{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T16:08:05Z","timestamp":1774541285322,"version":"3.50.1"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031500503","type":"print"},{"value":"9783031500510","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,12,15]],"date-time":"2023-12-15T00:00:00Z","timestamp":1702598400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,12,15]],"date-time":"2023-12-15T00:00:00Z","timestamp":1702598400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-50051-0_12","type":"book-chapter","created":{"date-parts":[[2023,12,14]],"date-time":"2023-12-14T05:02:24Z","timestamp":1702530144000},"page":"160-176","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Detection of\u00a0Energy Consumption Cyber Attacks on\u00a0Smart Devices"],"prefix":"10.1007","author":[{"given":"Zainab","family":"Alwaisi","sequence":"first","affiliation":[]},{"given":"Simone","family":"Soderi","sequence":"additional","affiliation":[]},{"given":"Rocco","family":"De Nicola","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,15]]},"reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Alwaisi, Z., Soderi, S., Nicola, R.: Energy cyber attacks to smart healthcare devices: a testbed, April 2023","DOI":"10.1007\/978-3-031-43135-7_24"},{"issue":"2","key":"12_CR2","doi-asserted-by":"publisher","first-page":"49","DOI":"10.3390\/fi14020049","volume":"14","author":"KLM Ang","year":"2022","unstructured":"Ang, K.L.M., Seng, J.K.P., Ngharamike, E.: Towards crowdsourcing internet of things (crowd-IoT): architectures, security and applications. Future Internet 14(2), 49 (2022)","journal-title":"Future Internet"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Avula, R.R., Oechtering, T.J.: Privacy-enhancing appliance filtering for smart meters. In: ICASSP 2022\u20132022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 9042\u20139046. IEEE (2022)","DOI":"10.1109\/ICASSP43922.2022.9746644"},{"key":"12_CR4","series-title":"Lecture Notes in Networks and Systems","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/978-981-16-2126-0_20","volume-title":"Expert Clouds and Applications","author":"B Barani Sundaram","year":"2022","unstructured":"Barani Sundaram, B., et al.: Analysis of machine learning data security in the internet of things (IoT) circumstance. In: Jeena Jacob, I., Gonzalez-Longatt, F.M., Kolandapalayam Shanmugam, S., Izonin, I. (eds.) Expert Clouds and Applications. LNNS, vol. 209, pp. 227\u2013236. Springer, Singapore (2022). https:\/\/doi.org\/10.1007\/978-981-16-2126-0_20"},{"issue":"10","key":"12_CR5","doi-asserted-by":"publisher","first-page":"3558","DOI":"10.1109\/JSEN.2013.2272099","volume":"13","author":"P Bellavista","year":"2013","unstructured":"Bellavista, P., Cardone, G., Corradi, A., Foschini, L.: Convergence of manet and WSN in IoT urban scenarios. IEEE Sens. J. 13(10), 3558\u20133567 (2013). https:\/\/doi.org\/10.1109\/JSEN.2013.2272099","journal-title":"IEEE Sens. J."},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Birajdar, D.M., Solapure, S.S.: Leach: An energy efficient routing protocol using omnet++ for wireless sensor network. In: 2017 International Conference on Inventive Communication and Computational Technologies (ICICCT), pp. 465\u2013470. IEEE (2017)","DOI":"10.1109\/ICICCT.2017.7975241"},{"key":"12_CR7","unstructured":"Bobrovnikova, K., Lysenko, S., Popov, P., Denysiuk, D., Goroshko, A.: Technique for IoT cyberattacks detection based on the energy consumption analysis. In: CEUR Workshop Proceedings, vol. 2853 (2021)"},{"key":"12_CR8","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/978-3-319-99516-8_8","volume-title":"Internet of Things From Hype to Reality","author":"M Dabbagh","year":"2019","unstructured":"Dabbagh, M., Rayes, A.: Internet of Things Security and Privacy. In: Rayes, A., Salam, S. (eds.) Internet of Things From Hype to Reality, pp. 211\u2013238. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-319-99516-8_8"},{"issue":"4","key":"12_CR9","doi-asserted-by":"publisher","first-page":"1344","DOI":"10.3390\/s22041344","volume":"22","author":"A Dawod","year":"2022","unstructured":"Dawod, A., Georgakopoulos, D., Jayaraman, P.P., Nirmalathas, A., Parampalli, U.: IoT device integration and payment via an autonomic blockchain-based service for IoT device sharing. Sensors 22(4), 1344 (2022)","journal-title":"Sensors"},{"key":"12_CR10","unstructured":"(EIA), E.I.A.: Cisco visual networking index (VNI) (2019). https:\/\/www.eia.gov\/outlooks\/ieo\/"},{"key":"12_CR11","doi-asserted-by":"publisher","unstructured":"Fabi, V., Spigliantini, G., Corgnati, S.P.: Insights on smart home concept and occupants\u2019 interaction with building controls. Energy Procedia 111, 759\u2013769 (2017). https:\/\/doi.org\/10.1016\/j.egypro.2017.03.238, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1876610217302680, 8th International Conference on Sustainability in Energy and Buildings, SEB-16, 11\u201313 September 2016, Turin, Italy","DOI":"10.1016\/j.egypro.2017.03.238"},{"key":"12_CR12","doi-asserted-by":"publisher","unstructured":"Felius, L., Dessen, F., Hrynyszyn, B.: Correction to: retrofitting towards energy-efficient homes in European cold climates: a review. Energy Efficiency 13 (2020). https:\/\/doi.org\/10.1007\/s12053-019-09838-3","DOI":"10.1007\/s12053-019-09838-3"},{"key":"12_CR13","doi-asserted-by":"publisher","unstructured":"Ford, R., Pritoni, M., Sanguinetti, A., Karlin, B.: Categories and functionality of smart home technology for energy management. Build. Environ. 123, 543\u2013554 (2017). https:\/\/doi.org\/10.1016\/j.buildenv.2017.07.020, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0360132317303062","DOI":"10.1016\/j.buildenv.2017.07.020"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Hoffmann, J., Neumann, S., Holz, T.: Mobile malware detection based on energy fingerprints a dead end, pp. 348\u2013368 (2013)","DOI":"10.1007\/978-3-642-41284-4_18"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Islam, M., Nooruddin, S., Karray, F., Muhammad, G., et al.: Internet of things device capabilities, architectures, protocols, and smart applications in healthcare domain: a review. arXiv preprint arXiv:2204.05921 (2022)","DOI":"10.1109\/JIOT.2022.3228795"},{"key":"12_CR16","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1016\/j.future.2017.11.022","volume":"82","author":"MA Khan","year":"2018","unstructured":"Khan, M.A., Salah, K.: IoT security: review, blockchain solutions, and open challenges. Futur. Gener. Comput. Syst. 82, 395\u2013411 (2018)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"12_CR17","doi-asserted-by":"publisher","unstructured":"Kraijak, S., Tuwanut, P.: A survey on IoT architectures, protocols, applications, security, privacy, real-world implementation and future trends. In: 11th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM 2015), pp. 1\u20136 (2015). https:\/\/doi.org\/10.1049\/cp.2015.0714","DOI":"10.1049\/cp.2015.0714"},{"key":"12_CR18","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1016\/j.comcom.2021.06.003","volume":"176","author":"A Kumar","year":"2021","unstructured":"Kumar, A., Sharma, S., Goyal, N., Singh, A., Cheng, X., Singh, P.: Secure and energy-efficient smart building architecture with emerging technology IoT. Comput. Commun. 176, 207\u2013217 (2021)","journal-title":"Comput. Commun."},{"key":"12_CR19","unstructured":"Patil, J., Sharma, M.: Survey of prevention techniques for denial service attacks (DoS) in wireless sensor network. Int. J. Sci. Res. (IJSR) (2016). ISSN 2319-7064"},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Pattewar, G., Mahamuni, N., Nikam, H., Loka, O., Patil, R.: Management of IoT devices security using blockchain-a review. Sentimental Anal. Deep Learn. 735\u2013743 (2022)","DOI":"10.1007\/978-981-16-5157-1_57"},{"key":"12_CR21","doi-asserted-by":"crossref","unstructured":"Rahmadhani, M.A., Yovita, L.V., Mayasari, R.: Energy consumption and packet loss analysis of leach routing protocol on WSN over DTN. In: 2018 4th International Conference on Wireless and Telematics (ICWT), pp. 1\u20135. IEEE (2018)","DOI":"10.1109\/ICWT.2018.8527827"},{"key":"12_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2021.102728","volume":"125","author":"LP Rondon","year":"2022","unstructured":"Rondon, L.P., Babun, L., Aris, A., Akkaya, K., Uluagac, A.S.: Survey on enterprise internet-of-things systems (e-IoT): a security perspective. Ad Hoc Netw. 125, 102728 (2022)","journal-title":"Ad Hoc Netw."},{"key":"12_CR23","doi-asserted-by":"publisher","unstructured":"Shi, Y., Li, F., Song, W., Li, X.Y., Ye, J.: Energy audition based cyber-physical attack detection system in IoT. In: Proceedings of the ACM Turing Celebration Conference China. ACM TURC \u201919. Association for Computing Machinery, New York, NY, USA (2019). https:\/\/doi.org\/10.1145\/3321408.3321588","DOI":"10.1145\/3321408.3321588"},{"key":"12_CR24","unstructured":"Tushir, B., Sehgal, H., Nair, R., Dezfouli, B., Liu, Y.: The impact of dos attacks onresource-constrained IoT devices: a study on the MIRAI attack. arXiv preprint arXiv:2104.09041 (2021)"},{"key":"12_CR25","doi-asserted-by":"crossref","unstructured":"Xu, J., Gu, B., Tian, G.: Review of agricultural IoT technology. Artif. Intell. Agric. (2022)","DOI":"10.1016\/j.aiia.2022.01.001"},{"issue":"1","key":"12_CR26","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/JIOT.2014.2306328","volume":"1","author":"A Zanella","year":"2014","unstructured":"Zanella, A., Bui, N., Castellani, A., Vangelista, L., Zorzi, M.: Internet of things for smart cities. IEEE Internet Things J. 1(1), 22\u201332 (2014). https:\/\/doi.org\/10.1109\/JIOT.2014.2306328","journal-title":"IEEE Internet Things J."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Future Access Enablers for Ubiquitous and Intelligent Infrastructures"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-50051-0_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,14]],"date-time":"2023-12-14T05:04:22Z","timestamp":1702530262000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-50051-0_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,15]]},"ISBN":["9783031500503","9783031500510"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-50051-0_12","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"value":"1867-8211","type":"print"},{"value":"1867-822X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12,15]]},"assertion":[{"value":"15 December 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FABULOUS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Future Access Enablers of Ubiquitous and Intelligent Infrastructures","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bratislava","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Slovakia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 October 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 October 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fabulous2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/fabulous-conf.eai-conferences.org\/2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confy +","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"35","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"14","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}