{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T05:34:08Z","timestamp":1743140048797,"version":"3.40.3"},"publisher-location":"Cham","reference-count":48,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030146863"},{"type":"electronic","value":"9783030146870"}],"license":[{"start":{"date-parts":[[2019,3,19]],"date-time":"2019-03-19T00:00:00Z","timestamp":1552953600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-14687-0_6","type":"book-chapter","created":{"date-parts":[[2019,3,18]],"date-time":"2019-03-18T01:35:21Z","timestamp":1552872921000},"page":"55-75","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["When the Price Is Your Privacy: A Security Analysis of Two Cheap IoT Devices"],"prefix":"10.1007","author":[{"given":"Margherita","family":"Favaretto","sequence":"first","affiliation":[]},{"given":"Tu","family":"Tran Anh","sequence":"additional","affiliation":[]},{"given":"Juxhino","family":"Kavaja","sequence":"additional","affiliation":[]},{"given":"Michele","family":"De Donno","sequence":"additional","affiliation":[]},{"given":"Nicola","family":"Dragoni","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,19]]},"reference":[{"issue":"1","key":"6_CR1","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/JIOT.2014.2306328","volume":"1","author":"A Zanella","year":"2014","unstructured":"Zanella A, Bui N, Castellani A, Vangelista L, Zorzi M (2014) Internet of Things for smart cities. IEEE Internet Things J 1(1):22\u201332","journal-title":"IEEE Internet Things J"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Soliman M, Abiodun T, Hamouda T, Zhou J, Lung C-H (2013) Smart home: integrating Internet of Things with web services and cloud computing. In: 2013 IEEE 5th international conference on cloud computing technology and science (CloudCom), vol\u00a02. IEEE, pp\u00a0317\u2013320","DOI":"10.1109\/CloudCom.2013.155"},{"issue":"10","key":"6_CR3","doi-asserted-by":"publisher","first-page":"3846","DOI":"10.1109\/JSEN.2013.2263379","volume":"13","author":"SDT Kelly","year":"2013","unstructured":"Kelly SDT, Suryadevara NK, Mukhopadhyay SC (2013) Towards the implementation of IoT for environmental condition monitoring in homes. IEEE Sens J 13(10):3846\u20133853","journal-title":"IEEE Sens J"},{"issue":"4","key":"6_CR4","doi-asserted-by":"publisher","first-page":"2233","DOI":"10.1109\/TII.2014.2300753","volume":"10","author":"L Xu Da","year":"2014","unstructured":"Da Xu L, He W, Li S (2014) Internet of Things in industries: a survey. IEEE Trans Ind Inform 10(4):2233\u20132243","journal-title":"IEEE Trans Ind Inform"},{"key":"6_CR5","unstructured":"Sadeghi A-R, Wachsmann C, Waidner M (2015) Security and privacy challenges in industrial Internet of Things. In: Proceedings of the 52nd annual design automation conference. ACM, p\u00a054"},{"issue":"9","key":"6_CR6","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/S1353-4858(15)30081-7","volume":"2015","author":"R Kirk","year":"2015","unstructured":"Kirk R (2015) Cars of the future: the Internet of Things in the automotive industry. Netw Secur 2015(9):16\u201318","journal-title":"Netw Secur"},{"key":"6_CR7","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/MITP.2016.42","volume":"18","author":"PA Laplante","year":"2016","unstructured":"Laplante PA, Laplante N (2016) The Internet of Things in healthcare: potential applications and challenges. IT Prof 18:2\u20134","journal-title":"IT Prof"},{"issue":"2","key":"6_CR8","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1109\/JIOT.2014.2313981","volume":"1","author":"S Amendola","year":"2014","unstructured":"Amendola S, Lodato R, Manzari S, Occhiuzzi C, Marrocco G (2014) RFID technology for IoT-based personal healthcare in smart spaces. IEEE Internet Things J 1(2):144\u2013152","journal-title":"IEEE Internet Things J"},{"key":"6_CR9","unstructured":"Eddy N (2015) Gartner: 21 billion IoT devices to invade by 2020. InformationWeek, vol\u00a010"},{"key":"6_CR10","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.comnet.2014.11.008","volume":"76","author":"S Sicari","year":"2015","unstructured":"Sicari S, Rizzardi A, Grieco LA, Coen-Porisini A (2015) Security, privacy and trust in Internet of Things: the road ahead. Comput Netw 76:146\u2013164","journal-title":"Comput Netw"},{"issue":"8","key":"6_CR11","doi-asserted-by":"publisher","first-page":"2481","DOI":"10.1007\/s11276-014-0761-7","volume":"20","author":"Q Jing","year":"2014","unstructured":"Jing Q, Vasilakos AV, Wan J, Lu J, Qiu D (2014) Security of the Internet of Things: perspectives and challenges. Wirel Netw 20(8):2481\u20132501","journal-title":"Wirel Netw"},{"key":"6_CR12","unstructured":"Dragoni N, Giaretta A, Mazzara M (2016) The internet of hackable things. In: International conference in software engineering for defence applications. Springer, pp\u00a0129\u2013140"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Goyal R, Dragoni N, Spognardi A (2016) Mind the tracker you wear: a security analysis of wearable health trackers. In: Proceedings of the 31st annual ACM symposium on applied computing, SAC 2016. ACM, New York, pp\u00a0131\u2013136","DOI":"10.1145\/2851613.2851685"},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"Giaretta A, De\u00a0Donno M, Dragoni N (2018) Adding salt to pepper: a structured security assessment over a humanoid robot. In: Proceedings of the 13th international conference on availability, reliability and security, ARES 2018. ACM, New York, pp\u00a022:1\u201322:8","DOI":"10.1145\/3230833.3232807"},{"issue":"1","key":"6_CR15","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1145\/2629633","volume":"58","author":"R Rawassizadeh","year":"2015","unstructured":"Rawassizadeh R, Price BA, Petre M (2015) Wearables: has the age of smartwatches finally arrived? Commun ACM 58(1):45\u201347","journal-title":"Commun ACM"},{"issue":"10","key":"6_CR16","doi-asserted-by":"publisher","first-page":"26783","DOI":"10.3390\/s151026783","volume":"15","author":"B Mortazavi","year":"2015","unstructured":"Mortazavi B, Nemati E, VanderWall K, Flores-Rodriguez HG, Cai JYJ, Lucier J, Naeim A, Sarrafzadeh M (2015) Can smartwatches replace smartphones for posture tracking? Sensors 15(10):26783\u201326800","journal-title":"Sensors"},{"key":"6_CR17","unstructured":"Wu R, De\u00a0Lara E, Liaqat D, Thukral I, Gershon AS (2016) Feasibility of using smartwatches and smartphones to monitor patients with COPD. In: A49. COPD: CARE DELIVERY. American Thoracic Society, pp\u00a0A1695\u2013A1695"},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"Weiss GM, Timko JL, Gallagher CM, Yoneda K, Schreiber AJ (2016) Smartwatch-based activity recognition: a machine learning approach. In: 2016 IEEE-EMBS international conference on biomedical and health informatics (BHI), pp\u00a0426\u2013429. IEEE","DOI":"10.1109\/BHI.2016.7455925"},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Ramos FBA, Lorayne A, Costa AAM, de\u00a0Sousa RR, Almeida HO, Perkusich A (2016) Combining smartphone and smartwatch sensor data in activity recognition approaches: an experimental evaluation. In: SEKE, pp\u00a0267\u2013272 (2016)","DOI":"10.18293\/SEKE2016-040"},{"issue":"11","key":"6_CR20","doi-asserted-by":"publisher","first-page":"e0140929","DOI":"10.1371\/journal.pone.0140929","volume":"10","author":"E Casilari","year":"2015","unstructured":"Casilari E, Oviedo-Jim\u00e9nez MA (2015) Automatic fall detection system based on the combined use of a smartphone and a smartwatch. PLoS One 10(11):e0140929","journal-title":"PLoS One"},{"key":"6_CR21","doi-asserted-by":"crossref","unstructured":"Johnston, AH, Weiss GM (2015) Smartwatch-based biometric gait recognition. In: 2015 IEEE 7th international conference on biometrics theory, applications and systems (BTAS). IEEE, pp\u00a01\u20136","DOI":"10.1109\/BTAS.2015.7358794"},{"key":"6_CR22","doi-asserted-by":"crossref","unstructured":"Lee W-H, Lee R (2016) Implicit sensor-based authentication of smartphone users with smartwatch. In: Proceedings of the hardware and architectural support for security and privacy 2016. ACM, p\u00a09","DOI":"10.1145\/2948618.2948627"},{"key":"6_CR23","doi-asserted-by":"crossref","unstructured":"Guerra-Rodr\u00edguez D, Granollers A (2016) User experience experiments with mobile devices in outdoors activities: use case: cycling and mountain biking. In: Proceedings of the XVII International Conference on Human Computer Interaction, Interaccion 2016. ACM, New York, pp\u00a026:1\u201326:4","DOI":"10.1145\/2998626.2998631"},{"key":"6_CR24","doi-asserted-by":"crossref","unstructured":"Liu X, Zhou Z, Diao W, Li Z, Zhang K (2015) When good becomes evil: keystroke inference with smartwatch. In: Proceedings of the 22nd ACM SIGSAC conference on computer and communications security, CCS 2015. ACM, New York, pp\u00a01273\u20131285","DOI":"10.1145\/2810103.2813668"},{"key":"6_CR25","doi-asserted-by":"crossref","unstructured":"Sarkisyan A, Debbiny R, Nahapetian A (2015) WristSnoop: smartphone PINs prediction using smartwatch motion sensors. In: 2015 IEEE international workshop on information forensics and security (WIFS), pp\u00a01\u20136","DOI":"10.1109\/WIFS.2015.7368569"},{"key":"6_CR26","doi-asserted-by":"crossref","unstructured":"Wang H, Lai TTT, Roy\u00a0Choudhury R (2015) MoLe: motion leaks through smartwatch sensors. In: Proceedings of the 21st annual international conference on mobile computing and networking, MobiCom 2015. ACM, New York, pp\u00a0155\u2013166","DOI":"10.1145\/2789168.2790121"},{"key":"6_CR27","doi-asserted-by":"crossref","unstructured":"Maiti A, Jadliwala M, He J, Bilogrevic I (2015) (Smart)watch your taps: side-channel keystroke inference attacks using smartwatches. In: Proceedings of the 2015 ACM international symposium on wearable computers, ISWC 2015. ACM, New York, pp\u00a027\u201330","DOI":"10.1145\/2802083.2808397"},{"issue":"99","key":"6_CR28","first-page":"1","volume":"PP","author":"A Maiti","year":"2018","unstructured":"Maiti A, Jadliwala M, He J, Bilogrevic I (2018) Side-channel inference attacks on mobile keypads using smartwatches. IEEE Trans Mob Comput PP(99):1","journal-title":"IEEE Trans Mob Comput"},{"key":"6_CR29","unstructured":"Lu CX, Du B, Wen H, Wang S, Markham A, Martinovic I, Shen Y, Trigoni N (2018) Snoopy: sniffing your smartwatch passwords via deep sequence learning. In: Proceedings of ACM on interactive, mobile, wearable and ubiquitous technologies, vol\u00a01, pp\u00a0152:1\u2013152:29"},{"issue":"3","key":"6_CR30","first-page":"391","volume":"47","author":"Q Do","year":"2017","unstructured":"Do Q, Martini B, Choo KR (2017) Is the data on your wearable device secure? An android wear smartwatch case study. Softw: Pract Exp 47(3):391\u2013403","journal-title":"Softw: Pract Exp"},{"key":"6_CR31","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/MCOM.2016.1600553CM","volume":"54","author":"J Liu","year":"2016","unstructured":"Liu J, Sun W (2016) Smart attacks against intelligent wearables in people-centric Internet of Things. IEEE Commun Mag 54:44\u201349","journal-title":"IEEE Commun Mag"},{"key":"6_CR32","doi-asserted-by":"publisher","first-page":"26:1","DOI":"10.1145\/2981546","volume":"16","author":"S Siboni","year":"2016","unstructured":"Siboni S, Shabtai A, Tippenhauer NO, Lee J, Elovici Y (2016) Advanced security testbed framework for wearable IoT devices. ACM Trans. Internet Technol. 16:26:1\u201326:25","journal-title":"ACM Trans. Internet Technol."},{"key":"6_CR33","doi-asserted-by":"crossref","unstructured":"Lee Y, Yang W, Kwon T (2017) Poster: watch out your smart watch when paired. In: Proceedings of the 2017 ACM SIGSAC conference on computer and communications security, CCS 2017. ACM, New York, pp\u00a02527\u20132529","DOI":"10.1145\/3133956.3138831"},{"key":"6_CR34","unstructured":"Internet of Things security study: Smartwatches. \n                  https:\/\/www.ftc.gov\/system\/files\/documents\/public_comments\/2015\/10\/00050-98093.pdf\n                  \n                . Accessed 26 Mar 2018"},{"key":"6_CR35","doi-asserted-by":"crossref","unstructured":"Padgette J (2017) Guide to bluetooth security. NIST Special Publication, vol 800, p 121","DOI":"10.6028\/NIST.SP.800-121r2"},{"key":"6_CR36","unstructured":"Mart\u00ednez, E (2017) Best chinese smartwatch of 2017. \n                  http:\/\/epinium.com\/blog\/best-chinese-smartwatch\/\n                  \n                . Accessed Oct 2017"},{"key":"6_CR37","unstructured":"Amazon.co.uk (2017) K88h product description. \n                  https:\/\/www.amazon.co.uk\/Waterproof-Dustproof-Notification-Smartphone-Silver-Black-Steel\/dp\/B01MSYUOFM\/ref=sr_1_1?s=electronics&ie=UTF8&qid=1507642684&sr=1-1&keywords=k88h\n                  \n                . Accessed Oct 2017"},{"key":"6_CR38","unstructured":"Bluetooth Specification (2003) RFCOMM with TS 07.10. Bluetooth SIG"},{"key":"6_CR39","doi-asserted-by":"crossref","unstructured":"Fernandes E, Jung J, Prakash A (2016) Security analysis of emerging smart home applications. In: 2016 IEEE symposium on security and privacy (SP), pp\u00a0636\u2013654","DOI":"10.1109\/SP.2016.44"},{"key":"6_CR40","doi-asserted-by":"crossref","unstructured":"Tekeoglu, A, Tosun AS (2015) Investigating security and privacy of a cloud-based wireless IP camera: NetCam. In: 2015 24th international conference on computer communication and networks (ICCCN). IEEE, pp\u00a01\u20136","DOI":"10.1109\/ICCCN.2015.7288421"},{"key":"6_CR41","unstructured":"CCTV hack takes casino for \\$33 million in poker losses. \n                  https:\/\/www.theregister.co.uk\/2013\/03\/15\/cctv_hack_casino_poker\/\n                  \n                . Accessed 30 Mar 2018"},{"issue":"3","key":"6_CR42","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MTS.2015.2476830","volume":"34","author":"K Albrecht","year":"2015","unstructured":"Albrecht K, Mcintyre L (2015) Privacy nightmare: when baby monitors go bad [opinion]. IEEE Technol Soc Mag 34(3):14\u201319","journal-title":"IEEE Technol Soc Mag"},{"key":"6_CR43","unstructured":"Shekyan S, Harutyunyan A (2013) To watch or be watched: turning your surveillance camera against you. HITB Amsterdam"},{"key":"6_CR44","doi-asserted-by":"crossref","unstructured":"Alshalawi R, Alghamdi T (2017) Forensic tool for wireless surveillance camera. In: 2017 19th international conference on advanced communication technology (ICACT), pp\u00a0536\u2013540","DOI":"10.23919\/ICACT.2017.7890148"},{"key":"6_CR45","unstructured":"De\u00a0Donno M, Dragoni N, Giaretta A, Mazzara M (2016) AntibIoTic: protecting IoT devices against DDoS attacks. In: International conference in software engineering for defence applications. Springer, pp\u00a059\u201372"},{"issue":"7","key":"6_CR46","doi-asserted-by":"publisher","first-page":"566","DOI":"10.1016\/j.cose.2009.06.005","volume":"28","author":"N Dragoni","year":"2009","unstructured":"Dragoni N, Massacci F, Walter T, Schaefer C (2009) What the heck is this application doing? A security-by-contract architecture for pervasive services. Comput Secur 28(7):566\u2013577","journal-title":"Comput Secur"},{"key":"6_CR47","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1016\/j.jlap.2009.02.013","volume":"78","author":"N Bielova","year":"2009","unstructured":"Bielova N, Dragoni N, Massacci F, Naliuka K, Siahaan I (2009) Matching in security-by-contract for mobile code. J. Logic Algebraic Program 78:340\u2013358","journal-title":"J. Logic Algebraic Program"},{"key":"6_CR48","doi-asserted-by":"crossref","unstructured":"Bonomi F, Milito R, Zhu J, Addepalli S (2012) Fog computing and its role in the Internet of Things. In: Proceedings of the first edition of the MCC workshop on mobile cloud computing, MCC 2012. ACM, New York, pp\u00a013\u201316","DOI":"10.1145\/2342509.2342513"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of 6th International Conference in Software Engineering for Defence Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-14687-0_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,18]],"date-time":"2019-05-18T03:09:56Z","timestamp":1558148996000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-14687-0_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,19]]},"ISBN":["9783030146863","9783030146870"],"references-count":48,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-14687-0_6","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,3,19]]},"assertion":[{"value":"19 March 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SEDA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference in Software Engineering for Defence Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rome","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"seda2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.sedaconference.eu\/2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}