{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,16]],"date-time":"2025-05-16T05:23:59Z","timestamp":1747373039831},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319504988"},{"type":"electronic","value":"9783319505008"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-50500-8_16","type":"book-chapter","created":{"date-parts":[[2017,5,18]],"date-time":"2017-05-18T07:14:46Z","timestamp":1495091686000},"page":"445-468","source":"Crossref","is-referenced-by-count":5,"title":["Securing the Internet of Things"],"prefix":"10.1007","author":[{"given":"Paul","family":"Dorey","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,19]]},"reference":[{"unstructured":"Cisco Systems, Inc, Available: http:\/\/ioeassessment.cisco.com\/learn\/ioe-faq , 28 September 2015, [Online], [Accessed 28 September 2015].","key":"16_CR1"},{"unstructured":"ITU-T, Available: http:\/\/www.itu.int\/rec\/T-REC-Y.2060-201206-I , 15 June 2012, [Online], [Accessed 28 September 2015].","key":"16_CR2"},{"unstructured":"Gartner, Available: http:\/\/www.gartner.com\/newsroom\/id\/2905717 , [Online].","key":"16_CR3"},{"unstructured":"Cisco Internet Business Solutions Group (IBSG), D Evans, \u201cThe Internet of Things\u2014How the Next Evolution of the Internet Is Changing Everything\u201d, Cisco IBSG, 2011.","key":"16_CR4"},{"unstructured":"C. Miller and C. Valadek, \u201cRemote Exploitation of an Unaltered Passenger Vehicle\u201d, 10 8 2015, Available: www.illmatics.com\/Remote%20Car%20Hacking.pdf , [Online], [Accessed 17 October 2015].","key":"16_CR5"},{"unstructured":"OWASP, \u201cOWASP Internet of Things Project\u201d, 2014, [Online], Available: https:\/\/www.owasp.org\/index.php\/OWASP_Internet_of_Things_Project , [Accessed 30 4 2016].","key":"16_CR6"},{"doi-asserted-by":"crossref","unstructured":"S. Peisert, J. Margulies, E. Byres, P. Dorey, D. Peterson and Z. Tudor, \u201cControl Systems Security from the Front Lines\u201d, Security & Privacy, vol. 12, no. 6, pp. 55\u201358, 2014.","key":"16_CR7","DOI":"10.1109\/MSP.2014.112"},{"doi-asserted-by":"crossref","unstructured":"M. Ersue, D. Romascanu and J. Schoenwaelder, \u201cManagement of Networks with Constrained Devices:\u201d, May 2015, [Online], Available: https:\/\/tools.ietf.org\/html\/rfc7547 , [Accessed 29 September 2015].","key":"16_CR8","DOI":"10.17487\/RFC7548"},{"unstructured":"E. Dockterman, \u201cRobot Kills Man at Volkswagen Plant,\u201d Time Life, 1 July 2015, [Online], Available: http:\/\/time.com\/3944181\/robot-kills-man-volkswagen-plant\/ , [Accessed 17 October 2015].","key":"16_CR9"},{"unstructured":"J. Edwards, \u201cFord Exec: \u2018We Know Everyone Who Breaks The Law\u2019 Thanks To Our GPS In Your Car\u201d, Business Insider, 8 January 2014.","key":"16_CR10"},{"unstructured":"Auto Alliance & Global Automakers, \u201cConsumer Privacy Protection Principles for Vehicle Technologies and Services\u201d, 12 November 2014, [Online], Available: https:\/\/www.globalautomakers.org\/system\/files\/document\/attachments\/Global%27s%20and%20the%20Alliance%27s%20FTC%20Letter%20Committment%20and%20Privacy%20Principles%20%282%29.pdf , [Accessed 29 September 2015].","key":"16_CR11"},{"unstructured":"T. Danielson, \u201cSamsung explains why its SmartTV records private conversations (+video)\u201d, The Christian Science Monitor, 9 February 2015.","key":"16_CR12"},{"unstructured":"Cloud Security Alliance, \u201cSecurity Guidance for Early Adopters of the Internet of Things (IoT)\u201d, April 2015, [Online], Available: https:\/\/downloads.cloudsecurityalliance.org\/whitepapers\/Security_Guidance_for_Early_Adopters_of_the_Internet_of_Things.pdf , [Accessed 29 September 2015].","key":"16_CR13"},{"doi-asserted-by":"crossref","unstructured":"F. daCosta and B. Henderson, Rethinking the Internet of Things: A Scalable Approach to Connecting Everything, Apress, 2014.","key":"16_CR14","DOI":"10.1007\/978-1-4302-5741-7"},{"unstructured":"F. Swiderski and W. Snyder, Threat Modelling, Redmond: Microsoft Professional, 2004.","key":"16_CR15"},{"unstructured":"GSM Association, \u201cGSMA IOT Guidelines Complete Document Set\u201d, February 2016, [Online], Available: http:\/\/www.gsma.com\/connectedliving\/gsma-iot-security-guidelines-complete-document-set\/ .","key":"16_CR16"},{"unstructured":"Trusted Computing Group, \u201cGuidance for Security IoT Using TCG Technology\u201d, 14 9 2015, [Online], Available: http:\/\/www.trustedcomputinggroup.org\/wp-content\/uploads\/TCG_Guidance_for_Securing_IoT_1_0r21-1.pdf , [Accessed 30 4 2016].","key":"16_CR17"},{"unstructured":"J. Voss, \u201cPrimitives and Elements of Internet of Things (IoT) Trustworthiness\u201d, February 2016, [Online], Available: http:\/\/csrc.nist.gov\/publications\/drafts\/nistir-8063\/nistir_8063_draft.pdf , [Accessed 30 4 2016].","key":"16_CR18"},{"unstructured":"K. Finley, \u201cNest Hub Shutdown\u201d, Wired.com, 4 5 2016, [Online], Available: http:\/\/www.wired.com\/2016\/04\/nests-hub-shutdown-proves-youre-crazy-buy-internet-things\/ , [Accessed 30 4 2016].","key":"16_CR19"},{"unstructured":"Hewlett Packard Enterprise, \u201cInternet of Things Research Study 2015\u201d, [Online], Available: http:\/\/www8.hp.com\/h20195\/V2\/GetPDF.aspx\/4AA5-4759ENW.pdf [Accessed 30 4 2016]","key":"16_CR20"}],"container-title":["Smart Cards, Tokens, Security and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-50500-8_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,24]],"date-time":"2019-09-24T16:17:10Z","timestamp":1569341830000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-50500-8_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319504988","9783319505008"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-50500-8_16","relation":{},"subject":[],"published":{"date-parts":[[2017]]}}}