{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T04:13:14Z","timestamp":1748751194256,"version":"3.41.0"},"publisher-location":"Singapore","reference-count":28,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811002809"},{"type":"electronic","value":"9789811002816"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-981-10-0281-6_42","type":"book-chapter","created":{"date-parts":[[2015,12,17]],"date-time":"2015-12-17T04:57:57Z","timestamp":1450328277000},"page":"289-294","source":"Crossref","is-referenced-by-count":2,"title":["A Study on Framework for Developing Secure IoT Service"],"prefix":"10.1007","author":[{"given":"Miyeon","family":"Yoon","sequence":"first","affiliation":[]},{"given":"Jonghyun","family":"Baek","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,18]]},"reference":[{"key":"42_CR1","unstructured":"FIDO Authentication (2015). https:\/\/fidoalliance.org\/specifications\/download\/"},{"key":"42_CR2","unstructured":"Security 2.0. https:\/\/allseenalliance.org\/developers\/learn\/core\/security2_0\/hld . Allseen alliance, January 2015"},{"key":"42_CR3","unstructured":"OIC, OIC_Security_Specification_Project_B_v0.9.9. OIC alliance (2015)"},{"key":"42_CR4","unstructured":"oneM2M, TS-0003-Security_Solutions-V1_0_1. oneM2M (2015)"},{"key":"42_CR5","unstructured":"DTLS, Datagram Transport Layer Security Version 1.2. RFC 6347 (2012)"},{"key":"42_CR6","unstructured":"TLS, The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246 (2008)"},{"key":"42_CR7","unstructured":"ISO\/IEC 15946, Information technology\u2013 Security techniques\u2013 Cryptographic techniques based on elliptic curves, November 2011"},{"key":"42_CR8","unstructured":"Internet of Things: Privacy & Security in a Connected World, FTC, January 2015"},{"key":"42_CR9","unstructured":"Zhang, W., Qu, B.: Security Architecture of the IoT Oriented to Perceptual Layer. IJ3C 2(2) (2013)"},{"key":"42_CR10","unstructured":"Opinion 8\/2014 on the on Recent Developments on the IoT. EU Data Protection Working Party, September 2014"},{"key":"42_CR11","unstructured":"Jha, A., Sunil, M.C.: Whitepaper: Security Considerations for Internet of Things. L&T Technology Services (2015)"},{"key":"42_CR12","doi-asserted-by":"crossref","unstructured":"Zhao, K., Ge, L.: A survey on the internet of things security, In: 2013 Ninth International Conference on Computational Intelligence and Security. IEEE (2013)","DOI":"10.1109\/CIS.2013.145"},{"key":"42_CR13","doi-asserted-by":"crossref","unstructured":"Zhang, B., Zou, Z., Liu, M.: Evaluation on security system of internet of things based on fuzzy-AHP method. In: ICEE, May 2011","DOI":"10.1109\/ICEBEG.2011.5881939"},{"key":"42_CR14","doi-asserted-by":"crossref","unstructured":"Babar, S., Stango, A., Prasad, N., Sen, J., Prasad, R.: Proposed embedded security framework for internet of things (IoT). In: 2011 2nd International Conference on Wireless VITAE (2011)","DOI":"10.1109\/WIRELESSVITAE.2011.5940923"},{"issue":"9","key":"42_CR15","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1109\/MC.2011.291","volume":"44","author":"R Roman","year":"2011","unstructured":"Roman, R.: Securing the Internet of Things. IEEE Computer 44(9), 51\u201358 (2011)","journal-title":"IEEE Computer"},{"issue":"3","key":"42_CR16","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1007\/s11277-011-0385-5","volume":"61","author":"T Heer","year":"2011","unstructured":"Heer, T.: Security Challenges in the IP-based Internet of Things. Journal on Wireless Personal Communications 61(3), 527\u2013542 (2011)","journal-title":"Journal on Wireless Personal Communications"},{"key":"42_CR17","doi-asserted-by":"crossref","unstructured":"Whitehouse, O.: Security of Things: An Implementers\u2019 Guide to Cyber-security for Internet of Things Devices and Beyond, NCC Group (2014)","DOI":"10.1016\/S1353-4858(14)70075-3"},{"key":"42_CR18","doi-asserted-by":"crossref","unstructured":"Babar, S., et al.: Proposed security model and threat taxonomy for the IoT. In: CNSA 2010, pp. 420\u2013429 (2010)","DOI":"10.1007\/978-3-642-14478-3_42"},{"key":"42_CR19","doi-asserted-by":"crossref","unstructured":"Ukil, A.: Embedded security for internet of things. In: NCETACS 2011, pp. 1\u20136 (2011)","DOI":"10.1109\/NCETACS.2011.5751382"},{"key":"42_CR20","unstructured":"Ora, L.: Safety standards in the ARM ecosystem. ARM Whitepaper, January 2015"},{"key":"42_CR21","unstructured":"Kempf, J., et al.: Thoughts on reliability in the internet of things. In: Interconnecting smart objects with the Internet workshop, vol. 1 (2011)"},{"key":"42_CR22","doi-asserted-by":"crossref","unstructured":"Linpner, S.: The trustworthy computing security development lifecycle. In: ACSAC 2004, pp. 2\u201313 (2004)","DOI":"10.1109\/CSAC.2004.41"},{"key":"42_CR23","unstructured":"Security Considerations in the System Development Life Cycle (SP800-64 Revision2). NIST (2008)"},{"key":"42_CR24","doi-asserted-by":"crossref","unstructured":"Bormann, C., et al.: Terminology for Constrained-Node Networks (RFC7228). IETF, May 2014","DOI":"10.17487\/rfc7228"},{"key":"42_CR25","unstructured":"Internet of Things Research Study 2014 Report, Hewlett Packard (2014)"},{"key":"42_CR26","unstructured":"Pescatore, J.: Securing the Internet of Things Survey. SANS Institute, January 2014"},{"key":"42_CR27","unstructured":"Ministry of Science, ICT and Future Planning, South Korea. http:\/\/www.msip.go.kr"},{"key":"42_CR28","unstructured":"10 Specialized Action Plans for IoT Development (2013-2015), Ministry of Industry and Information Technology, China"}],"container-title":["Lecture Notes in Electrical Engineering","Advances in Computer Science and Ubiquitous Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-0281-6_42","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T20:43:52Z","timestamp":1748724232000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-0281-6_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9789811002809","9789811002816"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-0281-6_42","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2015]]}}}