{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,4]],"date-time":"2025-09-04T13:18:06Z","timestamp":1756991886093,"version":"3.40.3"},"publisher-location":"Cham","reference-count":69,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031223556"},{"type":"electronic","value":"9783031223563"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-22356-3_9","type":"book-chapter","created":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T01:33:46Z","timestamp":1672536826000},"page":"86-100","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Security of IoT Application Layer: Requirements, Threats, and Solutions"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1886-8284","authenticated-orcid":false,"given":"Mahmoud","family":"Abbasi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2249-5425","authenticated-orcid":false,"given":"Marta","family":"Plaza-Hern\u00e1ndez","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4813-4043","authenticated-orcid":false,"given":"Yeray","family":"Mezquita","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,1]]},"reference":[{"issue":"15","key":"9_CR1","doi-asserted-by":"publisher","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L Atzori","year":"2010","unstructured":"Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 2787\u20132805 (2010)","journal-title":"Comput. Netw."},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Gupta, S., Ranga, V., Agrawal, P.: Epilnet: a novel approach to IoT based epileptic seizure prediction and diagnosis system using artificial intelligence. arXiv preprint arXiv:2111.03265 (2021)","DOI":"10.14201\/ADCAIJ2021104435452"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"de Alba, F.L., Gonz\u00e1lez-Briones, A., Chamoso, P., Pinto, T., Vale, Z., Corchado, J.M.: A P2P electricity negotiation agent systems in urban smart grids. In: International Symposium on Distributed Computing and Artificial Intelligence, pp. 97\u2013106. Springer, Berlin (2020)","DOI":"10.1007\/978-3-030-53829-3_9"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Unzueta, M., Bartolom\u00e9, A., Hern\u00e1ndez, G., Parra, J., Chamoso, P.: System for recommending financial products adapted to the user\u2019s profile. In: International Symposium on Ambient Intelligence, pp. 117\u2013126. Springer, Berlin (2020)","DOI":"10.1007\/978-3-030-58356-9_12"},{"key":"9_CR5","unstructured":"Cisco, U.: Cisco Annual Internet Report (2018\u20132023) White Paper. Cisco, San Jose, CA, USA (2020)"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Ali, I., Hussain, T., Khan, K., Iqbal, A., Perviz, F.: The impact of IEEE 802.11 contention window on the performance of transmission control protocol in mobile ad-hoc network. ADCAIJ: Adv. Distrib. Comput. Artif. Intell. J. 9(3), 29\u201348 (2020)","DOI":"10.14201\/ADCAIJ2020932948"},{"key":"9_CR7","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1016\/j.comcom.2020.01.059","volume":"152","author":"P Chamoso","year":"2020","unstructured":"Chamoso, P., Gonz\u00e1lez-Briones, A., De La Prieta, F., Venyagamoorthy, G.K., Corchado, J.M.: Smart city as a distributed platform: toward a system for citizen-oriented management. Comput. Commun. 152, 323\u2013332 (2020)","journal-title":"Comput. Commun."},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Gonz\u00e1lez-Briones, A., Castellanos-Garz\u00f3n, J.A., Mezquita Mart\u00edn, Y., Prieto, J., Corchado, J.M.: A framework for knowledge discovery from wireless sensor networks in rural environments: a crop irrigation systems case study. Wirel. Commun. Mob. Comput. 2018 (2018)","DOI":"10.1155\/2018\/6089280"},{"issue":"6","key":"9_CR9","doi-asserted-by":"publisher","first-page":"806","DOI":"10.3390\/en10060806","volume":"10","author":"O Abrishambaf","year":"2017","unstructured":"Abrishambaf, O., Faria, P., Gomes, L., Sp\u00ednola, J., Vale, Z., Corchado, J.M.: Implementation of a real-time microgrid simulation platform based on centralized and distributed management. Energies 10(6), 806 (2017)","journal-title":"Energies"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Gon\u00e7alves, C., Rebelo, D., Silva, F., Analide, C.: Sleep performance and physical activity estimation from multisensor time series sleep environment data. In: International Symposium on Ambient Intelligence, pp. 166\u2013176. Springer, Berlin (2020)","DOI":"10.1007\/978-3-030-58356-9_17"},{"key":"9_CR11","doi-asserted-by":"publisher","first-page":"965","DOI":"10.1016\/j.future.2019.09.042","volume":"102","author":"R Casado-Vara","year":"2020","unstructured":"Casado-Vara, R., Martin-del Rey, A., Affes, S., Prieto, J., Corchado, J.M.: IoT network slicing on virtual layers of homogeneous data for improved algorithm operation in smart buildings. Future Gener. Comput. Syst. 102, 965\u2013977 (2020)","journal-title":"Future Gener. Comput. Syst."},{"issue":"13","key":"9_CR12","doi-asserted-by":"publisher","first-page":"10452","DOI":"10.1109\/JIOT.2021.3060508","volume":"8","author":"L Da Xu","year":"2021","unstructured":"Da Xu, L., Lu, Y., Li, L.: Embedding blockchain technology into IoT for security: a survey. IEEE Internet Things J. 8(13), 10452\u201310473 (2021)","journal-title":"IEEE Internet Things J."},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Raufa, A., Abdullaha, A.H., Mateenb, A., Ashrafb, M.: Secure data access control with perception reasoning. ADCAIJ: Adv. Distrib. Comput. Artif. Intell. J. 13 (2018)","DOI":"10.14201\/ADCAIJ2018711328"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Swessi, D., Idoudi, H.: A survey on internet-of-things security: threats and emerging countermeasures. Wirel. Pers. Commun. 1\u201336 (2022)","DOI":"10.1007\/s11277-021-09420-0"},{"key":"9_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2020.103770","volume":"94","author":"A Shahraki","year":"2020","unstructured":"Shahraki, A., Abbasi, M., Haugen, \u00d8.: Boosting algorithms for network intrusion detection: a comparative evaluation of real adaboost, gentle adaboost and modest adaboost. Eng. Appl. Artif. Intell. 94, 103770 (2020)","journal-title":"Eng. Appl. Artif. Intell."},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Zhang, Z.-K., Cho, M.C.Y., Wang, C.-W., Hsu, C.-W., Chen, C.-K., Shieh, S.: IoT security: ongoing challenges and research opportunities. In: 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications, pp. 230\u2013234. IEEE (2014)","DOI":"10.1109\/SOCA.2014.58"},{"issue":"3","key":"9_CR17","doi-asserted-by":"publisher","first-page":"1383","DOI":"10.1007\/s11277-020-07108-5","volume":"112","author":"C Sobin","year":"2020","unstructured":"Sobin, C.: A survey on architecture, protocols and challenges in IoT. Wirel. Pers. Commun. 112(3), 1383\u20131429 (2020)","journal-title":"Wirel. Pers. Commun."},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"Hern\u00e1ndez, G., Rodr\u00edguez, S., Gonz\u00e1lez, A., Corchado, J.M., Prieto, J.: Video analysis system using deep learning algorithms. In: International Symposium on Ambient Intelligence, pp. 186\u2013199. Springer, Berlin (2020)","DOI":"10.1007\/978-3-030-58356-9_19"},{"key":"9_CR19","doi-asserted-by":"publisher","first-page":"8202","DOI":"10.1109\/ACCESS.2020.2964280","volume":"8","author":"A Nauman","year":"2020","unstructured":"Nauman, A., Qadri, Y.A., Amjad, M., Zikria, Y.B., Afzal, M.K., Kim, S.W.: Multimedia internet of things: a comprehensive survey. IEEE Access 8, 8202\u20138250 (2020)","journal-title":"IEEE Access"},{"key":"9_CR20","doi-asserted-by":"crossref","unstructured":"Fatras, N., Ma, Z., J\u00f8rgensen, B.N.: System architecture modelling framework applied to the integration of electric vehicles in the grid. In: International Symposium on Distributed Computing and Artificial Intelligence, pp. 205\u2013209. Springer, Berlin (2020)","DOI":"10.1007\/978-3-030-53829-3_22"},{"key":"9_CR21","unstructured":"Sakarkar, G., Kolekar, M.K.H., Paithankar, K., Gaurav, G.P., Dutta, P., Chaturvedi, R., Kumar, S., et al.: Advance approach for detection of DNS tunneling attack from network packets using deep learning algorithms (2021)"},{"key":"9_CR22","doi-asserted-by":"crossref","unstructured":"Plaza-Hernandez, M., Sitt\u00f3n-Candanedo, I., Alonso, R.S., Mart\u00ednez-de Iturrate, L.C., Prieto, J., Kravari, K., Kosmanis, T., Katranas, G., Silva, M.P., Corchado, J.M.: Edge computing and internet of things based platform to improve the quality of life of the silver economy on leisure cruise ships. In: 2021 International Symposium on Computer Science and Intelligent Controls (ISCSIC), pp. 159\u2013163. IEEE (2021)","DOI":"10.1109\/ISCSIC54682.2021.00038"},{"key":"9_CR23","doi-asserted-by":"crossref","unstructured":"Salazar, G., Figueiredo, L., Ferreira, N.: Towards the development of IoT protocols. In: International Symposium on Ambient Intelligence, pp. 146\u2013155. Springer, Berlin (2020)","DOI":"10.1007\/978-3-030-58356-9_15"},{"key":"9_CR24","doi-asserted-by":"crossref","unstructured":"Zahoor, S., Mir, R.N.: Resource management in pervasive internet of things: a survey. J. King Saud Univ.-Comput. Inf. Sci. 33(8), 921\u2013935 (2021)","DOI":"10.1016\/j.jksuci.2018.08.014"},{"key":"9_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102494","volume":"112","author":"AE Omolara","year":"2022","unstructured":"Omolara, A.E., Alabdulatif, A., Abiodun, O.I., Alawida, M., Alabdulatif, A., Arshad, H., et al.: The internet of things security: a survey encompassing unexplored areas and new insights. Comput. Secur. 112, 102494 (2022)","journal-title":"Comput. Secur."},{"key":"9_CR26","doi-asserted-by":"crossref","unstructured":"Alonso, R.S.: Low-power distributed AI and IoT for measuring lamb\u2019s milk ingestion and predicting meat yield and malnutrition diseases. In: International Symposium on Ambient Intelligence, pp. 251\u2013257. Springer, Berlin (2020)","DOI":"10.1007\/978-3-030-58356-9_26"},{"key":"9_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.107094","volume":"169","author":"MZ Gunduz","year":"2020","unstructured":"Gunduz, M.Z., Das, R.: Cyber-security on smart grid: threats and potential solutions. Comput. Netw. 169, 107094 (2020)","journal-title":"Comput. Netw."},{"issue":"1","key":"9_CR28","doi-asserted-by":"publisher","first-page":"707","DOI":"10.1109\/TII.2021.3074915","volume":"18","author":"MB Gough","year":"2021","unstructured":"Gough, M.B., Santos, S.F., AlSkaif, T., Javadi, M.S., Castro, R., Catal\u00e3o, J.P.: Preserving privacy of smart meter data in a smart grid environment. IEEE Trans. Ind. Inform. 18(1), 707\u2013718 (2021)","journal-title":"IEEE Trans. Ind. Inform."},{"key":"9_CR29","doi-asserted-by":"publisher","first-page":"3660","DOI":"10.1109\/ACCESS.2020.3047960","volume":"9","author":"F Alshehri","year":"2020","unstructured":"Alshehri, F., Muhammad, G.: A comprehensive survey of the internet of things (IoT) and AI-based smart healthcare. IEEE Access 9, 3660\u20133678 (2020)","journal-title":"IEEE Access"},{"issue":"2","key":"9_CR30","doi-asserted-by":"publisher","first-page":"1239","DOI":"10.17762\/turcomat.v12i2.1179","volume":"12","author":"R Hemalatha","year":"2021","unstructured":"Hemalatha, R., et al.: A survey: security challenges of VANET and their current solution. Turk. J. Comput. Math. Educ. (TURCOMAT) 12(2), 1239\u20131244 (2021)","journal-title":"Turk. J. Comput. Math. Educ. (TURCOMAT)"},{"key":"9_CR31","doi-asserted-by":"crossref","unstructured":"Ali, I., Chen, Y., Faisal, M., Li, M.: Certificateless signature-based authentication scheme for vehicle-to-infrastructure communications using bilinear pairing. In: Efficient and Provably Secure Schemes for Vehicular Ad-Hoc Networks, pp. 91\u2013119. Springer, Berlin (2022)","DOI":"10.1007\/978-981-16-8586-6_5"},{"issue":"2","key":"9_CR32","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1109\/JAS.2020.1003536","volume":"8","author":"X Yang","year":"2021","unstructured":"Yang, X., Shu, L., Chen, J., Ferrag, M.A., Wu, J., Nurellari, E., Huang, K.: A survey on smart agriculture: development modes, technologies, and security and privacy challenges. IEEE\/CAA J. Automatica Sin. 8(2), 273\u2013302 (2021)","journal-title":"IEEE\/CAA J. Automatica Sin."},{"key":"9_CR33","doi-asserted-by":"publisher","first-page":"152351","DOI":"10.1109\/ACCESS.2020.3016937","volume":"8","author":"T Gebremichael","year":"2020","unstructured":"Gebremichael, T., Ledwaba, L.P.I., Eldefrawy, M.H., Hancke, G.P., Pereira, N., Gidlund, M., Akerberg, J.: Security and privacy in the industrial internet of things: current standards and future challenges. IEEE Access 8, 152351\u2013152366 (2020)","journal-title":"IEEE Access"},{"key":"9_CR34","doi-asserted-by":"crossref","unstructured":"Agrawal, N., Kumar, R.: Security perspective analysis of industrial cyber physical systems (I-CPS): a decade-wide survey. ISA Trans. (2022)","DOI":"10.1016\/j.isatra.2022.03.018"},{"key":"9_CR35","doi-asserted-by":"crossref","unstructured":"Dhirani, L.L., Armstrong, E., Newe, T.: Industrial IoT, cyber threats, and standards landscape: evaluation and roadmap. Sensors 21(11) (2021) [Online]. Available: www.mdpi.com\/1424-8220\/21\/11\/3901","DOI":"10.3390\/s21113901"},{"issue":"10","key":"9_CR36","doi-asserted-by":"publisher","first-page":"5187","DOI":"10.1007\/s11227-018-2524-1","volume":"74","author":"F Al-Turjman","year":"2018","unstructured":"Al-Turjman, F., Alturjman, S.: Confidential smart-sensing framework in the IoT era. J. Supercomput. 74(10), 5187\u20135198 (2018). https:\/\/doi.org\/10.1007\/s11227-018-2524-1","journal-title":"J. Supercomput."},{"key":"9_CR37","doi-asserted-by":"crossref","unstructured":"Casado-Vara, R., de la Prieta, F., Prieto, J., Corchado, J.M.: Blockchain framework for IoT data quality via edge computing. In: Proceedings of the 1st Workshop on Blockchain-Enabled Networked Sensor Systems, pp. 19\u201324 (2018)","DOI":"10.1145\/3282278.3282282"},{"key":"9_CR38","doi-asserted-by":"crossref","unstructured":"Machado, C., Fr\u00f6hlich, A.A.M.: IoT data integrity verification for cyber-physical systems using blockchain. In: 2018 IEEE 21st International Symposium on Real-Time Distributed Computing (ISORC), pp. 83\u201390. IEEE (2018)","DOI":"10.1109\/ISORC.2018.00019"},{"key":"9_CR39","doi-asserted-by":"publisher","first-page":"11972","DOI":"10.1109\/ACCESS.2019.2892905","volume":"7","author":"R Casado-Vara","year":"2019","unstructured":"Casado-Vara, R., Novais, P., Gil, A.B., Prieto, J., Corchado, J.M.: Distributed continuous-time fault estimation control for multiple devices in IoT networks. IEEE Access 7, 11972\u201311984 (2019)","journal-title":"IEEE Access"},{"key":"9_CR40","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2018.07.009","volume":"153","author":"J Yan","year":"2020","unstructured":"Yan, J., Liu, J., Tseng, F.-M.: An evaluation system based on the self-organizing system framework of smart cities: a case study of smart transportation systems in China. Technol. Forecast. Soc. Change 153, 119371 (2020)","journal-title":"Technol. Forecast. Soc. Change"},{"key":"9_CR41","doi-asserted-by":"publisher","first-page":"101879","DOI":"10.1109\/ACCESS.2019.2930962","volume":"7","author":"A Algarni","year":"2019","unstructured":"Algarni, A.: A survey and classification of security and privacy research in smart healthcare systems. IEEE Access 7, 101879\u2013101894 (2019)","journal-title":"IEEE Access"},{"key":"9_CR42","unstructured":"Salman, T., Jain, R.: A survey of protocols and standards for internet of things. arXiv preprint arXiv:1903.11549 (2019)"},{"key":"9_CR43","doi-asserted-by":"crossref","unstructured":"Mezquita, Y., Gil-Gonz\u00e1lez, A.B., Mart\u00edn del Rey, A., Prieto, J., Corchado, J.M.: Towards a blockchain-based peer-to-peer energy marketplace. Energies 15(9), 3046 (2022)","DOI":"10.3390\/en15093046"},{"key":"9_CR44","doi-asserted-by":"publisher","first-page":"29641","DOI":"10.1109\/ACCESS.2021.3058628","volume":"9","author":"H Zhang","year":"2021","unstructured":"Zhang, H., Liu, B., Wu, H.: Smart grid cyber-physical attack and defense: a review. IEEE Access 9, 29641\u201329659 (2021)","journal-title":"IEEE Access"},{"key":"9_CR45","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2021.107211","volume":"93","author":"S Sengan","year":"2021","unstructured":"Sengan, S., Subramaniyaswamy, V., Indragandhi, V., Velayutham, P., Ravi, L.: Detection of false data cyber-attacks for the assessment of security in smart grid using deep learning. Comput. Electr. Eng. 93, 107211 (2021)","journal-title":"Comput. Electr. Eng."},{"key":"9_CR46","doi-asserted-by":"crossref","unstructured":"Zavala-D\u00edaz, J., Reyes-Archundia, E., Olivares-Rojas, J.C., Ch\u00e1vez-B\u00e1ez, M.V., Guti\u00e9rrez-Gnecchi, J.A., M\u00e9ndez-Pati\u00f1o, A.: Study of public key cryptography techniques for authentication in embedded devices for smart grids. In: 2021 IEEE International Autumn Meeting on Power, Electronics and Computing (ROPEC), vol. 5, pp. 1\u20135. IEEE (2021)","DOI":"10.1109\/ROPEC53248.2021.9668104"},{"key":"9_CR47","doi-asserted-by":"crossref","unstructured":"Pirayesh, H., Zeng, H.: Jamming attacks and anti-jamming strategies in wireless networks: a comprehensive survey. IEEE Commun. Surv. Tutorials (2022)","DOI":"10.1109\/COMST.2022.3159185"},{"key":"9_CR48","doi-asserted-by":"crossref","unstructured":"Ghayvat, H., Pandya, S.N., Bhattacharya, P., Zuhair, M., Rashid, M., Hakak, S., Dev, K.: CP-BDHCA: blockchain-based confidentiality-privacy preserving big data scheme for healthcare clouds and applications. IEEE J. Biomed. Health Inf. (2021)","DOI":"10.1109\/JBHI.2021.3097237"},{"issue":"5","key":"9_CR49","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-019-1251-3","volume":"43","author":"K Renuka","year":"2019","unstructured":"Renuka, K., Kumari, S., Li, X.: Design of a secure three-factor authentication scheme for smart healthcare. J. Med. Syst. 43(5), 1\u201312 (2019)","journal-title":"J. Med. Syst."},{"issue":"2","key":"9_CR50","doi-asserted-by":"publisher","first-page":"971","DOI":"10.1109\/JIOT.2019.2947419","volume":"7","author":"C Xu","year":"2019","unstructured":"Xu, C., Yang, H.H., Wang, X., Quek, T.Q.: Optimizing information freshness in computing-enabled IoT networks. IEEE Internet Things J. 7(2), 971\u2013985 (2019)","journal-title":"IEEE Internet Things J."},{"key":"9_CR51","doi-asserted-by":"crossref","unstructured":"Maimaris, A., Papageorgiou, G.: A review of intelligent transportation systems from a communications technology perspective. In: 2016 IEEE 19th International Conference on Intelligent Transportation Systems (ITSC), pp. 54\u201359. IEEE (2016)","DOI":"10.1109\/ITSC.2016.7795531"},{"key":"9_CR52","unstructured":"Behzadan, V., Munir, A.: Models and framework for adversarial attacks on complex adaptive systems. arXiv preprint arXiv:1709.04137 (2017)"},{"key":"9_CR53","doi-asserted-by":"crossref","unstructured":"Azam, F., Kumar, S., Yadav, K., Priyadarshi, N., Padmanaban, S.: An outline of the security challenges in VANET. In: 2020 IEEE 7th Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON), pp. 1\u20136. IEEE (2020)","DOI":"10.1109\/UPCON50219.2020.9376518"},{"key":"9_CR54","doi-asserted-by":"crossref","unstructured":"Verma, S.B., Verma, S.B., et al.: Secure data transmission in BPEL (business process execution language) (2020)","DOI":"10.14201\/ADCAIJ202093105117"},{"key":"9_CR55","doi-asserted-by":"crossref","unstructured":"Shen, X., Lu, Y., Zhang, Y., Liu, X., Zhang, L.: An innovative data integrity verification scheme in the internet of things assisted information exchange in transportation systems. Cluster Comput. 1\u201313 (2022)","DOI":"10.1007\/s10586-021-03471-5"},{"key":"9_CR56","doi-asserted-by":"publisher","first-page":"34564","DOI":"10.1109\/ACCESS.2020.2975142","volume":"8","author":"M Gupta","year":"2020","unstructured":"Gupta, M., Abdelsalam, M., Khorsandroo, S., Mittal, S.: Security and privacy in smart farming: challenges and opportunities. IEEE Access 8, 34564\u201334584 (2020)","journal-title":"IEEE Access"},{"issue":"9","key":"9_CR57","doi-asserted-by":"publisher","first-page":"2288","DOI":"10.1109\/TIFS.2019.2895955","volume":"14","author":"S Salamatian","year":"2019","unstructured":"Salamatian, S., Huleihel, W., Beirami, A., Cohen, A., M\u00e9dard, M.: Why botnets work: distributed brute-force attacks need no synchronization. IEEE Trans. Inf. Forensics Secur. 14(9), 2288\u20132299 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"9_CR58","doi-asserted-by":"crossref","unstructured":"Ferrag, M.A., Shu, L., Djallel, H., Choo, K.-K.R.: Deep learning-based intrusion detection for distributed denial of service attack in agriculture 4.0. Electronics 10(11) (2021) [Online]. Available: www.mdpi.com\/2079-9292\/10\/11\/1257","DOI":"10.3390\/electronics10111257"},{"key":"9_CR59","doi-asserted-by":"crossref","unstructured":"Sontowski, S., Gupta, M., Laya Chukkapalli, S.S., Abdelsalam, M., Mittal, S., Joshi, A., Sandhu, R.: Cyber attacks on smart farming infrastructure. In: 2020 IEEE 6th International Conference on Collaboration and Internet Computing (CIC), pp. 135\u2013143 (2020)","DOI":"10.1109\/CIC50333.2020.00025"},{"key":"9_CR60","doi-asserted-by":"publisher","first-page":"4018","DOI":"10.1109\/ACCESS.2017.2678510","volume":"5","author":"Q Wang","year":"2017","unstructured":"Wang, Q., Chen, D., Zhang, N., Qin, Z., Qin, Z.: LACS: a lightweight label-based access control scheme in IoT-based 5g caching context. IEEE Access 5, 4018\u20134027 (2017)","journal-title":"IEEE Access"},{"issue":"2","key":"9_CR61","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1109\/TIFS.2014.2365742","volume":"10","author":"Q Li","year":"2015","unstructured":"Li, Q., Zhang, X., Zheng, Q., Sandhu, R., Fu, X.: Live: lightweight integrity verification and content access control for named data networking. IEEE Trans. Inf. Forensics Secur. 10(2), 308\u2013320 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"9_CR62","doi-asserted-by":"crossref","unstructured":"Gope, P., Amin, R., Hafizul Islam, S., Kumar, N., Bhalla, V.K.: Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment. Future Gener. Comput. Syst. 83, 629\u2013637 (2018) [Online]. Available: www.sciencedirect.com\/science\/article\/pii\/S0167739X17313043","DOI":"10.1016\/j.future.2017.06.023"},{"key":"9_CR63","doi-asserted-by":"crossref","unstructured":"S\u00e1nchez, S.M.: Integral support predictive platform for industry 4.0. ADCAIJ: Adv. Distrib. Comput. Artif. Intell. J. 9(4), 71\u201382 (2020)","DOI":"10.14201\/ADCAIJ2020947182"},{"key":"9_CR64","doi-asserted-by":"crossref","unstructured":"Tuptuk, N., Hailes, S.: Security of smart manufacturing systems. J. Manuf. Syst. 47, 93\u2013106 (2018) [Online]. Available: www.sciencedirect.com\/science\/article\/pii\/S0278612518300463","DOI":"10.1016\/j.jmsy.2018.04.007"},{"key":"9_CR65","doi-asserted-by":"crossref","unstructured":"Del Rey, \u00c1.M., Batista, F.K., Dios, A. Q.: Malware propagation in wireless sensor networks: global models vs individual-based models. ADCAIJ: Adv. Distrib. Comput. Artif. Intell. J. 6(3), 5\u201315 (2017)","DOI":"10.14201\/ADCAIJ201763515"},{"key":"9_CR66","doi-asserted-by":"crossref","unstructured":"ElMamy, S.B., Mrabet, H., Gharbi, H., Jemai, A., Trentesaux, D.: A survey on the usage of blockchain technology for cyber-threats in the context of industry 4.0. Sustainability 12(21), 9179 (2020)","DOI":"10.3390\/su12219179"},{"key":"9_CR67","doi-asserted-by":"crossref","unstructured":"Lu, Y., Wang, D., Obaidat, M.S., Vijayakumar, P.: Edge-assisted intelligent device authentication in cyber-physical systems. IEEE Internet Things J. (2022)","DOI":"10.1109\/JIOT.2022.3151828"},{"key":"9_CR68","doi-asserted-by":"crossref","unstructured":"Chhetri, S.R., Rashid, N., Faezi, S., Al Faruque, M.A.: Security trends and advances in manufacturing systems in the era of industry 4.0. In: 2017 IEEE\/ACM International Conference on Computer-Aided Design (ICCAD), pp. 1039\u20131046 (2017)","DOI":"10.1109\/ICCAD.2017.8203896"},{"key":"9_CR69","doi-asserted-by":"crossref","unstructured":"Lupi\u00f3n, M., Redondo, J.L., Sanjuan, J.F., Ortigosa, P.M.: Deployment of an IoT platform for activity recognition at the ual\u2019s smart home. In: International Symposium on Ambient Intelligence, pp. 82\u201392. Springer, Berlin (2020)","DOI":"10.1007\/978-3-030-58356-9_9"}],"container-title":["Lecture Notes in Networks and Systems","Ambient Intelligence\u2014Software and Applications\u201413th International Symposium on Ambient Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-22356-3_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T02:43:50Z","timestamp":1672541030000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-22356-3_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031223556","9783031223563"],"references-count":69,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-22356-3_9","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"1 January 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISAmI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Ambient Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"L\u00b4Aquila","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 July 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 July 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isaml2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.isami-conference.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}