{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T02:54:55Z","timestamp":1743044095331,"version":"3.40.3"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030184186"},{"type":"electronic","value":"9783030184193"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-18419-3_1","type":"book-chapter","created":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T23:25:20Z","timestamp":1556753120000},"page":"3-16","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Securing Internet-of-Things"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2684-9259","authenticated-orcid":false,"given":"Guang","family":"Gong","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,4,14]]},"reference":[{"key":"1_CR1","unstructured":"Zigbee smart energy profile specification (sep) 1.2, revision 4. ZigBee Alliance, December 2014"},{"key":"1_CR2","unstructured":"CPS PWG draft cyber-physical systems (CPS) framework. National Institute of Standards and Technology (NIST), September 2015. https:\/\/pages.nist.gov\/cpspwg\/"},{"key":"1_CR3","unstructured":"EPC radio frequency identity protocols class-1 generation-2 UHF RFID protocol for communications at 860mhz-960mhz version 2. EPCglobal Inc., Specification documents, April 2015. https:\/\/www.gs1.org\/sites\/default\/files\/docs\/epc\/Gen2_Protocol_Standard.pdf"},{"key":"1_CR4","unstructured":"5G-PPP: Deliverable d2.7 security architecture (final) - 5G-Ensure, August 2018. www.5gensure.eu\/sites\/default\/files\/5G-ENSURE_D2.7_SecurityArchitectureFinal.pdf"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"AlTawy, R., Gong, G.: $$Mesh$$ : a supply chain solution with locally private transactions. In: Privacy Enhancing Technologies, pending revisions (2018)","DOI":"10.2478\/popets-2019-0041"},{"key":"1_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3233245","volume":"17","author":"R AlTawy","year":"2018","unstructured":"AlTawy, R., Rohit, R., He, M., Mandal, K., Yang, G., Gong, G.: sLiSCP-light: towards lighter sponge-specific cryptographic permutations. ACM Trans. Embed. Comput. Syst. 17, 1\u201326 (2018)","journal-title":"ACM Trans. Embed. Comput. Syst."},{"key":"1_CR7","doi-asserted-by":"publisher","first-page":"1341","DOI":"10.1109\/TC.2018.2811467","volume":"67","author":"R AlTawy","year":"2018","unstructured":"AlTawy, R., Rohit, R., He, M., Mandal, K., Yang, G., Gong, G.: Towards a cryptographic minimal design: the sLiSCP family of permutations. IEEE Trans. Comput. 67, 1341\u20131358 (2018)","journal-title":"IEEE Trans. Comput."},{"key":"1_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-319-13066-8_1","volume-title":"Radio Frequency Identification: Security and Privacy Issues","author":"F Armknecht","year":"2014","unstructured":"Armknecht, F., Hamann, M., Mikhalev, V.: Lightweight authentication protocols on ultra-constrained RFIDs - myths and facts. In: Saxena, N., Sadeghi, A.-R. (eds.) RFIDSec 2014. LNCS, vol. 8651, pp. 1\u201318. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-13066-8_1"},{"key":"1_CR9","unstructured":"Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., Wingers, L.: The SIMON and SPECK families of lightweight block ciphers. Cryptology ePrint Archive, Report 2013\/404 (2013). http:\/\/eprint.iacr.org\/2013\/404"},{"key":"1_CR10","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Permutation-based encryption, authentication and authenticated encryption. In: DIAC (2012)"},{"issue":"1","key":"1_CR11","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/s10623-012-9660-z","volume":"66","author":"A Bogdanov","year":"2013","unstructured":"Bogdanov, A., Shibutani, K.: Generalized feistel networks revisited. Des. Codes Crypt. 66(1), 75\u201397 (2013)","journal-title":"Des. Codes Crypt."},{"key":"1_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/978-3-642-25286-0_9","volume-title":"RFID. Security and Privacy","author":"Q Chai","year":"2012","unstructured":"Chai, Q., Gong, G.: BUPLE: securing passive RFID communication through physical layer enhancements. In: Juels, A., Paar, C. (eds.) RFIDSec 2011. LNCS, vol. 7055, pp. 127\u2013146. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-25286-0_9"},{"key":"1_CR13","unstructured":"Chen, L.: Lightweight cryptography standards developed in ISO\/IEC SC27 (2016). https:\/\/www.nist.gov\/sites\/default\/files\/documents\/2016\/10\/17\/chen-presentation-lwc2016.pdf"},{"key":"1_CR14","unstructured":"Columbus, L.: A roundup of 2018 enterprise Internet of Things forecasts and market estimates (2018)"},{"key":"1_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-642-14992-4_2","volume-title":"Financial Cryptography and Data Security","author":"D Engels","year":"2010","unstructured":"Engels, D., Fan, X., Gong, G., Hu, H., Smith, E.M.: Hummingbird: ultra-lightweight cryptography for resource-constrained devices. In: Sion, R., et al. (eds.) FC 2010. LNCS, vol. 6054, pp. 3\u201318. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-14992-4_2"},{"key":"1_CR16","unstructured":"Fan, X., Gong, G.: Securing NFC with elliptic curve cryptography - challenges and solutions. In: RFIDSec Asia 2013, vol. 11, pp. 97\u2013106 (2013)"},{"key":"1_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1007\/3-540-45682-1_4","volume-title":"Advances in Cryptology \u2014 ASIACRYPT 2001","author":"NJ Hopper","year":"2001","unstructured":"Hopper, N.J., Blum, M.: Secure human identification protocols. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 52\u201366. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-45682-1_4"},{"key":"1_CR18","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1109\/JSAC.2005.861395","volume":"24","author":"A Juels","year":"2006","unstructured":"Juels, A.: RFID security and privacy: a research survey. IEEE J. Sel. Areas Commun. 24, 381\u2013394 (2006)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"1_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/11535218_18","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"A Juels","year":"2005","unstructured":"Juels, A., Weis, S.A.: Authenticating pervasive devices with human protocols. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 293\u2013308. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11535218_18"},{"key":"1_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1007\/978-3-642-33027-8_25","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2012","author":"M Kne\u017eevi\u0107","year":"2012","unstructured":"Kne\u017eevi\u0107, M., Nikov, V., Rombouts, P.: Low-latency encryption \u2013 is \u201cLightweight = Light + Wait\u201d? In: Prouff, E., Schaumont, P. (eds.) CHES 2012. LNCS, vol. 7428, pp. 426\u2013446. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-33027-8_25"},{"key":"1_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/978-3-540-85893-5_20","volume-title":"Smart Card Research and Advanced Applications","author":"G Koning Gans de","year":"2008","unstructured":"de Koning Gans, G., Hoepman, J.-H., Garcia, F.D.: A practical attack on the MIFARE classic. In: Grimaud, G., Standaert, F.-X. (eds.) CARDIS 2008. LNCS, vol. 5189, pp. 267\u2013282. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-85893-5_20"},{"key":"1_CR22","unstructured":"Krebs, B.: Hacked cameras, DVRs powered todays massive internet outage, October 2016. https:\/\/krebsonsecurity.com\/2016\/10\/hacked-cameras-dvrs-powered-todays-massive-internet-outage\/"},{"issue":"6","key":"1_CR23","doi-asserted-by":"publisher","first-page":"4042","DOI":"10.1109\/TIT.2013.2253892","volume":"59","author":"Z Li","year":"2013","unstructured":"Li, Z., Gong, G., Qin, Z.: Secure and efficient LCMQ entity authentication protocol. IEEE Trans. Inf. Theory 59(6), 4042\u20134054 (2013)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"1_CR24","unstructured":"McKay, K., Bassham, L., S\u00f6nmez Turan, M., Mouha, N.: Report on lightweight cryptography (NISTIR8114) (2017). http:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2017\/NIST.IR.8114.pdf"},{"key":"1_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/BFb0034838","volume-title":"Advances in Cryptology \u2014 ASIACRYPT 1996","author":"K Nyberg","year":"1996","unstructured":"Nyberg, K.: Generalized Feistel networks. In: Kim, K., Matsumoto, T. (eds.) ASIACRYPT 1996. LNCS, vol. 1163, pp. 91\u2013104. Springer, Heidelberg (1996). https:\/\/doi.org\/10.1007\/BFb0034838"},{"key":"1_CR26","doi-asserted-by":"publisher","first-page":"585","DOI":"10.1109\/TETC.2015.2390034","volume":"3","author":"C Perera","year":"2005","unstructured":"Perera, C., Liu, C., Jayawardena, S.: The emerging Internet of Things marketplace from an industrial perspective: a survey. IEEE Trans. Emerg. Top. Comput. 3, 585\u2013598 (2005)","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"1_CR27","doi-asserted-by":"crossref","unstructured":"Ronen, E., Shamir, A., Weingarten, A., O\u2019Flynn, C.: IoT goes nuclear: creating a ZigBee chain reaction. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 195\u2013212, May 2017","DOI":"10.1109\/SP.2017.14"},{"key":"1_CR28","doi-asserted-by":"crossref","unstructured":"Vanhoef, M., Piessens, F.: Key reinstallation attacks: forcing nonce reuse in WPA2. In: CCS 2017, October 2017","DOI":"10.1145\/3133956.3134027"},{"key":"1_CR29","doi-asserted-by":"crossref","unstructured":"Wu, T., Gong, G.: The weakness of integrity protection for LTE. In: Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2013), Budapest, 17\u201319 April 2013, pp. 79\u201388 (2013)","DOI":"10.1145\/2462096.2462110"},{"key":"1_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1007\/978-3-662-48324-4_16","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2015","author":"G Yang","year":"2015","unstructured":"Yang, G., Zhu, B., Suder, V., Aagaard, M.D., Gong, G.: The Simeck family of lightweight block ciphers. In: G\u00fcneysu, T., Handschuh, H. (eds.) CHES 2015. LNCS, vol. 9293, pp. 307\u2013329. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-48324-4_16"}],"container-title":["Lecture Notes in Computer Science","Foundations and Practice of Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-18419-3_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,17]],"date-time":"2022-09-17T07:23:46Z","timestamp":1663399426000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-18419-3_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030184186","9783030184193"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-18419-3_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"14 April 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FPS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Foundations and Practice of Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Montreal, QC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 November 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fps2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/fps2018.encs.concordia.ca\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"51","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"16","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"1","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"31% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}