{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T04:59:09Z","timestamp":1743051549673,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319723945"},{"type":"electronic","value":"9783319723952"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-72395-2_27","type":"book-chapter","created":{"date-parts":[[2017,12,8]],"date-time":"2017-12-08T04:56:41Z","timestamp":1512709001000},"page":"291-301","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Analysing the Resilience of the Internet of Things Against Physical and Proximity Attacks"],"prefix":"10.1007","author":[{"given":"He","family":"Xu","sequence":"first","affiliation":[]},{"given":"Daniele","family":"Sgandurra","sequence":"additional","affiliation":[]},{"given":"Keith","family":"Mayes","sequence":"additional","affiliation":[]},{"given":"Peng","family":"Li","sequence":"additional","affiliation":[]},{"given":"Ruchuan","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,9]]},"reference":[{"unstructured":"The Internet of Things has started, April 2016. http:\/\/www.mycustomer.com\/community\/blogs\/corelynx\/the-internet-of-things-has-started-have-you-joined-the-iot-bandwagon","key":"27_CR1"},{"unstructured":"There will be 24 billion IoT devices installed on earth by 2020, June 2016. http:\/\/uk.businessinsider.com\/there-will-be-34-billion-iot-devices-installed-on-earth-by-2020-2016-5?r=US&IR=T","key":"27_CR2"},{"unstructured":"BrickerBot, the permanent denial-of-service Botnet, is back with a vengeance, April 2017. https:\/\/arstechnica.com\/security\/2017\/04\/brickerbot-the-permanent-denial-of-service-botnet-is-back-with-a-vengeance\/","key":"27_CR3"},{"unstructured":"Chinese bike-sharing start-up Ofo says it\u2019s now worth more than $2 billion, April 2017. http:\/\/www.cnbc.com\/2017\/04\/17\/ofo-chinese-bike-sharing-start-up-says-its-now-worth-more-than-2-billion.html","key":"27_CR4"},{"unstructured":"ESP8266_deauther, July 2017. https:\/\/github.com\/spacehuhn\/esp8266_deauther#supported-devices","key":"27_CR5"},{"unstructured":"Look out Cambridge: here comes Ofo - China\u2019s \u2018Uber for bikes\u2019, April 2017. http:\/\/www.wired.co.uk\/article\/chinese-bike-sharing-company-ofo-is-coming-to-cambridge-in-the-uk","key":"27_CR6"},{"unstructured":"RFID Emulator, July 2017. http:\/\/www.instructables.com\/id\/RFID-Emulator-How-to-Clone-RFID-Card-Tag-\/","key":"27_CR7"},{"issue":"2","key":"27_CR8","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1109\/MC.2017.62","volume":"50","author":"E Bertino","year":"2017","unstructured":"Bertino, E., Islam, N.: Botnets and internet of things security. Computer 50(2), 76\u201379 (2017)","journal-title":"Computer"},{"issue":"3","key":"27_CR9","doi-asserted-by":"crossref","first-page":"2259","DOI":"10.1007\/s11277-012-0935-5","volume":"71","author":"V Coskun","year":"2013","unstructured":"Coskun, V., Ozdenizci, B., Ok, K.: A survey on near field communication (NFC) technology. Wirel. Pers. Commun. 71(3), 2259\u20132294 (2013)","journal-title":"Wirel. Pers. Commun."},{"doi-asserted-by":"crossref","unstructured":"Fernandes, E., Jung, J., Prakash, A.: Security analysis of emerging smart home applications. In: 2016 IEEE Symposium on Security and Privacy (SP), pp. 636\u2013654, May 2016","key":"27_CR10","DOI":"10.1109\/SP.2016.44"},{"unstructured":"Garcia, F.D., de Koning Gans, G., Verdult, R.: Tutorial: Proxmark, the swiss army knife for RFID security research. Technical report, Radboud University Nijmegen (2012)","key":"27_CR11"},{"doi-asserted-by":"crossref","unstructured":"Ho, G., Leung, D., Mishra, P., Hosseini, A., Song, D., Wagner, D.: Smart locks: lessons for securing commodity internet of things devices. In: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, ASIA CCS 2016, pp. 461\u2013472. ACM, New York, NY, USA, March 2016. http:\/\/doi.acm.org\/10.1145\/2897845.2897886","key":"27_CR12","DOI":"10.1145\/2897845.2897886"},{"issue":"2","key":"27_CR13","first-page":"33","volume":"24","author":"CH Huang","year":"2013","unstructured":"Huang, C.H., Chang, S.L.: Study on the feasibility of NFC P2P communication for nursing care daily work. J. Comput. 24(2), 33\u201345 (2013)","journal-title":"J. Comput."},{"issue":"12","key":"27_CR14","doi-asserted-by":"crossref","first-page":"1347","DOI":"10.1080\/0144929X.2014.934286","volume":"33","author":"J Imgraben","year":"2014","unstructured":"Imgraben, J., Engelbrecht, A., Choo, K.K.R.: Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users. Behav. Inf. Technol. 33(12), 1347\u20131360 (2014)","journal-title":"Behav. Inf. Technol."},{"doi-asserted-by":"crossref","unstructured":"Jerkins, J.A.: Motivating a market or regulatory solution to IoT insecurity with the Mirai botnet code. In: 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC), pp. 1\u20135. IEEE, January 2017","key":"27_CR15","DOI":"10.1109\/CCWC.2017.7868464"},{"issue":"7","key":"27_CR16","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1109\/MC.2017.201","volume":"50","author":"C Kolias","year":"2017","unstructured":"Kolias, C., Kambourakis, G., Stavrou, A., Voas, J.: DDoS in the IoT: Mirai and other botnets. Computer 50(7), 80\u201384 (2017)","journal-title":"Computer"},{"doi-asserted-by":"crossref","unstructured":"Min, B., Varadharajan, V.: Design and evaluation of feature distributed malware attacks against the internet of things (IoT). In: 20th International Conference on Engineering of Complex Computer Systems (ICECCS), pp. 80\u201389. IEEE, December 2015","key":"27_CR17","DOI":"10.1109\/ICECCS.2015.19"},{"doi-asserted-by":"crossref","unstructured":"Ronen, E., Shamir, A.: Extended functionality attacks on IoT devices: the case of smart lights. In: IEEE European Symposium on Security and Privacy, pp. 3\u201312. IEEE, March 2016","key":"27_CR18","DOI":"10.1109\/EuroSP.2016.13"},{"issue":"3","key":"27_CR19","doi-asserted-by":"crossref","first-page":"46:1","DOI":"10.1145\/2856126","volume":"48","author":"D Sgandurra","year":"2016","unstructured":"Sgandurra, D., Lupu, E.: Evolution of attacks, threat models, and solutions for virtualized systems. ACM Comput. Surv. 48(3), 46:1\u201346:38 (2016). http:\/\/doi.acm.org\/10.1145\/2856126","journal-title":"ACM Comput. Surv."},{"doi-asserted-by":"crossref","unstructured":"Sivaraman, V., Chan, D., Earl, D., Boreli, R.: Smart-phones attacking smart-homes. In: Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, pp. 195\u2013200. ACM, July 2016","key":"27_CR20","DOI":"10.1145\/2939918.2939925"},{"key":"27_CR21","doi-asserted-by":"publisher","DOI":"10.1007\/978-90-481-9707-1","volume-title":"Handbook of Unmanned Aerial Vehicles","year":"2015","unstructured":"Valavanis, K.P., Vachtsevanos, G.J. (eds.): Handbook of Unmanned Aerial Vehicles. Springer, Dordrecht (2015). https:\/\/doi.org\/10.1007\/978-90-481-9707-1"},{"doi-asserted-by":"crossref","unstructured":"Verdult, R., de Koning Gans, G., Garcia, F.D.: A toolbox for RFID protocol analysis. In: Proceedings of the Fourth International EURASIP Workshop on RFID Technology (EURASIP RFID), pp. 27\u201334. IEEE, September 2012","key":"27_CR22","DOI":"10.1109\/RFID.2012.19"},{"unstructured":"BrickerBot: \u201cThe Doctor\u2019s\u201d PDoS Attack Has Killed Over 2 Million Insecure Devices, April 2017. https:\/\/fossbytes.com\/brickerbot-malware-pdos-attack-iot-device\/","key":"27_CR23"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-72395-2_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,7]],"date-time":"2019-10-07T14:07:24Z","timestamp":1570457244000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-72395-2_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319723945","9783319723952"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-72395-2_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}