{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T14:26:23Z","timestamp":1725978383158},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319911915"},{"type":"electronic","value":"9783319911922"}],"license":[{"start":{"date-parts":[[2018,5,17]],"date-time":"2018-05-17T00:00:00Z","timestamp":1526515200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-319-91192-2_40","type":"book-chapter","created":{"date-parts":[[2018,5,16]],"date-time":"2018-05-16T13:45:41Z","timestamp":1526478341000},"page":"403-412","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Novel, Lightweight, and Cost-Effective Mechanism to Secure the Sensor-Gateway Communication in IoT"],"prefix":"10.1007","author":[{"given":"Shamshekhar S.","family":"Patil","sequence":"first","affiliation":[]},{"given":"N. R.","family":"Sunitha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,17]]},"reference":[{"key":"40_CR1","volume-title":"Security Solutions for Hyperconnectivity and the Internet of Things","author":"M Dawson","year":"2016","unstructured":"Dawson, M., Eltayeb, M., Omar, M.: Security Solutions for Hyperconnectivity and the Internet of Things. IGI Global, Hershey (2016)"},{"key":"40_CR2","doi-asserted-by":"crossref","unstructured":"Gravina, R., Palau, C.E., Manso, M., Liotta, A., Fortino, G.: Integration, Interconnection, and Interoperability of IoT Systems. Springer (2017)","DOI":"10.1007\/978-3-319-61300-0"},{"key":"40_CR3","doi-asserted-by":"crossref","DOI":"10.1201\/b13092","volume-title":"Wireless Sensor Networks: Current Status and Future Trends","author":"S Khan","year":"2016","unstructured":"Khan, S., Pathan, A.S.K., Alrajeh, N.A.: Wireless Sensor Networks: Current Status and Future Trends. CRC Press, Boca Raton (2016)"},{"key":"40_CR4","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/978-3-319-46769-6_5","volume-title":"Wireless Sensor Networks","author":"Rastko R. Selmic","year":"2016","unstructured":"Selmic, R.R., Phoha, V.V., Serwadda, A.: Wireless Sensor Networks: Security, Coverage, and Localization. Springer (2016)"},{"key":"40_CR5","doi-asserted-by":"crossref","unstructured":"Gilchrist, A.: IoT Security Issues. Walter de Gruyter GmbH (2016)","DOI":"10.1515\/9781501505775"},{"key":"40_CR6","doi-asserted-by":"crossref","unstructured":"Riddle, A.R., Chung, S.M.: A survey on the security of hypervisors in cloud computing. In: 2015 IEEE 35th International Conference on Distributed Computing Systems Workshops, Columbus, OH, pp. 100\u2013104 (2015)","DOI":"10.1109\/ICDCSW.2015.28"},{"issue":"9","key":"40_CR7","doi-asserted-by":"publisher","first-page":"2052","DOI":"10.1109\/TIFS.2016.2573746","volume":"11","author":"D He","year":"2016","unstructured":"He, D., Zeadally, S., Kumar, N., Wu, W.: Efficient and anonymous mobile user authentication protocol using self-certified public key cryptography for multi-server architectures. IEEE Trans. Inf. Forensics Secur. 11(9), 2052\u20132064 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"40_CR8","doi-asserted-by":"crossref","unstructured":"Krej\u010d\u00ed, R., Huj\u0148\u00e1k, O., \u0160vepe\u0161, M.: Security survey of the IoT wireless protocols. In: 2017 25th Telecommunication Forum (TELFOR), Belgrade, Serbia, pp. 1\u20134 (2017)","DOI":"10.1109\/TELFOR.2017.8249286"},{"issue":"1","key":"40_CR9","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1109\/COMST.2015.2459691","volume":"18","author":"KA Shim","year":"2016","unstructured":"Shim, K.A.: A survey of public-key cryptographic primitives in wireless sensor networks. IEEE Commun. Surv. Tutor. 18(1), 577\u2013601 (2016)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"40_CR10","doi-asserted-by":"crossref","unstructured":"Kiviharju, M.: On the fog of RSA key lengths: verifying public key cryptography strength recommendations. In: 2017 International Conference on Military Communications and Information Systems (ICMCIS), Oulu, pp. 1\u20138 (2017)","DOI":"10.1109\/ICMCIS.2017.7956481"},{"issue":"1","key":"40_CR11","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1109\/TCAD.2017.2750067","volume":"37","author":"J Wang","year":"2018","unstructured":"Wang, J., Hong, Z., Zhang, Y., Jin, Y.: Enabling security-enhanced attestation with Intel SGX for remote terminal and IoT. IEEE Trans. Comput. Aided Des. Integr. Circ. Syst. 37(1), 88\u201396 (2018)","journal-title":"IEEE Trans. Comput. Aided Des. Integr. Circ. Syst."},{"key":"40_CR12","doi-asserted-by":"publisher","first-page":"26743","DOI":"10.1109\/ACCESS.2017.2777443","volume":"5","author":"NN Dao","year":"2017","unstructured":"Dao, N.N., Kim, Y., Jeong, S., Park, M., Cho, S.: Achievable multi-security levels for lightweight IoT-enabled devices in infrastructureless peer-aware communications. IEEE Access 5, 26743\u201326753 (2017)","journal-title":"IEEE Access"},{"issue":"5","key":"40_CR13","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/MWC.2016.7721741","volume":"23","author":"MS Hossain","year":"2016","unstructured":"Hossain, M.S., Muhammad, G., Rahman, S.M.M., Abdul, W., Alelaiwi, A., Alamri, A.: Toward end-to-end biomet rics-based security for IoT infrastructure. IEEE Wirel. Commun. 23(5), 44\u201351 (2016)","journal-title":"IEEE Wirel. Commun."},{"issue":"12","key":"40_CR14","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/MCOM.2016.1600462CM","volume":"54","author":"RT Tiburski","year":"2016","unstructured":"Tiburski, R.T., Amaral, L.A., de Matos, E., de Azevedo, D.F.G., Hessel, F.: The role of lightweight approaches towards the standardization of a security architecture for IoT middleware systems. IEEE Commun. Mag. 54(12), 56\u201362 (2016)","journal-title":"IEEE Commun. Mag."},{"key":"40_CR15","doi-asserted-by":"publisher","first-page":"2840","DOI":"10.1109\/ACCESS.2016.2575863","volume":"4","author":"Q Xu","year":"2016","unstructured":"Xu, Q., Ren, P., Song, H., Du, Q.: Security enhancement for IoT communications exposed to eavesdroppers with uncertain locations. IEEE Access 4, 2840\u20132853 (2016)","journal-title":"IEEE Access"},{"issue":"3","key":"40_CR16","doi-asserted-by":"publisher","first-page":"645","DOI":"10.1109\/JIOT.2016.2624824","volume":"4","author":"R Giuliano","year":"2017","unstructured":"Giuliano, R., Mazzenga, F., Neri, A., Vegni, A.M.: Security access protocols in IoT capillary networks. IEEE Internet Things J. 4(3), 645\u2013657 (2017)","journal-title":"IEEE Internet Things J."},{"issue":"7","key":"40_CR17","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1109\/MCOM.2017.1600993","volume":"55","author":"SM Cheng","year":"2017","unstructured":"Cheng, S.M., Chen, P.Y., Lin, C.C., Hsiao, H.C.: Traffic-aware patching for cyber security in mobile IoT. IEEE Commun. Mag. 55(7), 29\u201335 (2017)","journal-title":"IEEE Commun. Mag."},{"issue":"10","key":"40_CR18","doi-asserted-by":"publisher","first-page":"9381","DOI":"10.1109\/TVT.2017.2701551","volume":"66","author":"H Sedjelmaci","year":"2017","unstructured":"Sedjelmaci, H., Senouci, S.M., Taleb, T.: An accurate security game for low-resource IoT devices. IEEE Trans. Veh. Technol. 66(10), 9381\u20139393 (2017)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"10","key":"40_CR19","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1109\/MCOM.2017.1700154","volume":"55","author":"WL Chin","year":"2017","unstructured":"Chin, W.L., Li, W., Chen, H.H.: Energy big data security threats in IoT-based smart grid communications. IEEE Commun. Mag. 55(10), 70\u201375 (2017)","journal-title":"IEEE Commun. Mag."},{"issue":"1","key":"40_CR20","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MSP.2015.7","volume":"13","author":"W Trappe","year":"2015","unstructured":"Trappe, W., Howard, R., Moore, R.S.: Low-energy security: limits and opportunities in the Internet of Things. IEEE Secur. Priv. 13(1), 14\u201321 (2015)","journal-title":"IEEE Secur. Priv."},{"issue":"1","key":"40_CR21","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1109\/TCAD.2017.2685588","volume":"37","author":"SD Kumar","year":"2018","unstructured":"Kumar, S.D., Thapliyal, H., Mohammad, A.: FinSAL: FinFET-based secure adiabatic logic for energy-efficient and DPA resistant IoT devices. IEEE Trans. Comput. Aided Des. Integr. Circ. Syst. 37(1), 110\u2013122 (2018)","journal-title":"IEEE Trans. Comput. Aided Des. Integr. Circ. Syst."},{"issue":"1","key":"40_CR22","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1109\/JPROC.2017.2781198","volume":"106","author":"M Wolf","year":"2018","unstructured":"Wolf, M., Serpanos, D.: Safety and security in cyber-physical systems and Internet-of-Things systems. Proc. IEEE 106(1), 9\u201320 (2018)","journal-title":"Proc. IEEE"},{"issue":"1","key":"40_CR23","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/JPROC.2017.2780172","volume":"106","author":"A Burg","year":"2018","unstructured":"Burg, A., Chattopadhyay, A., Lam, K.Y.: Wireless communication and security issues for cyber-physical systems and the Internet-of-Things. Proc. IEEE 106(1), 38\u201360 (2018)","journal-title":"Proc. IEEE"},{"key":"40_CR24","doi-asserted-by":"publisher","first-page":"26832","DOI":"10.1109\/ACCESS.2017.2776160","volume":"5","author":"O Ruan","year":"2017","unstructured":"Ruan, O., Chen, J., Zhang, M.: Provably leakage-resilient password-based authenticated key exchange in the standard model. IEEE Access 5, 26832\u201326841 (2017)","journal-title":"IEEE Access"},{"key":"40_CR25","doi-asserted-by":"publisher","first-page":"27800","DOI":"10.1109\/ACCESS.2017.2774105","volume":"5","author":"ABO L\u00f3pez","year":"2017","unstructured":"L\u00f3pez, A.B.O., Encinas, L.H., Mu\u00f1oz, A.M., Vitini, F.M.: A lightweight pseudorandom number generator for securing the Internet of Things. IEEE Access 5, 27800\u201327806 (2017)","journal-title":"IEEE Access"},{"key":"40_CR26","doi-asserted-by":"publisher","first-page":"5494","DOI":"10.1109\/ACCESS.2017.2696031","volume":"5","author":"M Mohsin","year":"2017","unstructured":"Mohsin, M., Sardar, M.U., Hasan, O., Anwar, Z.: IoTRiskAnalyzer: a probabilistic model checking based framework for formal risk analytics of the Internet of Things. IEEE Access 5, 5494\u20135505 (2017)","journal-title":"IEEE Access"},{"key":"40_CR27","doi-asserted-by":"publisher","first-page":"21046","DOI":"10.1109\/ACCESS.2017.2734681","volume":"5","author":"G Xu","year":"2017","unstructured":"Xu, G., Cao, Y., Ren, Y., Li, X., Feng, Z.: Network security situation awareness based on semantic ontology and user-defined rules for Internet of Things. IEEE Access 5, 21046\u201321056 (2017)","journal-title":"IEEE Access"},{"issue":"6","key":"40_CR28","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1109\/MM.2016.101","volume":"36","author":"M Ambrosin","year":"2016","unstructured":"Ambrosin, M., et al.: On the feasibility of attribute-based encryption on Internet of Things devices. IEEE Micro 36(6), 25\u201335 (2016)","journal-title":"IEEE Micro"},{"issue":"3","key":"40_CR29","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1109\/LWC.2015.2408609","volume":"4","author":"SN Premnath","year":"2015","unstructured":"Premnath, S.N., Haas, Z.J.: Security and privacy in the Internet-of-Things under time-and-budget-limited adversary model. IEEE Wirel. Commun. Lett. 4(3), 277\u2013280 (2015)","journal-title":"IEEE Wirel. Commun. Lett."},{"issue":"6","key":"40_CR30","doi-asserted-by":"publisher","first-page":"1006","DOI":"10.1109\/JIOT.2016.2545926","volume":"3","author":"H Ko","year":"2016","unstructured":"Ko, H., Jin, J., Keoh, S.L.: Secure service virtualization in IoT by dynamic service dependency verification. IEEE Internet Things J. 3(6), 1006\u20131014 (2016)","journal-title":"IEEE Internet Things J."},{"key":"40_CR31","doi-asserted-by":"crossref","unstructured":"Zhao, G., Si, X., Wang, J., Long, X., Hu, T.: A novel mutual authentication scheme for Internet of Things. In: Proceedings of 2011 International Conference on Modelling, Identification and Control, Shanghai, pp. 563\u2013566 (2011)","DOI":"10.1109\/ICMIC.2011.5973767"}],"container-title":["Advances in Intelligent Systems and Computing","Cybernetics and Algorithms in Intelligent Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-91192-2_40","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,1]],"date-time":"2020-11-01T21:25:14Z","timestamp":1604265914000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-91192-2_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,17]]},"ISBN":["9783319911915","9783319911922"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-91192-2_40","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2018,5,17]]}}}