{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T09:44:41Z","timestamp":1774691081944,"version":"3.50.1"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319470627","type":"print"},{"value":"9783319470634","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-47063-4_48","type":"book-chapter","created":{"date-parts":[[2017,1,4]],"date-time":"2017-01-04T23:59:58Z","timestamp":1483574398000},"page":"454-460","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Security Analysis of an IoT Architecture for Healthcare"],"prefix":"10.1007","author":[{"given":"M.","family":"Teresa Villalba","sequence":"first","affiliation":[]},{"given":"Manuel","family":"de Buenaga","sequence":"additional","affiliation":[]},{"given":"Diego","family":"Gachet","sequence":"additional","affiliation":[]},{"given":"Fernando","family":"Aparicio","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,18]]},"reference":[{"issue":"5","key":"48_CR1","doi-asserted-by":"publisher","first-page":"5502","DOI":"10.3390\/s120505502","volume":"12","author":"D Gachet","year":"2012","unstructured":"Gachet, D., Aparicio, F., de Buenaga, M., Padr\u00f3n, V.: Personalized health care system with virtual reality rehabilitation and appropriate information for seniors. Sensors 12(5), 5502\u20135516 (2012)","journal-title":"Sensors"},{"key":"48_CR2","series-title":"LNCS","first-page":"416","volume-title":"Ubiquitous Computing and Ambient Intelligence. Personalization and User Adapted Services","author":"D Gachet","year":"2014","unstructured":"Gachet, D., Aparicio, F., de Buenaga, M., Ascanio, J.R.: Big data and IoT for chronic patients monitoring. In: Herv\u00e1s, R., Lee, S., Nugent, C., Bravo, J. (eds.) Ubiquitous Computing and Ambient Intelligence. Personalization and User Adapted Services. LNCS, vol. 8867, pp. 416\u2013423. Springer, Heidelberg (2014)"},{"key":"48_CR3","unstructured":"Angela McIntyre, J.E.: Gartner, Market Trends: Enter the Wearable Electronics Market with Products for the Quantified Self, July 2013"},{"key":"48_CR4","unstructured":"Ponemon Institute LLC: Fifth Annual Benchmark Study on Privacy & Security of Healthcare Data (2015)"},{"key":"48_CR5","unstructured":"Symantec: Internet Security Threat Report (2015). http:\/\/www.symantec.com\/security_response\/publications\/threatreport.jsp"},{"key":"48_CR6","unstructured":"FitBit: FitBit Flex (2015). http:\/\/www.fitbit.com\/es\/flex. Accessed June 2015"},{"key":"48_CR7","unstructured":"Cyr, B., Horn, W., Miao, D., Specter, M.: Security Analysis of Wearable Fitness Devices (Fitbit). Massachusetts Institute of Technology (MIT), December 2014"},{"key":"48_CR8","doi-asserted-by":"crossref","unstructured":"Hsu, Y., Lee, D.: Authentication and authorization protocol security property analysis with trace inclusion transformation and online minimization, pp. 164\u2013173 (2010)","DOI":"10.1109\/ICNP.2010.5762765"},{"key":"48_CR9","doi-asserted-by":"publisher","first-page":"11734","DOI":"10.3390\/s120911734","volume":"12","author":"C Gomez","year":"2012","unstructured":"Gomez, C., Oller, J., Paradells, J.: Overview and evaluation of bluetooth low energy: an emerging low-power wireless technology. Sensors 12, 11734 (2012)","journal-title":"Sensors"},{"key":"48_CR10","unstructured":"The Bluetooth Special Interest Group: Specification of the Bluetooth System, Covered Core Package, Version: 4.0. Kirkland, WA, USA (2010)"},{"key":"48_CR11","doi-asserted-by":"crossref","unstructured":"Backstrom, L., Huttenlocher, D., Kleinberg, J., et al.: Group formation in large social networks: membership, growth, and evolution, pp. 44\u201354 (2006)","DOI":"10.1145\/1150402.1150412"},{"key":"48_CR12","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: K-anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl.-Based Syst. 10, 557\u2013570 (2002)","journal-title":"Int. J. Uncertainty Fuzziness Knowl.-Based Syst."},{"key":"48_CR13","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1145\/2379776.2379779","volume":"45","author":"S Avancha","year":"2012","unstructured":"Avancha, S., Baxi, A., Kotz, D.: Privacy in mobile technology for personal healthcare. ACM Comput. Surv. 45, 31\u2013354 (2012)","journal-title":"ACM Comput. Surv."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Internet of Things. IoT Infrastructures"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-47063-4_48","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T07:56:43Z","timestamp":1617263803000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-47063-4_48"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319470627","9783319470634"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-47063-4_48","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"value":"1867-8211","type":"print"},{"value":"1867-822X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"18 November 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IoT360","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Internet of Things Summit","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rome","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2015","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 October 2015","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 October 2015","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iot3602015","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}