informatics","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.tele.2017.09.020","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2017 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}]}}