{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T15:25:02Z","timestamp":1766503502132,"version":"3.37.3"},"reference-count":70,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2022,10,14]],"date-time":"2022-10-14T00:00:00Z","timestamp":1665705600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,10,14]],"date-time":"2022-10-14T00:00:00Z","timestamp":1665705600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/100007225","name":"Ministry of Science and Technology","doi-asserted-by":"publisher","award":["PID2019-110565RB-I00"],"award-info":[{"award-number":["PID2019-110565RB-I00"]}],"id":[{"id":"10.13039\/100007225","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002878","name":"Consejer\u00eda de Econom\u00eda, Innovaci\u00f3n, Ciencia y Empleo, Junta de Andaluc\u00eda","doi-asserted-by":"publisher","award":["PY18-3724"],"award-info":[{"award-number":["PY18-3724"]}],"id":[{"id":"10.13039\/501100002878","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100009473","name":"Universidad de M\u00e1laga","doi-asserted-by":"crossref","id":[{"id":"10.13039\/100009473","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2023,8]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Security is gaining importance in the daily life of every citizen. The advent of Internet of Things devices in our lives is changing our conception of being connected through a single device to a multiple connection in which the centre of connection is becoming the devices themselves. This conveys the attack vector for a potential attacker is exponentially increased. This paper presents how the concatenation of several attacks on communication protocols (WiFi, Bluetooth LE, GPS, 433 Mhz and NFC) can lead to undesired situations in a domestic environment. A comprehensive analysis of the protocols with the identification of their weaknesses is provided. Some relevant aspects of the whole attacking procedure have been presented to provide some relevant tips and countermeasures.<\/jats:p>","DOI":"10.1007\/s11036-022-02046-x","type":"journal-article","created":{"date-parts":[[2022,10,14]],"date-time":"2022-10-14T14:15:40Z","timestamp":1665756940000},"page":"1255-1264","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["A Test Environment for Wireless Hacking in Domestic IoT Scenarios"],"prefix":"10.1007","volume":"28","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6751-0625","authenticated-orcid":false,"given":"Antonio","family":"Mu\u00f1oz","sequence":"first","affiliation":[]},{"given":"Carmen","family":"Fern\u00e1ndez-Gago","sequence":"additional","affiliation":[]},{"given":"Roberto","family":"L\u00f3pez-Villa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,14]]},"reference":[{"issue":"1","key":"2046_CR1","doi-asserted-by":"publisher","first-page":"396","DOI":"10.1109\/TSG.2016.2553647","volume":"9","author":"A Abdallah","year":"2016","unstructured":"Abdallah A, Shen XS (2016) A lightweight lattice-based homomorphic privacy-preserving data aggregation scheme for smart grid. IEEE Transactions on Smart Grid 9(1):396\u2013405","journal-title":"IEEE Transactions on Smart Grid"},{"doi-asserted-by":"crossref","unstructured":"Babamir SM, Nowrouzi R, Naseri H (2010) Mining bluetooth attacks in smart phones. In: International conference on networked digital technologies. Springer, Berlin, Heidelberg, pp 241\u2013253","key":"2046_CR2","DOI":"10.1007\/978-3-642-14292-5_26"},{"unstructured":"Battery-powered medical devices: their failure modes and mitigation strategies alerts, knowledge, exponent. https:\/\/www.exponent.com\/knowledge\/alerts\/2018\/11\/battery-powered-medical-devices (Online). [Accessed Jan 2022]","key":"2046_CR3"},{"unstructured":"Blanco J, Garcia A, Pastor JM, Canas V (2017) A multi-purpose UHF RFID tag emulator for communication protocols testing. In: Smart SysTech 2017; European Conference on Smart Objects, Systems and Technologies. VDE pp. 1\u20137)","key":"2046_CR4"},{"doi-asserted-by":"crossref","unstructured":"Bugeja J, Jacobsson A, Davidsson P (2016) On privacy and security challenges in smart connected homes. In: 2016 European Intelligence and Security Informatics Conference (EISIC). IEEE, pp 172\u2013175","key":"2046_CR5","DOI":"10.1109\/EISIC.2016.044"},{"doi-asserted-by":"crossref","unstructured":"Chacko A, Hayajneh T (2018) Security and privacy issues with IoT in healthcare.\u00a0EAI Endorsed Trans Pervasive Health Technol\u00a04(14):e2\u2013e2","key":"2046_CR6","DOI":"10.4108\/eai.13-7-2018.155079"},{"doi-asserted-by":"crossref","unstructured":"Danev B, Luecken H, Capkun S, El Defrawy K (2010) Attacks on physical-layer identification. In: Proceedings of the third ACM conference on Wireless network security. pp 89\u201398","key":"2046_CR7","DOI":"10.1145\/1741866.1741882"},{"unstructured":"Daniluk K, Niewiadomska-Szynkiewicz E (2012) Energy-efficient security in implantable medical devices. In: 2012 federated conference on computer science and information systems (FedCSIS). IEEE, pp 773\u2013778","key":"2046_CR8"},{"doi-asserted-by":"crossref","unstructured":"Devadas S, Suh E, Paral S, Sowell R, Ziola T,\u00a0 Khandelwal V (2008) Design and implementation of PUF-based\u00a0\u201cunclonable\u201d\u00a0RFID ICs for anti-counterfeiting and security applications. In: 2008 IEEE international conference on RFID. IEEE, pp 58\u201364","key":"2046_CR9","DOI":"10.1109\/RFID.2008.4519377"},{"unstructured":"ESA Navipedia Contributors. Principles of Interoperability among GNSS. ESA (2020)","key":"2046_CR10"},{"doi-asserted-by":"crossref","unstructured":"Farooq MU et al (2015) A critical analysis on the security concerns of internet of things (IoT). Int J Comput Appl 111:1\u20136","key":"2046_CR11","DOI":"10.5120\/19547-1280"},{"unstructured":"Garbelini ME, Wang C, Chattopadhyay S, Sumei S, Kurniawan E (2020) Sweyntooth: Unleashing mayhem over bluetooth low energy. In: 2020 USENIX annual technical conference (USENIXATC 20). pp 911\u2013925","key":"2046_CR12"},{"unstructured":"Giese D, Liu K, Sun M, Syed T, Zhang L (2019) Security analysis of near-field communication (NFC) payments. arXiv preprint arXiv:1904.10623","key":"2046_CR13"},{"issue":"10","key":"2046_CR14","first-page":"1","volume":"4","author":"R Godha","year":"2014","unstructured":"Godha R, Prateek S, Kataria N (2014) Home automation: Access control for IoT devices. International Journal of Scientific and Research Publications 4(10):1","journal-title":"International Journal of Scientific and Research Publications"},{"doi-asserted-by":"crossref","unstructured":"Gupta A (2019) The IoT Hacker\u2019s Handbook: A Practical Guide to Hacking the Internet of Things. Apress","key":"2046_CR15","DOI":"10.1007\/978-1-4842-4300-8"},{"unstructured":"Haselsteiner E, Breitfu\u00df K (2006) Security in near field communication: strengths and weaknesses. Philips Semiconductors, Gratkorn, Austria","key":"2046_CR16"},{"key":"2046_CR17","doi-asserted-by":"publisher","first-page":"102552","DOI":"10.1016\/j.scs.2020.102552","volume":"66","author":"V Hassija","year":"2021","unstructured":"Hassija V, Chamola V, Bajpai BC, Zeadally S (2021) Security issues in implantable medical devices: Fact or fiction? Sustainable Cities and Society 66:102552","journal-title":"Sustainable Cities and Society"},{"issue":"6","key":"2046_CR18","doi-asserted-by":"publisher","first-page":"1073","DOI":"10.1109\/TVLSI.2018.2806041","volume":"26","author":"Z He","year":"2018","unstructured":"He Z, Wan M, Deng J, Bai C, Dai K (2018) A reliable strong PUF based on switched- capacitor circuit. IEEE Transactions on Very Large Scale Integration (VLSI) Systems 26(6):1073\u20131083","journal-title":"IEEE Transactions on Very Large Scale Integration (VLSI) Systems"},{"doi-asserted-by":"crossref","unstructured":"Hosseini-Khayat S (2011) A lightweight security protocol for ultra-low power ASIC implementation for wireless implantable medical devices. In: 2011 5th international symposium on medical information and communication technology. IEEE, pp 6\u20139","key":"2046_CR19","DOI":"10.1109\/ISMICT.2011.5759785"},{"issue":"4","key":"2046_CR20","doi-asserted-by":"publisher","first-page":"5","DOI":"10.22215\/timreview\/1066","volume":"7","author":"M Hypponen","year":"2017","unstructured":"Hypponen M, Nyman L (2017) The Internet of (Vulnerable) Things. Technology Innovation Management Review 7(4):5\u201311","journal-title":"Technology Innovation Management Review"},{"doi-asserted-by":"crossref","unstructured":"Igier M, Vaudenay S (2016) Distance Bounding based on PUF. In: International conference on cryptology and network security. Springer, Cham, pp 701\u2013710","key":"2046_CR21","DOI":"10.1007\/978-3-319-48965-0_48"},{"unstructured":"ISO, Near Field Communication Interface and Protocol (NFCIP-1), ISO\/EIC 18092:2013 (2013)","key":"2046_CR22"},{"unstructured":"ISO, Near Field Communication Interface and Protocol-2 (NFCIP-2), ISO\/EIC 21481:2012 (2013)","key":"2046_CR23"},{"doi-asserted-by":"crossref","unstructured":"Iqbal MMW, Kausar F, Wahla MA (2010) Attacks on Bluetooth security architecture and its countermeasures. In: International conference on information security and assurance. Springer, Berlin, Heidelberg, pp 190\u2013197","key":"2046_CR24","DOI":"10.1007\/978-3-642-13365-7_18"},{"key":"2046_CR25","first-page":"1","volume":"PP","author":"X Jiang","year":"2013","unstructured":"Jiang X, Zhang J, Harding BJ, Makela JJ, Dom\u0131nguez-Garc\u0131a AD (2013) Spoofing GPS receiver clock offset of phasor measurement unit. IEEE Transactions on Power PP:1\u201310","journal-title":"IEEE Transactions on Power"},{"issue":"4","key":"2046_CR26","doi-asserted-by":"publisher","first-page":"1933","DOI":"10.1109\/COMST.2014.2320093","volume":"16","author":"N Komninos","year":"2014","unstructured":"Komninos N, Philippou E, Pitsillides A (2014) Survey in smart grid and smart home security: Issues, challenges and countermeasures. IEEE Communications Surveys & Tutorials 16(4):1933\u20131954","journal-title":"IEEE Communications Surveys & Tutorials"},{"unstructured":"Larcom JA, Liu H (2013) GPS vulnerability analysis in surface transportation. UMass Dartmouth 19th Annual Sigma Xi Research Exhibit, Dartmouth, MA","key":"2046_CR27"},{"doi-asserted-by":"crossref","unstructured":"Lee YC, Hsieh YC, You PS, Chen TC (2008) An improvement on RFID authentication protocol with privacy protection. In: 2008 Third international conference on convergence and hybrid information technology. IEEE, vol 2, pp 569\u2013573","key":"2046_CR28","DOI":"10.1109\/ICCIT.2008.162"},{"issue":"20","key":"2046_CR29","doi-asserted-by":"publisher","first-page":"12749","DOI":"10.1007\/s11042-016-3252-2","volume":"75","author":"S Lee","year":"2016","unstructured":"Lee S, Kim J, Shon T (2016) User privacy-enhanced security architecture for home area network of Smartgrid. Multimedia Tools and Applications 75(20):12749\u201312764","journal-title":"Multimedia Tools and Applications"},{"issue":"5","key":"2046_CR30","doi-asserted-by":"publisher","first-page":"1365","DOI":"10.1016\/j.jnca.2013.02.034","volume":"36","author":"X Li","year":"2013","unstructured":"Li X, Niu J, Khan MK, Liao J (2013) An enhanced smart card based remote user password authentication scheme. Journal of Network and Computer Applications 36(5):1365\u20131371","journal-title":"Journal of Network and Computer Applications"},{"unstructured":"Li C, Raghunathan A, Jha NK (2011) Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system. In: 2011 IEEE 13th international conference on e-health networking, applications and services. IEEE, pp 150\u2013156","key":"2046_CR31"},{"issue":"3","key":"2046_CR32","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1109\/MWC.2012.6231161","volume":"19","author":"T Li","year":"2012","unstructured":"Li T, Ren J, Tang X (2012) Secure wireless monitoring and control systems for smart grid and smart home. IEEE Wireless Communications 19(3):66\u201373","journal-title":"IEEE Wireless Communications"},{"issue":"10","key":"2046_CR33","doi-asserted-by":"publisher","first-page":"6543","DOI":"10.1109\/TII.2020.2966069","volume":"16","author":"W Liang","year":"2020","unstructured":"Liang W, Fan Y, Li KC, Zhang D, Gaudiot JL (2020) Secure data storage and recovery in industrial blockchain network environments. IEEE Transactions on Industrial Informatics 16(10):6543\u20136552","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"3","key":"2046_CR34","doi-asserted-by":"publisher","first-page":"28","DOI":"10.3390\/jsan7030028","volume":"7","author":"AM Lonzetta","year":"2018","unstructured":"Lonzetta AM, Cope P, Campbell J, Mohd BJ, Hayajneh T (2018) Security vulnerabilities in Bluetooth technology as used in IoT. Journal of Sensor and Actuator Networks 7(3):28","journal-title":"Journal of Sensor and Actuator Networks"},{"doi-asserted-by":"crossref","unstructured":"Mantoro T, Ayu MA, binti Mahmod SM (2014) Securing the authentication and message integrity for Smart Home using smart phone. In: 2014 International conference on multimedia computing and systems (ICMCS). IEEE, pp 985\u2013989","key":"2046_CR35","DOI":"10.1109\/ICMCS.2014.6911150"},{"unstructured":"Miessler D (2015) IoT attack surface mapping. Presentation at DEFCON. Accessed 29 Sept 2018","key":"2046_CR36"},{"unstructured":"Miller C (2012) Exploring the NFC attack surface. presented at Black Hat, Las Vegas, USA","key":"2046_CR37"},{"doi-asserted-by":"crossref","unstructured":"Mulliner C (2009) Vulnerability analysis and attacks on NFC-enabled mobile phones. Proceedings of International Conference on Availability, Reliability, and Security, 695\u2013700","key":"2046_CR38","DOI":"10.1109\/ARES.2009.46"},{"unstructured":"Mulliner C (2008) Attacking NFC mobile phones. presented at EUSecWest, London, UK","key":"2046_CR39"},{"key":"2046_CR40","first-page":"367","volume-title":"International conference on information processing","author":"TR Mutchukota","year":"2011","unstructured":"Mutchukota TR, Panigrahy SK, Jena SK (2011) Man-in-the-middle attack and its countermeasure in bluetooth secure simple pairing. International conference on information processing. Springer, Berlin, Heidelberg, pp 367\u2013376"},{"issue":"3","key":"2046_CR41","doi-asserted-by":"publisher","first-page":"2702","DOI":"10.1109\/COMST.2019.2910750","volume":"21","author":"N Neshenko","year":"2019","unstructured":"Neshenko N, Bou-Harb E, Crichigno J, Kaddoum G, Ghani N (2019) Demystifying IoT security: an exhaustive survey on IoT vulnerabilities and a first empirical look on internet-scale IoT exploitations. IEEE Communications Surveys & Tutorials 21(3):2702\u20132733","journal-title":"IEEE Communications Surveys & Tutorials"},{"unstructured":"Courtois Nicolas T (2009) Card-Only Attacks on MiFareClassic. University College London, UK","key":"2046_CR42"},{"doi-asserted-by":"crossref","unstructured":"Nilsson DK, Porras PA, Jonsson E (2007) How to secure bluetooth-based pico networks. In: International conference on computer safety, reliability, and security. Springer, Berlin, Heidelberg, pp 209\u2013223","key":"2046_CR43","DOI":"10.1007\/978-3-540-75101-4_20"},{"doi-asserted-by":"crossref","unstructured":"Notra S, Siddiqi M, Gharakheili HH, Sivaraman V, Boreli R (2014) An experimental study of security and privacy risks with emerging household appliances. In: 2014 IEEE conference on communications and network security. IEEE, pp 79\u201384","key":"2046_CR44","DOI":"10.1109\/CNS.2014.6997469"},{"doi-asserted-by":"crossref","unstructured":"Padgette J, Bahr J, Batra M, Holtmann M, Smithbey R, Chen L, Scarfone K (2017) Guide to Bluetooth Security. National Institute of Standards and Technology","key":"2046_CR45","DOI":"10.6028\/NIST.SP.800-121r2"},{"doi-asserted-by":"crossref","unstructured":"Pan X, Ling Z, Pingley A, Yu W, Zhang N, Fu X (2012) How privacy leaks from bluetooth mouse? In: Proceedings of the 2012 ACM conference on Computer and communications security. pp 1013\u20131015","key":"2046_CR46","DOI":"10.1145\/2382196.2382309"},{"issue":"2","key":"2046_CR47","doi-asserted-by":"publisher","first-page":"2","DOI":"10.36244\/ICJ.2019.2.1","volume":"11","author":"D Papp","year":"2019","unstructured":"Papp D, Tam\u00e1s K, Butty\u00e1n L (2019) IoT hacking-a primer. Infocommunications Journal 11(2):2\u201313","journal-title":"Infocommunications Journal"},{"doi-asserted-by":"crossref","unstructured":"Pereira H, Carreira R, Pinto P, Lopes SI (2020) Hacking the RFID-based authentication system of a university campus on a budget. In: 2020 15th Iberian conference on information systems and technologies (CISTI). IEEE, pp 1\u20135","key":"2046_CR48","DOI":"10.23919\/CISTI49556.2020.9140943"},{"issue":"1","key":"2046_CR49","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MIC.2017.17","volume":"21","author":"S Pinto","year":"2017","unstructured":"Pinto S, Gomes T, Pereira J, Cabral J, Tavares A (2017) IIoTEED: an enhanced, trusted execution environment for industrial IoT edge devices. IEEE Internet Computing 21(1):40\u201347","journal-title":"IEEE Internet Computing"},{"doi-asserted-by":"publisher","unstructured":"Pycroft L, Aziz TZ (2018) Security of implantable medical devices with wireless connections: The dangers of cyber-attacks. Expert Rev Med Devices 15(6):403\u2013406. https:\/\/doi.org\/10.1080\/17434440.2018.1483235","key":"2046_CR50","DOI":"10.1080\/17434440.2018.1483235"},{"unstructured":"Robberts C, Toft J (2019) Finding vulnerabilities in IoT devices: Ethical hacking of electronic locks","key":"2046_CR51"},{"doi-asserted-by":"crossref","unstructured":"Robyns P, Quax P, Lamotte W (2015) Injection attacks on 802.11 n MAC frame aggregation. In: Proceedings of the 8th ACM conference on security & privacy in wireless and mobile networks. pp 1\u201311","key":"2046_CR52","DOI":"10.1145\/2766498.2766513"},{"issue":"16\u201325","key":"2046_CR53","first-page":"2018","volume":"51","author":"R Roman","year":"2018","unstructured":"Roman R, Lopez J, Gritzalis S (2018) Evolution and trends in the security of the internet of things. IEEE Computer 51(16\u201325):2018","journal-title":"IEEE Computer"},{"doi-asserted-by":"crossref","unstructured":"Seis A, Saima SE, Rivest R (2004) Security and privacy aspects of low cost radio frequency identification system. In: Proceeding of the 1st international conference on security in pervasive computing. Springer, pp 201\u2013212","key":"2046_CR54","DOI":"10.1007\/978-3-540-39881-3_18"},{"unstructured":"Security contactless smartcard (2008) Digital Security group. Radboud University, Nederlands","key":"2046_CR55"},{"key":"2046_CR56","doi-asserted-by":"publisher","first-page":"102481","DOI":"10.1016\/j.jnca.2019.102481","volume":"149","author":"J Sengupta","year":"2020","unstructured":"Sengupta J, Ruj S, Bit SD (2020) A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT. Journal of Network and Computer Applications 149:102481","journal-title":"Journal of Network and Computer Applications"},{"doi-asserted-by":"crossref","unstructured":"Seralathan Y, Oh TT, Jadhav S, Myers J, Jeong JP, Kim YH, Kim JN (2018) IoT security vulnerability: A case study of a Web camera. In: 2018 20th International conference on advanced communication technology (ICACT). IEEE, pp 172\u2013177","key":"2046_CR57","DOI":"10.23919\/ICACT.2018.8323685"},{"key":"2046_CR58","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.comnet.2014.11.008","volume":"76","author":"S Sicari","year":"2015","unstructured":"Sicari S et al (2015) Security, privacy and trust in Internet of Things: The road a head. Computer Networks 76:146\u2013164","journal-title":"Computer Networks"},{"doi-asserted-by":"crossref","unstructured":"Steinmetzer D, Yuan Y, Hollick M (2018) Beam-stealing: Intercepting the sector sweep to launch man-in-the-middle attacks on wireless IEEE 802.11 ad networks. In: Proceedings of the 11th ACM conference on security & privacy in wireless and mobile networks. pp 12\u201322","key":"2046_CR59","DOI":"10.1145\/3212480.3212499"},{"key":"2046_CR60","doi-asserted-by":"publisher","first-page":"1454","DOI":"10.1016\/j.jclepro.2016.10.006","volume":"140","author":"BLR Stojkoska","year":"2017","unstructured":"Stojkoska BLR, Trivodaliev KV (2017) A review of Internet of Things for smart home: Challenges and solutions. Journal of Cleaner Production 140:1454\u20131464","journal-title":"Journal of Cleaner Production"},{"doi-asserted-by":"crossref","unstructured":"Sun Y, Wang X, Zhou X (2011) Jamming attack in wsn: A spatial perspective. In: Proceedings of the 13th international conference on Ubiquitous computing, pp. 563\u2013564","key":"2046_CR61","DOI":"10.1145\/2030112.2030214"},{"doi-asserted-by":"crossref","unstructured":"Vanhoef M, Piessens F (2017) Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2. imec-DistriNet, KU Leuven. https:\/\/papers.mathyvanhoef.com\/ccs2017.pdf","key":"2046_CR62","DOI":"10.1145\/3133956.3134027"},{"doi-asserted-by":"crossref","unstructured":"Wang S, Zhu S, Zhang Y (2018) Blockchain-based mutual authentication security protocol for distributed RFID systems. In: 2018 IEEE Symposium on computers and communications (ISCC). IEEE, pp 00074\u201300077","key":"2046_CR63","DOI":"10.1109\/ISCC.2018.8538567"},{"issue":"2","key":"2046_CR64","first-page":"19","volume":"25","author":"JS Warner","year":"2003","unstructured":"Warner JS, Johnston RG (2003) GPS spoofing countermeasures. Homeland. Security Journal 25(2):19\u201327","journal-title":"Security Journal"},{"issue":"5","key":"2046_CR65","doi-asserted-by":"publisher","first-page":"715","DOI":"10.1016\/j.clsr.2016.07.002","volume":"32","author":"RH Weber","year":"2016","unstructured":"Weber RH, Studer E (2016) Cyber-security in the Internet of Things: Legal aspects. Computer Law & Security Review 32(5):715\u2013728","journal-title":"Computer Law & Security Review"},{"unstructured":"Wesson K, Shepard D, Humphreys T (2012) Straight talk on anti-spoofing. GPS World, pp 32\u201363","key":"2046_CR66"},{"doi-asserted-by":"crossref","unstructured":"Xu T, Wendt JB, Potkonjak M (2014) Matched digital PUFs for low power security in implantable medical devices. In: 2014 IEEE international conference on healthcare informatics. IEEE, pp 33\u201338","key":"2046_CR67","DOI":"10.1109\/ICHI.2014.12"},{"doi-asserted-by":"crossref","unstructured":"Yang Q, Mai S, Zhao Y, Wang Z, Zhang C, Wang Z An on-chip security guard based on zero-power authentication for implantable medical devices. In: 2014 IEEE 57th international midwest symposium on circuits and systems (MWSCAS). IEEE, pp 531\u2013534","key":"2046_CR68","DOI":"10.1109\/MWSCAS.2014.6908469"},{"unstructured":"Yarbrough B, Wagner N (2018) Assessing security risk for wireless sensor networks under cyber attack. In: Proceedings of the annual simulation symposium. pp 1\u201312","key":"2046_CR69"},{"doi-asserted-by":"crossref","unstructured":"Yoon S, Park H, Yoo HS (2015) Security issues on smarthome in IoT environment. In: Computer science and its applications. Springer, Berlin, Heidelberg, pp 691\u2013696","key":"2046_CR70","DOI":"10.1007\/978-3-662-45402-2_97"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-022-02046-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11036-022-02046-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-022-02046-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,19]],"date-time":"2024-08-19T17:05:57Z","timestamp":1724087157000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11036-022-02046-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,14]]},"references-count":70,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,8]]}},"alternative-id":["2046"],"URL":"https:\/\/doi.org\/10.1007\/s11036-022-02046-x","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"type":"print","value":"1383-469X"},{"type":"electronic","value":"1572-8153"}],"subject":[],"published":{"date-parts":[[2022,10,14]]},"assertion":[{"value":"23 May 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 October 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}