{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,17]],"date-time":"2026-01-17T18:41:41Z","timestamp":1768675301249,"version":"3.49.0"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2017,10,26]],"date-time":"2017-10-26T00:00:00Z","timestamp":1508976000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Brazilian National Council for Scientific and Technological Development (CNPq)","award":["310671\/2012-4 and 404963\/2013-7"],"award-info":[{"award-number":["310671\/2012-4 and 404963\/2013-7"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2018,8]]},"DOI":"10.1007\/s11036-017-0960-4","type":"journal-article","created":{"date-parts":[[2017,10,26]],"date-time":"2017-10-26T09:12:18Z","timestamp":1509009138000},"page":"967-981","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["A Smart Meter and Smart House Integrated to an IdM and Key-based Scheme for Providing Integral Security for a Smart Grid ICT"],"prefix":"10.1007","volume":"23","author":[{"given":"Vilmar","family":"Abreu","sequence":"first","affiliation":[]},{"given":"Altair","family":"Santin","sequence":"additional","affiliation":[]},{"given":"Alex","family":"Xavier","sequence":"additional","affiliation":[]},{"given":"Alison","family":"Lando","sequence":"additional","affiliation":[]},{"given":"Adriano","family":"Witkovski","sequence":"additional","affiliation":[]},{"given":"Rafael","family":"Ribeiro","sequence":"additional","affiliation":[]},{"given":"Maicon","family":"Stihler","sequence":"additional","affiliation":[]},{"given":"Voldi","family":"Zambenedetti","sequence":"additional","affiliation":[]},{"given":"Ivan","family":"Chueiri","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,26]]},"reference":[{"key":"960_CR1","doi-asserted-by":"crossref","first-page":"264","DOI":"10.1016\/j.jnca.2015.05.024","volume":"59","author":"Z Cai","year":"2016","unstructured":"Cai Z, Yu M, Steurer M, Li H, Dong Y (2016) A network model for the real-time communications of a smart grid prototype. J Netw Comput Appl 59:264\u2013273","journal-title":"J Netw Comput Appl"},{"issue":"1","key":"960_CR2","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/TII.2012.2218253","volume":"9","author":"VC Gungor","year":"2013","unstructured":"Gungor VC, Sahin D, Kocak T, Ergut S, Buccella C, Cecati C, Hancke GP (2013) A survey on smart grid potential applications and communication requirements. IEEE Trans Ind Inf 9(1):28\u201342","journal-title":"IEEE Trans Ind Inf"},{"key":"960_CR3","doi-asserted-by":"publisher","unstructured":"Shiobara T, Palensky P, Nishi H (2015) Effective metering data aggregation for smart grid communication infrastructure, IECON 2015 - 41st Annual Conference of the IEEE Industrial Electronics Society, Yokohama, pp. 2136\u20132141. \nhttps:\/doi.org\/10.1109\/IECON.2015.7392417","DOI":"10.1109\/IECON.2015.7392417"},{"key":"960_CR4","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1016\/j.jnca.2016.08.012","volume":"74","author":"M Emmanuel","year":"2016","unstructured":"Emmanuel M, Rayudu R (2016) Communication technologies for smart grid applications: a survey. J Netw Comput Appl 74:133\u2013148","journal-title":"J Netw Comput Appl"},{"key":"960_CR5","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1016\/j.jnca.2016.08.007","volume":"81","author":"M Ganzha","year":"2016","unstructured":"Ganzha M, Paprzycki M, Paw\u0142owski W, Szmeja P, Wasielewska K (2016) Semantic interoperability in the internet of things: an overview from the INTER-IoT perspective. J Netw Comput Appl 81:111\u2013124","journal-title":"J Netw Comput Appl"},{"key":"960_CR6","unstructured":"OpenID Connect Core 1.0 Available at: \nhttp:\/\/openid.net\/specs\/openid-connect-core-1_0.html\n\n. Accessed March 2017"},{"key":"960_CR7","unstructured":"Infoworld. Millions of embedded devices use the same hard-coded SSH and TLS private keys. Available at: \nhttp:\/\/www.infoworld.com\/article\/3009667\/security\/millions-of-embedded-devices-use-the-same-hard-coded-ssh-and-tls-private-keys.html\n\n. Accessed March 2017"},{"key":"960_CR8","unstructured":"Hacker News Millions of IoT Devices Using Same Hard-Coded CRYPTO Keys. Available at: \nhttp:\/\/thehackernews.com\/2015\/11\/iot-device-crypto-keys.html\n\n. Accessed March 2017"},{"key":"960_CR9","unstructured":"ZDnet Smart meter hacking tool released. Available at: \nhttp:\/\/www.zdnet.com\/article\/smart-meter-hacking-tool-released\/\n\n. Accessed March 2017"},{"issue":"4","key":"960_CR10","doi-asserted-by":"crossref","first-page":"398","DOI":"10.1108\/09685220810908804","volume":"16","author":"SC Patel","year":"2008","unstructured":"Patel SC, Sanyal P (2008) Securing SCADA systems. Inf Manag Comput Secur 16(4):398\u2013414","journal-title":"Inf Manag Comput Secur"},{"key":"960_CR11","unstructured":"Warmer C, Kok K, Karnouskos S, Weidlich A, Nestle D, Selzam P, Ringelstein j, Dimeas A, andDrenkard S (2009) Web services for integration of smart houses in the smart grid. Proc of Grid-Interop Conference, Denver, USA, pp. 1\u20135"},{"issue":"1","key":"960_CR12","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1109\/SURV.2012.021312.00034","volume":"15","author":"Y Yan","year":"2013","unstructured":"Yan Y, Qian Y, Sharif H, Tipper D (2013) A survey on smart grid communication infrastructures: motivations, requirements and challenges. IEEE Commun Surv Tutorials 15(1):5\u201320","journal-title":"IEEE Commun Surv Tutorials"},{"key":"960_CR13","unstructured":"ZDnet Could lax smart meter security blackout the UK? Available at: \nhttp:\/\/www.zdnet.com\/article\/could-lax-smart-meter-security-blackout-the-uk\/\n\n. Accessed March 2017"},{"key":"960_CR14","doi-asserted-by":"crossref","unstructured":"Tanimoto S, Kinno R, Iwashita M, Kobayashi T, Sato H, Kanai A (2016) Risk assessment of home gateway\/smart meter in smart grid service. Proc Int Congr Adv Appl Informatics:1126\u20131131","DOI":"10.1109\/IIAI-AAI.2016.25"},{"issue":"5","key":"960_CR15","doi-asserted-by":"crossref","first-page":"591","DOI":"10.1007\/s11036-013-0474-7","volume":"18","author":"J Ko\u0142odziej","year":"2013","unstructured":"Ko\u0142odziej J, Jaatun MG, Khan SU, Koeppen M (2013) Security-aware and data intensive low-cost mobile systems. Mob Networks Appl 18(5):591\u2013593","journal-title":"Mob Networks Appl"},{"key":"960_CR16","doi-asserted-by":"publisher","unstructured":"Liu J, Xiao Y, Chen CLP (2012) Authentication and access control in the internet of things. 32nd International Conference on Distributed Computing Systems Workshops, Macau, pp. 588\u2013592. \nhttps:\/doi.org\/10.1109\/ICDCSW.2012.23","DOI":"10.1109\/ICDCSW.2012.23"},{"issue":"12","key":"960_CR17","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1109\/MCOM.2016.1600304CM","volume":"54","author":"WL Chin","year":"2016","unstructured":"Chin WL, Lin YH, Chen HH (2016) A framework of machine-to-machine authentication in smart grid: a two-layer approach. IEEE Commun Mag 54(12):102\u2013107","journal-title":"IEEE Commun Mag"},{"key":"960_CR18","doi-asserted-by":"publisher","unstructured":"Saxena N, Choi BJ (2016) Integrated distributed authentication protocol for smart grid communications. IEEE Syst J:(99)1\u201312. \nhttps:\/doi.org\/10.1109\/JSYST.2016.2574699","DOI":"10.1109\/JSYST.2016.2574699"},{"key":"960_CR19","doi-asserted-by":"publisher","unstructured":"Mohammad N, Barua A, Arafat MA (2013) A smart prepaid energy metering system to control electricity theft.2013 International Conference on Power, Energy and Control (ICPEC), Sri Rangalatchum Dindigul, pp. 562\u2013565. \nhttps:\/doi.org\/10.1109\/ICPEC.2013.6527721","DOI":"10.1109\/ICPEC.2013.6527721"},{"key":"960_CR20","doi-asserted-by":"publisher","unstructured":"Tangsunantham N, Ngamchuen S, Nontaboot V, Thepphaeng S, Pirak C (2013) Experimental performance analysis of current bypass anti-tampering in smart energy meters. 2013 Australasian Telecommunication Networks and Applications Conference (ATNAC), Christchurch, pp. 124\u2013129. \nhttps:\/doi.org\/10.1109\/ATNAC.2013.6705368","DOI":"10.1109\/ATNAC.2013.6705368"},{"key":"960_CR21","doi-asserted-by":"publisher","unstructured":"Kadurek P, Blom J, Cobben JFG, Kling WL (2010) Theft detection and smart metering practices and expectations in the Netherlands. 2010 I.E. PES Innovative Smart Grid Technologies Conference Europe (ISGT Europe), Gothenburg, pp. 1\u20136. \nhttps:\/doi.org\/10.1109\/ISGTEUROPE.2010.5638852","DOI":"10.1109\/ISGTEUROPE.2010.5638852"},{"key":"960_CR22","doi-asserted-by":"publisher","unstructured":"Fraser T (2000) LOMAC: low water-mark integrity protection for COTS environments. Proceeding 2000IEEE Symposium on Security and Privacy. S&P 2000, Berkeley, CA, pp.230\u2013245. \nhttps:\/doi.org\/10.1109\/SECPRI.2000.848460","DOI":"10.1109\/SECPRI.2000.848460"},{"key":"960_CR23","doi-asserted-by":"publisher","unstructured":"Brasser F, El Mahjoub B, Sadeghi A-R, Wachsmann C, Koeberl P (2015) TyTAN: tiny trust anchor for tiny devices. 2015 52nd ACM\/EDAC\/IEEE Design Automation Conference (DAC), San Francisco, CA, pp. 1\u20136. \nhttps:\/doi.org\/10.1145\/2744769.2744922","DOI":"10.1145\/2744769.2744922"},{"issue":"2","key":"960_CR24","doi-asserted-by":"crossref","first-page":"498","DOI":"10.1109\/TCE.2004.1309414","volume":"50","author":"AR Al-Ali","year":"2004","unstructured":"Al-Ali AR, AL-Rousan M (2004) Java-based home automation system. IEEE Trans Consum Electron 50(2):498\u2013504","journal-title":"IEEE Trans Consum Electron"},{"key":"960_CR25","doi-asserted-by":"publisher","unstructured":"Golzar MG, Tajozzakerin H (2010) \u201cA new intelligent remote control system for home automation and reduce energy consumption,\u201d 2010 Fourth Asia International Conference on Mathematical\/Analytical Modelling and Computer Simulation, Kota Kinabalu, Malaysia, pp. 174\u2013180. \nhttps:\/doi.org\/10.1109\/AMS.2010.46","DOI":"10.1109\/AMS.2010.46"},{"key":"960_CR26","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1016\/j.compeleceng.2014.11.010","volume":"43","author":"I Korkmaz","year":"2015","unstructured":"Korkmaz I, Metin SK, Gurek A, Gur C, Gurakin C, Akdeniz M (2015) A cloud based and android supported scalable home automation system. Comput Electr Eng 43:112\u2013128","journal-title":"Comput Electr Eng"},{"issue":"10","key":"960_CR27","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1109\/MC.2003.1236475","volume":"36","author":"H Chan","year":"2003","unstructured":"Chan H, Perrig A (2003) Security and privacy in sensor networks. Computer 36(10):103\u2013105","journal-title":"Computer"},{"key":"960_CR28","unstructured":"The hacker News. Linux Worm targets Internet-enabled Home appliances to Mine Cryptocurrencies Available at: \nhttp:\/\/thehackernews.com\/2014\/03\/linux-worm-targets-internet-enabled.html\n\n. Accessed March 2017"},{"key":"960_CR29","doi-asserted-by":"publisher","unstructured":"Zheng J, Gao DW, Lin L (2013) Smart meters in smart grid: an overview. 2013 I.E. GreenTechnologies Conference (GreenTech), Denver, CO, pp. 57\u201364. \nhttps:\/doi.org\/10.1109\/GreenTech.2013.17","DOI":"10.1109\/GreenTech.2013.17"},{"key":"960_CR30","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1016\/j.jnca.2015.04.011","volume":"55","author":"DF Ram\u00edrez","year":"2015","unstructured":"Ram\u00edrez DF, C\u00e9spedes S (2015) Routing in neighborhood area networks: a survey in the context of AMI communications. J Netw Comput Appl 55:68\u201380","journal-title":"J Netw Comput Appl"},{"key":"960_CR31","unstructured":"Dark Reading. Smart meter hack shuts off the lights. Available at: \nhttp:\/\/www.darkreading.com\/perimeter\/smart-meter-hack-shuts-off-the-lights\/d\/d-id\/1316242\n\n. Accessed March 2017"},{"key":"960_CR32","doi-asserted-by":"publisher","unstructured":"Weiss M, Helfenstein A, Mattern F, Staake T (2012) Leveraging smart meter data to recognize home appliances. 2012 I.E. International Conference on Pervasive Computing and Communications, Lugano, pp. 190\u2013197. \nhttps:\/doi.org\/10.1109\/PerCom.2012.6199866","DOI":"10.1109\/PerCom.2012.6199866"},{"issue":"7","key":"960_CR33","first-page":"66","volume":"5","author":"KKJ Biba","year":"1977","unstructured":"Biba KKJ (1977) Integrity considerations for secure computer systems. Proc Symp on Comput Archit 5(7):66","journal-title":"Proc Symp on Comput Archit"},{"key":"960_CR34","doi-asserted-by":"publisher","unstructured":"Witkovski A, Santin A, Abreu V, Marynowski J (2015) An IdM and key-based authentication method for providing single sign-on in IoT. 2015 I.E. Global Communications Conference (GLOBECOM), San Diego, CA, pp. 1\u20136. \nhttps:\/doi.org\/10.1109\/GLOCOM.2015.7417597","DOI":"10.1109\/GLOCOM.2015.7417597"},{"key":"960_CR35","unstructured":"Drotos D \u03bcCSim: software simulator for microcontrollers, Available at: \nhttp:\/\/mazsola.iit.uni-miskolc.hu\/~drdani\/ embedded\/ucsim\/\n\n Accessed March 2017"},{"key":"960_CR36","doi-asserted-by":"publisher","unstructured":"IEEE Guide for Smart Grid Interoperability of Energy Technology and Information Technology Operation with the Electric Power System (EPS) (2011) End-Use Applications, and Loads, in IEEE Std 2030\u20132011, pp.1-126. \nhtpps:\/doi.org\/10.1109\/IEEESTD.2011.6018239","DOI":"10.1109\/IEEESTD.2011.6018239"},{"key":"960_CR37","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1016\/j.jnca.2015.05.022","volume":"59","author":"M Wolkerstorfer","year":"2016","unstructured":"Wolkerstorfer M, Schweighofer B, Wegleiter H, Statovci D, Schwaiger H, Lackner W (2016) Measurement and simulation framework for throughput evaluation of narrowband power line communication links in low-voltage grids. J Netw Comput Appl 59:285\u2013300","journal-title":"J Netw Comput Appl"},{"key":"960_CR38","unstructured":"ANSI X9 encryption collection. Available at: \nhttp:\/\/webstore.ansi.org\/RecordDetail.aspx?sku=X9+Encryption+Collection\n\n. Accessed March 2017"},{"key":"960_CR39","unstructured":"Vaadin OpenID Integration. Available at: \nhttps:\/\/vaadin.com\/directory#!addon\/openid-integration\n\n. Accessed March 2017"},{"key":"960_CR40","unstructured":"Java API for RESTful Services. Available at: \nhttps:\/\/jax-rs-spec.java.net\/\n\n. Accessed March 2017"},{"key":"960_CR41","unstructured":"Eclipse Foundation, \u201cCalifornium.\u201d Available at: \nhttps:\/\/www.eclipse.org\/californium\/\n\n. Accessed March 2017"},{"key":"960_CR42","unstructured":"The Contiki Operating System. Available at: \nhttp:\/\/contiki-os.org\/\n\n. Accessed March 2017"},{"key":"960_CR43","doi-asserted-by":"publisher","unstructured":"Mohammadali A, Tadayon MH, Asadian M (2014) A new key management for AMI systems based on DLMS\/COSEM standard. Telecommunications (IST), 2014 7th International Symposium on, Tehran, pp. 849\u2013856. \nhttps:\/doi.org\/10.1109\/ISTEL.2014.7000822","DOI":"10.1109\/ISTEL.2014.7000822"},{"key":"960_CR44","doi-asserted-by":"crossref","unstructured":"Ribeiro R, Santin A, Abreu V, Marynowski J, Viegas E (2016) Providing security and privacy in smart house through mobile cloud computing. Proc of IEEE Latin-American Conference on Communications:1\u20136","DOI":"10.1109\/LATINCOM.2016.7811599"},{"issue":"5","key":"960_CR45","doi-asserted-by":"crossref","first-page":"610","DOI":"10.1007\/s11036-013-0450-2","volume":"18","author":"E Niewiadomska-Szynkiewicz","year":"2013","unstructured":"Niewiadomska-Szynkiewicz E, Sikora A, Ko\u0142odziej J (2013) Modeling mobility in cooperative ad hoc networks. Mob Networks Appl 18(5):610\u2013621","journal-title":"Mob Networks Appl"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11036-017-0960-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-017-0960-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-017-0960-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,8,11]],"date-time":"2018-08-11T05:05:51Z","timestamp":1533963951000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11036-017-0960-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,26]]},"references-count":45,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,8]]}},"alternative-id":["960"],"URL":"https:\/\/doi.org\/10.1007\/s11036-017-0960-4","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"value":"1383-469X","type":"print"},{"value":"1572-8153","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,10,26]]}}}