{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:59:26Z","timestamp":1740099566174,"version":"3.37.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030310189"},{"type":"electronic","value":"9783030310196"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-31019-6_40","type":"book-chapter","created":{"date-parts":[[2019,10,8]],"date-time":"2019-10-08T23:03:32Z","timestamp":1570575812000},"page":"475-486","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["From a Home-Area-Network to a Secure Internet of Things Application"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4393-9638","authenticated-orcid":false,"given":"Maryori","family":"Sabalza-Mejia","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3528-2688","authenticated-orcid":false,"given":"Luz","family":"Magre-Colorado","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6851-5241","authenticated-orcid":false,"given":"Ivan","family":"Ba\u00f1os","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2755-0718","authenticated-orcid":false,"given":"Juan Carlos","family":"Mart\u00ednez-Santos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,10,9]]},"reference":[{"key":"40_CR1","unstructured":"FIPS Pub: Standards for security categorization of federal information and information systems. NIST FIPS 199 (2004)"},{"key":"40_CR2","volume-title":"Learning PHP, MySQL, JavaScript, and CSS: A Step-by-Step Guide to Creating Dynamic Websites","author":"R Nixon","year":"2012","unstructured":"Nixon, R.: Learning PHP, MySQL, JavaScript, and CSS: A Step-by-Step Guide to Creating Dynamic Websites. O\u2019Reilly Media Inc., Beijing (2012)"},{"key":"40_CR3","unstructured":"Nicholas Zambetti: Wire.h library (2006)"},{"key":"40_CR4","volume-title":"Arduino Cookbook: Recipes to Begin, Expand, and Enhance Your Projects","author":"M Margolis","year":"2011","unstructured":"Margolis, M.: Arduino Cookbook: Recipes to Begin, Expand, and Enhance Your Projects. O\u2019Reilly Media Inc., Sebastopol (2011)"},{"key":"40_CR5","unstructured":"Bootstrap framework. https:\/\/uxplanet.org\/how-to-customize-bootstrap-b8078a011203 . Accessed 8 Apr 2016"},{"key":"40_CR6","volume-title":"MySQL\/PHP Database Applications","author":"B Bulger","year":"2003","unstructured":"Bulger, B., Greenspan, J., Wall, D.: MySQL\/PHP Database Applications. Wiley, New York (2003)"},{"key":"40_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-1-4302-6838-3_1","volume-title":"Intel\u00ae Galileo and Intel\u00ae Galileo Gen 2","author":"MC Ramon","year":"2014","unstructured":"Ramon, M.C.: Intel Galileo and Intel Galileo Gen 2. Intel\u00ae Galileo and Intel\u00ae Galileo Gen 2, pp. 1\u201333. Apress, Berkeley, CA (2014). https:\/\/doi.org\/10.1007\/978-1-4302-6838-3_1"},{"key":"40_CR8","doi-asserted-by":"crossref","unstructured":"Hummen, R., Hiller, J., Wirtz, H., Henze, M., Shafagh, H., Wehrle, K.: 6LoWPAN fragmentation attacks and mitigation mechanisms. In: Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 55\u201366. ACM, April 2013","DOI":"10.1145\/2462096.2462107"},{"key":"40_CR9","doi-asserted-by":"crossref","unstructured":"Henze, M., Hermerschmidt, L., Kerpen, D., Huling, R., Rumpe, B., Wehrle, K.: User-driven privacy enforcement for cloud-based services in the internet of things. In: 2014 International Conference on Future Internet of Things and Cloud, pp. 191\u2013196. IEEE, August 2014","DOI":"10.1109\/FiCloud.2014.38"},{"key":"40_CR10","doi-asserted-by":"publisher","DOI":"10.1002\/9781118027974","volume-title":"Information Security: Principles and Practice","author":"M Stamp","year":"2011","unstructured":"Stamp, M.: Information Security: Principles and Practice. Wiley, Hoboken (2011)"},{"key":"40_CR11","doi-asserted-by":"crossref","unstructured":"Lounis, A., Hadjidj, A., Bouabdallah, A., Challal, Y.: Secure and scalable cloud-based architecture for e-health wireless sensor networks. In: 2012 21st International Conference on Computer Communications and Networks (ICCCN), pp. 1\u20137. IEEE, July 2012","DOI":"10.1109\/ICCCN.2012.6289252"},{"key":"40_CR12","unstructured":"International Organization for Standardization: Technical Committee ISO\/TC 97: ISO7498-2: Information processing system, open system interconnection, basic reference mode. Part 2: security architecture. International Organization for Standardization (1989)"},{"key":"40_CR13","doi-asserted-by":"crossref","unstructured":"Li, X., Xuan, Z., Wen, L.: Research on the architecture of trusted security system based on the internet of things. In: 2011 Fourth International Conference on Intelligent Computation Technology and Automation, vol. 2, pp. 1172\u20131175. IEEE, March 2011","DOI":"10.1109\/ICICTA.2011.578"},{"key":"40_CR14","doi-asserted-by":"crossref","unstructured":"Li, D., Sampalli, S., Aung, Z., Williams, J., Sanchez, A.: Fine-grained encryption for search and rescue operation on Internet of Things. In: Asia-Pacific World Congress on Computer Science and Engineering, pp. 1\u20139. IEEE, November 2014","DOI":"10.1109\/APWCCSE.2014.7053860"},{"key":"40_CR15","doi-asserted-by":"crossref","unstructured":"Islam, S., Falcarin, P.: Measuring security requirements for software security. In: 2011 IEEE 10th International Conference on Cybernetic Intelligent Systems (CIS), pp. 70\u201375. IEEE, September 2011","DOI":"10.1109\/CIS.2011.6169137"},{"key":"40_CR16","doi-asserted-by":"crossref","unstructured":"Van Solingen, R., Basili, V., Caldiera, G., Rombach, H.D.: Goal question metric (GQM) approach. In: Encyclopedia of Software Engineering (2002)","DOI":"10.1002\/0471028959.sof142"},{"issue":"1","key":"40_CR17","doi-asserted-by":"crossref","first-page":"69","DOI":"10.3390\/s17010069","volume":"17","author":"S Pirbhulal","year":"2017","unstructured":"Pirbhulal, S., et al.: A novel secure IoT-based smart home automation system using a wireless sensor network. Sensors 17(1), 69 (2017)","journal-title":"Sensors"},{"key":"40_CR18","doi-asserted-by":"crossref","unstructured":"Han, J.H., Jeon, Y., Kim, J.: Security considerations for secure and trustworthy smart home system in the IoT environment. In: 2015 International Conference on Information and Communication Technology Convergence (ICTC), pp. 1116\u20131118. IEEE, October 2015","DOI":"10.1109\/ICTC.2015.7354752"},{"key":"40_CR19","doi-asserted-by":"publisher","first-page":"964","DOI":"10.1016\/j.future.2016.11.031","volume":"78","author":"C Stergiou","year":"2018","unstructured":"Stergiou, C., Psannis, K.E., Kim, B.G., Gupta, B.: Secure integration of IoT and cloud computing. Future Gener. Comput. Syst. 78, 964\u2013975 (2018)","journal-title":"Future Gener. Comput. Syst."},{"key":"40_CR20","doi-asserted-by":"crossref","unstructured":"Santoso, F.K., Vun, N.C.: Securing IoT for smart home system. In: 2015 International Symposium on Consumer Electronics (ISCE), pp. 1\u20132. IEEE, June 2015","DOI":"10.1109\/ISCE.2015.7177843"},{"key":"40_CR21","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"759","DOI":"10.1007\/978-3-319-66562-7_54","volume-title":"Advances in Computing","author":"LA Magre Colorado","year":"2017","unstructured":"Magre Colorado, L.A., Mart\u00edinez-Santos, J.C.: Leveraging 1-wire communication bus system for secure home automation. In: Solano, A., Ordo\u00f1ez, H. (eds.) CCC 2017. CCIS, vol. 735, pp. 759\u2013771. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-66562-7_54"},{"key":"40_CR22","doi-asserted-by":"crossref","unstructured":"Beaulieu, R., Treatman-Clark, S., Shors, D., Weeks, B., Smith, J., Wingers, L.: The SIMON and SPECK lightweight block ciphers. In: 2015 52nd ACM\/EDAC\/IEEE Design Automation Conference (DAC), pp. 1\u20136. IEEE, June 2015","DOI":"10.1145\/2744769.2747946"},{"key":"40_CR23","doi-asserted-by":"crossref","unstructured":"Griffor, E.R., Greer, C., Wollman, D.A., Burns, M.J.: Framework for cyber-physical systems: volume 1, overview (No. Special Publication (NIST SP)-1500-201) (2017)","DOI":"10.6028\/NIST.SP.1500-201"},{"key":"40_CR24","unstructured":"Sabalza, M.M., Santos, J.C.M.: Design and construction of a power meter to optimize usage of the electric power. In: 2014 III International Congress of Engineering Mechatronics and Automation (CIIMA), pp. 1\u20135. IEEE, October 2014"}],"container-title":["Communications in Computer and Information Science","Applied Computer Sciences in Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-31019-6_40","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,24]],"date-time":"2024-07-24T19:08:38Z","timestamp":1721848118000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-31019-6_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030310189","9783030310196"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-31019-6_40","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"9 October 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WEA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Workshop on Engineering Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Santa Marta","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Colombia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 October 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 October 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"woea2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/ieee.udistrital.edu.co\/wea2019","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}