{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T20:35:13Z","timestamp":1743021313376,"version":"3.40.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031312748"},{"type":"electronic","value":"9783031312755"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-31275-5_7","type":"book-chapter","created":{"date-parts":[[2023,4,30]],"date-time":"2023-04-30T14:01:42Z","timestamp":1682863302000},"page":"65-71","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Hybrid AI-Based iBeacon Indoor Positioning Cybersecurity Attacks and Defenses Thereof"],"prefix":"10.1007","author":[{"given":"Fang-Yie","family":"Leu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5718-4785","authenticated-orcid":false,"given":"Chi-Jan","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Cheng-Jan","family":"Chi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1533-2182","authenticated-orcid":false,"given":"Wei-Tzu","family":"Hung","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,1]]},"reference":[{"issue":"1","key":"7_CR1","first-page":"88","volume":"20","author":"CL Kao","year":"2021","unstructured":"Kao, C.L.: The application of beacon micro positioning technology. Arch. Semiannual 20(1), 88\u201397 (2021)","journal-title":"Arch. Semiannual"},{"issue":"1","key":"7_CR2","doi-asserted-by":"publisher","first-page":"4","DOI":"10.3390\/technologies6010004","volume":"6","author":"A Meliones","year":"2018","unstructured":"Meliones, A., Sampson, D.: Blind museum tourer: a system for self-guided tours in museums and blind indoor navigation. Technologies 6(1), 4 (2018)","journal-title":"Technologies"},{"key":"7_CR3","doi-asserted-by":"publisher","first-page":"637","DOI":"10.1016\/j.cie.2018.05.005","volume":"125","author":"ZH Zhao","year":"2018","unstructured":"Zhao, Z.H., Zhang, M.D., Yang, C., Fang, J., Huang, G.Q.: Distributed and collaborative proactive tandem location tracking of vehicle products for warehouse operations. Comput. Ind. Eng. 125, 637\u2013648 (2018)","journal-title":"Comput. Ind. Eng."},{"key":"7_CR4","volume-title":"Beacons and the City: Smart Internet of Things","author":"P Spachos","year":"2018","unstructured":"Spachos, P., Plataniotis, K.: Beacons and the City: Smart Internet of Things, 1st edn. Academic Press, USA (2018)","edition":"1"},{"issue":"11","key":"7_CR5","first-page":"1560","volume":"37","author":"DT Bai","year":"2018","unstructured":"Bai, D.T., Zhang, J.N., Pan, Y.: Research on the principle and technology of indoor positioning navigation escape rescue system. Fire Sci. Technol. 37(11), 1560\u20131563 (2018)","journal-title":"Fire Sci. Technol."},{"doi-asserted-by":"crossref","unstructured":"Chen, L.W., Liu, J.X.: EasyFind: a mobile crowdsourced guiding system with lost item finding based on IoT technologies.\u00a0In: International Conference on Pervasive Computing and Communication Workshops, pp. 343\u2013345. IEEE, Japan (2019)","key":"7_CR6","DOI":"10.1109\/PERCOMW.2019.8730851"},{"issue":"5","key":"7_CR7","doi-asserted-by":"publisher","first-page":"3125","DOI":"10.1109\/TSMC.2019.2918233","volume":"51","author":"LW Chen","year":"2021","unstructured":"Chen, L.W., Liu, J.X.: Time-efficient indoor navigation and evacuation with fastest path planning based on internet of things technologies. IEEE Trans. Syst. Man Cybern. Syst. 51(5), 3125\u20133135 (2021)","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"key":"7_CR8","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-8447-8","volume-title":"Inside Radio: An Attack and Defense Guide","author":"Q Yang","year":"2018","unstructured":"Yang, Q., Huang, L.: Inside Radio: An Attack and Defense Guide, 1st edn. Springer, Singapore (2018)","edition":"1"},{"doi-asserted-by":"crossref","unstructured":"Campos-Cruz, K.J., Mancillas-L\u00f3pez, C., Ovilla-Martinez, B.: A lightweight security protocol for beacons BLE.\u00a0In: 18th International Conference on Electrical Engineering, Computing Science and Automatic Control, pp. 1\u20136. IEEE, Mexico (2021)","key":"7_CR9","DOI":"10.1109\/CCE53527.2021.9633037"},{"doi-asserted-by":"crossref","unstructured":"Na, X., Guo, X., He, Y., Xi, R.: Wi-attack: cross-technology impersonation attack against iBeacon services.\u00a0In: 18th Annual IEEE International Conference on Sensing, Communication, and Networking, pp. 1\u20139. IEEE, Italy (2021)","key":"7_CR10","DOI":"10.1109\/SECON52354.2021.9491605"},{"issue":"1\u20132","key":"7_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1561\/2000000094","volume":"11","author":"M Kok","year":"2017","unstructured":"Kok, M., Hol, J.D., Sch, T.B.: Using inertial sensors for position and orientation estimation. Found. Trends Signal Process. 11(1\u20132), 1\u2013153 (2017)","journal-title":"Found. Trends Signal Process."},{"doi-asserted-by":"crossref","unstructured":"Hu, J., et al.: Efficient graph deep learning in tensorflow with tf_geometric.\u00a0In: 29th ACM International Conference on Multimedia, pp. 3775\u20133778. Association for Computing Machinery, China (2021)","key":"7_CR12","DOI":"10.1145\/3474085.3478322"},{"doi-asserted-by":"publisher","unstructured":"Sun, M., Kamoto, KM., Liu, Q., Liu, X., Qi, L.: Application of bluetooth low energy beacons and fog computing for smarter environments in emerging economies.\u00a0In: Zhang, X., Liu, G., Qiu, M., Xiang, W., Huang, T. (eds) Cloud Computing, Smart Grid and Innovative Frontiers in Telecommunications: International Conference on Cloud Computing, pp. 101\u2013110. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-48513-9_8","key":"7_CR13","DOI":"10.1007\/978-3-030-48513-9_8"},{"unstructured":"LINE developers. https:\/\/developers.line.biz\/en\/docs\/messaging-api\/beacon-device-spec\/. Accessed 19 July 2022","key":"7_CR14"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Smart Grid and Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-31275-5_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,30]],"date-time":"2023-04-30T14:02:34Z","timestamp":1682863354000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-31275-5_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031312748","9783031312755"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-31275-5_7","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"1 May 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SGIoT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Smart Grid and Internet of Things","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"TaiChung","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taiwan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 November 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 November 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sgiot2022a","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/sgiot.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confy plus","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"96","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"34% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}