{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T08:25:36Z","timestamp":1761294336209,"version":"3.41.0"},"publisher-location":"Cham","reference-count":51,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030773915"},{"type":"electronic","value":"9783030773922"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-77392-2_1","type":"book-chapter","created":{"date-parts":[[2021,7,2]],"date-time":"2021-07-02T23:06:05Z","timestamp":1625267165000},"page":"3-21","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Authentication Management of Home IoT Devices"],"prefix":"10.1007","author":[{"given":"Aniqa","family":"Alam","sequence":"first","affiliation":[]},{"given":"Heather","family":"Molyneaux","sequence":"additional","affiliation":[]},{"given":"Elizabeth","family":"Stobert","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,3]]},"reference":[{"unstructured":"Alqhatani, A., Lipford, H.R.: There is nothing that I need to keep secret: sharing practices and concerns of wearable fitness data. In: Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019) (2019)","key":"1_CR1"},{"unstructured":"Behm, S., Deetjen, U., Kaniyar, S., Methner, N., M\u00fcnstermann, B.: Digital ecosystems for insurers: Opportunities through the internet of things. McKinsey (Feb 2019)","key":"1_CR2"},{"unstructured":"Bilton, N.: Nest thermostat glitch leaves users in the cold. The New York Times (Jan 2016)","key":"1_CR3"},{"unstructured":"Blumtritt, C.: Smart Home - Number of Households in the Segment Smart Home Worldwide 2024 (2020). www.statista.com\/forecasts\/887613\/number-of-smart-homes-in-thesmart- home-market-worldwide","key":"1_CR4"},{"doi-asserted-by":"crossref","unstructured":"Brush, A.B., Lee, B., Mahajan, R., Agarwal, S., Saroiu, S., Dixon, C.: Home automation in the wild: challenges and opportunities. In: proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 2115\u20132124 (2011)","key":"1_CR5","DOI":"10.1145\/1978942.1979249"},{"doi-asserted-by":"crossref","unstructured":"Butler, D.J., Huang, J., Roesner, F., Cakmak, M.: The privacy-utility tradeoff for remotely teleoperated robots. In: Proceedings of the Tenth Annual ACM\/IEEE International Conference on Human-Robot Interaction, pp. 27\u201334 (2015)","key":"1_CR6","DOI":"10.1145\/2696454.2696484"},{"doi-asserted-by":"crossref","unstructured":"De Carn\u00e9 de Carnavalet, X., Mannan, M.: From very weak to very strong: analyzing password-strength meters. In: Network and Distributed System Security Symposium (NDSS 2014). Internet Society (2014)","key":"1_CR7","DOI":"10.14722\/ndss.2014.23268"},{"doi-asserted-by":"crossref","unstructured":"Choe, E.K., Consolvo, S., Jung, J., Harrison, B., Patel, S.N., Kientz, J.A.: Investigating receptiveness to sensing and inference in the home using sensor proxies. In: Proceedings of the 2012 ACM Conference on Ubiquitous Computing, pp. 61\u201370 (2012)","key":"1_CR8","DOI":"10.1145\/2370216.2370226"},{"doi-asserted-by":"crossref","unstructured":"Courtney, K.L., Demeris, G., Rantz, M., Skubic, M.: Needing smart home technologies: the perspectives of older adults in continuing care retirement communities (2008)","key":"1_CR9","DOI":"10.14236\/jhi.v16i3.694"},{"key":"1_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/978-3-319-18425-8_9","volume-title":"End-User Development","author":"A Demeure","year":"2015","unstructured":"Demeure, A., Caffiau, S., Elias, E., Roux, C.: Building and using home automation systems: a field study. In: D\u00edaz, P., Pipek, V., Ardito, C., Jensen, C., Aedo, I., Boden, A. (eds.) IS-EUD 2015. LNCS, vol. 9083, pp. 125\u2013140. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-18425-8_9"},{"issue":"1","key":"1_CR11","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1145\/2398356.2398377","volume":"56","author":"T Denning","year":"2013","unstructured":"Denning, T., Kohno, T., Levy, H.M.: Computer security and the modern home. Commun. ACM 56(1), 94\u2013103 (2013)","journal-title":"Commun. ACM"},{"issue":"5","key":"1_CR12","doi-asserted-by":"publisher","first-page":"1141","DOI":"10.3390\/s19051141","volume":"19","author":"M El-Hajj","year":"2019","unstructured":"El-Hajj, M., Fadlallah, A., Chamoun, M., Serhrouchni, A.: A survey of internet of things (IoT) authentication schemes. Sensors 19(5), 1141 (2019)","journal-title":"Sensors"},{"doi-asserted-by":"crossref","unstructured":"Geeng, C., Roesner, F.: Who\u2019s in control? interactions in multi-user smart homes. In: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, pp. 1\u201313 (2019)","key":"1_CR13","DOI":"10.1145\/3290605.3300498"},{"doi-asserted-by":"crossref","unstructured":"Geneiatakis, D., Kounelis, I., Neisse, R., Nai-Fovino, I., Steri, G., Baldini, G.: Security and privacy issues for an IoT based smart home. In: 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), pp. 1292\u20131297. IEEE (2017)","key":"1_CR14","DOI":"10.23919\/MIPRO.2017.7973622"},{"key":"1_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1007\/978-3-030-50309-3_26","volume-title":"HCI for Cybersecurity, Privacy and Trust","author":"JM Haney","year":"2020","unstructured":"Haney, J.M., Furman, S.M., Acar, Y.: Smart home security and privacy mitigations: consumer perceptions, practices, and challenges. In: Moallem, A. (ed.) HCII 2020. LNCS, vol. 12210, pp. 393\u2013411. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-50309-3_26"},{"unstructured":"He, W., et al.: Rethinking access control and authentication for the home internet of things (IoT). In: 27th USENIX Security Symposium (USENIX Security 18), pp. 255\u2013272 (2018)","key":"1_CR16"},{"unstructured":"He, W., Hainline, J., Padhi, R., Ur, B.: Clap on, clap off: usability of authentication methods in the smart home. In: Proceedings of the Interactive Workshop on the Human Aspect of Smarthome Security and Privacy (2018)","key":"1_CR17"},{"doi-asserted-by":"crossref","unstructured":"He, W., Martinez, J., Padhi, R., Zhang, L., Ur, B.: When smart devices are stupid: negative experiences using home smart devices. In: 2019 IEEE Security and Privacy Workshops (SPW), pp. 150\u2013155. IEEE (2019)","key":"1_CR18","DOI":"10.1109\/SPW.2019.00036"},{"unstructured":"Hill, K.: \u2018baby monitor hack\u2019could happen to 40,000 other foscam users (2013)","key":"1_CR19"},{"key":"1_CR20","doi-asserted-by":"publisher","first-page":"1028","DOI":"10.1016\/j.future.2017.08.035","volume":"92","author":"MA Jan","year":"2019","unstructured":"Jan, M.A., Khan, F., Alam, M., Usman, M.: A payload-based mutual authentication scheme for internet of things. Future Gener. Comput. Syst. 92, 1028\u20131039 (2019)","journal-title":"Future Gener. Comput. Syst."},{"doi-asserted-by":"crossref","unstructured":"Komanduri, S., et al.: Of passwords and people: measuring the effect of password-composition policies. In: Proceedings of the Sigchi Conference on Human Factors in Computing Systems, pp. 2595\u20132604 (2011)","key":"1_CR21","DOI":"10.1145\/1978942.1979321"},{"doi-asserted-by":"crossref","unstructured":"Lee, H., Kobsa, A.: Understanding user privacy in internet of things environments. In: 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), pp. 407\u2013412. IEEE (2016)","key":"1_CR22","DOI":"10.1109\/WF-IoT.2016.7845392"},{"issue":"3","key":"1_CR23","doi-asserted-by":"publisher","first-page":"44","DOI":"10.3390\/info7030044","volume":"7","author":"H Lin","year":"2016","unstructured":"Lin, H., Bergmann, N.W.: IoT privacy and security challenges for smart home environments. Information 7(3), 44 (2016)","journal-title":"Information"},{"doi-asserted-by":"crossref","unstructured":"Locasto, M.E., Massimi, M., DePasquale, P.J.: Security and privacy considerations in digital death. In: Proceedings of the 2011 New Security Paradigms Workshop, pp. 1\u201310 (2011)","key":"1_CR24","DOI":"10.1145\/2073276.2073278"},{"doi-asserted-by":"crossref","unstructured":"Maclean, R., Ophoff, J.: Determining key factors that lead to the adoption of password managers. In: 2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC), pp. 1\u20137. IEEE (2018)","key":"1_CR25","DOI":"10.1109\/ICONIC.2018.8601223"},{"unstructured":"McLean, A.: IoT malware and ransomware attacks on the incline: Intel security (2015)","key":"1_CR26"},{"doi-asserted-by":"crossref","unstructured":"McReynolds, E., Hubbard, S., Lau, T., Saraf, A., Cakmak, M., Roesner, F.: Toys that listen: a study of parents, children, and internet-connected toys. In: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, pp. 5197\u20135207 (2017)","key":"1_CR27","DOI":"10.1145\/3025453.3025735"},{"key":"1_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/978-3-642-31205-2_10","volume-title":"Pervasive Computing","author":"S Mennicken","year":"2012","unstructured":"Mennicken, S., Huang, E.M.: Hacking the natural habitat: an in-the-wild study of smart homes, their development, and the people who live in them. In: Kay, J., Lukowicz, P., Tokuda, H., Olivier, P., Kr\u00fcger, A. (eds.) Pervasive 2012. LNCS, vol. 7319, pp. 143\u2013160. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-31205-2_10"},{"unstructured":"Naeini, P.E., et al.: Privacy expectations and preferences in an IoT world. In: Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017), pp. 399\u2013412 (2017)","key":"1_CR29"},{"issue":"2","key":"1_CR30","doi-asserted-by":"publisher","first-page":"1184","DOI":"10.1109\/JIOT.2018.2812239","volume":"5","author":"O Novo","year":"2018","unstructured":"Novo, O.: Blockchain meets IoT: an architecture for scalable access management in IoT. IEEE Internet Things J. 5(2), 1184\u20131195 (2018)","journal-title":"IEEE Internet Things J."},{"unstructured":"Oluwafemi, T., Kohno, T., Gupta, S., Patel, S.: Experimental security analyses of non-networked compact fluorescent lamps: a case study of home automation security. In: LASER 2013, pp. 13\u201324 (2013)","key":"1_CR31"},{"doi-asserted-by":"crossref","unstructured":"Seymour, W., Kraemer, M.J., Binns, R., Van Kleek, M.: Informing the design of privacy-empowering tools for the connected home. In: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, pp. 1\u201314 (2020)","key":"1_CR32","DOI":"10.1145\/3313831.3376264"},{"unstructured":"Shane, S., Rosenberg, M., Lehren, A.W.: WikiLeaks releases trove of alleged CIA hacking documents. New York Times (2017)","key":"1_CR33"},{"doi-asserted-by":"crossref","unstructured":"Simpson, A.K., Roesner, F., Kohno, T.: Securing vulnerable home IoT devices with an in-hub security manager. In: 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), pp. 551\u2013556. IEEE (2017)","key":"1_CR34","DOI":"10.1109\/PERCOMW.2017.7917622"},{"unstructured":"Stobert, E., Biddle, R.: Authentication in the home. Proc. HUPS (2013)","key":"1_CR35"},{"unstructured":"Tabassum, M., Kosinski, T., Lipford, H.R.: \u201cI don\u2019t own the data\u201d: end user perceptions of smart home device data practices and risks. In: Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019) (2019)","key":"1_CR36"},{"unstructured":"Tian, Y., et al.: Smartauth: user-centered authorization for the internet of things. In: 26th USENIX Security Symposium (USENIX Security 2017), pp. 361\u2013378 (2017)","key":"1_CR37"},{"doi-asserted-by":"crossref","unstructured":"Townsend, D., Knoefel, F., Goubran, R.: Privacy versus autonomy: a tradeoff model for smart home monitoring technologies. In: 2011 Annual International Conference of the IEEE Engineering in Medicine and Biology Society, pp. 4749\u20134752. IEEE (2011)","key":"1_CR38","DOI":"10.1109\/IEMBS.2011.6091176"},{"doi-asserted-by":"crossref","unstructured":"Ur, B., et al.: Design and evaluation of a data-driven password meter. In: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, pp. 3775\u20133786 (2017)","key":"1_CR39","DOI":"10.1145\/3025453.3026050"},{"unstructured":"Ur, B., Jung, J., Schechter, S.: The current state of access control for smart devices in homes. In: Workshop on Home Usable Privacy and Security (HUPS), vol. 29, pp. 209\u2013218. HUPS 2014 (2013)","key":"1_CR40"},{"unstructured":"Ur, B., et al.: \u201cI added\u2018!\u2019at the end to make it secure\u201d: observing password creation in the lab. In: Eleventh Symposium On Usable Privacy and Security (SOUPS 2015), pp. 123\u2013140 (2015)","key":"1_CR41"},{"doi-asserted-by":"crossref","unstructured":"Wang, Q., Hassan, W.U., Bates, A., Gunter, C.: Fear and logging in the internet of things. In: Network and Distributed Systems Symposium (2018)","key":"1_CR42","DOI":"10.14722\/ndss.2018.23282"},{"unstructured":"Wheeler, D.L.: zxcvbn: low-budget password strength estimation. In: 25th USENIX Security Symposium (USENIX Security 2016), pp. 157\u2013173 (2016)","key":"1_CR43"},{"doi-asserted-by":"crossref","unstructured":"Woo, J.B., Lim, Y.K.: User experience in do-it-yourself-style smart homes. In: Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing, pp. 779\u2013790 (2015)","key":"1_CR44","DOI":"10.1145\/2750858.2806063"},{"doi-asserted-by":"crossref","unstructured":"Worthy, P., Matthews, B., Viller, S.: Trust me: doubts and concerns living with the internet of things. In: Proceedings of the 2016 ACM Conference on Designing Interactive Systems, pp. 427\u2013434 (2016)","key":"1_CR45","DOI":"10.1145\/2901790.2901890"},{"key":"1_CR46","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1007\/978-3-319-45741-3_16","volume-title":"Computer Security \u2013 ESORICS 2016","author":"DJ Wu","year":"2016","unstructured":"Wu, D.J., Taly, A., Shankar, A., Boneh, D.: Privacy, discovery, and authentication for the internet of things. In: Askoxylakis, I., Ioannidis, S., Katsikas, S., Meadows, C. (eds.) ESORICS 2016, Part II. LNCS, vol. 9879, pp. 301\u2013319. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-45741-3_16"},{"doi-asserted-by":"crossref","unstructured":"Yu, T., Sekar, V., Seshan, S., Agarwal, Y., Xu, C.: Handling a trillion (unfixable) flaws on a billion devices: rethinking network security for the internet-of-things. In: Proceedings of the 14th ACM Workshop on Hot Topics in Networks, pp. 1\u20137 (2015)","key":"1_CR47","DOI":"10.1145\/2834050.2834095"},{"unstructured":"Zeng, E., Mare, S., Roesner, F.: End user security and privacy concerns with smart homes. In: Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017), pp. 65\u201380 (2017)","key":"1_CR48"},{"unstructured":"Zeng, E., Roesner, F.: Understanding and improving security and privacy in multi-user smart homes: a design exploration and in-home user study. In: 28th USENIX Security Symposium (USENIX Security 19), pp. 159\u2013176 (2019)","key":"1_CR49"},{"doi-asserted-by":"crossref","unstructured":"Zhang-Kennedy, L., Chiasson, S., Biddle, R.: Password advice shouldn\u2019t be boring: visualizing password guessing attacks. In: 2013 APWG eCrime Researchers Summit, pp. 1\u201311. IEEE (2013)","key":"1_CR50","DOI":"10.1109\/eCRS.2013.6805770"},{"issue":"CSCW","key":"1_CR51","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3274469","volume":"2","author":"S Zheng","year":"2018","unstructured":"Zheng, S., Apthorpe, N., Chetty, M., Feamster, N.: User perceptions of smart home IoT privacy. Proc. ACM Hum. Comput. Interact. 2(CSCW), 1\u201320 (2018)","journal-title":"Proc. ACM Hum. Comput. Interact."}],"container-title":["Lecture Notes in Computer Science","HCI for Cybersecurity, Privacy and Trust"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-77392-2_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T22:07:00Z","timestamp":1751494020000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-77392-2_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030773915","9783030773922"],"references-count":51,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-77392-2_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"3 July 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 July 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 July 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2021.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}