{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,14]],"date-time":"2025-06-14T04:08:10Z","timestamp":1749874090752,"version":"3.41.0"},"publisher-location":"Singapore","reference-count":73,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819655656","type":"print"},{"value":"9789819655663","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-5566-3_18","type":"book-chapter","created":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T20:23:03Z","timestamp":1749846183000},"page":"344-378","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["LUA-IoT: Let\u2019s Usably Authenticate the\u00a0IoT"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9733-540X","authenticated-orcid":false,"given":"Markus","family":"Dahlmanns","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0398-6904","authenticated-orcid":false,"given":"Jan","family":"Pennekamp","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0009-4390-6121","authenticated-orcid":false,"given":"Robin","family":"Decker","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7252-4186","authenticated-orcid":false,"given":"Klaus","family":"Wehrle","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,14]]},"reference":[{"key":"18_CR1","doi-asserted-by":"publisher","unstructured":"Aas, J., Barnes, R., Case, B., Durumeric, Z., et\u00a0al.: Let\u2019s encrypt: an automated certificate authority to encrypt the entire web. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (CCS \u201919), pp. 2473\u20132487. ACM (2019). https:\/\/doi.org\/10.1145\/3319535.3363192","DOI":"10.1145\/3319535.3363192"},{"key":"18_CR2","doi-asserted-by":"publisher","unstructured":"Abdolinezhad, S., Sikora, A.: A lightweight mutual authentication protocol based on physical unclonable functions. In: Proceedings of the 2022 IEEE International Symposium on Hardware Oriented Security and Trust (HOST \u201922), pp. 161\u2013164 (2022). https:\/\/doi.org\/10.1109\/HOST54066.2022.9840132","DOI":"10.1109\/HOST54066.2022.9840132"},{"key":"18_CR3","doi-asserted-by":"publisher","unstructured":"Akram, M., Barker, W.C., Clatterbuck, R., Dodson, D., et\u00a0al.: Securing web transactions TLS server certificate management. NIST SP 1800-16 (2020). https:\/\/doi.org\/10.6028\/nist.sp.1800-16","DOI":"10.6028\/nist.sp.1800-16"},{"issue":"16","key":"18_CR4","doi-asserted-by":"publisher","first-page":"3450","DOI":"10.3390\/math11163450","volume":"11","author":"H Alasmary","year":"2023","unstructured":"Alasmary, H., Tanveer, M.: ESCI-AKA: enabling secure communication in an IoT-enabled smart home environment using authenticated key agreement framework. Mathematics 11(16), 3450 (2023). https:\/\/doi.org\/10.3390\/math11163450","journal-title":"Mathematics"},{"issue":"11","key":"18_CR5","doi-asserted-by":"publisher","first-page":"5123","DOI":"10.1007\/s12652-020-02349-5","volume":"13","author":"BA Alzahrani","year":"2022","unstructured":"Alzahrani, B.A., Chaudhry, S.A., Barnawi, A., Xiao, W., et al.: ILAS-IoT: an improved and lightweight authentication scheme for IoT deployment. J. Ambient. Intell. Humaniz. Comput. 13(11), 5123\u20135135 (2022). https:\/\/doi.org\/10.1007\/s12652-020-02349-5","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"key":"18_CR6","doi-asserted-by":"publisher","unstructured":"Aman, M.N., Chua, K.C., Sikdar, B.: A light-weight mutual authentication protocol for IoT systems. In: Proceedings of the 2017 IEEE Global Communications Conference (GLOBECOM \u201917), pp.\u00a01\u20136. IEEE (2017). https:\/\/doi.org\/10.1109\/GLOCOM.2017.8253991","DOI":"10.1109\/GLOCOM.2017.8253991"},{"key":"18_CR7","unstructured":"Arends, T.: Tasmota (2017). https:\/\/github.com\/arendst\/Tasmota. Accessed 09 Apr 2024"},{"key":"18_CR8","doi-asserted-by":"publisher","unstructured":"Aura, T., Sethi, M., Peltonen, A.: Nimble Out-of-Band Authentication for EAP (EAP-NOOB). RFC 9140 (2021). https:\/\/doi.org\/10.17487\/RFC9140","DOI":"10.17487\/RFC9140"},{"key":"18_CR9","doi-asserted-by":"publisher","unstructured":"Babun, L., Denney, K., Celik, Z.B., McDaniel, P., Uluagac, A.S.: A survey on IoT platforms: communication, security, and privacy perspectives. Comput. Netw. 192, 108040 (2021). https:\/\/doi.org\/10.1016\/j.comnet.2021.108040","DOI":"10.1016\/j.comnet.2021.108040"},{"key":"18_CR10","unstructured":"Banks, A., Briggs, E., Borgendale, K., Gupta, R.: MQTT Version 5.0. OASIS Standard: mqtt-v5.0-os (2019)"},{"key":"18_CR11","doi-asserted-by":"publisher","unstructured":"Barnes, R., Hoffman-Andrews, J., McCarney, D., Kasten, J.: Automatic Certificate Management Environment (ACME). RFC 8555 (2019). https:\/\/doi.org\/10.17487\/RFC8555","DOI":"10.17487\/RFC8555"},{"key":"18_CR12","volume-title":"Linux Security Cookbook: Security Tools & Techniques","author":"D Barrett","year":"2003","unstructured":"Barrett, D., Silverman, R., Byrnes, R.G.: Linux Security Cookbook: Security Tools & Techniques. O\u2019Reilly Media, Newton (2003)"},{"key":"18_CR13","doi-asserted-by":"publisher","unstructured":"Basic, F., Steger, C., Seifert, C., Kofler, R.: Trust your BMS: designing a lightweight authentication architecture for industrial networks. In: Proceedings of the 2022 IEEE International Conference on Industrial Technology (ICIT \u201922), pp.\u00a01\u20136. IEEE (2022). https:\/\/doi.org\/10.1109\/ICIT48603.2022.10002825","DOI":"10.1109\/ICIT48603.2022.10002825"},{"issue":"1","key":"18_CR14","doi-asserted-by":"publisher","first-page":"616","DOI":"10.1109\/COMST.2019.2953364","volume":"22","author":"I Butun","year":"2020","unstructured":"Butun, I., \u00d6sterberg, P., Song, H.: Security of the internet of things: vulnerabilities, attacks, and countermeasures. IEEE Commun. Surv. Tutor. 22(1), 616\u2013644 (2020). https:\/\/doi.org\/10.1109\/COMST.2019.2953364","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"18_CR15","unstructured":"CA\/Browser Forum: Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates. Technical Report Version 2.0.2, CA\/Browser Forum (2024)"},{"key":"18_CR16","doi-asserted-by":"publisher","unstructured":"Cheshire, S., Krochmal, M.: Multicast DNS. RFC 6762 (2013). https:\/\/doi.org\/10.17487\/RFC6762","DOI":"10.17487\/RFC6762"},{"key":"18_CR17","unstructured":"COMSYS: LUA-IoT Reference Implementation (2024). https:\/\/github.com\/COMSYS\/LUAIoT"},{"key":"18_CR18","doi-asserted-by":"publisher","unstructured":"Cooper, D., Santesson, S., Farrell, S., Boeyen, S., et\u00a0al.: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 5280 (2008). https:\/\/doi.org\/10.17487\/RFC5280","DOI":"10.17487\/RFC5280"},{"key":"18_CR19","doi-asserted-by":"publisher","unstructured":"Dahlmanns, M., Lohm\u00f6ller, J., Fink, I.B., Pennekamp, J., et\u00a0al.: Easing the conscience with OPC UA: an internet-wide study on insecure deployments. In: Proceedings of the ACM Internet Measurement Conference (IMC \u201920), pp. 101\u2013110. ACM (2020). https:\/\/doi.org\/10.1145\/3419394.3423666","DOI":"10.1145\/3419394.3423666"},{"key":"18_CR20","doi-asserted-by":"publisher","unstructured":"Dahlmanns, M., Lohm\u00f6ller, J., Pennekamp, J., Bodenhausen, J., et\u00a0al.: Missed opportunities: measuring the untapped TLS support in the industrial internet of things. In: Proceedings of the 17th ACM ASIA Conference on Computer and Communications Security (ASIACCS \u201922), pp. 252\u2013266. ACM (2022). https:\/\/doi.org\/10.1145\/3488932.3497762","DOI":"10.1145\/3488932.3497762"},{"key":"18_CR21","doi-asserted-by":"publisher","unstructured":"Dahlmanns, M., Sander, C., Decker, R., Wehrle, K.: Secrets revealed in container images: an internet-wide study on occurrence and impact. In: Proceedings of the 18th ACM Asia Conference on Computer and Communications Security (ASIACCS \u201923), pp. 797\u2013811. ACM (2023). https:\/\/doi.org\/10.1145\/3579856.3590329","DOI":"10.1145\/3579856.3590329"},{"key":"18_CR22","doi-asserted-by":"publisher","unstructured":"Dierks, T., Rescorla, E.: The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246 (2008). https:\/\/doi.org\/10.17487\/RFC5246","DOI":"10.17487\/RFC5246"},{"key":"18_CR23","doi-asserted-by":"publisher","unstructured":"Elhabrush, H., Ahmeda, S.: Authentication protocol for wireless sensor network in the internet of things. In: Proceedings of the 2022 IEEE 2nd International Maghreb Meeting of the Conference on Sciences and Techniques of Automatic Control and Computer Engineering (MI-STA \u201922), pp. 471\u2013478. IEEE (2022). https:\/\/doi.org\/10.1109\/MI-STA54861.2022.9837557","DOI":"10.1109\/MI-STA54861.2022.9837557"},{"key":"18_CR24","unstructured":"ESPHome: ESPHome (2018). https:\/\/github.com\/esphome\/esphome. Accessed 09 Apr 2024"},{"key":"18_CR25","unstructured":"ESPHome: Boards: esp32 (2023). https:\/\/devices.esphome.io\/board\/esp32. Accessed 09 Apr 2024"},{"key":"18_CR26","unstructured":"ESPHome: Boards: esp8266 (2023). https:\/\/devices.esphome.io\/board\/esp8266. Accessed 09 Apr 2024"},{"key":"18_CR27","doi-asserted-by":"publisher","unstructured":"Fielding, R., Nottingham, M., Reschke, J.: HTTP Semantics. IETF RFC 9110 (2022). https:\/\/doi.org\/10.17487\/RFC9110","DOI":"10.17487\/RFC9110"},{"key":"18_CR28","doi-asserted-by":"publisher","first-page":"550","DOI":"10.1016\/j.procs.2015.07.251","volume":"56","author":"Z Gnimpieba","year":"2015","unstructured":"Gnimpieba, Z., Nait-Sidi-Moh, A., Durand, D., Fortin, J.: Using internet of things technologies for a collaborative supply chain: application to tracking of pallets and containers. Procedia Comput. Sci. 56, 550\u2013557 (2015). https:\/\/doi.org\/10.1016\/j.procs.2015.07.251","journal-title":"Procedia Comput. Sci."},{"issue":"5","key":"18_CR29","doi-asserted-by":"publisher","first-page":"2323","DOI":"10.1109\/TNET.2020.3009425","volume":"28","author":"H Guo","year":"2020","unstructured":"Guo, H., Heidemann, J.: Detecting IoT devices in the internet. IEEE\/ACM Trans. Network. 28(5), 2323\u20132336 (2020). https:\/\/doi.org\/10.1109\/TNET.2020.3009425","journal-title":"IEEE\/ACM Trans. Network."},{"key":"18_CR30","doi-asserted-by":"publisher","unstructured":"Haj-Hassan, A., Imine, Y., Gallais, A., Quoitin, B.: Zero-touch mutual authentication scheme for 6TiSCH industrial IoT networks. In: Proceedings of the 2022 International Wireless Communications and Mobile Computing (IWCMC \u201922), pp. 354\u2013359. IEEE (2022). https:\/\/doi.org\/10.1109\/IWCMC55113.2022.9824568","DOI":"10.1109\/IWCMC55113.2022.9824568"},{"key":"18_CR31","doi-asserted-by":"publisher","unstructured":"He, Z., Furuhed, M., Raza, S.: Indraj: digital certificate enrollment for battery-powered wireless devices. In: Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks (WiSec \u201919), pp. 117\u2013127. ACM (2019). https:\/\/doi.org\/10.1145\/3317549.3323408","DOI":"10.1145\/3317549.3323408"},{"key":"18_CR32","doi-asserted-by":"publisher","unstructured":"Holohan, E., Schukat, M.: Authentication using virtual certificate authorities: a new security paradigm for wireless sensor networks. In: Proceedings of the 2010 9th IEEE International Symposium on Network Computing and Applications (NCA \u201910), pp. 92\u201399. IEEE (2010). https:\/\/doi.org\/10.1109\/NCA.2010.19","DOI":"10.1109\/NCA.2010.19"},{"key":"18_CR33","doi-asserted-by":"publisher","unstructured":"Holz, R., Amann, J., Mehani, O., Wachs, M., Ali\u00a0Kaafar, M.: TLS in the wild: an internet-wide analysis of TLS-based protocols for electronic communication. In: Proceedings of the 23rd Annual Network and Distributed System Security Symposium (NDSS \u201916) (2016). https:\/\/doi.org\/10.14722\/ndss.2016.23055","DOI":"10.14722\/ndss.2016.23055"},{"key":"18_CR34","doi-asserted-by":"publisher","unstructured":"Holz, R., Braun, L., Kammenhuber, N., Carle, G.: The SSL landscape: a thorough analysis of the x.509 PKI using active and passive measurements. In: Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference (IMC \u201911), pp. 427\u2013444. ACM (2011). https:\/\/doi.org\/10.1145\/2068816.2068856","DOI":"10.1145\/2068816.2068856"},{"key":"18_CR35","unstructured":"Howarth, J.: 80+ Amazing IoT Statistics (2024-2030) (2023). https:\/\/explodingtopics.com\/blog\/iot-stats. Accessed 09 Apr 2024"},{"key":"18_CR36","doi-asserted-by":"publisher","unstructured":"Huang, D.Y., Apthorpe, N., Li, F., Acar, G., Feamster, N.: IoT inspector: crowdsourcing labeled network traffic from smart home devices at scale. Proc. ACM Interact. Mob. Wearable Ubiq. Technol. 4(2), 46:1\u201321 (2020). https:\/\/doi.org\/10.1145\/3397333","DOI":"10.1145\/3397333"},{"key":"18_CR37","unstructured":"International Telecommunication Union: Overview of the Internet of things. ITU-T Y.2060 (2012)"},{"key":"18_CR38","doi-asserted-by":"publisher","unstructured":"Iqbal, M.A., Hussain, S., Xing, H., Imran, M.: Social IoT, chap.\u00a09, pp. 195\u2013211. John Wiley & Sons, Ltd., Hoboken (2021). https:\/\/doi.org\/10.1002\/9781119701460.ch9","DOI":"10.1002\/9781119701460.ch9"},{"key":"18_CR39","unstructured":"Krombholz, K., Mayer, W., Schmiedecker, M., Weippl, E.: \u201cI Have No Idea What i\u2019m Doing\u201d: on the usability of deploying HTTPS. In: Proceedings of the 26th USENIX Security Symposium (USENIX SEC \u201917), pp. 1339\u20131356. USENIX Association (2017)"},{"key":"18_CR40","unstructured":"Kumar, S., Hu, Y., Andersen, M.P., Popa, R.A., Culler, D.E.: JEDI: many-to-many end-to-end encryption and key delegation for IoT. In: Proceedings of the 28th USENIX Security Symposium (SEC \u201919), pp. 1519\u20131536. USENIX Association (2019)"},{"key":"18_CR41","doi-asserted-by":"publisher","unstructured":"Lee, H., Mun, H., Lee, Y.: Comparing response time of home IoT devices with or without cloud. In: Proceedings of the 2020 IEEE International Conference on Consumer Electronics (ICCE \u201920), pp.\u00a01\u20136. IEEE (2020). https:\/\/doi.org\/10.1109\/ICCE46568.2020.9043102","DOI":"10.1109\/ICCE46568.2020.9043102"},{"issue":"2","key":"18_CR42","doi-asserted-by":"publisher","first-page":"818","DOI":"10.1109\/JIOT.2019.2944400","volume":"7","author":"C Lin","year":"2020","unstructured":"Lin, C., He, D., Kumar, N., Huang, X., et al.: HomeChain: a blockchain-based secure mutual authentication system for smart homes. IEEE Internet Things J. 7(2), 818\u2013829 (2020). https:\/\/doi.org\/10.1109\/JIOT.2019.2944400","journal-title":"IEEE Internet Things J."},{"key":"18_CR43","doi-asserted-by":"publisher","unstructured":"Ma, Z., Austgen, J., Mason, J., Durumeric, Z., Bailey, M.: Tracing your roots: exploring the TLS trust anchor ecosystem. In: Proceedings of the 21st ACM Internet Measurement Conference (IMC \u201921), pp. 179\u2013194. ACM (2021).https:\/\/doi.org\/10.1145\/3487552.3487813","DOI":"10.1145\/3487552.3487813"},{"issue":"5","key":"18_CR44","doi-asserted-by":"publisher","first-page":"164","DOI":"10.4236\/jcc.2015.35021","volume":"3","author":"S Madakam","year":"2015","unstructured":"Madakam, S., Ramaswamy, R., Tripathi, S.: Internet of Things (IoT): a literature review. J. Comput. Commun. 3(5), 164\u2013173 (2015). https:\/\/doi.org\/10.4236\/jcc.2015.35021","journal-title":"J. Comput. Commun."},{"key":"18_CR45","unstructured":"Maggi, F., Vosseler, R., Quarta, D.: The Fragility of Industrial IoT\u2019s Data Backbone: Security and Privacy Issues in MQTT and CoAP Protocols. White paper, Trend Micro Inc. (2018)"},{"key":"18_CR46","doi-asserted-by":"publisher","unstructured":"Mai, A., Schedler, O., Weippl, E., Krombholz, K.: Are HTTPS configurations still a challenge?: validating theories of administrators\u2019 difficulties with TLS configurations. In: Proceedings of the 4th International Conference on HCI for Cybersecurity, Privacy and Trust (HCI-CPT \u201922), vol. 13333, pp. 173\u2013193. Springer, Heidelberg (2022). https:\/\/doi.org\/10.1007\/978-3-031-05563-8_12","DOI":"10.1007\/978-3-031-05563-8_12"},{"issue":"6","key":"18_CR47","doi-asserted-by":"publisher","first-page":"9762","DOI":"10.1109\/JIOT.2019.2931372","volume":"6","author":"S Malani","year":"2019","unstructured":"Malani, S., Srinivas, J., Das, A.K., Srinathan, K., Jo, M.: Certificate-based anonymous device access control scheme for IoT environment. IEEE Internet Things J. 6(6), 9762\u20139773 (2019). https:\/\/doi.org\/10.1109\/JIOT.2019.2931372","journal-title":"IEEE Internet Things J."},{"key":"18_CR48","doi-asserted-by":"publisher","unstructured":"Padmanabhan, R., Rula, J.P., Richter, P., Strowes, S.D., Dainotti, A.: DynamIPs: analyzing address assignment practices in IPv4 and IPv6. In: Proceedings of the 16th International Conference on Emerging Networking EXperiments and Technologies (CoNEXT \u201920), pp. 55\u201370. ACM (2020). https:\/\/doi.org\/10.1145\/3386367.3431314","DOI":"10.1145\/3386367.3431314"},{"key":"18_CR49","doi-asserted-by":"publisher","unstructured":"Paracha, M.T., Dubois, D.J., Vallina-Rodriguez, N., Choffnes, D.: IoTLS: understanding TLS usage in consumer IoT devices. In: Proceedings of the 21st ACM Internet Measurement Conference (IMC \u201921), pp. 165\u2013178. ACM (2021). https:\/\/doi.org\/10.1145\/3487552.3487830","DOI":"10.1145\/3487552.3487830"},{"key":"18_CR50","doi-asserted-by":"publisher","unstructured":"Pritikin, M., Yee, P.E., Harkins, D.: Enrollment over Secure Transport. RFC 7030 (2013). https:\/\/doi.org\/10.17487\/RFC7030","DOI":"10.17487\/RFC7030"},{"key":"18_CR51","unstructured":"Redmiles, E.M., Liu, E., Mazurek, M.L.: You want me to do what? a design study of two-factor authentication messages. In: Proceedings of the 13th Symposium on Usable Privacy and Security (SOUPS \u201917). USENIX Association (2017)"},{"key":"18_CR52","unstructured":"Reese, K., Smith, T., Dutson, J., Armknecht, J., et\u00a0al.: A usability study of five two-factor authentication methods. In: Proceedings of the 15th Symposium on Usable Privacy and Security (SOUPS \u201919), pp. 357\u2013370. USENIX Association (2019)"},{"key":"18_CR53","doi-asserted-by":"publisher","unstructured":"Rescorla, E., Tschofenig, H., Modadugu, N.: The Datagram Transport Layer Security (DTLS) Protocol Version 1.3. RFC 9147 (2022). https:\/\/doi.org\/10.17487\/RFC9147","DOI":"10.17487\/RFC9147"},{"key":"18_CR54","unstructured":"Rose, K., Eldridge, S., Chapin, L.: The internet of things: an overview. Technical Report. report-InternetofThings-20151015-en, The Internet Society (ISOC) (2015)"},{"key":"18_CR55","doi-asserted-by":"publisher","unstructured":"R\u00fchrmair, U., Sehnke, F., S\u00f6lter, J., Dror, G., et\u00a0al.: Modeling attacks on physical unclonable functions. In: Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS \u201910), pp. 237\u2013249. ACM (2010). https:\/\/doi.org\/10.1145\/1866307.1866335","DOI":"10.1145\/1866307.1866335"},{"key":"18_CR56","doi-asserted-by":"publisher","unstructured":"Salman, O., Abdallah, S., Elhajj, I.H., Chehab, A., Kayssi, A.: Identity-based authentication scheme for the Internet of Things. In: Proceedings of the 2016 IEEE Symposium on Computers and Communication (ISCC \u201916), pp. 1109\u20131111. IEEE (2016). https:\/\/doi.org\/10.1109\/ISCC.2016.7543884","DOI":"10.1109\/ISCC.2016.7543884"},{"key":"18_CR57","doi-asserted-by":"publisher","unstructured":"Sciancalepore, S., Capossele, A., Piro, G., Boggia, G., Bianchi, G.: Key management protocol with implicit certificates for IoT systems. In: Proceedings of the 2015 Workshop on IoT Challenges in Mobile and Industrial Systems (IoT-Sys \u201915), pp. 37\u201342. ACM (2015). https:\/\/doi.org\/10.1145\/2753476.2753477","DOI":"10.1145\/2753476.2753477"},{"key":"18_CR58","unstructured":"Shekari, T., Cardenas, A.A., Beyah, R.: MaDIoT 2.0: modern high-wattage IoT botnet attacks and defenses. In: Proceedings of the 31st USENIX Security Symposium (SEC \u201922), pp. 3539\u20133556. USENIX Association (2022)"},{"key":"18_CR59","doi-asserted-by":"publisher","unstructured":"Shelby, Z., Hartke, K., Bormann, C.: The Constrained Application Protocol (CoAP). RFC 7252 (2014). https:\/\/doi.org\/10.17487\/RFC7252","DOI":"10.17487\/RFC7252"},{"key":"18_CR60","unstructured":"Soltan, S., Mittal, P., Poor, H.V.: BlackIoT: IoT botnet of high wattage devices can disrupt the power grid. In: Proceedings of the 27th USENIX Security Symposium (SEC \u201918), pp. 15\u201332. USENIX Association (2018)"},{"key":"18_CR61","doi-asserted-by":"publisher","unstructured":"Srinivasa, S., Pedersen, J.M., Vasilomanolakis, E.: Open for Hire: attack trends and misconfiguration pitfalls of IoT devices. In: Proceedings of the 21st ACM Internet Measurement Conference (IMC \u201921), pp. 195\u2013215. ACM (2021). https:\/\/doi.org\/10.1145\/3487552.3487833","DOI":"10.1145\/3487552.3487833"},{"key":"18_CR62","doi-asserted-by":"publisher","unstructured":"van\u00a0der Stok, P., Kampanakis, P., Richardson, M., Raza, S.: EST-coaps: Enrollment over Secure Transport with the Secure Constrained Application Protocol. RFC 9148 (2022). https:\/\/doi.org\/10.17487\/RFC9148","DOI":"10.17487\/RFC9148"},{"issue":"23","key":"18_CR63","doi-asserted-by":"publisher","first-page":"24453","DOI":"10.1109\/JIOT.2022.3188711","volume":"9","author":"M Tanveer","year":"2022","unstructured":"Tanveer, M., Alkhayyat, A., Khan, A.U., Kumar, N., Alharbi, A.G.: REAP-IIoT: resource-efficient authentication protocol for the industrial internet of things. IEEE Internet Things J. 9(23), 24453\u201324465 (2022). https:\/\/doi.org\/10.1109\/JIOT.2022.3188711","journal-title":"IEEE Internet Things J."},{"key":"18_CR64","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2023.100902","volume":"23","author":"M Tanveer","year":"2023","unstructured":"Tanveer, M., Badshah, A., Alasmary, H., Chaudhry, S.A.: CMAF-IIoT: chaotic map-based authentication framework for Industrial Internet of Things. Internet Things 23, 100902 (2023). https:\/\/doi.org\/10.1016\/j.iot.2023.100902","journal-title":"Internet Things"},{"key":"18_CR65","doi-asserted-by":"publisher","unstructured":"Tiefenau, C., von Zezschwitz, E., H\u00e4ring, M., Krombholz, K., Smith, M.: A usability evaluation of let\u2019s encrypt and certbot: usable security done right. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (CCS \u201919), pp. 1971\u20131988. ACM (2019). https:\/\/doi.org\/10.1145\/3319535.3363220","DOI":"10.1145\/3319535.3363220"},{"key":"18_CR66","doi-asserted-by":"publisher","unstructured":"Wan, Y., Xu, K., Wang, F., Xue, G.: IoTMosaic: inferring user activities from IoT network traffic in smart homes. In: Proceedings of the 41st IEEE Conference on Computer Communications (INFOCOM \u201922), pp. 370\u2013379. IEEE (2022). https:\/\/doi.org\/10.1109\/INFOCOM48880.2022.9796908","DOI":"10.1109\/INFOCOM48880.2022.9796908"},{"key":"18_CR67","doi-asserted-by":"publisher","unstructured":"Wouters, P., Tschofenig, H., Gilmore, J., Weiler, S., Kivinen, T.: Using Raw Public Keys in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS). RFC 7250 (2014). https:\/\/doi.org\/10.17487\/RFC7250","DOI":"10.17487\/RFC7250"},{"issue":"4","key":"18_CR68","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1145\/1282427.1282415","volume":"37","author":"Y Xie","year":"2007","unstructured":"Xie, Y., Yu, F., Achan, K., Gillum, E., et al.: How dynamic are IP addresses? ACM SIGCOMM Comput. Commun. Rev. 37(4), 301\u2013312 (2007). https:\/\/doi.org\/10.1145\/1282427.1282415","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"issue":"4","key":"18_CR69","doi-asserted-by":"publisher","first-page":"2233","DOI":"10.1109\/TII.2014.2300753","volume":"10","author":"LD Xu","year":"2014","unstructured":"Xu, L.D., He, W., Li, S.: Internet of Things in industries: a survey. IEEE Trans. Ind. Inf. 10(4), 2233\u20132243 (2014). https:\/\/doi.org\/10.1109\/TII.2014.2300753","journal-title":"IEEE Trans. Ind. Inf."},{"key":"18_CR70","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1016\/j.comnet.2018.11.013","volume":"148","author":"K Yang","year":"2019","unstructured":"Yang, K., Li, Q., Sun, L.: Towards automatic fingerprinting of IoT devices in the cyberspace. Comput. Netw. 148, 318\u2013327 (2019). https:\/\/doi.org\/10.1016\/j.comnet.2018.11.013","journal-title":"Comput. Netw."},{"key":"18_CR71","unstructured":"Z-Wave Alliance: Application Work Group Z-Wave Specifications. Technical Report. Release 2023B, Z-Wave Alliance (2023)"},{"issue":"22","key":"18_CR72","doi-asserted-by":"publisher","first-page":"23072","DOI":"10.1109\/JIOT.2022.3186646","volume":"9","author":"S Zhang","year":"2022","unstructured":"Zhang, S., Sangdeh, P.K., Pirayesh, H., Zeng, H., et al.: AuthIoT: a transferable wireless authentication scheme for IoT devices without input interface. IEEE Internet Things J. 9(22), 23072\u201323085 (2022). https:\/\/doi.org\/10.1109\/JIOT.2022.3186646","journal-title":"IEEE Internet Things J."},{"key":"18_CR73","unstructured":"ZigBee Alliance: ZigBee Specification. Technical Report 05-3474-21, ZigBee Alliance (2015)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology \u2013 ICISC 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-5566-3_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T20:23:08Z","timestamp":1749846188000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-5566-3_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819655656","9789819655663"],"references-count":73,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-5566-3_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"14 June 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICISC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security and Cryptology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Seoul","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 November 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icisc2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icisc.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}