{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T15:37:00Z","timestamp":1768837020706,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":55,"publisher":"Springer Singapore","isbn-type":[{"value":"9789811358258","type":"print"},{"value":"9789811358265","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-13-5826-5_46","type":"book-chapter","created":{"date-parts":[[2019,1,24]],"date-time":"2019-01-24T10:07:57Z","timestamp":1548324477000},"page":"591-604","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Survey of Security Threats in IoT and Emerging Countermeasures"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1608-9682","authenticated-orcid":false,"given":"Mimi","family":"Cherian","sequence":"first","affiliation":[]},{"given":"Madhumita","family":"Chatterjee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,24]]},"reference":[{"key":"46_CR1","doi-asserted-by":"crossref","unstructured":"Frustaci, M., Pace, P., Aloi, G.: Securing the IoT world: issues and perspectives. In: IEEE Conference on Standards for Communications and Networking (CSCN) (2017)","DOI":"10.1109\/CSCN.2017.8088629"},{"key":"46_CR2","unstructured":"Chahid, Y., Benabdellah, M., Azizi, A.: Traffic-aware firewall optimization strategies (2010)"},{"key":"46_CR3","doi-asserted-by":"crossref","unstructured":"Deogirikar, J., Vidhate, A.: Security attacks inIoT: a survey. In: International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC 2017)","DOI":"10.1109\/I-SMAC.2017.8058363"},{"key":"46_CR4","unstructured":"Lin, J., Yuy, W., Zhangz, N., Yang, X., Zhangx, H., Zhao, W.: A survey on internet of things: architecture, enabling technologies, security and privacy, and applications. In: 2016 IEEE"},{"key":"46_CR5","unstructured":"Mendez, D., Papapanagiotou, I., Yang, B.: Internet of Things: survey on security and privacy. In: IEEE J. July 2017"},{"key":"46_CR6","doi-asserted-by":"crossref","unstructured":"Varga, P., Plosz, S., Soos, G.: Security threats and issues in automation IoT. IEEE (2017)","DOI":"10.1109\/WFCS.2017.7991968"},{"key":"46_CR7","doi-asserted-by":"crossref","unstructured":"Kumar, S.A., Vealey, T., Srivastava, H.: Security in Internet of Things: challenges, solutions and future directions. In: 49th Hawaii International Conference on System Sciences (2016)","DOI":"10.1109\/HICSS.2016.714"},{"key":"46_CR8","doi-asserted-by":"crossref","unstructured":"Kuusijarvi, J., Savola, R., Savolainen, P., Evesti, A.: Mitigating loT security threats with a trusted network element. In: The 11th International Conference for Internet Technology and Secured Transactions (ICITST-2016)","DOI":"10.1109\/ICITST.2016.7856708"},{"key":"46_CR9","doi-asserted-by":"crossref","unstructured":"Dorsemaine, B., Gaulier, J-P., Wary, J-P., Kheir, N.: A new approach to investigate IoT threats based on a four layer model. In: 13th International Conference on New Technologies for Distributed Systems (NOTERE 2016)","DOI":"10.1109\/NOTERE.2016.7745830"},{"key":"46_CR10","unstructured":"The Internet of Things reference model. 4CISCO (2014). http:\/\/cdn.iotwf.com\/resources\/71\/IoTReferenceModelWhitePaperJune42014.pdf"},{"key":"46_CR11","unstructured":"Emmerson, B.: Unleashing the Internet of Things. http:\/\/www.iotevolutionworld.com\/m2m\/articles\/208798-unleashing-internet-things.htm"},{"issue":"8","key":"46_CR12","doi-asserted-by":"publisher","first-page":"1174","DOI":"10.1109\/JPROC.2014.2322103","volume":"102","author":"M Zhang","year":"2014","unstructured":"Zhang, M., Raghunathan, A., Jha, N.K.: Trustworthiness of medical devices and body area networks. Proc. IEEE 102(8), 1174\u20131188 (2014)","journal-title":"Proc. IEEE"},{"key":"46_CR13","unstructured":"Li, C., Raghunathan, A., Jha, N.K.: Hijacking an insulin pump: security attacks and defenses for a diabetes therapy system. In: Proceedings of the IEEE 13th International Conference on e-Health Networking Applications and Services, pp. 150\u2013156 (2011)"},{"key":"46_CR14","doi-asserted-by":"crossref","unstructured":"Halperin, D., et al.: Pacemakers and implantable cardiac defibrillators: software radio attacks and zeropower defenses. In: Proceedings of the IEEE Symposium Security and Privacy, pp. 129\u2013142 (2008)","DOI":"10.1109\/SP.2008.31"},{"issue":"8","key":"46_CR15","doi-asserted-by":"publisher","first-page":"1229","DOI":"10.1109\/JPROC.2014.2334493","volume":"102","author":"S Bhunia","year":"2014","unstructured":"Bhunia, S., Hsiao, M.S., Banga, M., Narasimhan, S.: Hardware trojan attacks: threat analysis and countermeasures. Proc. IEEE 102(8), 1229\u20131247 (2014)","journal-title":"Proc. IEEE"},{"key":"46_CR16","unstructured":"Brandt, A., Buron, J.: Home automation routing requirements in low-power and lossy networks. https:\/\/tools.ietf.org\/html\/rfc5826"},{"key":"46_CR17","doi-asserted-by":"crossref","unstructured":"Martin, T., Hsiao, M., Ha, D., Krishnaswami, J.: Denial-of-service attacks on battery-powered mobile computers. In: Proceedings of the IEEE 2nd Conference on Pervasive Computing and Communications, pp. 309\u2013318 (2004)","DOI":"10.1109\/PERCOM.2004.1276868"},{"key":"46_CR18","unstructured":"Matrosov, A., Rodionov, E., Harley, D., Malcho, J.: Stuxnet under the microscope, ESET LLC, Technical report (2011)"},{"key":"46_CR19","doi-asserted-by":"crossref","first-page":"367","DOI":"10.1201\/9780849379253-20","volume":"1","author":"JP Walters","year":"2007","unstructured":"Walters, J.P., Liang, Z., Shi, W., Chaudhary, V.: Wireless sensor network security: a survey. Secur. Distrib. Grid Mobile Pervasive Comput. 1, 367 (2007)","journal-title":"Secur. Distrib. Grid Mobile Pervasive Comput."},{"key":"46_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/3-540-45748-8_24","volume-title":"Peer-to-Peer Systems","author":"JR Douceur","year":"2002","unstructured":"Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251\u2013260. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-45748-8_24"},{"key":"46_CR21","unstructured":"Karakehayov, Z.: Using reward to detect team black-hole attacks in wireless sensor networks. In: Proceedings of the Workshop on Real-World Wireless Sensor Networks, pp. 20\u201321 (2005)"},{"key":"46_CR22","unstructured":"Garcia-Morchon, O., Kumar, S., Struik, R., Keoh, S., Hummen, R.: Security considerations in the IP-based Internet of Things. https:\/\/tools.ietf.org\/html\/draft-garcia-core-security-04"},{"key":"46_CR23","unstructured":"Hernandez, G., Arias, O., Buentello, D., Jin, Y.: Smart nest thermostat: a smart spy in your home. In: Proceedings of the Black Hat USA (2014)"},{"key":"46_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/978-3-642-01516-8_20","volume-title":"Pervasive Computing","author":"M Lehtonen","year":"2009","unstructured":"Lehtonen, M., Ostojic, D., Ilic, A., Michahelles, F.: Securing RFID systems by detecting tag cloning. In: Tokuda, H., Beigl, M., Friday, A., Brush, A.J.B., Tobe, Y. (eds.) Pervasive 2009. LNCS, vol. 5538, pp. 291\u2013308. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-01516-8_20"},{"key":"46_CR25","unstructured":"Parno, B., Perrig, A., Gligor, V.: Distributed detection of node replication attacks in sensor networks. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 49\u201363 (2005)"},{"key":"46_CR26","unstructured":"Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 197\u2013213 (2003)"},{"key":"46_CR27","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1007\/978-3-319-04283-1_18","volume-title":"Security and Privacy in Communication Networks","author":"M Msgna","year":"2013","unstructured":"Msgna, M., Markantonakis, K., Mayes, K.: The B-Side of side channel leakage: control flow security in embedded systems. In: Zia, T., Zomaya, A., Varadharajan, V., Mao, M. (eds.) SecureComm 2013. LNICST, vol. 127, pp. 288\u2013304. Springer, Cham (2013). https:\/\/doi.org\/10.1007\/978-3-319-04283-1_18"},{"key":"46_CR28","unstructured":"Carluccio, D., Lemke, K., Paar, C.: Electromagnetic side channel analysis of a contactless smart card: First results. http:\/\/www.iaik.tu-graz.ac.at\/research\/krypto\/events\/index.php"},{"issue":"3","key":"46_CR29","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1145\/2000502.2000503","volume":"7","author":"M Zhang","year":"2011","unstructured":"Zhang, M., Jha, N.K.: FinFET-based power management for improved DPA resistance with low overhead. ACM J. Emerg. Technol. Comput. Syst. 7(3), 10 (2011)","journal-title":"ACM J. Emerg. Technol. Comput. Syst."},{"key":"46_CR30","doi-asserted-by":"crossref","unstructured":"Sundaresan, V., Rammohan, S., Vemuri, R.: Defense against side-channel power analysis attacks on microelectronic systems. In: Proceedings of the IEEE National Conference on Aerospace and Electronics, pp. 144\u2013150 (2008)","DOI":"10.1109\/NAECON.2008.4806536"},{"key":"46_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1007\/11506157_16","volume-title":"Information Security and Privacy","author":"MR Rieback","year":"2005","unstructured":"Rieback, M.R., Crispo, B., Tanenbaum, A.S.: RFID guardian: a battery-powered mobile device for RFID privacy management. In: Boyd, C., Gonz\u00e1lez Nieto, J.M. (eds.) ACISP 2005. LNCS, vol. 3574, pp. 184\u2013194. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11506157_16"},{"issue":"8","key":"46_CR32","first-page":"2007","volume":"45","author":"S Kinoshita","year":"2004","unstructured":"Kinoshita, S., Hoshino, F., Komuro, T., Fujimura, A., Ohkubo, M.: Low-cost RFID privacy protection scheme. IPS J. 45(8), 2007\u20132021 (2004)","journal-title":"IPS J."},{"key":"46_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"912","DOI":"10.1007\/11833529_93","volume-title":"Ubiquitous Intelligence and Computing","author":"P Peris-Lopez","year":"2006","unstructured":"Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: M2AP: a minimalist mutual-authentication protocol for low-cost RFID tags. In: Ma, J., Jin, H., Yang, L.T., Tsai, J.J.-P. (eds.) UIC 2006. LNCS, vol. 4159, pp. 912\u2013923. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11833529_93"},{"issue":"8","key":"46_CR34","doi-asserted-by":"publisher","first-page":"2661","DOI":"10.1016\/j.adhoc.2013.04.014","volume":"11","author":"S Raza","year":"2013","unstructured":"Raza, S., Wallgren, L., Voigt, T.: SVELTE: real-time intrusion detection in the Internet of Things. Ad-hoc Netw. 11(8), 2661\u20132674 (2013)","journal-title":"Ad-hoc Netw."},{"key":"46_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/978-3-540-74619-5_12","volume-title":"Fast Software Encryption","author":"T Shirai","year":"2007","unstructured":"Shirai, T., Shibutani, K., Akishita, T., Moriai, S., Iwata, T.: The 128-bit blockcipher CLEFIA (Extended Abstract). In: Biryukov, A. (ed.) FSE 2007. LNCS, vol. 4593, pp. 181\u2013195. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-74619-5_12"},{"key":"46_CR36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74735-2_31","volume-title":"PRESENT: An Ultra-lightweight Block Cipher","author":"A Bogdanov","year":"2007","unstructured":"Bogdanov, A., et al.: PRESENT: An Ultra-lightweight Block Cipher. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-74735-2_31"},{"key":"46_CR37","doi-asserted-by":"crossref","unstructured":"Son, S., McKinley, K.S., Shmatikov, V.: Diglossia: detecting code injection attacks with precision and efficiency. In: Proceedings of the ACM SIGSAC Conference Computer Communications Security, pp. 1181\u20131192 (2013)","DOI":"10.1145\/2508859.2516696"},{"key":"46_CR38","doi-asserted-by":"crossref","unstructured":"Salman, O.: Identity-based authentication scheme for the Internet of Things. In: Proceedings of the IEEE 21st Symposium on Computers and Communication (ISCC), Italy, pp. 1109\u20131111 (2016)","DOI":"10.1109\/ISCC.2016.7543884"},{"key":"46_CR39","doi-asserted-by":"crossref","unstructured":"Nobakht, M., Sivaraman, V., Boreli, R.: A host-based intrusion detection and mitigation framework for smart home IoT using OpenFlow. In: Proceedings of the IEEE 11th International Conference on Availability, Reliability and Security (ARES), pp. 147\u2013156 (2016)","DOI":"10.1109\/ARES.2016.64"},{"key":"46_CR40","doi-asserted-by":"crossref","unstructured":"Chakrabarty, S., Engels, D.W., Thathapudi, S.: Black SDN for the Internet of Things. In: Proceedings of the IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems (MASS), Dallas, USA, pp. 190\u2013198 (2015)","DOI":"10.1109\/MASS.2015.100"},{"key":"46_CR41","doi-asserted-by":"crossref","unstructured":"Bull, P.: Flow based security for IoT devices using an SDN gateway. In: Proceedings of the IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud), Austria, pp. 157\u2013163 (2016)","DOI":"10.1109\/FiCloud.2016.30"},{"key":"46_CR42","doi-asserted-by":"crossref","unstructured":"Flauzac, O.: SDN based architecture for IoT and improvement of the security. In: Proceedings of the IEEE 29th International Conference on Advanced Information Networking and Applications Workshops (WAINA), South Korea, pp. 688\u2013693 (2015)","DOI":"10.1109\/WAINA.2015.110"},{"key":"46_CR43","doi-asserted-by":"crossref","unstructured":"Gonzalez, C.: A novel distributed SDN-secured architecture for the IoT. In: Proceedings of the IEEE International Conference on Distributed Computing in Sensor systems (DCOSS), Washington, USA, pp. 244\u2013249 (2016)","DOI":"10.1109\/DCOSS.2016.22"},{"key":"46_CR44","doi-asserted-by":"crossref","unstructured":"Bhunia, S.S., Gurusamy, M.: Dynamic attack detection and mitigation in IoT using SDN. In: 27th International Telecommunication Networks and Applications Conference (ITNAC). IEEE (2017)","DOI":"10.1109\/ATNAC.2017.8215418"},{"key":"46_CR45","doi-asserted-by":"crossref","unstructured":"Satasiya, D., Raviya, R., Kumar, H.: Enhanced SDN security using firewall in a distributed scenario. In: 2016 International Conference on Advanced Communication Control and Computing Technologies (ICACCCT). ISBN No. 978-1-4673-9545-8","DOI":"10.1109\/ICACCCT.2016.7831708"},{"key":"46_CR46","doi-asserted-by":"crossref","unstructured":"Tselios, C., Politis, I., Kotsopoulos, S.: Enhancing SDN security for IoT-related deployments through Blockchain. In: IEEE NFV-SDN 2017 - Third International Workshop on Security in NFV-SDN,978-1-5386-3285-7\/17. IEEE (2017)","DOI":"10.1109\/NFV-SDN.2017.8169860"},{"key":"46_CR47","unstructured":"IBM Corp.: Blockchain benefits for electronics - White Paper. https:\/\/public.dhe.ibm.com\/common\/ssi\/ecm\/gb\/en\/gbe03809usen\/GBE03809USEN.PDF"},{"key":"46_CR48","unstructured":"Microsoft Corp.: Blockchain as a Service. https:\/\/azure.microsoft.com\/en-us\/solutions\/blockchain\/"},{"key":"46_CR49","unstructured":"The Linux Foundation: Hyperledger project. https:\/\/www.hyperledger.org\/"},{"key":"46_CR50","unstructured":"Ericsson, Data-centric security. http:\/\/cloudpages.ericsson.com\/data-centric-security-ebook"},{"key":"46_CR51","unstructured":"Citrix Systems Inc., Netscaler: Secure Event Delivery Controller"},{"key":"46_CR52","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1109\/ACCESS.2017.2757955","volume":"6","author":"Pradip Kumar Sharma","year":"2018","unstructured":"Sharma, P.K., Chen, M-Y., Park, J.H.: A software defined fog node based distributed blockchain cloud architecture for IoT. IEEE Access. https:\/\/doi.org\/10.1109\/ACCESS.2017.2757955","journal-title":"IEEE Access"},{"key":"46_CR53","unstructured":"Duong, T., Fan, L., Zhou, H.S.: 2-hop blockchain: combining proof-of-work and proof-of-stake securely. In: IACR 2016, pp. 1\u201340 (2016)"},{"key":"46_CR54","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/j.future.2013.12.024","volume":"34","author":"TS Somasundaram","year":"2014","unstructured":"Somasundaram, T.S., Kannan, G.: CLOUDRB: a framework for scheduling and managing high-performance computing (HPC) applications in science cloud. Future Gener. Comput. Syst. 34, 47\u201365 (2014)","journal-title":"Future Gener. Comput. Syst."},{"issue":"9","key":"46_CR55","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1109\/MCOM.2017.1700041","volume":"55","author":"PK Sharma","year":"2017","unstructured":"Sharma, P.K., Singh, S., Jeong, Y.-S., Park, J.H.: DistBlockNet: a distributed blockchains-based secure SDN architecture for IoT networks. IEEE Commun. Mag. 55(9), 78\u201385 (2017)","journal-title":"IEEE Commun. Mag."}],"container-title":["Communications in Computer and Information Science","Security in Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-5826-5_46","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T08:07:45Z","timestamp":1606118865000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-5826-5_46"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811358258","9789811358265"],"references-count":55,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-5826-5_46","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"24 January 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SSCC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Security in Computing and Communication","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bangalore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sscc2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.acn-conference.org\/sscc2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}