{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T14:18:16Z","timestamp":1743085096785,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030503987"},{"type":"electronic","value":"9783030503994"}],"license":[{"start":{"date-parts":[[2020,6,10]],"date-time":"2020-06-10T00:00:00Z","timestamp":1591747200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,6,10]],"date-time":"2020-06-10T00:00:00Z","timestamp":1591747200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-50399-4_15","type":"book-chapter","created":{"date-parts":[[2020,6,9]],"date-time":"2020-06-09T11:02:37Z","timestamp":1591700557000},"page":"149-160","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["IoT Cryptosecurity: Overview and Potential Solutions"],"prefix":"10.1007","author":[{"given":"Jacek","family":"Wytr\u0119bowicz","sequence":"first","affiliation":[]},{"given":"Micha\u0142","family":"Goworko","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,6,10]]},"reference":[{"key":"15_CR1","doi-asserted-by":"publisher","unstructured":"Perera, C., Liu, C.H., Jayawardena, S.: The emerging internet of things marketplace from an industrial perspective: a survey. IEEE Trans. Emerg. Top. Comput. 585\u2013598 (2015). \nhttps:\/\/doi.org\/10.1109\/TETC.2015.2390034","DOI":"10.1109\/TETC.2015.2390034"},{"key":"15_CR2","unstructured":"IBM Industries Blog: The little-known story of the first IoT device. \nhttps:\/\/www.ibm.com\/blogs\/industries\/little-known-story-first-iot-device\n\n. Accessed 15 Apr 2020"},{"key":"15_CR3","volume-title":"Serious Cryptography: A Practical Introduction to Modern Encryption","author":"J-P Aumasson","year":"2018","unstructured":"Aumasson, J.-P.: Serious Cryptography: A Practical Introduction to Modern Encryption. No Starch Press, San Francisco (2018)"},{"key":"15_CR4","unstructured":"Goworko, M.: Secure communication system for the Internet of Things. B.S. thesis, The Faculty of Electronics and Information Technology, Warsaw University of Technology, Warsaw, Poland (2019)"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Garcia-Morchon, O., Kumar, S., Sethi, M.: Internet of Things (IoT) Security: State of the Art and Challenges. RFC Editor (2019). \nhttp:\/\/doi.org\/10.17487\/RFC8576","DOI":"10.17487\/RFC8576"},{"key":"15_CR6","doi-asserted-by":"publisher","unstructured":"Wytr\u0119bowicz, J.: Key-server adaptation to IoT systems. In: SENSORNETS 2018 - Proceedings of the 7th International Conference on Sensor Networks, pp. 155\u2013160 (2018). \nhttps:\/\/doi.org\/10.5220\/0006670201550160\n\n. \nhttp:\/\/www.scitepress.org\/PublicationsDetail.aspx?ID=Rw+kLnOBBEI=&t=1","DOI":"10.5220\/0006670201550160"},{"key":"15_CR7","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1080\/19393555.2018.1458258","volume":"27","author":"DM Mena","year":"2018","unstructured":"Mena, D.M., Papapanagiotou, I., Yang, B.: Internet of things: survey on security. Inf. Secur. J. Glob. Perspect. 27, 162\u2013182 (2018). \nhttps:\/\/doi.org\/10.1080\/19393555.2018.1458258","journal-title":"Inf. Secur. J. Glob. Perspect."},{"key":"15_CR8","unstructured":"Moore, K., Barnes, R., Tschofenig, H.: Best current practices for securing internet of things (IoT) devices. Internet Eng. Task Force (2017). \nhttps:\/\/tools.ietf.org\/html\/draft-moore-iot-security-bcp-01"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Bradner, S.: RFC2119: Key words for use in RFCs to Indicate Requirement Levels. RFC Editor (1997). \nhttp:\/\/doi.org\/10.17487\/rfc2119","DOI":"10.17487\/rfc2119"},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Barker, E.: Recommendation for Key Management \u2013 Part 1: General. NIST Spec. Publ. 800-57, pp. 51\u201354 (2016). \nhttp:\/\/doi.org\/10.6028\/NIST.SP.800-57pt3r1","DOI":"10.6028\/NIST.SP.800-57Pt3r1"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Fossati, T.: Transport Layer Security (TLS)\/Datagram Transport Layer Security (DTLS) Profiles for the Internet of Things. RFC Editor (2016). \nhttp:\/\/doi.org\/10.17487\/rfc7925","DOI":"10.17487\/RFC7925"},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Schaad, J.: CBOR Object Signing and Encryption (COSE). RFC Editor (2017). \nhttp:\/\/doi.org\/10.17487\/rfc8152","DOI":"10.17487\/RFC8152"},{"key":"15_CR13","doi-asserted-by":"publisher","first-page":"805","DOI":"10.1016\/j.future.2017.08.025","volume":"107","author":"B Qin","year":"2020","unstructured":"Qin, B., Huang, J., Wang, Q., Luo, X., Liang, B., Shi, W.: Cecoin: a decentralized PKI mitigating MitM attacks. Future Gener. Comput. Syst. 107, 805\u2013815 (2020). \nhttps:\/\/doi.org\/10.1016\/j.future.2017.08.025","journal-title":"Future Gener. Comput. Syst."},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Fang, W., Chen, W., Zhang, W., Pei, J., Gao, W., Wang, G.: Digital signature scheme for information non-repudiation in blockchain: a state of the art review. EURASIP J. Wirel. Commun. Netw. (2020). \nhttp:\/\/doi.org\/10.1186\/s13638-020-01665-w","DOI":"10.1186\/s13638-020-01665-w"},{"key":"15_CR15","unstructured":"Jo\u0144ski, P.: Certificate registration system (CeReS). M.S. thesis, The Faculty of Electronics and Information Technology, Warsaw University of Technology, Warsaw, Poland (2019)"},{"key":"15_CR16","unstructured":"Sosinowicz, J.: Web of trust certificate for embedded devices. M.S. thesis, The Faculty of Electronics and Information Technology, Warsaw University of Technology, Warsaw, Poland (2019)"},{"key":"15_CR17","doi-asserted-by":"publisher","unstructured":"Forsby, F., Furuhed, M., Papadimitratos, P., Raza, S.: Lightweight X.509 digital certificates for the internet of things. In: Interoperability, Safety and Security in IoT, pp. 123\u2013133. Springer (2018). \nhttps:\/\/doi.org\/10.1007\/978-3-319-93797-7_14","DOI":"10.1007\/978-3-319-93797-7_14"},{"key":"15_CR18","doi-asserted-by":"crossref","unstructured":"Bormann, C., Hoffman, P.: Concise Binary Object Representation (CBOR). RFC Editor (2013). \nhttp:\/\/doi.org\/10.17487\/rfc7049","DOI":"10.17487\/rfc7049"},{"key":"15_CR19","unstructured":"Truskovsky, A., Van Geest, D., Fluhrer, S., Kampanakis, P., Ounsworth, M., Mister, S.: Multiple public-key algorithm X.509 certificates. Internet Eng. Task Force (2018). \nhttps:\/\/datatracker.ietf.org\/doc\/html\/draft-truskovsky-lamps-pq-hybrid-x509-01"},{"key":"15_CR20","doi-asserted-by":"crossref","unstructured":"Turner, S., Brown, D., Yiu, K., Housley, R., Polk, T.: Elliptic Curve Cryptography Subject Public Key Information. RFC Editor (2009). \nhttp:\/\/doi.org\/10.17487\/rfc5480","DOI":"10.17487\/rfc5480"},{"key":"15_CR21","doi-asserted-by":"publisher","unstructured":"Zhu, Q., Wang, R., Chen, Q., Liu, Y., Qin, W.: IOT gateway: bridging wireless sensor networks into internet of things. In: 2010 IEEE\/IFIP International Conference on Embedded and Ubiquitous Computing, pp. 347\u2013352. IEEE Press (2010). \nhttps:\/\/doi.org\/10.1109\/euc.2010.58","DOI":"10.1109\/euc.2010.58"},{"key":"15_CR22","doi-asserted-by":"publisher","unstructured":"Chen, H., Jia, X., Li, H.: A brief introduction to IoT gateway. In: IET International Conference on Communication Technology and Application (ICCTA 2011), pp. 610\u2013613. IET (2011). \nhttps:\/\/doi.org\/10.1049\/cp.2011.0740","DOI":"10.1049\/cp.2011.0740"}],"container-title":["Advances in Intelligent Systems and Computing","Innovative Mobile and Internet Services in Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-50399-4_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,9]],"date-time":"2020-06-09T11:25:32Z","timestamp":1591701932000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-50399-4_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,10]]},"ISBN":["9783030503987","9783030503994"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-50399-4_15","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,6,10]]},"assertion":[{"value":"10 June 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IMIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lodz","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"imis2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/imis\/2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}