{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T03:53:59Z","timestamp":1742961239348,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319673790"},{"type":"electronic","value":"9783319673806"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-67380-6_6","type":"book-chapter","created":{"date-parts":[[2017,9,11]],"date-time":"2017-09-11T21:13:35Z","timestamp":1505164415000},"page":"66-74","source":"Crossref","is-referenced-by-count":8,"title":["The IoT Identification Procedure Based on the Degraded Flash Memory Sector"],"prefix":"10.1007","author":[{"given":"Sergey","family":"Vladimirov","sequence":"first","affiliation":[]},{"given":"Ruslan","family":"Kirichek","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,13]]},"reference":[{"key":"6_CR1","series-title":"Lecture Notes in Electrical Engineering","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1007\/978-81-322-2580-5_44","volume-title":"Wireless Communications, Networking and Applications","author":"R Kirichek","year":"2016","unstructured":"Kirichek, R., Koucheryavy, A.: Internet of Things laboratory test bed. In: Zeng, Q.-A. (ed.) Wireless Communications, Networking and Applications. LNEE, vol. 348, pp. 485\u2013494. Springer, New Delhi (2016). doi: 10.1007\/978-81-322-2580-5_44"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Kirichek, R., Kulik, V., Koucheryavy, A.: False clouds for Internet of Things and methods of protection. In: IEEE 18th International Conference on Advanced Communication Technology: ICACT 2016, Phoenix Park, Korea, pp. 201\u2013205 (2016)","DOI":"10.1109\/ICACT.2016.7423328"},{"volume-title":"Internet of Things: Converging Technologies for Smart Environments and Integrated Ecosystems","year":"2013","key":"6_CR3","unstructured":"Vermesan, O., Friess, P. (eds.): Internet of Things: Converging Technologies for Smart Environments and Integrated Ecosystems. River Publishers, Aalborg (2013)"},{"key":"6_CR4","volume-title":"Practical Internet of Things Security","author":"B Russell","year":"2016","unstructured":"Russell, B., Van Duren, D.: Practical Internet of Things Security. Packt Publishing, Birmingham (2016)"},{"key":"6_CR5","volume-title":"Abusing the Internet of Things. Blackouts, Freakouts, and Stakeouts","author":"N Dhanjani","year":"2015","unstructured":"Dhanjani, N.: Abusing the Internet of Things. Blackouts, Freakouts, and Stakeouts. O\u2019Reilly Media, Sebastopol (2015)"},{"volume-title":"Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations","year":"2016","key":"6_CR6","unstructured":"Hu, F. (ed.): Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations. CRC Press, Boca Raton (2016)"},{"key":"6_CR7","doi-asserted-by":"crossref","first-page":"121","DOI":"10.4236\/jcc.2017.51010","volume":"5","author":"E Leloglu","year":"2017","unstructured":"Leloglu, E.: A review of security concerns in Internet of Things. J. Comput. Commun. 5, 121\u2013136 (2017)","journal-title":"J. Comput. Commun."},{"key":"6_CR8","unstructured":"Soldatos, J., Yuming, G. (eds.): Internet of Things. EU-China Joint White Paper on Internet-of-Things Identification. European Research Cluster on the Internet of Things (2014)"},{"issue":"1","key":"6_CR9","first-page":"229","volume":"5","author":"A Hegde","year":"2016","unstructured":"Hegde, A.: MAC spoofing detection and prevention. Int. J. Adv. Res. Comput. Commun. Eng. 5(1), 229\u2013232 (2016)","journal-title":"Int. J. Adv. Res. Comput. Commun. Eng."},{"key":"6_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1007\/978-3-540-74735-2_24","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"G DeJean","year":"2007","unstructured":"DeJean, G., Kirovski, D.: RF-DNA: radio-frequency certificates of authenticity. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 346\u2013363. Springer, Heidelberg (2007). doi: 10.1007\/978-3-540-74735-2_24"},{"key":"6_CR11","doi-asserted-by":"publisher","unstructured":"Wang, Y., et al.: Flash memory for ubiquitous hardware security functions: true random number generation and device fingerprints. In: Proceedings of the 2012 IEEE Symposium on Security and Privacy. IEEE Computer Society, Washington, 20\u201325 May 2012. doi: 10.1109\/SP.2012.12","DOI":"10.1109\/SP.2012.12"},{"key":"6_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1007\/978-3-319-23318-5_24","volume-title":"Information Security","author":"S Jia","year":"2015","unstructured":"Jia, S., Xia, L., Wang, Z., Lin, J., Zhang, G., Ji, Y.: Extracting robust keys from NAND flash physical unclonable functions. In: Lopez, J., Mitchell, C.J. (eds.) ISC 2015. LNCS, vol. 9290, pp. 437\u2013454. Springer, Cham (2015). doi: 10.1007\/978-3-319-23318-5_24"},{"key":"6_CR13","unstructured":"Jakobsson, M., Johansson, K.-A.: Unspoofable Device Identity Using NAND Flash Memory (2010). http:\/\/www.securityweek.com\/unspoofable-device-identity-using-nand-flash-memory . Accessed 1 May 2017"},{"issue":"4","key":"6_CR14","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1109\/JPROC.2003.811702","volume":"91","author":"R Bez","year":"2003","unstructured":"Bez, R., Camerlenghi, E., Modelli, A., Visconti, A.: Introduction to flash memory. Proc. IEEE 91(4), 489\u2013502 (2003). doi: 10.1109\/JPROC.2003.811702","journal-title":"Proc. IEEE"},{"key":"6_CR15","unstructured":"Tal, A.: Two Flash Technologies Compared: NOR vs NAND. 91-SR-012-04-8 L REV. 1.0. M-Systems Flash Disk Pioneers. Newark (2002)"}],"container-title":["Lecture Notes in Computer Science","Internet of Things, Smart Spaces, and Next Generation Networks and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-67380-6_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,3]],"date-time":"2019-10-03T06:22:28Z","timestamp":1570083748000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-67380-6_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319673790","9783319673806"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-67380-6_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}