{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T10:22:25Z","timestamp":1743070945141,"version":"3.40.3"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031367564"},{"type":"electronic","value":"9783031367571"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-36757-1_27","type":"book-chapter","created":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T16:01:40Z","timestamp":1688227300000},"page":"365-374","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A View on\u00a0Vulnerabilities Within IoT Devices in\u00a0the\u00a0Smart Home Environment"],"prefix":"10.1007","author":[{"given":"Annika","family":"Nyk\u00e4nen","sequence":"first","affiliation":[]},{"given":"Andrei","family":"Costin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,2]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Amadeo, M., Campolo, C., Iera, A., Molinaro, A.: Information centric networking in IoT scenarios: the case of a smart home. In: 2015 IEEE International Conference on Communications (ICC), pp. 648\u2013653 (2015)","key":"27_CR1","DOI":"10.1109\/ICC.2015.7248395"},{"key":"27_CR2","doi-asserted-by":"publisher","first-page":"168825","DOI":"10.1109\/ACCESS.2020.3022842","volume":"8","author":"P Anand","year":"2020","unstructured":"Anand, P., Singh, Y., Selwal, A., Alazab, M., Tanwar, S., Kumar, N.: IoT vulnerability assessment for sustainable computing: threats, current solutions, and open challenges. IEEE Access 8, 168825\u2013168853 (2020)","journal-title":"IEEE Access"},{"unstructured":"Antonakakis, M., et al.: Understanding the mirai botnet. In: 26th $$\\{$$USENIX$$\\}$$ security symposium ($$\\{$$USENIX$$\\}$$ Security 17), pp. 1093\u20131110 (2017)","key":"27_CR3"},{"unstructured":"Apthorpe, N., Reisman, D., Feamster, N.: A smart home is no castle: privacy vulnerabilities of encrypted IoT traffic (2017)","key":"27_CR4"},{"doi-asserted-by":"crossref","unstructured":"Bassi, A., et al.: Enabling Things to Talk: Designing IoT solutions with the IoT Architectural Reference Model. Springer, Berlin Heidelberg (2013)","key":"27_CR5","DOI":"10.1007\/978-3-642-40403-0"},{"unstructured":"Borgohain, T., Kumar, U., Sanyal, S.: Survey of security and privacy issues of Internet of Things (2015)","key":"27_CR6"},{"doi-asserted-by":"crossref","unstructured":"Chan, M., Campo, E., Est\u00e8ve, D., Fourniols, J.Y.: Smart homes - current features and future perspectives. Maturitas 64(2), 90\u201397 (2009)","key":"27_CR7","DOI":"10.1016\/j.maturitas.2009.07.014"},{"unstructured":"Collin, J., Saarelainen, A.: Teollinen internet. Talentum (2016)","key":"27_CR8"},{"doi-asserted-by":"crossref","unstructured":"da Costa, L.T., Barros, J.P., Tavares, M.: Vulnerabilities in IoT devices for smart home environment. In: International Conference on Information Systems Security and Privacy, vol. 1, pp. 615\u2013622 (2019)","key":"27_CR9","DOI":"10.5220\/0007583306150622"},{"unstructured":"Costin, A., Zaddach, J.: IoT malware: comprehensive survey, analysis framework and case studies. BlackHat USA 1(1) 1\u20139 (2018)","key":"27_CR10"},{"unstructured":"Costin, A., Zaddach, J., Francillon, A., Balzarotti, D.: A large-scale analysis of the security of embedded firmwares. In: 23rd $$\\{$$USENIX$$\\}$$ Security Symposium ($$\\{$$USENIX$$\\}$$ Security 14), pp. 95\u2013110 (2014)","key":"27_CR11"},{"doi-asserted-by":"crossref","unstructured":"Costin, A., Zarras, A., Francillon, A.: Automated dynamic firmware analysis at scale: a case study on embedded web interfaces. In: 11th ACM on Asia Conference on Computer and Communications Security, pp. 437\u2013448 (2016)","key":"27_CR12","DOI":"10.1145\/2897845.2897900"},{"doi-asserted-by":"crossref","unstructured":"Gaikwad, P.P., Gabhane, J.P., Golait, S.S.: A survey based on smart homes system using internet-of-things. 2015 International Conference on Computation of Power, Energy, Information and Communication (ICCPEIC), pp. 0330\u20130335 (2015)","key":"27_CR13","DOI":"10.1109\/ICCPEIC.2015.7259486"},{"doi-asserted-by":"crossref","unstructured":"Giri, A., Dutta, S., Neogy, S., Dahal, K., Pervez, Z.: Internet of things (IoT): a survey on architecture, enabling technologies, applications and challenges. In: 1st International Conference on Internet of Things and Machine Learning. IML 2017, Association for Computing Machinery, New York, pp. 1\u201312 (2017)","key":"27_CR14","DOI":"10.1145\/3109761.3109768"},{"unstructured":"Kadam, M., Mahamuni, P., Parikh, Y.: Smart home system. Int. J. Innov. Res. Adv. Eng. 2(1), 81\u201386 (2015)","key":"27_CR15"},{"doi-asserted-by":"crossref","unstructured":"Lee, C., Zappaterra, L., Choi, K., Choi, H.A.: Securing smart home: technologies, security challenges, and security requirements. In: 2014 IEEE Conference on Communications and Network Security, pp. 67\u201372 (2014)","key":"27_CR16","DOI":"10.1109\/CNS.2014.6997467"},{"unstructured":"Lehto, M.: Muuttunut turvallisuustilanne ja uhkakuvat. Jyv\u00e4skyl\u00e4n yliopisto (2018)","key":"27_CR17"},{"doi-asserted-by":"crossref","unstructured":"Lin, H., Bergmann, N.: IoT privacy and security challenges for smart home environments. Inf. 7, 44 (2016)","key":"27_CR18","DOI":"10.3390\/info7030044"},{"issue":"6","key":"27_CR19","doi-asserted-by":"publisher","first-page":"1899","DOI":"10.1109\/JIOT.2017.2707465","volume":"4","author":"Z Ling","year":"2017","unstructured":"Ling, Z., Luo, J., Xu, Y., Gao, C., Wu, K., Fu, X.: Security vulnerabilities of internet of things: a case study of the smart plug system. IEEE Internet Things J. 4(6), 1899\u20131909 (2017)","journal-title":"IEEE Internet Things J."},{"doi-asserted-by":"crossref","unstructured":"Mahmoud, R., Yousuf, T., Aloul, F., Zualkernan, I.: Internet of things (IoT) security: current status, challenges and prospective measures. In: 10th International Conference for Internet Technology and Secured Transactions (ICITST), pp. 336\u2013341 (2015)","key":"27_CR20","DOI":"10.1109\/ICITST.2015.7412116"},{"issue":"11","key":"27_CR21","doi-asserted-by":"publisher","first-page":"2496","DOI":"10.3390\/s17112496","volume":"17","author":"S Majumder","year":"2017","unstructured":"Majumder, S., et al.: Smart homes for elderly healthcare-recent advances and research challenges. Sensors 17(11), 2496 (2017)","journal-title":"Sensors"},{"issue":"5","key":"27_CR22","doi-asserted-by":"publisher","first-page":"8182","DOI":"10.1109\/JIOT.2019.2935189","volume":"6","author":"F Meneghello","year":"2019","unstructured":"Meneghello, F., Calore, M., Zucchetto, D., Polese, M., Zanella, A.: Iot: Internet of threats? a survey of practical security vulnerabilities in real IoT devices. IEEE Internet of Things J. 6(5), 8182\u20138201 (2019)","journal-title":"IEEE Internet of Things J."},{"issue":"6","key":"27_CR23","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1109\/MWC.2017.1800100","volume":"25","author":"Y Meng","year":"2018","unstructured":"Meng, Y., Zhang, W., Zhu, H., Shen, X.S.: Securing consumer IoT in the smart home: architecture, challenges, and countermeasures. IEEE Wirel. Commun. 25(6), 53\u201359 (2018)","journal-title":"IEEE Wirel. Commun."},{"issue":"13","key":"27_CR24","doi-asserted-by":"publisher","first-page":"3625","DOI":"10.3390\/s20133625","volume":"20","author":"H Mrabet","year":"2020","unstructured":"Mrabet, H., Belguith, S., Alhomoud, A., Jemai, A.: A survey of IoT security based on a layered architecture of sensing and data analysis. Sensors 20(13), 3625 (2020)","journal-title":"Sensors"},{"doi-asserted-by":"crossref","unstructured":"Nguyen Duc, A., Jabangwe, R., Paul, P., Abrahamsson, P.: Security challenges in IoT development: a software engineering perspective. In: Proceedings of the XP2017 Scientific Workshops, pp. 1\u20135 (2017)","key":"27_CR25","DOI":"10.1145\/3120459.3120471"},{"unstructured":"Oracle: The internet of things: Manage the complexity, seize the opportunity (2014)","key":"27_CR26"},{"unstructured":"OWASP: Owasp category: Vulnerability (2016)","key":"27_CR27"},{"unstructured":"OWASP: Internet of things (IoT) top 10 (2020)","key":"27_CR28"},{"unstructured":"Patel, K., Patel, S., Scholar, P., Salazar, C.: Internet of things-IoT: definition, characteristics, architecture, enabling technologies, application & future challenges. Int. J. Eng. Sci. Comput. 6(5) (2016)","key":"27_CR29"},{"unstructured":"Pfleeger, C.P., Pfleeger, S.L., Margulies, J.: Security in Computing (5th Edition), 5th edn. Prentice Hall Press, USA (2015)","key":"27_CR30"},{"doi-asserted-by":"crossref","unstructured":"Rao, T., Haq, E.: Security challenges facing IoT layers and its protective measures. Int. J. Comput. Appl. 179, 31\u201335 (2018)","key":"27_CR31","DOI":"10.5120\/ijca2018916607"},{"doi-asserted-by":"crossref","unstructured":"Sethi, P., Sarangi, S.R.: Internet of Things: architectures, protocols, and applications. J. Electr. Comput. Eng. (2017)","key":"27_CR32","DOI":"10.1155\/2017\/9324035"},{"doi-asserted-by":"crossref","unstructured":"Tewari, A., Gupta, B.: Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework. Future Gen. Comput. Syst. 108 909\u2013920 (2020)","key":"27_CR33","DOI":"10.1016\/j.future.2018.04.027"},{"unstructured":"TSK, S.: Kokonaisturvallisuuden sanasto (2017)","key":"27_CR34"},{"doi-asserted-by":"crossref","unstructured":"Wang, J.A., Guo, M., Wang, H., Xia, M., Zhou, L.: Environmental metrics for software security based on a vulnerability ontology. In: 2009 Third IEEE International Conference on Secure Software Integration and Reliability Improvement, pp. 159\u2013168 (2009)","key":"27_CR35","DOI":"10.1109\/SSIRI.2009.60"},{"issue":"3","key":"27_CR36","doi-asserted-by":"publisher","first-page":"227","DOI":"10.2345\/0899-8205-53.3.227","volume":"53","author":"A Wirth","year":"2019","unstructured":"Wirth, A.: Cyberinsights: reviewing today\u2019s cyberthreat landscape. Biomed. Instrum. Technol. 53(3), 227\u2013231 (2019)","journal-title":"Biomed. Instrum. Technol."},{"doi-asserted-by":"crossref","unstructured":"Zheng, S., Apthorpe, N., Chetty, M., Feamster, N.: User perceptions of smart home IoT privacy. Proc. ACM Hum.-Comput. Interact. 2(CSCW), 1\u201320 (2018)","key":"27_CR37","DOI":"10.1145\/3274469"}],"container-title":["Lecture Notes in Business Information Processing","Business Modeling and Software Design"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-36757-1_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T13:39:17Z","timestamp":1729690757000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-36757-1_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031367564","9783031367571"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-36757-1_27","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"2 July 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BMSD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Business Modeling and Software Design","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Utrecht","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Netherlands","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 July 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 July 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bmsd2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.is-bmsd.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}