{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T18:04:58Z","timestamp":1755799498492,"version":"3.44.0"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030000202"},{"type":"electronic","value":"9783030000219"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00021-9_8","type":"book-chapter","created":{"date-parts":[[2018,9,25]],"date-time":"2018-09-25T11:21:11Z","timestamp":1537874471000},"page":"80-89","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Study on the Internet of Things from Applications to Security Issues"],"prefix":"10.1007","author":[{"given":"Shuyan","family":"Yu","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,26]]},"reference":[{"key":"8_CR1","doi-asserted-by":"publisher","first-page":"606","DOI":"10.1016\/j.procs.2015.05.046","volume":"52","author":"H Samani","year":"2015","unstructured":"Samani, H., Wahaishi, A.: Privacy in Internet of Things: a model and protection framework. Procedia Comput. Sci. 52, 606\u2013613 (2015)","journal-title":"Procedia Comput. Sci."},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Shah, S., Yaqoob, I.: A survey: Internet of Things (IoT) technologies, applications and challenges. In: Smart Energy Grid Engineering, vol. 16, pp. 381\u2013385 (2016)","DOI":"10.1109\/SEGE.2016.7589556"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Pawar, A.: A survey on IoT applications, security challenges and counter measures. In: 2016 International Conference on Computing. Analytics and Security Trends (CAST), pp. 294\u2013299. College of Engineering Pune, India (2016)","DOI":"10.1109\/CAST.2016.7914983"},{"issue":"5","key":"8_CR4","first-page":"97","volume":"2","author":"K Ashton","year":"2009","unstructured":"Ashton, K.: That \u2019Internet of Things\u2019 thing. RFID J. 2(5), 97\u2013114 (2009)","journal-title":"RFID J."},{"key":"8_CR5","first-page":"32","volume":"17","author":"J Deogirikar","year":"2017","unstructured":"Deogirikar, J., Vidhate, A.: Security attacks inIoT: a survey. Int. J. I-SMAC 17, 32\u201337 (2017)","journal-title":"Int. J. I-SMAC"},{"key":"8_CR6","first-page":"492","volume":"17","author":"S Vashi","year":"2017","unstructured":"Vashi, S.: Internet of Things (IoT) a vision, architectural elements, and security issues. Int. J. I-SMAC 17, 492\u2013496 (2017)","journal-title":"Int. J. I-SMAC"},{"key":"8_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2017.04.002","volume":"88","author":"F Alaba","year":"2017","unstructured":"Alaba, F.: Internet of Things security: a survey. J. Netw. Comput. Appl. 88, 1\u201328 (2017)","journal-title":"J. Netw. Comput. Appl."},{"issue":"15","key":"8_CR8","doi-asserted-by":"publisher","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L Atzori","year":"2010","unstructured":"Atzori, L., Iera, A., Morabito, G.: The Internet of Things: a survey. Comput. Netw. 54(15), 2787\u20132805 (2010)","journal-title":"Comput. Netw."},{"key":"8_CR9","first-page":"375","volume":"15","author":"B Dhanalaxmi","year":"2017","unstructured":"Dhanalaxmi, B.: A survey on design and analysis of robust IoT architecture. Int. J. Innov. Mech. 15, 375\u2013378 (2017)","journal-title":"Int. J. Innov. Mech."},{"key":"8_CR10","doi-asserted-by":"publisher","first-page":"2347","DOI":"10.1109\/COMST.2015.2444095","volume":"17","author":"A Al-Fuqaha","year":"2015","unstructured":"Al-Fuqaha, A., et al.: Internet of Things: a survey on enabling technologies, protocols, and applications. IEEE Commun. Surv. Tutor. 17, 2347\u20132376 (2015)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"8_CR11","unstructured":"http:\/\/www.juniperresearch.com\/press\/press-releases\/iot-connecteddevices-to-triple-to-38-bn-by-2020 . Accessed 1 Jan 2018"},{"key":"8_CR12","unstructured":"http:\/\/www.cisco.com\/c\/en\/us\/solutions\/internet-ofthings\/overview.html . Accessed 3 Feb 2018"},{"key":"8_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.14445\/22315381\/IJETT-V34P201","volume":"34","author":"B Joharan","year":"2016","unstructured":"Joharan, B.: A fair survey on Internet of Things (IoT). Int. J. Emerg. Trends Eng. 34, 1\u20136 (2016)","journal-title":"Int. J. Emerg. Trends Eng."},{"key":"8_CR14","unstructured":"Monaco. http:\/\/monacotrades.com\/2015\/06\/ . Accessed 4 Feb 2016"},{"key":"8_CR15","unstructured":"https:\/\/blogs.commons.georgetown.edu\/cctp-797-fall2013\/archives\/838 . Accessed 1 May 2017"},{"issue":"12","key":"8_CR16","first-page":"102","volume":"3","author":"P Rao","year":"2012","unstructured":"Rao, P., et al.: Detection of rain fall and wind direction using wireless mobile multi node energy efficient sensor network. Int. J. Appl. Inf. Syst. 3(12), 102\u2013124 (2012)","journal-title":"Int. J. Appl. Inf. Syst."},{"key":"8_CR17","doi-asserted-by":"publisher","first-page":"678","DOI":"10.1109\/ACCESS.2015.2437951","volume":"3","author":"S Islam","year":"2015","unstructured":"Islam, S., et al.: The Internet of Things for health care: a comprehensive survey. IEEE Access 3, 678\u2013708 (2015)","journal-title":"IEEE Access"},{"issue":"12","key":"8_CR18","first-page":"477","volume":"3","author":"S Sowmya","year":"2017","unstructured":"Sowmya, S.: Security threats in the application layer in IoT applications. Int. J. I-SMAC 3(12), 477\u2013480 (2017)","journal-title":"Int. J. I-SMAC"},{"issue":"11","key":"8_CR19","first-page":"22","volume":"70","author":"S Uke","year":"2013","unstructured":"Uke, S., Mahajan, A., Thool, R.: UML modeling of physical and data link layer security attacks in WSN. Int. J. Comput. Appl. 70(11), 22\u201332 (2013)","journal-title":"Int. J. Comput. Appl."},{"key":"8_CR20","doi-asserted-by":"crossref","unstructured":"Li, H., Chen, Y., He, Z.: The survey of RFID attacks and defenses. In: 8th International Conference on IEEE Wireless Communications. Networking and Mobile Computing, Barcelona, Spain, pp. 1\u20134. World Scientific & Engineering Academy & Society (2012)","DOI":"10.1109\/WiCOM.2012.6478720"},{"issue":"4","key":"8_CR21","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1002\/sec.681","volume":"6","author":"F Kandah","year":"2013","unstructured":"Kandah, F.: Mitigating colluding injected attack using monitoring verification in mobile ad-hoc networks. Secur. Commun. Netw. 6(4), 539\u2013547 (2013)","journal-title":"Secur. Commun. Netw."},{"issue":"7","key":"8_CR22","first-page":"23","volume":"11","author":"M Farooq","year":"2015","unstructured":"Farooq, M., et al.: A critical analysis on the security concerns of Internet of Things (IoT). Int. J. Comput. Appl. 11(7), 23\u201335 (2015)","journal-title":"Int. J. Comput. Appl."},{"key":"8_CR23","doi-asserted-by":"crossref","unstructured":"Andrea, I., Chrysostomou, C., Hadjichristofi, G.: Internet of Things: security vulnerabilities and challenges. In: Computers & Communication, vol. 2016, pp. 180\u2013187 (2016)","DOI":"10.1109\/ISCC.2015.7405513"},{"key":"8_CR24","first-page":"50","volume":"23","author":"M Abdullah","year":"2015","unstructured":"Abdullah, M., Rahman, M., Roy, C.: Detecting sinkhole attacks in wireless sensor network using hop count. I. J. Comput. Netw. Inf. Secur. 23, 50\u201356 (2015)","journal-title":"I. J. Comput. Netw. Inf. Secur."},{"issue":"8","key":"8_CR25","first-page":"189","volume":"1","author":"W Abdul","year":"2015","unstructured":"Abdul, W., Kumar, P.: A survey on attacks, challenges and security mechanism in wireless sensor network. Int. J. Res. Sci. Technol. 1(8), 189\u2013196 (2015)","journal-title":"Int. J. Res. Sci. Technol."},{"issue":"5","key":"8_CR26","first-page":"33","volume":"12","author":"M Zulkifli","year":"2008","unstructured":"Zulkifli, M.: Attack on cryptography. Comput. Secur. 12(5), 33\u201345 (2008)","journal-title":"Comput. Secur."},{"key":"8_CR27","unstructured":"Arvind K.: Security attacks and secure routing protocols in RPL-based internet of things: survey. In: 2017 International Conference on Emerging Trends and Innovation in ICT (ICEI), pp. 34\u201339. Pune Institute of Computer Technology, India (2017)"},{"key":"8_CR28","first-page":"450","volume":"5","author":"A Balte","year":"2015","unstructured":"Balte, A., Patil, B.: Security issues in Internet of Things (IoT): a survey. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 5, 450\u2013455 (2015)","journal-title":"Int. J. Adv. Res. Comput. Sci. Softw. Eng."},{"key":"8_CR29","first-page":"1","volume":"23","author":"N Kang","year":"2016","unstructured":"Kang, N.: Mutual authentication scheme in secure Internet of Things technology for comfortable lifestyle. Sensors 23, 1\u201316 (2016)","journal-title":"Sensors"},{"key":"8_CR30","doi-asserted-by":"crossref","unstructured":"Mahalle, P.N.: Identity establishment and capability based access control (IECAC) scheme for Internet of Things. In: International Symposium on Wireless Personal Multimedia Communications, vol. 2012, pp. 187\u2013191 (2012)","DOI":"10.1109\/ANTS.2012.6524227"},{"key":"8_CR31","doi-asserted-by":"crossref","unstructured":"Liu, J.: Authentication and access control in the Internet of Things. In: International Conference on Distributed Computing Systems Workshops, vol. 12, no. 7, pp. 588\u2013592 (2012)","DOI":"10.1109\/ICDCSW.2012.23"},{"key":"8_CR32","doi-asserted-by":"crossref","unstructured":"Neisse R., Steri G., and Baldini G.: Enforcement of security policy rules for the Internet of Things. In: 10th International Conference on Wireless and Mobile Computing, Networking and Communications, USA, pp. 165\u2013172. IEEE (2014)","DOI":"10.1109\/WiMOB.2014.6962166"}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00021-9_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,19]],"date-time":"2025-08-19T23:37:20Z","timestamp":1755646640000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00021-9_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030000202","9783030000219"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00021-9_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cloud Computing and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Haikou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icccsconf.org\/icccs2018.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}