{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T10:23:26Z","timestamp":1776335006624,"version":"3.51.2"},"publisher-location":"Cham","reference-count":49,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031451614","type":"print"},{"value":"9783031451621","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-45162-1_12","type":"book-chapter","created":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T22:04:44Z","timestamp":1701381884000},"page":"193-218","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Future Privacy and Trust Challenges for IoE Networks"],"prefix":"10.1007","author":[{"given":"Abeer","family":"Iftikhar","sequence":"first","affiliation":[]},{"given":"Kashif Naseer","family":"Qureshi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,1]]},"reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Flores FFS, de Lemos Meira SR Ethical Software Engineering: A critical review about Software Engineering in face of Security Requirements in the IoT\/IoE Society. In: 2021 IEEE International Systems Conference (SysCon), 2021. IEEE, pp 1\u20138","DOI":"10.1109\/SysCon48628.2021.9447113"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Ilgi GS, Ever YK (2020) Critical analysis of security and privacy challenges for the Internet of drones: a survey. In: Drones in smart-cities. Elsevier, pp 207\u2013214","DOI":"10.1016\/B978-0-12-819972-5.00011-2"},{"key":"12_CR3","doi-asserted-by":"publisher","unstructured":"ALiero MS, Qureshi KN, Pasha MF, Jeon G (2021) Smart Home Energy Management Systems in Internet of Things networks for green cities demands and services. Environmental Technology & Innovation:101443. doi:https:\/\/doi.org\/10.1016\/j.eti.2021.101443","DOI":"10.1016\/j.eti.2021.101443"},{"key":"12_CR4","doi-asserted-by":"publisher","unstructured":"Qureshi KN, Alhudhaif A, Hussain A, Iqbal S, Jeon G (2021) Trust aware energy management system for smart homes appliances. Computers & Electrical Engineering:107641. doi:https:\/\/doi.org\/10.1016\/j.compeleceng.2021.107641","DOI":"10.1016\/j.compeleceng.2021.107641"},{"key":"12_CR5","doi-asserted-by":"publisher","unstructured":"Qureshi KN, Alhudhaif A, Haider SW, Majeed S, Jeon G (2022) Secure Data Communication for Wireless Mobile Nodes in Intelligent Transportation Systems. Microprocessors and Microsystems:104501. doi:https:\/\/doi.org\/10.1016\/j.micpro.2022.104501","DOI":"10.1016\/j.micpro.2022.104501"},{"issue":"11","key":"12_CR6","doi-asserted-by":"publisher","first-page":"220","DOI":"10.3390\/risks10110220","volume":"10","author":"A Mazzoccoli","year":"2022","unstructured":"Mazzoccoli A, Naldi M (2022) An Overview of Security Breach Probability Models. Risks 10 (11):220","journal-title":"Risks"},{"key":"12_CR7","unstructured":"Cisco U (2021) Cisco annual internet report (2018\u20132023) white paper. 2020. Acessado em 10 (01)"},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"Gabilondo Garc\u00eda \u00c1, Fern\u00e1ndez Z, Viola R, Mart\u00edn \u00c1, Zorrilla M, Angueira Buceta P, Montalb\u00e1n S\u00e1nchez J (2022) Traffic Classification for Network Slicing in Mobile Networks.","DOI":"10.3390\/electronics11071097"},{"key":"12_CR9","doi-asserted-by":"publisher","first-page":"100471","DOI":"10.1016\/j.ijcip.2021.100471","volume":"35","author":"E Luiijf","year":"2021","unstructured":"Luiijf E, Klaver M (2021) Analysis and lessons identified on critical infrastructures and dependencies from an empirical data set. International Journal of Critical Infrastructure Protection 35:100471","journal-title":"International Journal of Critical Infrastructure Protection"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Karie NM, Sahri NM, Yang W, Valli C, Kebande VR (2021) A review of security standards and frameworks for IoT-based smart environments. IEEE Access","DOI":"10.1109\/ACCESS.2021.3109886"},{"issue":"23","key":"12_CR11","doi-asserted-by":"publisher","first-page":"23472","DOI":"10.1109\/JIOT.2022.3200431","volume":"9","author":"X Kong","year":"2022","unstructured":"Kong X, Wu Y, Wang H, Xia F (2022) Edge Computing for Internet of Everything: A Survey. IEEE Internet of Things Journal 9 (23):23472\u201323485","journal-title":"IEEE Internet of Things Journal"},{"issue":"9","key":"12_CR12","doi-asserted-by":"publisher","first-page":"1374","DOI":"10.3390\/electronics11091374","volume":"11","author":"K Shahzad","year":"2022","unstructured":"Shahzad K, Aseeri AO, Shah MA (2022) A Blockchain-Based Authentication Solution for 6G Communication Security in Tactile Networks. Electronics 11 (9):1374","journal-title":"Electronics"},{"key":"12_CR13","doi-asserted-by":"publisher","unstructured":"Un Nisa K, Alhudhaif A, Qureshi KN, Hadi HJ, Jeon G (2022) Security Provision for Protecting Intelligent Sensors and Zero Touch Devices by using Blockchain Method for the Smart Cities. Microprocessors and Microsystems:104503. doi:https:\/\/doi.org\/10.1016\/j.micpro.2022.104503","DOI":"10.1016\/j.micpro.2022.104503"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Conti M, Kumar G, Nerurkar P, Saha R, Vigneri L (2022) A survey on security challenges and solutions in the IOTA. Journal of Network Computer Applications:103383","DOI":"10.1016\/j.jnca.2022.103383"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Paleri P (2022) Threat, Risk and Uncertainty: Triad of Chaotic Balance in a Chancy, Chancy World. In: Revisiting National Security. Springer, pp 155\u2013193","DOI":"10.1007\/978-981-16-8293-3_4"},{"key":"12_CR16","doi-asserted-by":"publisher","unstructured":"Qureshi KN, Ahmad A, Piccialli F, Casolla G, Jeon G (2020) Nature-inspired algorithm-based secure data dissemination framework for smart city networks. Neural Computing and Applications. doi:https:\/\/doi.org\/10.1007\/s00521-020-04900-z","DOI":"10.1007\/s00521-020-04900-z"},{"key":"12_CR17","doi-asserted-by":"crossref","unstructured":"Sachdev R Towards security and privacy for edge AI in IoT\/IoE based digital marketing environments. In: 2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC), 2020. IEEE, pp 341\u2013346","DOI":"10.1109\/FMEC49853.2020.9144755"},{"issue":"5","key":"12_CR18","doi-asserted-by":"publisher","first-page":"1371","DOI":"10.1108\/JEIM-12-2020-0533","volume":"34","author":"M El-Masri","year":"2021","unstructured":"El-Masri M, Hussain EMA (2021) Blockchain as a mean to secure Internet of Things ecosystems\u2013a systematic literature review. Journal of Enterprise Information Management 34 (5):1371\u20131405","journal-title":"Journal of Enterprise Information Management"},{"key":"12_CR19","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1016\/j.cose.2019.02.012","volume":"83","author":"JM Hatfield","year":"2019","unstructured":"Hatfield JM (2019) Virtuous human hacking: The ethics of social engineering in penetration-testing. Computers Security 83:354\u2013366","journal-title":"Computers Security"},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Formosa P, Wilson M, Richards DJC, Security (2021) A principlist framework for cybersecurity ethics. 109:102382","DOI":"10.1016\/j.cose.2021.102382"},{"key":"12_CR21","doi-asserted-by":"publisher","first-page":"824","DOI":"10.1016\/j.procs.2019.09.241","volume":"159","author":"N Abe","year":"2019","unstructured":"Abe N, Soltys M (2019) Deploying health campaign strategies to defend against social engineering threats. Procedia Computer Science 159:824\u2013831","journal-title":"Procedia Computer Science"},{"key":"12_CR22","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/978-3-031-14748-7_2","volume-title":"Recent Innovations in Artificial Intelligence and Smart Applications","author":"MMH Shuvo","year":"2022","unstructured":"Shuvo MMH (2022) Edge AI: Leveraging the full potential of deep learning. In: Recent Innovations in Artificial Intelligence and Smart Applications. Springer, pp 27\u201346"},{"key":"12_CR23","unstructured":"Kokkonen H, Lov\u00e9n L, Motlagh NH, Partala J, Gonz\u00e1lez-Gil A, Sola E, Angulo I, Liyanage M, Lepp\u00e4nen T, Nguyen T (2022) Autonomy and Intelligence in the Computing Continuum: Challenges, Enablers, and Future Directions for Orchestration. arXiv preprint arXiv:01423"},{"key":"12_CR24","unstructured":"Chinchawade AJ, Lamba OS (2021) Security and privacy challenges in internet of everything (ioe) with security requirements. Journal of Engineering Technology-Suresh Gyan Vihar University 7 (2)"},{"key":"12_CR25","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/s10586-018-2820-9","volume":"22","author":"S Desai","year":"2019","unstructured":"Desai S, Alhadad R, Chilamkurti N, Mahmood A (2019) A survey of privacy preserving schemes in IoE enabled smart grid advanced metering infrastructure. Cluster Computing 22:43\u201369","journal-title":"Cluster Computing"},{"issue":"4","key":"12_CR26","doi-asserted-by":"publisher","first-page":"3453","DOI":"10.1109\/COMST.2018.2855563","volume":"20","author":"I Stellios","year":"2018","unstructured":"Stellios I, Kotzanikolaou P, Psarakis M, Alcaraz C, Lopez J (2018) A survey of IoT-enabled cyberattacks: Assessing attack paths to critical infrastructures and services. IEEE Communications Surveys Tutorials 20 (4):3453\u20133495","journal-title":"IEEE Communications Surveys Tutorials"},{"issue":"3","key":"12_CR27","doi-asserted-by":"publisher","first-page":"1646","DOI":"10.1109\/COMST.2020.2988293","volume":"22","author":"MA Al-Garadi","year":"2020","unstructured":"Al-Garadi MA, Mohamed A, Al-Ali AK, Du X, Ali I, Guizani M (2020) A survey of machine and deep learning methods for internet of things (IoT) security. IEEE Communications Surveys Tutorials 22 (3):1646\u20131685","journal-title":"IEEE Communications Surveys Tutorials"},{"issue":"1","key":"12_CR28","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1504\/IJWMC.2022.125534","volume":"23","author":"SV Shankhpal","year":"2022","unstructured":"Shankhpal SV, Brahmananda S (2022) Systematic analysis and review of trust management schemes for IoT security. International Journal of Wireless Mobile Computing 23 (1):33\u201345","journal-title":"International Journal of Wireless Mobile Computing"},{"issue":"2","key":"12_CR29","doi-asserted-by":"publisher","first-page":"568","DOI":"10.3390\/s21020568","volume":"21","author":"VC Farias da Costa","year":"2021","unstructured":"Farias da Costa VC, Oliveira L, de Souza J (2021) Internet of everything (IoE) taxonomies: A survey and a novel knowledge-based taxonomy. Sensors 21 (2):568","journal-title":"Sensors"},{"key":"12_CR30","doi-asserted-by":"crossref","unstructured":"Saba T, Rehman A, Haseeb K, Alam T, Jeon G (2023) Cloud-edge load balancing distributed protocol for IoE services using swarm intelligence. Cluster Computing:1\u201311","DOI":"10.1007\/s10586-022-03916-5"},{"key":"12_CR31","doi-asserted-by":"crossref","unstructured":"Jimo S, Abdullah T, Jamal A IoE Security Risk Analysis in a Modern Hospital Ecosystem. In: Cybersecurity in the Age of Smart Societies: Proceedings of the 14th International Conference on Global Security, Safety and Sustainability, London, September 2022, 2023. Springer, pp 451\u2013467","DOI":"10.1007\/978-3-031-20160-8_26"},{"issue":"13","key":"12_CR32","doi-asserted-by":"publisher","first-page":"4603","DOI":"10.3390\/en15134603","volume":"15","author":"O Juszczyk","year":"2022","unstructured":"Juszczyk O, Shahzad K (2022) Blockchain technology for renewable energy: principles, applications and prospects. Energies 15 (13):4603","journal-title":"Energies"},{"key":"12_CR33","doi-asserted-by":"crossref","unstructured":"Alqasemi F, Al-Hagree S, Shaddad RQ, Zahary AT An IEEE Xplore Database Literature Review Concerning Internet of Everything During 2020\u20132021. In: 2021 International Conference on Intelligent Technology, System and Service for Internet of Everything (ITSS-IoE), 2021. IEEE, pp 1\u20138","DOI":"10.1109\/ITSS-IoE53029.2021.9615285"},{"key":"12_CR34","doi-asserted-by":"crossref","unstructured":"Puthal D, Damiani E, Mohanty SP Secure and Scalable Collaborative Edge Computing using Decision Tree. In: 2022 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 2022. IEEE, pp 247\u2013252","DOI":"10.1109\/ISVLSI54635.2022.00055"},{"key":"12_CR35","doi-asserted-by":"crossref","unstructured":"Aldawsari H, Artoli AM (2021) A Reliable Lightweight Trust Evaluation Scheme for IoT Security. International Journal of Advanced Computer Science Applications 12 (11)","DOI":"10.14569\/IJACSA.2021.0121182"},{"issue":"5","key":"12_CR36","first-page":"e12703","volume":"39","author":"S Tanwar","year":"2022","unstructured":"Tanwar S, Popat A, Bhattacharya P, Gupta R, Kumar N (2022) A taxonomy of energy optimization techniques for smart cities: Architecture and future directions. Expert Systems with Applications 39 (5):e12703","journal-title":"Expert Systems with Applications"},{"key":"12_CR37","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/978-3-030-93266-4_14","volume-title":"Information and Communications Technology in Support of Migration","author":"S Uribe","year":"2022","unstructured":"Uribe S, Moreno F, Hern\u00e1ndez G, \u00c1lvarez F (2022) Personalised Interaction or How We Can Improve Migrants\u2019 Experience When Using a Digital Companion Through a Mobile App. In: Information and Communications Technology in Support of Migration. Springer, pp 229\u2013247"},{"issue":"2","key":"12_CR38","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1109\/MCE.2019.2953758","volume":"9","author":"SP Mohanty","year":"2020","unstructured":"Mohanty SP, Yanambaka VP, Kougianos E, Puthal D (2020) PUFchain: A hardware-assisted blockchain for sustainable simultaneous device and data security in the internet of everything (IoE). IEEE Consumer Electronics Magazine 9 (2):8\u201316. doi:https:\/\/doi.org\/10.1109\/MCE.2019.2953758","journal-title":"IEEE Consumer Electronics Magazine"},{"key":"12_CR39","doi-asserted-by":"publisher","first-page":"108209","DOI":"10.1016\/j.compeleceng.2022.108209","volume":"102","author":"GC Swathi","year":"2022","unstructured":"Swathi GC, Kumar GK, Kumar AS (2022) Estimating Botnet Impact on IoT\/IoE networks using Traffic flow Features. Computers Electrical Engineering 102:108209","journal-title":"Computers Electrical Engineering"},{"key":"12_CR40","doi-asserted-by":"crossref","unstructured":"Rustagi A, Manchanda C, Sharma N IoE: A boon & threat to the mankind. In: 2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT), 2020. IEEE, pp 114\u2013119","DOI":"10.1109\/CSNT48778.2020.9115748"},{"key":"12_CR41","doi-asserted-by":"crossref","unstructured":"Kouicem DE, Bouabdallah A, Lakhlef H An efficient architecture for trust management in IoE based systems of systems. In: 2018 13th Annual Conference on System of Systems Engineering (SoSE), 2018. IEEE, pp 138\u2013143","DOI":"10.1109\/SYSOSE.2018.8428732"},{"key":"12_CR42","doi-asserted-by":"publisher","first-page":"60117","DOI":"10.1109\/ACCESS.2020.2982318","volume":"8","author":"G Fortino","year":"2020","unstructured":"Fortino G, Fotia L, Messina F, Rosaci D, Sarn\u00e9 GM (2020) Trust and reputation in the internet of things: State-of-the-art and research challenges. IEEE Access 8:60117\u201360125","journal-title":"IEEE Access"},{"key":"12_CR43","doi-asserted-by":"publisher","first-page":"45184","DOI":"10.1109\/ACCESS.2020.2977325","volume":"8","author":"MA Elsayed","year":"2020","unstructured":"Elsayed MA, Zulkernine M (2020) PredictDeep: security analytics as a service for anomaly detection and prediction. IEEE Access 8:45184\u201345197","journal-title":"IEEE Access"},{"key":"12_CR44","doi-asserted-by":"publisher","unstructured":"Khan WZ, Rafique W, Haider N, Hakak S, Imran M (2022) Internet of Everything: Enabling Technologies, Applications, Security and Challenges. TechRxiv Preprint. doi:https:\/\/doi.org\/10.36227\/techrxiv.21341796.v1","DOI":"10.36227\/techrxiv.21341796.v1"},{"key":"12_CR45","doi-asserted-by":"publisher","unstructured":"Ryoo J, Kim S, Cho J, Kim H, Tjoa S, DeRobertis C IoE security threats and you. In: 2017 International Conference on Software Security and Assurance (ICSSA), 2017. IEEE, pp 13\u201319. doi:https:\/\/doi.org\/10.1109\/ICSSA.2017.28","DOI":"10.1109\/ICSSA.2017.28"},{"issue":"20","key":"12_CR46","doi-asserted-by":"publisher","first-page":"5796","DOI":"10.3390\/s20205796","volume":"20","author":"N Janbi","year":"2020","unstructured":"Janbi N, Katib I, Albeshri A, Mehmood R (2020) Distributed artificial intelligence-as-a-service (DAIaaS) for smarter IoE and 6G environments. Sensors 20 (20):5796","journal-title":"Sensors"},{"issue":"2","key":"12_CR47","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/MCE.2019.2954959","volume":"9","author":"SP Mohanty","year":"2020","unstructured":"Mohanty SP (2020) Security and Privacy by Design is Key in the Internet of Everything (IoE) Era. IEEE Consumer Electron Mag 9 (2):4\u20135","journal-title":"IEEE Consumer Electron Mag"},{"issue":"5","key":"12_CR48","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/MCE.2020.3040541","volume":"10","author":"B Bera","year":"2020","unstructured":"Bera B, Das AK, Obaidat MS, Vijayakumar P, Hsiao K-F, Park Y (2020) AI-enabled blockchain-based access control for malicious attacks detection and mitigation in IoE. IEEE Consumer Electronics Magazine 10 (5):82\u201392","journal-title":"IEEE Consumer Electronics Magazine"},{"issue":"24","key":"12_CR49","doi-asserted-by":"publisher","first-page":"e7213","DOI":"10.1002\/cpe.7213","volume":"34","author":"SM Jameii","year":"2022","unstructured":"Jameii SM, Zamirnaddafi RS, Rezabakhsh R (2022) Internet of Flying Things security: A systematic review. Concurrency Computation: Practice Experience 34 (24):e7213","journal-title":"Concurrency Computation: Practice Experience"}],"container-title":["Internet of Things","Cybersecurity Vigilance and Security Engineering of Internet of Everything"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-45162-1_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T22:05:53Z","timestamp":1701381953000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-45162-1_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,1]]},"ISBN":["9783031451614","9783031451621"],"references-count":49,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-45162-1_12","relation":{},"ISSN":["2199-1073","2199-1081"],"issn-type":[{"value":"2199-1073","type":"print"},{"value":"2199-1081","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12,1]]},"assertion":[{"value":"1 December 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}