{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:49:19Z","timestamp":1740098959121,"version":"3.37.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319698106"},{"type":"electronic","value":"9783319698113"}],"license":[{"start":{"date-parts":[[2017,11,2]],"date-time":"2017-11-02T00:00:00Z","timestamp":1509580800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-69811-3_41","type":"book-chapter","created":{"date-parts":[[2017,11,1]],"date-time":"2017-11-01T00:08:02Z","timestamp":1509494882000},"page":"450-458","source":"Crossref","is-referenced-by-count":0,"title":["Research on UPnP Protocol Security of Gateway Device"],"prefix":"10.1007","author":[{"given":"Baojiang","family":"Cui","sequence":"first","affiliation":[]},{"given":"Qin","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xiangqian","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Guo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,2]]},"reference":[{"key":"41_CR1","unstructured":"https:\/\/openconnectivity.org\/developer\/specifications\/upnp-resources\/upnp"},{"key":"41_CR2","unstructured":"UPnP Device Architecture 2.0 Document Reversion Date: 20 February 2015"},{"key":"41_CR3","unstructured":"http:\/\/www.upnp-hacks.org\/"},{"key":"41_CR4","doi-asserted-by":"crossref","unstructured":"AI Hasib, A., Mottalib, M.A.: Vulnerability analysis and protection schemes of universal plug and play protocol. In: 2010 13th EEE International Conference on Computational Science and Engineering, pp. 222\u2013228","DOI":"10.1109\/CSE.2010.37"},{"key":"41_CR5","unstructured":"Hemel, A.: Universal Plug and Play: Dead simple or simply deadly? 7 April 2006"},{"key":"41_CR6","unstructured":"https:\/\/openconnectivity.org\/developer\/specifications\/upnp-resources\/upnp\/iot-management-and-control1"},{"key":"41_CR7","unstructured":"UPnP Forum.DeviceManagementv2DCPs_2012[EB\/OL] (2012-05-17) [2012-09-11]"},{"key":"41_CR8","unstructured":"https:\/\/openconnectivity.org\/business\/ocf-security"},{"issue":"1","key":"41_CR9","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1109\/TCE.2013.6490253","volume":"59","author":"TM Sales","year":"2013","unstructured":"Sales, T.M., Sales, L.M., Almeida, H.O., et al.: Multilevel security in UPnP networks for pervasive environments. IEEE Trans. Consum. Electron. 59(1), 144\u2013152 (2013)","journal-title":"IEEE Trans. Consum. Electron."},{"key":"41_CR10","unstructured":"Zhou, X.F.: Research on the UPnP standard security of digital home. Sci-Tech Inf. Dev. Econ. (2007)"},{"key":"41_CR11","unstructured":"Technet. Unchecked buffer in universal plug and play can lead to system compromise. Microsoft Security Bulletin MS01-059, Microsoft, December 2001"},{"issue":"7","key":"41_CR12","first-page":"2400","volume":"27","author":"J Tan","year":"2010","unstructured":"Tan, J., Zhe, H.E., Chen, Y.F., et al.: Survey on IGRS and UPnP devices security interconnection mechanism. Appl. Res. Comput. 27(7), 2400\u20132411 (2010)","journal-title":"Appl. Res. Comput."},{"key":"41_CR13","doi-asserted-by":"crossref","unstructured":"Jia, H., Qi, Z.: Research on the implementation of secure UPnP architecture. In: 2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology, pp. 433\u2013437 (2009)","DOI":"10.1109\/ICBNMT.2009.5348530"},{"key":"41_CR14","doi-asserted-by":"crossref","unstructured":"Rajkumar, P.P., Nair, A.A.: A UPnP extension for multilevel security in pervasive systems. In: Fourth International Conference on Computing, Communications and Networking Technologies, pp. 1\u20139. IEEE (2014)","DOI":"10.1109\/ICCCNT.2013.6726733"},{"key":"41_CR15","doi-asserted-by":"crossref","unstructured":"Guo, X., Li, J.Z.: Secure UPnP services based on group signature algorithm. In: International Conference on Computer Science and Network Technology, pp. 951\u2013955. IEEE (2014)","DOI":"10.1109\/ICCSNT.2013.6967261"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances on Broad-Band Wireless Computing, Communication and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-69811-3_41","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,5]],"date-time":"2019-10-05T08:06:00Z","timestamp":1570262760000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-69811-3_41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,2]]},"ISBN":["9783319698106","9783319698113"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-69811-3_41","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2017,11,2]]}}}