{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T16:37:17Z","timestamp":1768408637384,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":38,"publisher":"Springer Singapore","isbn-type":[{"value":"9789811563522","type":"print"},{"value":"9789811563539","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,11,10]],"date-time":"2020-11-10T00:00:00Z","timestamp":1604966400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,11,10]],"date-time":"2020-11-10T00:00:00Z","timestamp":1604966400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-15-6353-9_46","type":"book-chapter","created":{"date-parts":[[2020,11,9]],"date-time":"2020-11-09T12:06:39Z","timestamp":1604923599000},"page":"493-504","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":30,"title":["IoT Security, Challenges, and Solutions: A Review"],"prefix":"10.1007","author":[{"given":"Jayashree","family":"Mohanty","sequence":"first","affiliation":[]},{"given":"Sushree","family":"Mishra","sequence":"additional","affiliation":[]},{"given":"Sibani","family":"Patra","sequence":"additional","affiliation":[]},{"given":"Bibudhendu","family":"Pati","sequence":"additional","affiliation":[]},{"given":"Chhabi Rani","family":"Panigrahi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,10]]},"reference":[{"key":"46_CR1","doi-asserted-by":"crossref","unstructured":"Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of Things (IoT): a vision, architectural elements, and future directions.\u00a0Future Gener. Comput. Syst.\u00a029(7), 1645\u20131660 (2013)","DOI":"10.1016\/j.future.2013.01.010"},{"key":"46_CR2","doi-asserted-by":"crossref","unstructured":"Gopi, A., Kameswara Rao, M.: Survey of privacy and security issues in IoT.\u00a0Int. J. Eng. Technol. 7(27), 293 (2018)","DOI":"10.14419\/ijet.v7i2.7.10600"},{"issue":"27","key":"46_CR3","first-page":"31","volume":"179","author":"T Aziz","year":"2018","unstructured":"Aziz, T., Haq, E.: Security challenges facing IoT layers and its protective measures. Int. J. Comput. Appl. 179(27), 31\u201335 (2018)","journal-title":"Int. J. Comput. Appl."},{"key":"46_CR4","unstructured":"Rico-Alvarino, A., et al.: An overview of 3GPP enhancements on machine to machine communications.\u00a0IEEE Commun. Mag. 54(6), 14\u201321 (2016)"},{"key":"46_CR5","unstructured":"https:\/\/www.ubuntupit.com\/top-15-standard-iot-protocols-that-you-must-know-about\/. Accessed 6 June 2019"},{"key":"46_CR6","unstructured":"Pandey, E., Gupta, V.: An analysis of security issues of Internet of Things (IoT). Int. J. Adv. Res. Comput. Sci. Softw. Eng. 5(11), 768\u2013773 (2015)"},{"key":"46_CR7","unstructured":"Malge, S., Singh, P.: Internet of Things (IoT): security perspective 3(4), 2456\u20136470 (2019). e-ISSN: www.ijtsrd.com"},{"key":"46_CR8","unstructured":"Jaychand, N.B.: A survey on IoT security threats and solutions. Int. J. Innov. Res. Comput. Commun. Eng. 5(3), 5187\u20135193 (2017)"},{"key":"46_CR9","doi-asserted-by":"crossref","unstructured":"Suoa, H., Jiafu Wana, B.: A security in the Internet of Things: a review. In: International Conference on Computer Science and Electronics Engineering, pp. 648\u2013651 (2012)","DOI":"10.1109\/ICCSEE.2012.373"},{"key":"46_CR10","unstructured":"Zhang, W., Qu, B.: Security architecture of the Internet of Things oriented to perceptual layer.\u00a0Int. J. Comput. Consum. Control. (IJ3C)\u00a02(2), 37\u201345 (2013)"},{"key":"46_CR11","unstructured":"Fernades, P., Monteiro, A., Lasrado, S.A.: Evolution of Internet of Things (IoT): security challenges and future scope, Int. J. Latest Trends Eng. Technol. 164\u2013168 (2016)"},{"issue":"7","key":"46_CR12","first-page":"491","volume":"8","author":"A Wahab","year":"2017","unstructured":"Wahab, A., Ahmad, O., Muhammad, M., Ali, M.: A comprehensive analysis on the security threats and their countermeasures of IoT. Int. J. Adv. Comput. Sci. Appl. 8(7), 491\u2013501 (2017)","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"46_CR13","unstructured":"Khoo, B.: RFID as an enabler of the Internet of Things: issues of security and privacy. In:\u00a0Internet of Things (iThings\/CPSCom), International Conference on and 4th International Conference on Cyber, Physical and Social Computing, IEEE, October, 2011, pp. 709\u2013712 (2011)"},{"key":"46_CR14","unstructured":"Sathish Kumar, J., Patel, D.R.: A survey on Internet of Things: security and privacy issues.\u00a0Int. J. Comput. Appl. 90(11), 20\u201326 (2014)"},{"key":"46_CR15","unstructured":"Pandey, P., Gupta, V.: An analysis of security issues of internet of things. IJARCSSE 5(11), 768\u2013773 (2015)"},{"issue":"7","key":"46_CR16","first-page":"1","volume":"111","author":"MU Farooq","year":"2015","unstructured":"Farooq, M.U., Waseem, M., Khairi, A., Mazhar, S.: A critical analysis on the security concerns of Internet of Things (IoT). Int. J. Comput. Appl. 111(7), 1\u20136 (2015)","journal-title":"Int. J. Comput. Appl."},{"key":"46_CR17","unstructured":"Mendez, D.M., Papapanagiotou, I., Yang, B.: Internet of Things: survey on security and privacy, pp. 162\u2013182 (2017).\u00a0https:\/\/arxiv.org\/1707.01879"},{"key":"46_CR18","doi-asserted-by":"crossref","unstructured":"Sain, M., Kang, Y.J., Lee, H.J.: Survey on security in Internet of Things: state of the art and challenges. ICACT 19\u201322 (2017)","DOI":"10.23919\/ICACT.2017.7890183"},{"issue":"01","key":"46_CR19","doi-asserted-by":"crossref","first-page":"121","DOI":"10.4236\/jcc.2017.51010","volume":"05","author":"E Leloglu","year":"2017","unstructured":"Leloglu, E.: A review of security concerns in Internet of Things. J. Comput. Commun. 05(01), 121\u2013136 (2017)","journal-title":"J. Comput. Commun."},{"key":"46_CR20","unstructured":"Abomhara, M., K\u00f8ien, G.M., Security and privacy in the Internet of Things: Current status and open issues. In\u00a0Privacy and Security in Mobile Systems (PRISMS), International Conference on, IEEE, (2014) . 1\u20138."},{"issue":"3","key":"46_CR21","first-page":"5187","volume":"5","author":"J Chand","year":"2017","unstructured":"Chand, J., Behar, N.: A survey on IoT security threats and solutions. IJIRCCE 5(3), 5187\u20135193 (2017)","journal-title":"IJIRCCE"},{"key":"46_CR22","doi-asserted-by":"crossref","unstructured":"Pereira, P.P., Eliasson, J., Kyusakov, R., Delsing, J., Raayatinezhad, A., Johansson, M.: Enabling cloud connectivity for mobile Internet of Things applications. In:\u00a0IEEE 7th International Symposium on Service Oriented System Engineering (SOSE), pp. 518\u2013526 (2013)","DOI":"10.1109\/SOSE.2013.33"},{"key":"46_CR23","doi-asserted-by":"crossref","unstructured":"Sasikala, B.: Internet of Things: a survey on security issues analysis and countermeasures.\u00a0Int. J. Eng. Comput. Sci. 21435\u201322442 (2017)","DOI":"10.18535\/ijecs\/v6i5.41"},{"key":"46_CR24","doi-asserted-by":"crossref","unstructured":"Singh, D., Tripathi, G., Jara, A.J.: A survey of Internet-of-Things: future vision, architecture, challenges and services. In:\u00a0IEEE World Forum on Internet of Things (WF-IoT), pp. 287\u2013292 (2014)","DOI":"10.1109\/WF-IoT.2014.6803174"},{"key":"46_CR25","doi-asserted-by":"crossref","unstructured":"Suciu, G., et al.: Big data, internet of things and cloud convergence \u2013 an architecture for secure e-health applications.\u00a0J. Med. Syst. 39(11), 141(1\u20138) (2015)","DOI":"10.1007\/s10916-015-0327-y"},{"issue":"4","key":"46_CR26","doi-asserted-by":"crossref","first-page":"2483","DOI":"10.1109\/JIOT.2017.2767291","volume":"5","author":"M Frustaci","year":"2018","unstructured":"Frustaci, M., Pace, P., Aloi, G., Fortino, G.: Evaluating critical security issues of the IoT world: present and future challenges. IEEE Internet of Things J. 5(4), 2483\u20132495 (2018)","journal-title":"IEEE Internet of Things J."},{"issue":"3","key":"46_CR27","doi-asserted-by":"crossref","first-page":"1294","DOI":"10.1109\/COMST.2015.2388550","volume":"17","author":"J Granjal","year":"2015","unstructured":"Granjal, J., Monteiro, E., Silva, J.: Security for the Internet of Things: a survey of existing protocols and open research issues. IEEE Commun. Surv. Tutor. 17(3), 1294\u20131310 (2015)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"46_CR28","unstructured":"Mohammed, A., Alkuhlani, I., Thorat, S.B.: Internet of Things (IoT) standards, protocols and security issues. Int. J. Adv. Res. Comput. Commun. Eng. 4(11), 491\u2013494 (2015)"},{"key":"46_CR29","unstructured":"Long, C.: Security management for the Internet of Things. Electronic theses and dissertations, 5932 (2017). https:\/\/scholar.uwindsor.ca\/etd\/5932"},{"key":"46_CR30","doi-asserted-by":"crossref","unstructured":"Azka, Revathi, S.: Protocols for secure Internet of Things. J. Educ. Manag. Eng. 20\u201328 (2017)","DOI":"10.5815\/ijeme.2017.02.03"},{"key":"46_CR31","unstructured":"https:\/\/www.electronics-notes.com\/articles\/connectivity\/ieee-802-15-4-wireless\/6lowpan.php. Accessed 21 Apr 2019"},{"key":"46_CR32","unstructured":"https:\/\/www.darkreading.com\/vulnerabilities---threats\/new-security-woes-for-popular-iot-protocols\/d\/d-id\/1333069. Accessed 10 Aug 2018"},{"key":"46_CR33","unstructured":"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/internet-of-things\/mqtt-and-coap-security-and-privacy-issues-in-iot-and-iiot-communication-protocol. Accessed 2 Nov 2019"},{"key":"46_CR34","unstructured":"Salman, T.: Networking protocols and standards for Internet of Things, pp. 1\u201321 (2015). https:\/\/www.cse.wustl.edu\/~jain\/cse570-15\/ftp\/iot_prot\/index.html"},{"key":"46_CR35","unstructured":"Lu, Y., Xu, L.: Internet of Things (IoT) cyber security research: a review of current research topic"},{"key":"46_CR36","first-page":"243","volume":"189","author":"D Puthal","year":"2018","unstructured":"Puthal, D., Ranjan, R., Nepal, S., Chen, J.: IoT and big data: an architecture with data flow and security issues. LNICST 189, 243\u2013252 (2018)","journal-title":"LNICST"},{"key":"46_CR37","unstructured":"Azamuddin: Survey on IoT Security (2019). https:\/\/www.coursehero.com\/file\/33381554\/iot-sec2pdf\/"},{"key":"46_CR38","doi-asserted-by":"publisher","unstructured":"Hossain, Md.M., Fotouhi, M., Hasan, R.: Towards an analysis of security issues, challenges, and open problems in the Internet of Things, pp. 1\u20138. IEEE (2015). 978\u20131\u20134673\u20137275\u20136\/15, https:\/\/doi.org\/10.1109\/SERVICES.2015.12","DOI":"10.1109\/SERVICES.2015.12"}],"container-title":["Advances in Intelligent Systems and Computing","Progress in Advanced Computing and Intelligent Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-6353-9_46","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,9]],"date-time":"2020-11-09T12:31:43Z","timestamp":1604925103000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-6353-9_46"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,10]]},"ISBN":["9789811563522","9789811563539"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-6353-9_46","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,11,10]]},"assertion":[{"value":"10 November 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}