{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T14:28:31Z","timestamp":1773844111117,"version":"3.50.1"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030017002","type":"print"},{"value":"9783030017019","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-01701-9_2","type":"book-chapter","created":{"date-parts":[[2018,12,28]],"date-time":"2018-12-28T12:03:08Z","timestamp":1545998588000},"page":"22-42","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Securing the Smart Home via a Two-Mode Security Framework"],"prefix":"10.1007","author":[{"given":"Devkishen","family":"Sisodia","sequence":"first","affiliation":[]},{"given":"Samuel","family":"Mergendahl","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Li","sequence":"additional","affiliation":[]},{"given":"Hasan","family":"Cam","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,29]]},"reference":[{"issue":"3","key":"2_CR1","doi-asserted-by":"publisher","first-page":"1223","DOI":"10.1109\/SURV.2012.121912.00006","volume":"15","author":"A Abduvaliyev","year":"2013","unstructured":"Abduvaliyev, A., Pathan, A.S.K., Zhou, J., Roman, R., Wong, W.C.: On the vital areas of intrusion detection systems in wireless sensor networks. IEEE Commun. Surv. Tutor. 15(3), 1223\u20131237 (2013)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Abie, H., Balasingham, I.: Risk-based adaptive security for smart IoT in eHealth. In: Proceedings of the 7th International Conference on Body Area Networks, pp. 269\u2013275. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering) (2012)","DOI":"10.4108\/icst.bodynets.2012.250235"},{"key":"2_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"408","DOI":"10.1007\/978-3-319-13102-3_67","volume-title":"Ubiquitous Computing and Ambient Intelligence. Personalisation and User Adapted Services","author":"J Bernal Bernabe","year":"2014","unstructured":"Bernal Bernabe, J., Hern\u00e1ndez, J.L., Moreno, M.V., Skarmeta Gomez, A.F.: Privacy-preserving security framework for a social-aware Internet of Things. In: Herv\u00e1s, R., Lee, S., Nugent, C., Bravo, J. (eds.) UCAmI 2014. LNCS, vol. 8867, pp. 408\u2013415. Springer, Cham (2014). \nhttps:\/\/doi.org\/10.1007\/978-3-319-13102-3_67"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Cervantes, C., Poplade, D., Nogueira, M., Santos, A.: Detection of sinkhole attacks for supporting secure routing on 6LoWPAN for Internet of Things. In: IFIP\/IEEE International Symposium on Integrated Network Management, pp. 606\u2013611. IEEE (2015)","DOI":"10.1109\/INM.2015.7140344"},{"issue":"1","key":"2_CR5","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1145\/2398356.2398377","volume":"56","author":"T Denning","year":"2013","unstructured":"Denning, T., Kohno, T., Levy, H.M.: Computer security and the modern home. ACM Commun. 56(1), 94\u2013103 (2013)","journal-title":"ACM Commun."},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Fernandes, E., Jung, J., Prakash, A.: Security analysis of emerging smart home applications. In: IEEE Symposium on Security and Privacy, pp. 636\u2013654. IEEE (2016)","DOI":"10.1109\/SP.2016.44"},{"key":"2_CR7","unstructured":"Hilton, S.: Dyn analysis summary of Friday October 21 attack (2016). \nhttps:\/\/dyn.com\/blog\/dyn-analysis-summary-of-friday-october-21-attack\/"},{"key":"2_CR8","unstructured":"IETF: Routing over low power and lossy networks (2012)"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Kalofonos, D.N., Shakhshir, S.: Intuisec: a framework for intuitive user interaction with smart home security using mobile devices. In: IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications, pp. 1\u20135. IEEE (2007)","DOI":"10.1109\/PIMRC.2007.4394312"},{"issue":"1","key":"2_CR10","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1186\/s13673-017-0087-4","volume":"7","author":"WM Kang","year":"2017","unstructured":"Kang, W.M., Moon, S.Y., Park, J.H.: An enhanced security framework for home appliances in smart home. Human-cent. Comput. Inf. Sci. 7(1), 6 (2017)","journal-title":"Human-cent. Comput. Inf. Sci."},{"key":"2_CR11","doi-asserted-by":"publisher","first-page":"968","DOI":"10.1109\/TIFS.2016.2647225","volume":"12","author":"P Kumar","year":"2017","unstructured":"Kumar, P., Braeken, A., Gurtov, A., Iinatti, J., Ha, P.: Anonymous secure framework in connected smart home environments. IEEE Trans. Inf. Forensics Secur. 12, 968\u2013979 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2_CR12","unstructured":"van der Meulen, R.: Gartner says 6.4 billion connected \u201cthings\u201d will be in use in 2016, up 30 percent from 2015 (2015). \nhttp:\/\/www.gartner.com\/newsroom\/id\/3165317"},{"issue":"3","key":"2_CR13","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1109\/TDSC.2005.35","volume":"2","author":"J Mirkovic","year":"2005","unstructured":"Mirkovic, J., Reiher, P.: D-ward: a source-end defense against flooding denial-of-service attacks. IEEE Trans. Dependable Secure Comput. 2(3), 216\u2013232 (2005)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Neisse, R., Steri, G., Baldini, G.: Enforcement of security policy rules for the internet of things. In: IEEE 10th International Conference on Wireless and Mobile Computing, pp. 165\u2013172. IEEE (2014)","DOI":"10.1109\/WiMOB.2014.6962166"},{"key":"2_CR15","unstructured":"Nordrum, A.: Popular internet of things forecast of 50 billion devices by 2020 is outdated (2016). \nhttp:\/\/spectrum.ieee.org\/tech-talk\/telecom\/internet\/popular-internet-of-things-forecast-of-50-billion-devices-by-2020-is-outdated"},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Notra, S., Siddiqi, M., Gharakheili, H.H., Sivaraman, V., Boreli, R.: An experimental study of security and privacy risks with emerging household appliances. In: IEEE Conference on Communications and Network Security, pp. 79\u201384. IEEE (2014)","DOI":"10.1109\/CNS.2014.6997469"},{"issue":"8","key":"2_CR17","doi-asserted-by":"publisher","first-page":"2661","DOI":"10.1016\/j.adhoc.2013.04.014","volume":"11","author":"S Raza","year":"2013","unstructured":"Raza, S., Wallgren, L., Voigt, T.: SVELTE: real-time intrusion detection in the internet of things. Ad hoc Netw. 11(8), 2661\u20132674 (2013)","journal-title":"Ad hoc Netw."},{"key":"2_CR18","doi-asserted-by":"crossref","unstructured":"Roman, R., Zhou, J., Lopez, J.: Applying intrusion detection systems to wireless sensor networks. In: IEEE Consumer Communications & Networking Conference (CCNC 2006) (2006)","DOI":"10.1109\/CCNC.2006.1593102"},{"issue":"12","key":"2_CR19","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1109\/MCOM.2012.6384464","volume":"50","author":"A Sehgal","year":"2012","unstructured":"Sehgal, A., Perelman, V., Kuryla, S., Schonwalder, J.: Management of resource constrained devices in the internet of things. IEEE Commun. Mag. 50(12), 144\u2013149 (2012)","journal-title":"IEEE Commun. Mag."},{"key":"2_CR20","doi-asserted-by":"crossref","unstructured":"Simpson, A.K., Roesner, F., Kohno, T.: Securing vulnerable home IoT devices with an in-hub security manager. In: IEEE International Conference on Pervasive Computing and Communications Workshops, pp. 551\u2013556. IEEE (2017)","DOI":"10.1109\/PERCOMW.2017.7917622"},{"key":"2_CR21","unstructured":"Team, O.P.: Ossec: open source hids security (2010\u20132017). \nhttps:\/\/ossec.github.io\/index.html"},{"issue":"8","key":"2_CR22","doi-asserted-by":"publisher","first-page":"794326","DOI":"10.1155\/2013\/794326","volume":"9","author":"L Wallgren","year":"2013","unstructured":"Wallgren, L., Raza, S., Voigt, T.: Routing attacks and countermeasures in the RPL-based internet of things. Int. J. Distrib. Sens. Netw. 9(8), 794326 (2013)","journal-title":"Int. J. Distrib. Sens. Netw."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-01701-9_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,12,28]],"date-time":"2018-12-28T12:03:42Z","timestamp":1545998622000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-01701-9_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030017002","9783030017019"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-01701-9_2","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"value":"1867-8211","type":"print"},{"value":"1867-822X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"SecureComm","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Communication Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 August 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 August 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"securecomm2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/securecomm.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}