A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications
暂无分享,去创建一个
Xinyu Yang | Wei Yu | Jie Lin | Wei Zhao | Nan Zhang | Hanlin Zhang | Wei Yu | Xinyu Yang | Hanlin Zhang | N. Zhang | Wei Zhao | Jie Lin
[1] Gang Gan,et al. Internet of Things Security Analysis , 2011, 2011 International Conference on Internet Technology and Applications.
[2] Shuang-Hua Yang,et al. RFID Sensor Network Network Architectures to Integrate RFID, Sensor and WSN , 2007 .
[3] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[4] Weisong Shi,et al. Security in Internet of Things: Opportunities and Challenges , 2016, 2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI).
[5] Ayman I. Kayssi,et al. IP Spoofing Detection Using Modified Hop Count , 2014, 2014 IEEE 28th International Conference on Advanced Information Networking and Applications.
[6] Mohsen Guizani,et al. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.
[7] Miao Wu,et al. Research on the architecture of Internet of Things , 2010, 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE).
[8] Srdjan Capkun,et al. Self-Organized Public-Key Management for Mobile Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..
[9] Lida Xu,et al. Enterprise Systems: State-of-the-Art and Future Trends , 2011, IEEE Transactions on Industrial Informatics.
[10] Paramvir Bahl,et al. Low Latency Geo-distributed Data Analytics , 2015, SIGCOMM.
[11] Jayashree Agarkhed,et al. QoS based multipath routing for intrusion detection of sinkhole attack in wireless sensor networks , 2016, 2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT).
[12] Mohsen Guizani,et al. An effective key management scheme for heterogeneous sensor networks , 2007, Ad Hoc Networks.
[13] Jan Markendahl,et al. WHO IS INVESTING IN MACHINE-TO-MACHINE COMMUNICATIONS? , 2013 .
[14] Hang Liu,et al. Cooperative spectrum sharing of multiple primary users and multiple secondary users , 2016 .
[15] Junichi Nakamura,et al. Image Sensors and Signal Processing for Digital Still Cameras , 2005 .
[16] E. A. Mary Anita,et al. A novel robust routing protocol RAEED to avoid DoS attacks in WSN , 2016, 2016 International Conference on Information Communication and Embedded Systems (ICICES).
[17] T. Luckenbach,et al. TinyREST – a Protocol for Integrating Sensor Networks into the Internet , 2005 .
[18] C. Richard G. Helps,et al. Cyber-physical system concepts for IT students , 2013, SIGITE Conference.
[19] Guihai Chen,et al. Privacy and Quality Preserving Multimedia Data Aggregation for Participatory Sensing Systems , 2015, IEEE Transactions on Mobile Computing.
[20] Dong Seong Kim,et al. Access Control and Authorization for Security of RFID Multi-Domain Using SAML and XACML , 2006, 2006 International Conference on Computational Intelligence and Security.
[21] L. Roselli,et al. Review of the present technologies concurrently contributing to the implementation of the Internet of Things (IoT) paradigm: RFID, Green Electronics, WPT and Energy Harvesting , 2015, 2015 IEEE Topical Conference on Wireless Sensors and Sensor Networks (WiSNet).
[22] Anna N. Kim,et al. When HART goes wireless: Understanding and implementing the WirelessHART standard , 2008, 2008 IEEE International Conference on Emerging Technologies and Factory Automation.
[23] S. Shankar Sastry,et al. Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.
[24] Xinwen Fu,et al. DSSS-Based Flow Marking Technique for Invisible Traceback , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[25] Frank Eliassen,et al. RESTful integration of heterogeneous devices in pervasive environments , 2010, DAIS'10.
[26] Gennaro Boggia,et al. On Optimal Scheduling in Duty-Cycled Industrial IoT Applications Using IEEE802.15.4e TSCH , 2013, IEEE Sensors Journal.
[27] Amardeep Das,et al. Firewall engine based on Graphics Processing Unit , 2014, 2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies.
[28] Manas Ranjan Patra,et al. Cloud Computing: Security Issues and Research Challenges , 2011 .
[29] Dong Xuan,et al. Query aggregation for providing efficient data services in sensor networks , 2004, 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE Cat. No.04EX975).
[30] Diego López-de-Ipiña,et al. A Triple Space-Based Semantic Distributed Middleware for Internet of Things , 2010, ICWE Workshops.
[31] Xinyu Yang,et al. Toward a Gaussian-Mixture Model-Based Detection Scheme Against Data Integrity Attacks in the Smart Grid , 2017, IEEE Internet Things J..
[32] Xinyu Yang,et al. Towards Effective En-Route Filtering against Injected False Data in Wireless Sensor Networks , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.
[33] Lida Xu,et al. The internet of things: a survey , 2014, Information Systems Frontiers.
[34] Nader Mohamed,et al. Challenges in middleware solutions for the internet of things , 2012, 2012 International Conference on Collaboration Technologies and Systems (CTS).
[35] John A. Stankovic,et al. Research Directions for the Internet of Things , 2014, IEEE Internet of Things Journal.
[36] Ivan Stojmenovic,et al. The Fog computing paradigm: Scenarios and security issues , 2014, 2014 Federated Conference on Computer Science and Information Systems.
[37] Xinwen Fu,et al. CAP: A Context-Aware Privacy Protection System for Location-Based Services , 2009, 2009 29th IEEE International Conference on Distributed Computing Systems.
[38] R. Bettati,et al. An Integrated Middleware-Based Solution for Supporting Secured Dynamic-Coalition Applications in Heterogeneous Environments , .
[39] Wei Yu,et al. Assessing Performance of Constrained Application Protocol (CoAP) in MANET Using Emulation , 2016, RACS.
[40] Ieee Standards Board. IEEE standards for local and metropolitan area networks : overview and architecture , 1990 .
[41] Jianzhong Li,et al. Location-privacy-aware review publication mechanism for local business service systems , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.
[42] Patrick Tague,et al. Network self-organization in the Internet of Things , 2013, 2013 IEEE International Conference on Sensing, Communications and Networking (SECON).
[43] Antonio F. Gómez-Skarmeta,et al. Survey of Internet of Things Technologies for Clinical Environments , 2013, 2013 27th International Conference on Advanced Information Networking and Applications Workshops.
[44] Nada Golmie,et al. An integrated detection system against false data injection attacks in the Smart Grid , 2015, Secur. Commun. Networks.
[45] Carsten Bormann,et al. CoAP: An Application Protocol for Billions of Tiny Internet Nodes , 2012, IEEE Internet Computing.
[46] Gennaro Boggia,et al. Standardized Protocol Stack for the Internet of (Important) Things , 2013, IEEE Communications Surveys & Tutorials.
[47] Imran A. Zualkernan,et al. Internet of things (IoT) security: Current status, challenges and prospective measures , 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST).
[48] Tao Xiang,et al. User Differentiated Verifiable File Search on the Cloud , 2018, IEEE Transactions on Services Computing.
[49] Zvonimir Sipus,et al. Active wireless sensor with radio frequency identification chip , 2012, 2012 Proceedings of the 35th International Convention MIPRO.
[50] Klaus Finkenzeller,et al. Rfid Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification , 2003 .
[51] Zhipeng Cai,et al. FakeMask: A Novel Privacy Preserving Approach for Smartphones , 2016, IEEE Transactions on Network and Service Management.
[52] Xinyu Yang,et al. On Data Integrity Attacks Against Real-Time Pricing in Energy-Based Cyber-Physical Systems , 2017, IEEE Transactions on Parallel and Distributed Systems.
[53] Martin Gilje Jaatun,et al. Cyber security challenges in Smart Grids , 2011, 2011 2nd IEEE PES International Conference and Exhibition on Innovative Smart Grid Technologies.
[54] Yves Deswarte,et al. Survey on security threats and protection mechanisms in embedded automotive networks , 2013, 2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W).
[55] Xinyu Yang,et al. A Novel En-route Filtering Scheme against False Data Injection Attacks in Cyber-Physical Networked Systems , 2012, 2012 IEEE 32nd International Conference on Distributed Computing Systems.
[56] Guobin Xu,et al. A Cloud Computing Based Network Monitoring and Threat Detection System for Critical Infrastructures , 2016, Big Data Res..
[57] Xinyu Yang,et al. A Novel Dynamic En-Route Decision Real-Time Route Guidance Scheme in Intelligent Transportation Systems , 2015, 2015 IEEE 35th International Conference on Distributed Computing Systems.
[58] Weisong Shi,et al. Edge Computing: Vision and Challenges , 2016, IEEE Internet of Things Journal.
[59] Xinyu Yang,et al. On binary decomposition based privacy-preserving aggregation schemes in real-time monitoring systems , 2015, 2015 IEEE International Conference on Communications (ICC).
[60] Laurence T. Yang,et al. Data Mining for Internet of Things: A Survey , 2014, IEEE Communications Surveys & Tutorials.
[61] Weijia Jia,et al. A new cell counter based attack against tor , 2009, CCS.
[62] Dong Xuan,et al. A dynamic geographic hash table for data-centric storage in sensor networks , 2006, IEEE Wireless Communications and Networking Conference, 2006. WCNC 2006..
[63] Michele Zorzi,et al. The “Wireless Sensor Networks for City-Wide Ambient Intelligence (WISE-WAI)” Project , 2009, Sensors.
[64] Ramesh Karri,et al. Scan based side channel attack on dedicated hardware implementations of Data Encryption Standard , 2004 .
[65] Xinyu Yang,et al. On Scaling Perturbation Based Privacy-Preserving Schemes in Smart Metering Systems , 2013, 2013 22nd International Conference on Computer Communication and Networks (ICCCN).
[66] Vlad Trifa,et al. SOA-Based Integration of the Internet of Things in Enterprise Services , 2009, 2009 IEEE International Conference on Web Services.
[67] Vlad Trifa,et al. Interacting with the SOA-Based Internet of Things: Discovery, Query, Selection, and On-Demand Provisioning of Web Services , 2010, IEEE Transactions on Services Computing.
[68] Wei Yu,et al. On false data injection attacks against Kalman filtering in power system dynamic state estimation , 2016, Secur. Commun. Networks.
[69] Antonio F. Gómez-Skarmeta,et al. Light-Weight Multicast DNS and DNS-SD (lmDNS-SD): IPv6-Based Resource and Service Discovery for the Web of Things , 2012, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
[70] Lionel Touseau,et al. Combining heterogeneous service technologies for building an Internet of Things middleware , 2012, Comput. Commun..
[71] Xinyu Yang,et al. On False Data Injection Attacks against Distributed Energy Routing in Smart Grid , 2012, 2012 IEEE/ACM Third International Conference on Cyber-Physical Systems.
[72] Xuechen He. The Two-Dimensional Bar Code Application in Book Management , 2010, 2010 International Conference on Web Information Systems and Mining.
[73] Ramesh Karri,et al. Scan based side channel attack on dedicated hardware implementations of Data Encryption Standard , 2004, 2004 International Conferce on Test.
[74] Jiafu Wan,et al. Security in the Internet of Things: A Review , 2012, 2012 International Conference on Computer Science and Electronics Engineering.
[75] Felix Wortmann,et al. Internet of Things , 2015, Business & Information Systems Engineering.
[76] Syed Hassan Ahmed,et al. Cyber Physical System: Architecture, applications and research challenges , 2013, 2013 IFIP Wireless Days (WD).
[77] Charalampos Doukas,et al. COMPOSE: Building smart & context-aware mobile applications utilizing IoT technologies , 2013, Global Information Infrastructure Symposium - GIIS 2013.
[78] Dirk Westhoff,et al. CDA: concealed data aggregation for reverse multicast traffic in wireless sensor networks , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.
[79] Jae-Woo Kim,et al. Design of RFID Mutual Authentication Protocol Using Time Stamp , 2009, 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology.
[80] Yuxi Liu,et al. Key Technologies and Applications of Internet of Things , 2012, 2012 Fifth International Conference on Intelligent Computation Technology and Automation.
[81] Mahdi H. Miraz,et al. A review on Internet of Things (IoT), Internet of Everything (IoE) and Internet of Nano Things (IoNT) , 2015, 2015 Internet Technologies and Applications (ITA).
[82] Vinay Soni,et al. Detecting Sinkhole Attack in Wireless Sensor Network , 2013 .
[83] Xinyu Yang,et al. Towards Multistep Electricity Prices in Smart Grid Electricity Markets , 2016, IEEE Transactions on Parallel and Distributed Systems.
[84] Emil Angelov. Google Self-driving car , 2016 .
[85] Nader Mohamed,et al. Middleware: middleware challenges and approaches for wireless sensor networks , 2006, IEEE Distributed Systems Online.
[86] Emiliano Miluzzo,et al. A survey of mobile phone sensing , 2010, IEEE Communications Magazine.
[87] Zhen Ling,et al. Cyber Crime Scene Investigations (C²SI) through Cloud Computing , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems Workshops.
[88] Xiaojiang Du,et al. A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..
[89] Ana Roxin,et al. TransportML: A Middleware for Location-Based Services Collaboration , 2009, 2009 3rd International Conference on New Technologies, Mobility and Security.
[90] Ck Cheng,et al. The Age of Big Data , 2015 .
[91] Varsha Singh,et al. MAODV: Modified wormhole detection AODV protocol , 2013, 2013 Sixth International Conference on Contemporary Computing (IC3).
[92] Jia Guo,et al. Trust management for service composition in SOA-based IoT systems , 2014, 2014 IEEE Wireless Communications and Networking Conference (WCNC).
[93] Xinwen Fu,et al. Self-Disciplinary Worms and Countermeasures: Modeling and Analysis , 2010, IEEE Transactions on Parallel and Distributed Systems.
[94] Xun Wang,et al. Detecting worms via mining dynamic program execution , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.
[95] Xinyu Yang,et al. Towards Efficient and Secured Real-Time Pricing in the Smart Grid , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).
[96] Xinwen Fu,et al. A context-aware scheme for privacy-preserving location-based services , 2012, Comput. Networks.
[97] R. Muniz,et al. A robust software barcode reader using the Hough transform , 1999, Proceedings 1999 International Conference on Information Intelligence and Systems (Cat. No.PR00446).
[98] Matthew R. McKay,et al. On the Equivalence Between Interference and Eavesdropping in Wireless Communications , 2014, IEEE Transactions on Vehicular Technology.
[99] Qun Li,et al. A Survey of Fog Computing: Concepts, Applications and Issues , 2015, Mobidata@MobiHoc.
[100] Evangelos N. Gazis,et al. A survey of technologies for the internet of things , 2015, 2015 International Wireless Communications and Mobile Computing Conference (IWCMC).
[101] Antonio Pescapè,et al. On the Integration of Cloud Computing and Internet of Things , 2014, 2014 International Conference on Future Internet of Things and Cloud.
[102] Chiara Petrioli,et al. Pro-Energy: A novel energy prediction model for solar and wind energy-harvesting wireless sensor networks , 2012, 2012 IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS 2012).
[103] Yingshu Li,et al. Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks , 2018, IEEE Transactions on Dependable and Secure Computing.
[104] Shaowei Wang,et al. Joint optimization of spectrum and energy efficiency in cognitive radio networks , 2015, Digit. Commun. Networks.
[105] Jeng-Farn Lee,et al. TEAM: Trust-Extended Authentication Mechanism for Vehicular Ad Hoc Networks , 2011, IEEE Systems Journal.
[106] Daniel S. Yeung,et al. RFID access authorization by face recognition , 2009, 2009 International Conference on Machine Learning and Cybernetics.
[107] Raja Lavanya,et al. Fog Computing and Its Role in the Internet of Things , 2019, Advances in Computer and Electrical Engineering.
[108] Weijia Jia,et al. A New Cell-Counting-Based Attack Against Tor , 2012, IEEE/ACM Transactions on Networking.
[109] George C. Hadjichristofi,et al. Internet of Things: Security vulnerabilities and challenges , 2015, 2015 IEEE Symposium on Computers and Communication (ISCC).
[110] W. Kluge,et al. A Fully Integrated 2.4-GHz IEEE 802.15.4-Compliant Transceiver for ZigBee™ Applications , 2006, IEEE Journal of Solid-State Circuits.
[111] Rui Li,et al. Towards a Low-Cost Remote Memory Attestation for the Smart Grid , 2015, Sensors.
[112] D. Saha,et al. Present Scenarios and Future Challenges in Pervasive Middleware , 2006, 2006 1st International Conference on Communication Systems Software & Middleware.
[113] Hyuk Lim,et al. Prefetching-Based Data Dissemination in Vehicular Cloud Systems , 2016, IEEE Transactions on Vehicular Technology.
[114] Bruno Sinopoli,et al. Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[115] Wu He,et al. Internet of Things in Industries: A Survey , 2014, IEEE Transactions on Industrial Informatics.
[116] Wei Yu,et al. On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures , 2014, IEEE Transactions on Parallel and Distributed Systems.
[117] Luming Tan,et al. Future internet: The Internet of Things , 2010, 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE).
[118] Lauro T. Kubota,et al. Review of the use of biosensors as analytical tools in the food and drink industries , 2002 .
[119] Hui Liu,et al. Novel Anti-forensics Approaches for Smart Phones , 2012, 2012 45th Hawaii International Conference on System Sciences.
[120] Radu Prodan,et al. A survey and taxonomy of infrastructure as a service and web hosting cloud providers , 2009, 2009 10th IEEE/ACM International Conference on Grid Computing.
[121] Radha Poovendran,et al. A Passivity Framework for Modeling and Mitigating Wormhole Attacks on Networked Control Systems , 2013, IEEE Transactions on Automatic Control.
[122] Ranjita Bhagwan,et al. Anonygator: Privacy and Integrity Preserving Data Aggregation , 2010, Middleware.
[123] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[124] Jafar Ramadhan Mohammed. A New Simple Adaptive Noise Cancellation Scheme Based On ALE and NLMS Filter , 2007, Fifth Annual Conference on Communication Networks and Services Research (CNSR '07).
[125] Imrich Chlamtac,et al. Internet of things: Vision, applications and research challenges , 2012, Ad Hoc Networks.
[126] Chunxiao Jiang,et al. Information Security in Big Data: Privacy and Data Mining , 2014, IEEE Access.
[127] Sneha A. Dalvi,et al. Internet of Things for Smart Cities , 2017 .
[128] Xinyu Yang,et al. On Distributed Energy Routing Protocols in the Smart Grid , 2013 .
[129] Antonio Iera,et al. The Social Internet of Things (SIoT) - When social networks meet the Internet of Things: Concept, architecture and network characterization , 2012, Comput. Networks.
[130] Aikaterini Mitrokotsa,et al. Classifying RFID attacks and defenses , 2010, Inf. Syst. Frontiers.
[131] Ian F. Akyildiz,et al. A cross-layer communication module for the Internet of Things , 2013, Comput. Networks.
[132] Zheng Guo,et al. Differential power cryptanalysis attacks against PRESENT implementation , 2010, 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE).
[133] Victor C. M. Leung,et al. Anti-Eavesdropping Schemes for Interference Alignment (IA)-Based Wireless Networks , 2016, IEEE Transactions on Wireless Communications.
[134] Stuart Cheshire,et al. DNS-Based Service Discovery , 2013, RFC.
[135] Sandip Lahiri,et al. RFID Sourcebook , 2005 .
[136] Wei Yu,et al. Smart city: The state of the art, datasets, and evaluation platforms , 2017, 2017 IEEE/ACIS 16th International Conference on Computer and Information Science (ICIS).
[137] Kai Zhao,et al. A Survey on the Internet of Things Security , 2013, 2013 Ninth International Conference on Computational Intelligence and Security.
[138] Yada Zhu,et al. Social Phishing , 2018, Encyclopedia of Social Network Analysis and Mining. 2nd Ed..
[139] László Monostori,et al. A survey of applications and requirements of unique identification systems and RFID techniques , 2011, Comput. Ind..
[140] Xue Liu,et al. PDA: Privacy-Preserving Data Aggregation in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[141] Arkady B. Zaslavsky,et al. Sensing as a Service and Big Data , 2013, ArXiv.
[142] Philip Levis,et al. RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks , 2012, RFC.
[143] Alessandro Neri,et al. A federated architecture approach for Internet of Things security , 2014, 2014 Euro Med Telco Conference (EMTC).
[144] Xinyu Yang,et al. Data integrity attacks against the distributed real-time pricing in the smart grid , 2016, 2016 IEEE 35th International Performance Computing and Communications Conference (IPCCC).
[145] Seyyed Mohsen Hashemi,et al. Route guidance systems: Review and classification , 2012, 2012 6th Euro American Conference on Telematics and Information Systems (EATIS).
[146] Xinyu Yang,et al. On data integrity attacks against optimal power flow in power grid systems , 2017, 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC).
[147] Peter Saint-Andre. Extensible Messaging and Presence Protocol (XMPP): Core , 2011, RFC.
[148] Carles Gomez,et al. Wireless home automation networks: A survey of architectures and technologies , 2010, IEEE Communications Magazine.
[149] Xiaohui Liang,et al. Sybil Attacks and Their Defenses in the Internet of Things , 2014, IEEE Internet of Things Journal.
[150] Wei Xiang,et al. Radio resource allocation in LTE-advanced cellular networks with M2M communications , 2012, IEEE Communications Magazine.
[151] Stefano Chessa,et al. Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards , 2007, Comput. Commun..
[152] Debdutta Barman Roy,et al. Prevention of sleep deprivation attacks using clustering , 2011, 2011 3rd International Conference on Electronics Computer Technology.
[153] Pradeep K. Khosla,et al. SWATT: softWare-based attestation for embedded devices , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[154] Michele Zorzi,et al. The Deployment of a Smart Monitoring System Using Wireless Sensor and Actuator Networks , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[155] C. Jayakumar,et al. Node capture attack in Wireless Sensor Network: A survey , 2012, 2012 IEEE International Conference on Computational Intelligence and Computing Research.
[156] Dapeng Wu,et al. Scalable privacy-preserving big data aggregation mechanism , 2016 .