{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T20:25:43Z","timestamp":1769977543998,"version":"3.49.0"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030440404","type":"print"},{"value":"9783030440411","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-44041-1_104","type":"book-chapter","created":{"date-parts":[[2020,3,27]],"date-time":"2020-03-27T19:02:51Z","timestamp":1585335771000},"page":"1215-1226","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Identity and Access Management for IoT in Smart Grid"],"prefix":"10.1007","author":[{"given":"Vilmar","family":"Abreu","sequence":"first","affiliation":[]},{"given":"Altair O.","family":"Santin","sequence":"additional","affiliation":[]},{"given":"Eduardo K.","family":"Viegas","sequence":"additional","affiliation":[]},{"given":"Vinicius\u00a0V.","family":"Cogo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,28]]},"reference":[{"issue":"4","key":"104_CR1","doi-asserted-by":"publisher","first-page":"967","DOI":"10.1007\/s11036-017-0960-4","volume":"23","author":"V Abreu","year":"2018","unstructured":"Abreu, V., Santin, A., Xavier, A., Lando, A., Witkovski, A., Ribeiro, R., Stihler, M., Zambenedetti, V., Chueiri, I.: A smart meter and smart house integrated to an idm and key-based scheme for providing integral security for a smart grid ICT. Mob. Netw. Appl. 23(4), 967\u2013981 (2018)","journal-title":"Mob. Netw. Appl."},{"key":"104_CR2","doi-asserted-by":"crossref","unstructured":"Abreu, V., Santin, A.O., Viegas, E.K., Stihler, M.: A multi-domain role activation model. In: 2017 IEEE International Conference on Communications (ICC). IEEE (2017)","DOI":"10.1109\/ICC.2017.7997247"},{"key":"104_CR3","doi-asserted-by":"crossref","unstructured":"Ammayappan, K., Saxena, A., Negi, A.: Mutual authentication and key agreement based on elliptic curve cryptography for GSM. In: 2006 International Conference on Advanced Computing and Communications, pp. 183\u2013186 (2006)","DOI":"10.1109\/ADCOM.2006.4289879"},{"key":"104_CR4","first-page":"140","volume":"6","author":"L Arockiam","year":"2016","unstructured":"Arockiam, L., Joshitta, R.S.: Authentication in IoT environment: a survey. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 6, 140\u2013145 (2016)","journal-title":"Int. J. Adv. Res. Comput. Sci. Softw. Eng."},{"key":"104_CR5","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1016\/j.cose.2017.04.005","volume":"68","author":"Y Ashibani","year":"2017","unstructured":"Ashibani, Y., Mahmoud, Q.H.: Cyber physical systems security: analysis, challenges and solutions. Comput. Secur. 68, 81\u201397 (2017)","journal-title":"Comput. Secur."},{"key":"104_CR6","unstructured":"C\u00e1rdenas, A.A., Amin, S., Sastry, S.: Research challenges for the security of control systems. In: Proceedings of the 3rd Conference on Hot Topics in Security, HOTSEC 2008, pp. 6:1\u20136:6. USENIX Association, Berkeley (2008)"},{"key":"104_CR7","doi-asserted-by":"publisher","first-page":"646","DOI":"10.1016\/j.procs.2016.02.112","volume":"78","author":"AA Chavan","year":"2016","unstructured":"Chavan, A.A., Nighot, M.K.: Secure and cost-effective application layer protocol with authentication interoperability for IOT. Procedia Comput. Sci. 78, 646\u2013651 (2016)","journal-title":"Procedia Comput. Sci."},{"issue":"12","key":"104_CR8","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1109\/MCOM.2016.1600304CM","volume":"54","author":"W Chin","year":"2016","unstructured":"Chin, W., Lin, Y., Chen, H.: A framework of machine-to-machine authentication in smart grid: a two-layer approach. IEEE Commun. Mag. 54(12), 102\u2013107 (2016)","journal-title":"IEEE Commun. Mag."},{"key":"104_CR9","unstructured":"International Electrotechnical Commission: IEC smart grid standardization roadmap (2010). \nhttps:\/\/www.iec.ch\/smartgrid\/downloads\/sg3_roadmap.pdf"},{"key":"104_CR10","unstructured":"Contiki: Contiki OS (2019). \nhttps:\/\/www.contiki-ng.org\/"},{"issue":"4","key":"104_CR11","doi-asserted-by":"publisher","first-page":"944","DOI":"10.1109\/SURV.2011.101911.00087","volume":"14","author":"X Fang","year":"2012","unstructured":"Fang, X., Misra, S., Xue, G., Yang, D.: Smart grid\u2014the new and improved power grid: a survey. IEEE Commun. Surv. Tutor. 14(4), 944\u2013980 (2012)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"104_CR12","doi-asserted-by":"crossref","unstructured":"Garcia-Morchon, O., Keoh, S.L., Kumar, S., Moreno-Sanchez, P., Vidal-Meca, F., Ziegeldorf, J.H.: Securing the IP-based internet of things with hip and DTLS. In: ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2013, pp. 119\u2013124. ACM, New York (2013)","DOI":"10.1145\/2462096.2462117"},{"key":"104_CR13","first-page":"5:5","volume":"2015","author":"JL Hou","year":"2016","unstructured":"Hou, J.L., Yeh, K.H.: Novel authentication schemes for IoT based healthcare systems. Int. J. Distrib. Sen. Netw. 2015, 5:5 (2016)","journal-title":"Int. J. Distrib. Sen. Netw."},{"key":"104_CR14","unstructured":"Infoworld: Millions of embedded devices use the same hard-coded SSH and TLS private keys (2015). \nhttp:\/\/www.infoworld.com\/article\/3009667\/security\/millions-ofembedded-devices-use-the-same-hard-coded-ssh-and-tls-privatekeys.html"},{"key":"104_CR15","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1109\/MSP.2011.67","volume":"9","author":"R Langner","year":"2011","unstructured":"Langner, R.: Stuxnet: dissecting a cyberwarfare weapon. IEEE Secur. Priv. 9, 49\u201351 (2011)","journal-title":"IEEE Secur. Priv."},{"key":"104_CR16","doi-asserted-by":"publisher","unstructured":"Liu, J., Xiao, Y., Chen, C.L.P.: Authentication and access control in the internet of things. In: 2012 32nd International Conference on Distributed Computing Systems Workshops, pp. 588\u2013592 (2012). \nhttps:\/\/doi.org\/10.1109\/ICDCSW.2012.23","DOI":"10.1109\/ICDCSW.2012.23"},{"key":"104_CR17","unstructured":"The Hacker News: Millions of IoT devices using same hard-coded crypto keys (2015). \nhttp:\/\/thehackernews.com\/2015\/11\/iot-devicecrypto-keys.html"},{"key":"104_CR18","unstructured":"NIST: Ansi x9.17 key distribution (1992). \nhttps:\/\/www.niatec.iri.isu.edu\/(S(5pvzas455hrdzsrxbwh1ndqb))\/GetFile.aspx?pid=60"},{"key":"104_CR19","unstructured":"NIST: Framework for cps cybersecurity (2018). \nhttps:\/\/nvlpubs.nist.gov\/nistpubs\/"},{"key":"104_CR20","unstructured":"NIST: Iam for electric utilities (2018). \nhttps:\/\/nvlpubs.nist.gov\/nistpubs\/"},{"key":"104_CR21","doi-asserted-by":"crossref","unstructured":"Peng, Y., Lu, T., Liu, J., Gao, Y., Guo, X., Xie, F.: Cyber-physical system risk assessment. In: International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 442\u2013447 (2013)","DOI":"10.1109\/IIH-MSP.2013.116"},{"key":"104_CR22","doi-asserted-by":"crossref","unstructured":"Ribeiro, R., Santin, A., Abreu, V., Marynowski, J., Viegas, E.: Providing security and privacy in smart house through mobile cloud computing. In: 2016 8th IEEE Latin-American Conference on Communications (LATINCOM). IEEE (2016)","DOI":"10.1109\/LATINCOM.2016.7811599"},{"issue":"2","key":"104_CR23","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"RS Sandhu","year":"1996","unstructured":"Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. Computer 29(2), 38\u201347 (1996)","journal-title":"Computer"},{"key":"104_CR24","doi-asserted-by":"crossref","unstructured":"Shivraj, V.L., Rajan, M.A., Singh, M., Balamuralidhar, P.: One time password authentication scheme based on elliptic curves for internet of things (IoT). In: 2015 5th National Symposium on Information Technology: Towards New Smart World (NSITNSW), pp. 1\u20136 (2015)","DOI":"10.1109\/NSITNSW.2015.7176384"},{"key":"104_CR25","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1016\/j.jnca.2018.11.005","volume":"126","author":"C Vicentini","year":"2019","unstructured":"Vicentini, C., Santin, A., Viegas, E., Abreu, V.: SDN-based and multitenant-aware resource provisioning mechanism for cloud-based big data streaming. J. Netw. Comput. Appl. 126, 133\u2013149 (2019)","journal-title":"J. Netw. Comput. Appl."},{"key":"104_CR26","doi-asserted-by":"crossref","unstructured":"Viegas, E., Santin, A., Abreu, V., Oliveira, L.S.: Enabling anomaly-based intrusion detection through model generalization. In: 2018 IEEE Symposium on Computers and Communications (ISCC). IEEE (2018)","DOI":"10.1109\/ISCC.2018.8538524"},{"key":"104_CR27","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.cose.2018.05.014","volume":"78","author":"E Viegas","year":"2018","unstructured":"Viegas, E., Santin, A., Oliveira, L., Fran\u00e7a, A., Jasinski, R., Pedroni, V.: A reliable and energy-efficient classifier combination scheme for intrusion detection in embedded systems. Comput. Secur. 78, 16\u201332 (2018)","journal-title":"Comput. Secur."},{"issue":"1","key":"104_CR28","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1109\/TC.2016.2560839","volume":"66","author":"E Viegas","year":"2017","unstructured":"Viegas, E., Santin, A.O., Franca, A., Jasinski, R., Pedroni, V.A., Oliveira, L.S.: Towards an energy-efficient anomaly-based intrusion detection engine for embedded systems. IEEE Trans. Comput. 66(1), 163\u2013177 (2017)","journal-title":"IEEE Trans. Comput."},{"key":"104_CR29","doi-asserted-by":"crossref","unstructured":"Witkovski, A., Santin, A., Abreu, V., Marynowski, J.: An IDM and key-based authentication method for providing single sign-on in IoT. In: IEEE GLOBECOM, pp. 1\u20136 (2015)","DOI":"10.1109\/GLOCOM.2015.7417597"},{"key":"104_CR30","unstructured":"ZDnet: Smart meter hacking tool released (2012). \nhttp:\/\/www.zdnet.com\/article\/smart-meter-hacking-tool-released"}],"container-title":["Advances in Intelligent Systems and Computing","Advanced Information Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-44041-1_104","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,27]],"date-time":"2020-03-27T19:35:55Z","timestamp":1585337755000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-44041-1_104"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030440404","9783030440411"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-44041-1_104","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"28 March 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AINA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Networking and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Caserta","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 April 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 April 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aina0d","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}