{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T11:29:11Z","timestamp":1740137351746,"version":"3.37.3"},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,8,28]],"date-time":"2021-08-28T00:00:00Z","timestamp":1630108800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,8,28]],"date-time":"2021-08-28T00:00:00Z","timestamp":1630108800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2022,6]]},"DOI":"10.1007\/s10207-021-00562-7","type":"journal-article","created":{"date-parts":[[2021,8,28]],"date-time":"2021-08-28T11:02:31Z","timestamp":1630148551000},"page":"427-436","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Establishing and validating secured keys for IoT devices: using P3 connection model on a cloud-based architecture"],"prefix":"10.1007","volume":"21","author":[{"given":"Sairath","family":"Bhattacharjya","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5060-6332","authenticated-orcid":false,"given":"Hossein","family":"Saiedian","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,28]]},"reference":[{"key":"562_CR1","doi-asserted-by":"publisher","first-page":"46990","DOI":"10.1109\/ACCESS.2019.2909408","volume":"7","author":"T Adame","year":"2019","unstructured":"Adame, T., Bel, A., Bellalta, B.: Increasing lpwan scalability by means of concurrent multiband iot technologies: an industry 4.0 use case. IEEE. Access 7, 46990\u201347010 (2019)","journal-title":"IEEE Access"},{"key":"562_CR2","doi-asserted-by":"crossref","unstructured":"Atwady, Y., Hammoudeh, M.: A survey on authentication techniques for the internet of things. In: Proceedings of the International Conference on Future Networks and Distributed Systems, ICFNDS \u201917, New York, NY, USA. Association for Computing Machinery (2017)","DOI":"10.1145\/3102304.3102312"},{"issue":"2","key":"562_CR3","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/MC.2017.62","volume":"50","author":"E Bertino","year":"2017","unstructured":"Bertino, E., Islam, N.: Botnets and internet of things security. IEEE Computer 50(2), 76\u201379 (2017)","journal-title":"IEEE Comput."},{"issue":"4","key":"562_CR4","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MC.2018.2141038","volume":"51","author":"S Bhattarai","year":"2018","unstructured":"S. Bhattarai and Y. Wang. End-to-end trust and security for internet of things applications. Computer, 51(4), 20\u201327, 2018","journal-title":"Computer"},{"key":"562_CR5","unstructured":"Columbus, L.: 2018 roundup of internet of things forecasts and market estimates. shorturl.at\/qMPTU, 2019. Accessed 21 Jan 2020"},{"key":"562_CR6","doi-asserted-by":"crossref","unstructured":"Fomichev, M., Maass, M., Almon, L., Molina, A., Hollick, M.: Perils of zero-interaction security in the internet of things. In: Proceedings of ACM Interactive Mobile Wearable Ubiquitous Technology, vol. 3(1) (2019)","DOI":"10.1145\/3314397"},{"issue":"6","key":"562_CR7","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1109\/MC.2017.176","volume":"50","author":"M Gao","year":"2017","unstructured":"Gao, M., Wang, Q., Arafin, M.T., Lyu, Y., Qu, G.: Approximate computing for low power and security in the internet of things. IEEE Computer 50(6), 27\u201334 (2017)","journal-title":"IEEE Comput."},{"key":"562_CR8","unstructured":"Goasduff, L.: Gartner says 5.8 billion enterprise and automotive IoT endpoints will be in use in 2020. shorturl.at\/jlosS, 2019. Accessed 21 January 2020"},{"key":"562_CR9","unstructured":"Hilton, S.: Dyn analysis summary of Friday October 21 attack. https:\/\/bit.ly\/39mqJl6, 2016. Accessed 28 January (2020)"},{"key":"562_CR10","doi-asserted-by":"crossref","unstructured":"Huth, C., Zibuschka, J., Duplys, P., Guneysu, T.: Securing systems on the internet of things via physical properties of devices and communications. In: 2015 Annual IEEE Systems Conference (SysCon) Proceedings, pp. 8\u201313 (2015)","DOI":"10.1109\/SYSCON.2015.7116721"},{"issue":"3","key":"562_CR11","doi-asserted-by":"publisher","first-page":"2702","DOI":"10.1109\/COMST.2019.2910750","volume":"21","author":"N Neshenko","year":"2019","unstructured":"Neshenko, N., Bou-Harb, E., Crichigno, J., Kaddoum, G., Ghani, N.: Demystifying IoT security: An exhaustive survey on iot vulnerabilities and a first empirical look on internet-scale IoT exploitations. IEEE Communications Surveys Tutorials 21(3), 2702\u20132733 (2019)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"6","key":"562_CR12","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1109\/MNET.2014.6963809","volume":"28","author":"J Nieminen","year":"2014","unstructured":"Nieminen, J., Gomez, C., Isomaki, M., Savolainen, T., Patil, B., Shelby, Z., Xi, M., Oller, J.: Networking solutions for connecting Bluetooth low energy enabled machines to the internet of things. IEEE Networks 28(6), 83\u201390 (Nov 2014)","journal-title":"IEEE Netw."},{"key":"562_CR13","doi-asserted-by":"crossref","unstructured":"Pazos, N., Muller, M., Aeberli, M., Ouerhani, N.: Connectopen: automatic integration of IoT devices. In: 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), pp. 640\u2013644 (2015)","DOI":"10.1109\/WF-IoT.2015.7389129"},{"issue":"2","key":"562_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3301443","volume":"19","author":"C Puliafito","year":"2019","unstructured":"Puliafito, C., Mingozzi, E., Longo, F., Puliafito, A., Rana, O.: Fog computing for the internet of things: A survey. ACM Transactions on Internet Technology 19(2), 1-41 (2019)","journal-title":"ACM Trans. Internet Technol."},{"key":"562_CR15","doi-asserted-by":"crossref","unstructured":"Ronen, E., Shamir, A.: Extended functionality attacks on IoT devices: the case of smart lights. In: 2016 IEEE European Symposium on Security and Privacy (EuroS&P), pp. 3\u201312 (2016)","DOI":"10.1109\/EuroSP.2016.13"},{"issue":"1","key":"562_CR16","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1109\/COMST.2019.2916177","volume":"22","author":"SK Sharma","year":"2020","unstructured":"Sharma, S.K., Wang, X.: Toward massive machine type communications in ultra-dense cellular iot networks: Current issues and machine learning-assisted solutions. IEEE Communications Surveys Tutorials 22(1), 426\u2013471 (2020)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"1","key":"562_CR17","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MSP.2015.7","volume":"13","author":"W Trappe","year":"2015","unstructured":"Trappe, W., Howard, R., Moore, R.S.: Low-energy security: Limits and opportunities in the internet of things. IEEE Security & Privacy 13(1), 14\u201321 (Jan 2015)","journal-title":"IEEE Secur. Privacy"},{"issue":"4","key":"562_CR18","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1145\/975817.975838","volume":"47","author":"EM Uslaner","year":"2004","unstructured":"Uslaner, E.M.: Trust online, trust offline. Communications of the ACM 47(4), 28\u201329 (April 2004)","journal-title":"Commun. ACM"},{"issue":"5","key":"562_CR19","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1109\/MSEC.2019.2925918","volume":"17","author":"PC van Oorschot","year":"2019","unstructured":"van Oorschot, P.C., Smith, S.W.: The internet of things: Security challenges. IEEE Security & Privacy 17(5), 7\u20139 (2019)","journal-title":"IEEE Secur. Privacy"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-021-00562-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-021-00562-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-021-00562-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,27]],"date-time":"2022-05-27T11:09:58Z","timestamp":1653649798000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-021-00562-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,28]]},"references-count":19,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,6]]}},"alternative-id":["562"],"URL":"https:\/\/doi.org\/10.1007\/s10207-021-00562-7","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"type":"print","value":"1615-5262"},{"type":"electronic","value":"1615-5270"}],"subject":[],"published":{"date-parts":[[2021,8,28]]},"assertion":[{"value":"28 August 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This research does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Animals performed"}},{"value":"Informed consent was obtained from all individual participants included in the study. (The authors were the only individuals who participated in the study.)","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}