{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T10:45:34Z","timestamp":1761129934103,"version":"3.40.3"},"publisher-location":"Cham","reference-count":42,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030784584"},{"type":"electronic","value":"9783030784591"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-78459-1_11","type":"book-chapter","created":{"date-parts":[[2021,6,19]],"date-time":"2021-06-19T08:03:05Z","timestamp":1624089785000},"page":"154-166","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Categorizing IoT Services According to Security Risks"],"prefix":"10.1007","author":[{"given":"Ostro\u0161ki","family":"Dominik","sequence":"first","affiliation":[]},{"given":"Mikuc","family":"Miljenko","sequence":"additional","affiliation":[]},{"given":"Vukovi\u0107","family":"Marin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,6,20]]},"reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Suresh, P., Daniel, J.V., Parthasarathy, V., Aswathy, R.: A state of the art review on the Internet of Things (ToT) history, technology and fields of deployment. In: 2014 International Conference on Science Engineering and Management Research (ICSEMR), pp. 1\u20138. IEEE (2014)","DOI":"10.1109\/ICSEMR.2014.7043637"},{"key":"11_CR2","unstructured":"Antonakakis, M., et al.: Understanding the Mirai botnet. In: 26th Security Symposium (Security 17), pp. 1093\u20131110 (2017)"},{"key":"11_CR3","unstructured":"Davis, D.B.: ISTR 2019: Internet of Things cyber attacks grow more diverse (2019)"},{"key":"11_CR4","unstructured":"Hassan, W.U., Hussain, S., Bates, A.: Analysis of privacy protections in fitness tracking social networks-or-you can run, but can you hide? In: 27th Security Symposium (Security 18), pp. 497\u2013512 (2018)"},{"key":"11_CR5","unstructured":"Hern, A.: Fitness tracking app Strava gives away location of secret us army bases, January 2018"},{"key":"11_CR6","unstructured":"Common vulnerability scoring system v3.0: Specification document"},{"issue":"20","key":"11_CR7","doi-asserted-by":"publisher","first-page":"5897","DOI":"10.3390\/s20205897","volume":"20","author":"S Pal","year":"2020","unstructured":"Pal, S., Hitchens, M., Rabehaja, T., Mukhopadhyay, S.: Security requirements for the Internet of Things: a systematic approach. Sensors 20(20), 5897 (2020)","journal-title":"Sensors"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Abomhara, M., K\u00f8ien, G.M.: Security and privacy in the Internet of Things: current status and open issues. In: 2014 International Conference on Privacy and Security in Mobile Systems (PRISMS), pp. 1\u20138. IEEE (2014)","DOI":"10.1109\/PRISMS.2014.6970594"},{"key":"11_CR9","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.comnet.2014.11.008","volume":"76","author":"S Sicari","year":"2015","unstructured":"Sicari, S., Rizzardi, A., Grieco, L.A., Coen-Porisini, A.: Security, privacy and trust in Internet of Things: the road ahead. Comput. Netw. 76, 146\u2013164 (2015)","journal-title":"Comput. Netw."},{"key":"11_CR10","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1007\/978-3-642-14478-3_42","volume-title":"Recent Trends in Network Security and Applications","author":"S Babar","year":"2010","unstructured":"Babar, S., Mahalle, P., Stango, A., Prasad, N., Prasad, R.: Proposed security model and threat taxonomy for the Internet of Things (IoT). In: Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D. (eds.) CNSA 2010. CCIS, vol. 89, pp. 420\u2013429. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-14478-3_42"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Sain, M., Kang, Y.J., Lee, H.J.: Survey on security in Internet of Things: state of the art and challenges. In: 2017 19th International Conference on Advanced Communication Technology (ICACT), pp. 699\u2013704. IEEE (2017)","DOI":"10.23919\/ICACT.2017.7890183"},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Bastos, D., Shackleton, M., El-Moussa, F.: Internet of Things: a survey of technologies and security risks in smart home and city environments (2018)","DOI":"10.1049\/cp.2018.0030"},{"key":"11_CR13","doi-asserted-by":"publisher","unstructured":"Davoli, L., Veltri, L., Ferrari, G., Amadei, U.: Internet of Things on power line communications: an experimental performance analysis. In: Kabalci, E., Kabalci, Y. (eds.) Smart Grids and Their Communication Systems. ESIEE, pp. 465\u2013498. Springer, Singapore (2019). https:\/\/doi.org\/10.1007\/978-981-13-1768-2_13","DOI":"10.1007\/978-981-13-1768-2_13"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Suryani, V., et al.: A survey on trust in Internet of Things. In: 2016 8th International Conference on Information Technology and Electrical Engineering (ICITEE), pp. 1\u20136. IEEE (2016)","DOI":"10.1109\/ICITEED.2016.7863238"},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"Alqassem, I.: Privacy and security requirements framework for the Internet of Things (IoT). In: Companion Proceedings of the 36th International Conference on Software Engineering, pp. 739\u2013741 (2014)","DOI":"10.1145\/2591062.2591201"},{"key":"11_CR16","unstructured":"Cviti\u0107, I., Vuji\u0107, M., et al.: Classification of security risks in the IoT environment. Ann. DAAAM Proc. 26(1) (2015)"},{"key":"11_CR17","unstructured":"Owasp: IoT security verification standard (2020)"},{"key":"11_CR18","unstructured":"Owasp: Application security verification standard (2020)"},{"key":"11_CR19","unstructured":"Researcher at Forescout Technologies Inc.: Discovering and defending against vulnerabilities in building automation systems (BAS), June 2020"},{"key":"11_CR20","unstructured":"Case, D.U.: Analysis of the cyber attack on the Ukrainian power grid. Electr. Inf. Shar. Anal. Cent. (E-ISAC) 388 (2016)"},{"key":"11_CR21","unstructured":"Holloway, M"},{"key":"11_CR22","unstructured":"Cimpanu, C.: Cyber-attack hits Utah wind and solar energy provider, October 2019"},{"key":"11_CR23","unstructured":"Huq, N., Vosseler, R., Swimmer, M.: Cyberattacks against intelligent transportation systems. TrendLabs Research Paper (2017)"},{"key":"11_CR24","unstructured":"Rodriguez, J.F.: \u2018You hacked\u2019 appears at muni stations as fare payment system crashes, November 2016"},{"key":"11_CR25","unstructured":"Williams, C.: Hackers hit d.c. police closed-circuit camera network, city officials disclose, January 2017"},{"key":"11_CR26","doi-asserted-by":"crossref","unstructured":"Eykholt, K., et al.: Robust physical-world attacks on deep learning visual classification. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1625\u20131634 (2018)","DOI":"10.1109\/CVPR.2018.00175"},{"key":"11_CR27","unstructured":"Goldman, J.: Cyber attack causes physical damage at German iron plant (2014)"},{"key":"11_CR28","unstructured":"Kaspersky, I.: Threat landscape for industrial automation systems (2019)"},{"key":"11_CR29","unstructured":"Langston, J.: UW researchers hack a teleoperated surgical robot to reveal security flaws (2015)"},{"issue":"2","key":"11_CR30","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1145\/3176402","volume":"61","author":"K Fu","year":"2018","unstructured":"Fu, K., Xu, W.: Risks of trusting the physics of sensors. Commun. ACM 61(2), 20\u201323 (2018)","journal-title":"Commun. ACM"},{"key":"11_CR31","unstructured":"Li, C., Raghunathan, A., Jha, N.K.: Hijacking an insulin pump: security attacks and defenses for a diabetes therapy system. In: 2011 IEEE 13th International Conference on e-Health Networking, Applications and Services, pp. 150\u2013156. IEEE (2011)"},{"key":"11_CR32","doi-asserted-by":"crossref","unstructured":"Halperin, D., et al.: Pacemakers and implantable cardiac defibrillators: software radio attacks and zero-power defenses. In: 2008 IEEE Symposium on Security and Privacy (sp 2008), pp. 129\u2013142. IEEE (2008)","DOI":"10.1109\/SP.2008.31"},{"key":"11_CR33","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/978-3-319-27072-2_5","volume-title":"Future Access Enablers for Ubiquitous and Intelligent Infrastructures","author":"Q Zhang","year":"2015","unstructured":"Zhang, Q., Fitzek, F.H.P.: Mission critical IoT communication in 5G. In: Atanasovski, V., Leon-Garcia, A. (eds.) FABULOUS 2015. LNICST, vol. 159, pp. 35\u201341. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-27072-2_5"},{"issue":"2","key":"11_CR34","doi-asserted-by":"publisher","first-page":"205","DOI":"10.3390\/fi5020205","volume":"5","author":"G Loukas","year":"2013","unstructured":"Loukas, G., Gan, D., Vuong, T.: A review of cyber threats and defence approaches in emergency management. Future Internet 5(2), 205\u2013236 (2013)","journal-title":"Future Internet"},{"key":"11_CR35","doi-asserted-by":"publisher","first-page":"34564","DOI":"10.1109\/ACCESS.2020.2975142","volume":"8","author":"M Gupta","year":"2020","unstructured":"Gupta, M., Abdelsalam, M., Khorsandroo, S., Mittal, S.: Security and privacy in smart farming: challenges and opportunities. IEEE Access 8, 34564\u201334584 (2020)","journal-title":"IEEE Access"},{"key":"11_CR36","unstructured":"Bennett, C.: Russia tied to cyberattack on Ukrainian power grid, February 2016"},{"key":"11_CR37","unstructured":"Abomhara, M., Gerdes, M., K\u00f8ien, G.M.: A stride-based threat model for telehealth systems. NISK J., 82\u201396 (2015)"},{"key":"11_CR38","unstructured":"Alhassan, J.K., Abba, E., Olaniyi, O., Waziri, V.O.: Threat modeling of electronic health systems and mitigating countermeasures. In: International Conference on Information and Communication Technology and Its Applications (ICTA 2016). Federal University of Technology, Minna, Nigeria (2016)"},{"issue":"7","key":"11_CR39","first-page":"953","volume":"15","author":"A Amini","year":"2015","unstructured":"Amini, A., Jamil, N., Ahmad, A., Zaba, M.: Threat modeling approaches for securing cloud computin. JApSc 15(7), 953\u2013967 (2015)","journal-title":"JApSc"},{"key":"11_CR40","doi-asserted-by":"crossref","unstructured":"Lin, X., Zavarsky, P., Ruhl, R., Lindskog, D.: Threat modeling for CSRF attacks. In: 2009 International Conference on Computational Science and Engineering, vol. 3, pp. 486\u2013491. IEEE (2009)","DOI":"10.1109\/CSE.2009.372"},{"key":"11_CR41","series-title":"IFIP \u2014 The International Federation for Information Processing","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/0-387-24486-7_14","volume-title":"Communications and Multimedia Security","author":"D De Cock","year":"2005","unstructured":"De Cock, D., Wouters, K., Schellekens, D., Singelee, D., Preneel, B.: Threat modelling for security tokens in web applications. In: Chadwick, D., Preneel, B. (eds.) CMS 2004. ITIFIP, vol. 175, pp. 183\u2013193. Springer, Boston, MA (2005). https:\/\/doi.org\/10.1007\/0-387-24486-7_14"},{"key":"11_CR42","unstructured":"Meier, J., Mackman, A., Dunner, M., Vasireddy, S., Escamilla, R., Muruka, A.: Threat modeling (2003)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Future Access Enablers for Ubiquitous and Intelligent Infrastructures"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-78459-1_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,15]],"date-time":"2021-07-15T17:34:25Z","timestamp":1626370465000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-78459-1_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030784584","9783030784591"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-78459-1_11","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"20 June 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FABULOUS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Future Access Enablers of Ubiquitous and Intelligent Infrastructures","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 May 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 May 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fabulous2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/fabulous-conf.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EAI Confy +","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"60","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"30","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"50% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}