{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T09:10:40Z","timestamp":1769505040299,"version":"3.49.0"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T00:00:00Z","timestamp":1746403200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T00:00:00Z","timestamp":1746403200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"name":"National Science and Technology Council","award":["112-2221-E-011 -091 -MY3"],"award-info":[{"award-number":["112-2221-E-011 -091 -MY3"]}]},{"name":"National Science and Technology Council","award":["112-2221-E-011 -091 -MY3"],"award-info":[{"award-number":["112-2221-E-011 -091 -MY3"]}]},{"DOI":"10.13039\/501100007530","name":"National Taiwan University of Science and Technology","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100007530","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,6]]},"DOI":"10.1007\/s10207-025-01030-2","type":"journal-article","created":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T02:33:58Z","timestamp":1746412438000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A novel risk-based access control engine in zero trust architecture for IoT network"],"prefix":"10.1007","volume":"24","author":[{"given":"Yi-Wei","family":"Ma","sequence":"first","affiliation":[]},{"given":"Po-Hung","family":"Chiu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,5]]},"reference":[{"key":"1030_CR1","unstructured":"IOT Analytics. State of IoT 2023: Number of connected IoT devices growing 16% to 16.7 billion globally [Online]. Available: https:\/\/iot-analytics.com\/number-connected-iot-devices (2023). Accessed 15 May 2023"},{"key":"1030_CR2","unstructured":"Reseach and Markets. Wireless sensor network global market report 2023 [Online]. Available: https:\/\/www.researchandmarkets.com\/report\/wireless-sensor-network(2023). Accessed 15 May 2023"},{"key":"1030_CR3","doi-asserted-by":"publisher","first-page":"86448","DOI":"10.1109\/ACCESS.2020.2992441","volume":"8","author":"A Kirimtat","year":"2020","unstructured":"Kirimtat, A., Krejcar, O., Kertesz, A., Tasgetiren, M.F.: Future trends and current state of smart city concepts: a survey. IEEE Access 8, 86448\u201386467 (2020)","journal-title":"IEEE Access"},{"key":"1030_CR4","doi-asserted-by":"crossref","unstructured":"Rose, S., Borchert, O., Mitchell, S., Connelly, S. Zero trust architecture. Available: https:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.800-207.pdf(2020). Accessed 16 May 2023","DOI":"10.6028\/NIST.SP.800-207-draft2"},{"key":"1030_CR5","unstructured":"MIT Technology Review. 2021 has broken the record for zero-day hacking attacks. [Online]. Available: https:\/\/www.technologyreview.com\/2021\/09\/23\/1036140\/2021-record-zero-day-hacks-reasons\/ (2021). Accessed 16 May 2023"},{"issue":"6","key":"1030_CR6","doi-asserted-by":"publisher","first-page":"4260","DOI":"10.1109\/TII.2020.3011444","volume":"17","author":"L Fang","year":"2021","unstructured":"Fang, L., Li, Y., Liu, Z., Yin, C., Li, M., Cao, Z.J.: A practical model based on anomaly detection for protecting medical iot control services against external attacks. IEEE Trans. Industr. Inf. 17(6), 4260\u20134269 (2021)","journal-title":"IEEE Trans. Industr. Inf."},{"key":"1030_CR7","doi-asserted-by":"crossref","unstructured":"Yun, K., Astillo, P. V., Lee, S., Kim, J., Kim, B., You, I. Behavior-rule specification-based IDS for safety-related embedded devices in smart home. World Automation Congress (WAC), pp. 65\u201370 (2021)","DOI":"10.23919\/WAC50355.2021.9559588"},{"issue":"1","key":"1030_CR8","first-page":"1","volume":"22","author":"P Astillo","year":"2021","unstructured":"Astillo, P., Jeong, J., Chien, W., Kim, B., Jang, J., You, I.: SMDAps: a specification-based misbehavior detection system for implantable devices in artificial pancreas system. J. Internet Technol. 22(1), 1\u201311 (2021)","journal-title":"J. Internet Technol."},{"issue":"6","key":"1030_CR9","doi-asserted-by":"publisher","first-page":"4280","DOI":"10.1109\/JIOT.2021.3103829","volume":"9","author":"G Abdelmoumin","year":"2022","unstructured":"Abdelmoumin, G., Rawat, D.B., Rahman, A.: On the performance of machine learning models for anomaly-based intelligent intrusion detection systems for the internet of things. IEEE Internet Things J. 9(6), 4280\u20134290 (2022)","journal-title":"IEEE Internet Things J."},{"key":"1030_CR10","doi-asserted-by":"publisher","first-page":"1164","DOI":"10.1109\/OJCOMS.2022.3188750","volume":"3","author":"ZAE Houda","year":"2022","unstructured":"Houda, Z.A.E., Brik, B., Khoukhi, L.: \u201cWhy should i trust your IDS?\u201d: an explainable deep learning framework for intrusion detection systems in internet of things networks. IEEE Open J. Commun. Soc. 3, 1164\u20131176 (2022)","journal-title":"IEEE Open J. Commun. Soc."},{"issue":"3","key":"1030_CR11","doi-asserted-by":"publisher","first-page":"2523","DOI":"10.1109\/TITS.2021.3119968","volume":"23","author":"M Abdel-Basset","year":"2022","unstructured":"Abdel-Basset, M., Moustafa, N., Hawash, H., Razzak, I., Sallam, K.M., Elkomy, O.M.: Federated intrusion detection in blockchain-based smart transportation systems. IEEE Trans. Intell. Transp. Syst. 23(3), 2523\u20132537 (2022)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"1030_CR12","doi-asserted-by":"crossref","unstructured":"Sadkhan, S.B., Sadkhan, R.S.B. Analysis of different types of digital signature. In: Proceedings of the International Engineering Conference on Sustainable Technology and Development (IEC), pp. 241\u2013246 (2022)","DOI":"10.1109\/IEC54822.2022.9807502"},{"key":"1030_CR13","doi-asserted-by":"publisher","first-page":"1057","DOI":"10.1007\/s11280-019-00677-x","volume":"23","author":"Z Huang","year":"2019","unstructured":"Huang, Z., Wang, Q.: A PUF-based unified identity verification framework for secure IoT hardware via device authentication. World Wide Web 23, 1057\u20131088 (2019)","journal-title":"World Wide Web"},{"key":"1030_CR14","doi-asserted-by":"crossref","unstructured":"Muzammal, S.M., Murugesan, R.K., Jhanjhi, N.Z., Humayun, M., Ibrahim, A.O., Abdelmaboud, A. A Trust-Based Model for Secure Routing against RPL Attacks in Internet of Things. Sensors (Basel), (2022)","DOI":"10.3390\/s22187052"},{"key":"1030_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2018\/6526018","volume":"2018","author":"Z Ye","year":"2017","unstructured":"Ye, Z., Wen, T., Liu, Z., Song, X., Fu, C.: An efficient dynamic trust evaluation model for wireless sensor networks. J. Sensors 2018, 1\u201316 (2017)","journal-title":"J. Sensors"},{"issue":"7","key":"1030_CR16","doi-asserted-by":"publisher","first-page":"3555","DOI":"10.1007\/s11227-018-2700-3","volume":"75","author":"SY Hashemi","year":"2019","unstructured":"Hashemi, S.Y., Aliee, F.S.: Dynamic and comprehensive trust model for IoT and its integration into RPL. J. Supercomput. 75(7), 3555\u20133584 (2019)","journal-title":"J. Supercomput."},{"key":"1030_CR17","doi-asserted-by":"crossref","unstructured":"Lahbib, A., Toumi, K., Elleuch, S., Laouiti, A., Martin, S. Link reliable and trust aware RPL routing protocol for Internet of Things. In: Proceedings of the International Symposium on Network Computing and Applications (2017)","DOI":"10.1109\/NCA.2017.8171360"},{"key":"1030_CR18","doi-asserted-by":"publisher","first-page":"43665","DOI":"10.1109\/ACCESS.2020.2977476","volume":"8","author":"I Wadhaj","year":"2020","unstructured":"Wadhaj, I., Ghaleb, B., Thomson, C., Al-Dubai, A., Buchanan, W.J.: Mitigation mechanisms against the DAO attack on the routing protocol for low power and lossy networks (RPL). IEEE Access 8, 43665\u201343675 (2020)","journal-title":"IEEE Access"},{"key":"1030_CR19","doi-asserted-by":"crossref","unstructured":"Verma, A., Ranga, V. Addressing Flooding Attacks in IPv6-based Low Power and Lossy Networks. In: Proceedings of the IEEE Region 10 Conference, pp. 552\u2013557 (2019)","DOI":"10.1109\/TENCON.2019.8929409"},{"key":"1030_CR20","unstructured":"Verducci, S., Schr\u00f6er, A. Social Trust. International Encyclopedia of Civil Society (2010)"},{"key":"1030_CR21","unstructured":"Ross, R. Winstead, M., McEvilley, M. Engineering trustworthy secure systems. Available: https:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.800-160v1r1.pdf. (2022) Accessed 20 May 2023"},{"issue":"9","key":"1030_CR22","doi-asserted-by":"publisher","first-page":"1825","DOI":"10.3390\/pr12091825","volume":"12","author":"BUI Khan","year":"2024","unstructured":"Khan, B.U.I., Goh, K.W., Khan, A.R., Zuhairi, M.F., Chaimanee, M.: Integrating AI and blockchain for enhanced data security in IoT-driven smart cities. Processes 12(9), 1825 (2024)","journal-title":"Processes"},{"key":"1030_CR23","doi-asserted-by":"publisher","first-page":"212","DOI":"10.3390\/info15040212","volume":"15","author":"BUI Khan","year":"2024","unstructured":"Khan, B.U.I., Goh, K.W., Mir, M.S., Mohd Rosely, N.F.L., Mir, A.A., Chaimanee, M.: Blockchain-enhanced sensor-as-a-service (SEaaS) in IoT: leveraging blockchain for efficient and secure sensing data transactions. Information 15, 212 (2024)","journal-title":"Information"},{"key":"1030_CR24","doi-asserted-by":"publisher","first-page":"3982","DOI":"10.3390\/electronics11233982","volume":"11","author":"RF Olanrewaju","year":"2022","unstructured":"Olanrewaju, R.F., Khan, B.U.I., Kiah, M.L.M., Abdullah, N.A., Goh, K.W.: Decentralized blockchain network for resisting side-channel attacks in mobility-based IoT. Electronics 11, 3982 (2022)","journal-title":"Electronics"},{"key":"1030_CR25","doi-asserted-by":"publisher","first-page":"544","DOI":"10.3390\/info13110544","volume":"13","author":"BUI Khan","year":"2022","unstructured":"Khan, B.U.I., Anwar, F., Rahman, F.D.B.A., Olanrewaju, R.F., Goh, K.W., Janin, Z., Rahman, M.A.: SGM: strategic game model for resisting node misbehaviour in IoT-cloud ecosystem. Information 13, 544 (2022)","journal-title":"Information"},{"key":"1030_CR26","doi-asserted-by":"publisher","first-page":"307","DOI":"10.22452\/mjcs.vol35no4.2","volume":"35","author":"B Khan","year":"2022","unstructured":"Khan, B., Anwar, F., Rahman, F., Olanrewaju, R., Kiah, M., Rahman, M., Janin, Z.: Exploring manet security aspects: analysis of attacks and node misbehaviour issues. Malays. J. Comput. Sci. 35, 307\u2013338 (2022)","journal-title":"Malays. J. Comput. Sci."},{"key":"1030_CR27","doi-asserted-by":"crossref","unstructured":"Anwar, F., Khan, B.U.I, Kiah, M.L.M., Abdullah, N.A., Goh, K.W. A Comprehensive insight into blockchain technology: past development, present impact and future considerations. Int. J. Adv. Comput. Sci. Appl. 13(11) (2022)","DOI":"10.14569\/IJACSA.2022.01311101"},{"key":"1030_CR28","doi-asserted-by":"publisher","first-page":"61778","DOI":"10.1109\/ACCESS.2021.3073343","volume":"9","author":"BUI Khan","year":"2021","unstructured":"Khan, B.U.I., Anwar, F., Olanrewaju, R.F., Kiah, M.L.B.M., Mir, R.N.: Game theory analysis and modeling of sophisticated multi-collusion attack in MANETs. IEEE Access 9, 61778\u201361792 (2021)","journal-title":"IEEE Access"},{"key":"1030_CR29","doi-asserted-by":"crossref","unstructured":"Sharmin, A., Olanrewaju, R.F., Khan, B.U.I., Anwar, F., Motakabber, S.M.A., Rosely, N.F.L.M., Hashim, A.H.A. Secure IoT routing through manifold criterion trust evaluation using ant colony optimization. Int. J. Adv. Comput. Sci. Appl. 14(11) (2023)","DOI":"10.14569\/IJACSA.2023.0141113"},{"key":"1030_CR30","doi-asserted-by":"publisher","first-page":"129240","DOI":"10.1109\/ACCESS.2021.3110310","volume":"9","author":"RF Olanrewaju","year":"2021","unstructured":"Olanrewaju, R.F., Khan, B.U.I., Morshidi, M.A., Anwar, F., Kiah, M.L.B.M.: A frictionless and secure user authentication in web-based premium applications. IEEE Access 9, 129240\u2013129255 (2021)","journal-title":"IEEE Access"},{"key":"1030_CR31","doi-asserted-by":"publisher","first-page":"51","DOI":"10.37934\/araset.26.1.5177","volume":"26","author":"R Olanrewaju","year":"2022","unstructured":"Olanrewaju, R., Khan, B., Hashim, A., Sidek, K., Khan, Z., Daniyal, H.: The internet of things vision: a comprehensive review of architecture, enabling technologies, adoption challenges, research open issues and contemporary applications. J. Adv. Res. Appl. Sci. Eng. Technol. 26, 51\u201377 (2022)","journal-title":"J. Adv. Res. Appl. Sci. Eng. Technol."}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01030-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-01030-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01030-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,21]],"date-time":"2025-06-21T10:11:49Z","timestamp":1750500709000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-025-01030-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,5]]},"references-count":31,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,6]]}},"alternative-id":["1030"],"URL":"https:\/\/doi.org\/10.1007\/s10207-025-01030-2","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5,5]]},"assertion":[{"value":"28 March 2025","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 May 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"124"}}