{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T23:14:30Z","timestamp":1768432470554,"version":"3.49.0"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031434600","type":"print"},{"value":"9783031434617","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-43461-7_2","type":"book-chapter","created":{"date-parts":[[2023,9,25]],"date-time":"2023-09-25T06:02:35Z","timestamp":1695621755000},"page":"13-21","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["IoT Security and Privacy Challenges from the Developer Perspective"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-0043-8966","authenticated-orcid":false,"given":"Yaqin","family":"Shaheen","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5722-9816","authenticated-orcid":false,"given":"Miguel J.","family":"Hornos","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5626-3115","authenticated-orcid":false,"given":"Carlos","family":"Rodr\u00edguez-Dom\u00ednguez","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,26]]},"reference":[{"key":"2_CR1","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1016\/j.cosrev.2020.100312","volume":"38","author":"MM Ogonji","year":"2020","unstructured":"Ogonji, M.M., Okeyo, G., Wafula, J.M.: A survey on privacy and security of internet of things. Comput. Sci. Rev. 38, 100\u2013312 (2020). https:\/\/doi.org\/10.1016\/j.cosrev.2020.100312","journal-title":"Comput. Sci. Rev."},{"key":"2_CR2","doi-asserted-by":"publisher","unstructured":"Corno, F., De Russis, L., Saenz, J.P.: Pain points for novice programmers of ambient intelligence systems: an exploratory study. In: Proceedings - International Computer Software and Applications Conference, vol. 1, pp. 250\u2013255 (2017). https:\/\/doi.org\/10.1109\/COMPSAC.2017.186","DOI":"10.1109\/COMPSAC.2017.186"},{"key":"2_CR3","doi-asserted-by":"publisher","first-page":"1667","DOI":"10.1007\/s11277-020-07649-9","volume":"115","author":"PM Chanal","year":"2020","unstructured":"Chanal, P.M., Kakkasageri, M.S.: Security and privacy in IoT: a survey. Wirel. Pers. Commun. 115, 1667\u20131693 (2020). https:\/\/doi.org\/10.1007\/s11277-020-07649-9","journal-title":"Wirel. Pers. Commun."},{"key":"2_CR4","doi-asserted-by":"publisher","first-page":"1497","DOI":"10.1016\/j.adhoc.2012.02.016","volume":"10","author":"D Miorandi","year":"2012","unstructured":"Miorandi, D., Sicari, S., De Pellegrini, F., Chlamtac, I.: Internet of things: vision, applications and research challenges. Ad Hoc Netw. 10, 1497\u20131516 (2012). https:\/\/doi.org\/10.1016\/j.adhoc.2012.02.016","journal-title":"Ad Hoc Netw."},{"key":"2_CR5","doi-asserted-by":"publisher","unstructured":"Javed, B., Iqbal, M.W., Abbas, H.: Internet of things (IoT) design considerations for developers and manufacturers. In: 2017 IEEE International Conference on Communications Workshop, ICC Workshop 2017, pp. 834\u2013839 (2017). https:\/\/doi.org\/10.1109\/ICCW.2017.7962762","DOI":"10.1109\/ICCW.2017.7962762"},{"key":"2_CR6","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1108\/IntR-07-2014-0173","volume":"26","author":"S Li","year":"2016","unstructured":"Li, S., Tryfonas, T., Li, H.: The internet of things: a security point of view. Internet Res. 26, 337\u2013359 (2016). https:\/\/doi.org\/10.1108\/IntR-07-2014-0173","journal-title":"Internet Res."},{"key":"2_CR7","doi-asserted-by":"publisher","unstructured":"Sicari, S., Rizzardi, A., Grieco, L.A., Coen-Porisini, A.: Security, privacy and trust in internet of things: the road ahead. Comput. Netw. 76, 146\u2013164 (2015). https:\/\/doi.org\/10.1016\/j.comnet.2014.11.008","DOI":"10.1016\/j.comnet.2014.11.008"},{"key":"2_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/s20205897","volume":"20","author":"S Pal","year":"2020","unstructured":"Pal, S., Hitchens, M., Rabehaja, T., Mukhopadhyay, S.: Security requirements for the internet of things: a systematic approach. Sens. (Switz.) 20, 1\u201334 (2020). https:\/\/doi.org\/10.3390\/s20205897","journal-title":"Sens. (Switz.)"},{"key":"2_CR9","doi-asserted-by":"publisher","unstructured":"Makhshari, A., Mesbah, A.: IoT development in the wild: bug taxonomy and developer challenges. In: Proceedings of the International Conference on Software Engineering, pp. 225\u2013226 (2021). https:\/\/doi.org\/10.1109\/ICSE-Companion52605.2021.00103","DOI":"10.1109\/ICSE-Companion52605.2021.00103"},{"key":"2_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.pmcj.2022.101656","volume":"85","author":"P K\u00fchtreiber","year":"2022","unstructured":"K\u00fchtreiber, P., Pak, V., Reinhardt, D.: A survey on solutions to support developers in privacy-preserving IoT development. Pervasive Mob. Comput. 85, 1\u201331 (2022). https:\/\/doi.org\/10.1016\/j.pmcj.2022.101656","journal-title":"Pervasive Mob. Comput."},{"key":"2_CR11","doi-asserted-by":"publisher","first-page":"444","DOI":"10.1109\/JCN.2019.000048","volume":"21","author":"ELC Macedo","year":"2019","unstructured":"Macedo, E.L.C., et al.: On the security aspects of internet of things: a systematic literature review. J. Commun. Netw. 21, 444\u2013457 (2019). https:\/\/doi.org\/10.1109\/JCN.2019.000048","journal-title":"J. Commun. Netw."},{"key":"2_CR12","doi-asserted-by":"publisher","unstructured":"Corno, F., de Russis, L., Mannella, L.: Perception of security issues in the development of Cloud-IoT systems by a novice programmer. In: Intelligent Environments 2021: Workshop Proceedings of the 17th International Conference on Intelligent Environments, pp. 5\u201315 (2021). https:\/\/doi.org\/10.3233\/AISE210074","DOI":"10.3233\/AISE210074"},{"key":"2_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3376123","volume":"53","author":"JBF Sequeiros","year":"2020","unstructured":"Sequeiros, J.B.F., Chimuco, F.T., Samaila, M.G., Freire, M.M., In\u00e1cio, P.R.M.: Attack and system modeling applied to IoT, cloud, and mobile ecosystems: embedding security by design. ACM Comput. Surv. 53, 1\u201332 (2020). https:\/\/doi.org\/10.1145\/3376123","journal-title":"ACM Comput. Surv."},{"key":"2_CR14","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/s40860-022-00175-4","volume":"8","author":"F Corno","year":"2022","unstructured":"Corno, F., De Russis, L., Mannella, L.: Helping novice developers harness security issues in cloud-IoT systems. J. Reliab. Intell. Environ. 8, 261\u2013283 (2022). https:\/\/doi.org\/10.1007\/s40860-022-00175-4","journal-title":"J. Reliab. Intell. Environ."},{"key":"2_CR15","doi-asserted-by":"publisher","first-page":"27","DOI":"10.3390\/s23052740","volume":"23","author":"F Corno","year":"2023","unstructured":"Corno, F., Mannella, L.: Security evaluation of arduino projects developed by hobbyist IoT programmers. Sensors 23, 27\u201340 (2023). https:\/\/doi.org\/10.3390\/s23052740","journal-title":"Sensors"},{"key":"2_CR16","doi-asserted-by":"publisher","unstructured":"Corneliu, B., Oana, G., Marius, P.: Considerations on the development of IoT systems. In: 2019 International Conference on Sensing and Instrumentation in IoT Era, ISSI 2019, pp. 13\u201319 (2019). https:\/\/doi.org\/10.1109\/ISSI47111.2019.9043644","DOI":"10.1109\/ISSI47111.2019.9043644"},{"key":"2_CR17","unstructured":"AWS: Introduction to AWS Security: AWS Whitepaper (2021)"},{"key":"2_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3434186","volume":"17","author":"L Alkhariji","year":"2021","unstructured":"Alkhariji, L., Alhirabi, N., Alraja, M.N., Barhamgi, M., Rana, O., Perera, C.: Synthesising privacy by design knowledge toward explainable internet of things application designing in healthcare. ACM Trans. Multimed. Comput. Commun. Appl. 17, 1\u201329 (2021). https:\/\/doi.org\/10.1145\/3434186","journal-title":"ACM Trans. Multimed. Comput. Commun. Appl."},{"issue":"1","key":"2_CR19","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s10207-019-00445-y","volume":"19","author":"P Aufner","year":"2019","unstructured":"Aufner, P.: The IoT security gap: a look down into the valley between threat models and their implementation. Int. J. Inf. Secur. 19(1), 3\u201314 (2019). https:\/\/doi.org\/10.1007\/s10207-019-00445-y","journal-title":"Int. J. Inf. Secur."},{"key":"2_CR20","doi-asserted-by":"crossref","unstructured":"Voigt, P., von dem Bussche, A.: The EU general data protection regulation (GDPR) (2017). http:\/\/dx.doi.org\/10.1007\/978-3-319-57959-7","DOI":"10.1007\/978-3-319-57959-7"},{"key":"2_CR21","unstructured":"Edemekong, P.F., Annamaraju, P., Haydel, M.J.: Health insurance portability and accountability act. Presented at the January (2023)"},{"key":"2_CR22","doi-asserted-by":"publisher","first-page":"10250","DOI":"10.1109\/JIOT.2020.2997651","volume":"7","author":"W Iqbal","year":"2020","unstructured":"Iqbal, W., Abbas, H., Daneshmand, M., Rauf, B., Bangash, Y.A.: An in-depth analysis of IoT security requirements, challenges, and their countermeasures via software-defined security. IEEE Internet Things J. 7, 10250\u201310276 (2020). https:\/\/doi.org\/10.1109\/JIOT.2020.2997651","journal-title":"IEEE Internet Things J."},{"key":"2_CR23","doi-asserted-by":"publisher","unstructured":"Omolara, A.E., et al.: The internet of things security: A survey encompassing unexplored areas and new insights. Comput. Secur. 112, 102494 (2022). https:\/\/doi.org\/10.1016\/j.cose.2021.102494","DOI":"10.1016\/j.cose.2021.102494"},{"key":"2_CR24","doi-asserted-by":"crossref","unstructured":"Wurm, J., Hoang, K., Arias, O., Sadeghi, A.-R., Jin, Y.: Security analysis on consumer and industrial IoT devices (2016). http:\/\/dx.doi.org\/10.1109\/aspdac.2016.7428064","DOI":"10.1109\/ASPDAC.2016.7428064"},{"key":"2_CR25","doi-asserted-by":"publisher","first-page":"1125","DOI":"10.1109\/COMST.2021.3064507","volume":"23","author":"AK Sikder","year":"2021","unstructured":"Sikder, A.K., Petracca, G., Aksu, H., Jaeger, T., Uluagac, A.S.: A survey on sensor-based threats and attacks to smart devices and applications. IEEE Commun. Surv. Tutorials. 23, 1125\u20131159 (2021). https:\/\/doi.org\/10.1109\/COMST.2021.3064507","journal-title":"IEEE Commun. Surv. Tutorials."}],"container-title":["Lecture Notes in Networks and Systems","Ambient Intelligence \u2013 Software and Applications \u2013 14th International Symposium on Ambient Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-43461-7_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,25]],"date-time":"2023-09-25T06:05:25Z","timestamp":1695621925000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-43461-7_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031434600","9783031434617"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-43461-7_2","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"value":"2367-3370","type":"print"},{"value":"2367-3389","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"26 September 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISAmI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Ambient Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guimaraes","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 July 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isaml2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.isami-conference.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}