{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,3]],"date-time":"2026-01-03T21:05:31Z","timestamp":1767474331736,"version":"3.37.3"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"26","license":[{"start":{"date-parts":[[2021,8,12]],"date-time":"2021-08-12T00:00:00Z","timestamp":1628726400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,8,12]],"date-time":"2021-08-12T00:00:00Z","timestamp":1628726400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2022,11]]},"DOI":"10.1007\/s11042-021-11389-8","type":"journal-article","created":{"date-parts":[[2021,8,12]],"date-time":"2021-08-12T19:02:21Z","timestamp":1628794941000},"page":"36931-36946","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["An approach to adding simple interface as security gateway architecture for IoT device"],"prefix":"10.1007","volume":"81","author":[{"given":"Nikola","family":"Pavlovi\u0107","sequence":"first","affiliation":[]},{"given":"Marko","family":"\u0160arac","sequence":"additional","affiliation":[]},{"given":"Sa\u0161a","family":"Adamovi\u0107","sequence":"additional","affiliation":[]},{"given":"Muzafer","family":"Sara\u010devi\u0107","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5682-7184","authenticated-orcid":false,"given":"Khaleel","family":"Ahmad","sequence":"additional","affiliation":[]},{"given":"Nemanja","family":"Ma\u010dek","sequence":"additional","affiliation":[]},{"given":"Deepak Kumar","family":"Sharma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,12]]},"reference":[{"key":"11389_CR1","doi-asserted-by":"publisher","unstructured":"Alrawi O, Lever C, Antonakakis M, Monrose F (2019) SoK: Security Evaluation of Home-Based IoT Deployments. 2019 IEEE Symp Secur Priv (SP). https:\/\/doi.org\/10.1109\/sp.2019.00013","DOI":"10.1109\/sp.2019.00013"},{"key":"11389_CR2","doi-asserted-by":"publisher","unstructured":"Andriansyah M, Subali M, Purwanto I, Irianto S, Pramono R (2017) e-KTP as the basis of home security system using arduino UNO. 2017 4th Int Conf Comput Appl Inf Process Technol (CAIPT). https:\/\/doi.org\/10.1109\/caipt.2017.8320693","DOI":"10.1109\/caipt.2017.8320693"},{"key":"11389_CR3","doi-asserted-by":"publisher","unstructured":"Bechtel M, Yun H (2019) Denial-of-Service Attacks on Shared Cache in Multicore: Analysis and Prevention. 2019 IEEE Real-Time Embed Technol Appl Symp (RTAS). https:\/\/doi.org\/10.1109\/rtas.2019.00037","DOI":"10.1109\/rtas.2019.00037"},{"key":"11389_CR4","doi-asserted-by":"publisher","unstructured":"Bhat B, Ali A, Gupta A (2015) DES and AES performance evaluation. IEEE Int Conf Comput Commun Autom 15\u201316 May 2015 Greater Noida, India.\u00a0https:\/\/doi.org\/10.1109\/ccaa.2015.7148500","DOI":"10.1109\/ccaa.2015.7148500"},{"key":"11389_CR5","doi-asserted-by":"crossref","unstructured":"Buford J, Yu H, Lua EK (2009) P2P Networking and Applications (Morgan Kaufmann Series in Networking (Hardcover)) (1st ed.). Morgan Kaufmann","DOI":"10.1016\/B978-0-12-374214-8.00001-5"},{"key":"11389_CR6","doi-asserted-by":"publisher","unstructured":"Cirani S, Ferrari G, Iotti N, Picone M (2015) The IoT hub: a fog node for seamless management of heterogeneous connected smart objects. 2015 12th Ann IEEE Int Conf Sens Commun Netw Workshops (SECON Workshops). https:\/\/doi.org\/10.1109\/seconw.2015.7328145","DOI":"10.1109\/seconw.2015.7328145"},{"issue":"3","key":"11389_CR7","doi-asserted-by":"publisher","first-page":"1617","DOI":"10.1007\/s11277-015-2467-2","volume":"83","author":"R Ch\u00e1vez-Santiago","year":"2015","unstructured":"Ch\u00e1vez-Santiago R, Szyde\u0142ko M, Kliks A, Foukalas F, Haddad Y, Nolan KE, Kelly MY, Masonta MT, Balasingham I (2015) 5G: The Convergence of Wireless Communications. Wirel Pers Commun 83(3):1617\u20131642. https:\/\/doi.org\/10.1007\/s11277-015-2467-2","journal-title":"Wireless Personal Communications"},{"key":"11389_CR8","doi-asserted-by":"publisher","unstructured":"Faheem M, Jamel S, Hassan AAZ, Shafinaz N, Mat M (2017) A Survey on the Cryptographic Encryption Algorithms. Int J Adv Comput Sci Appl 8(11). https:\/\/doi.org\/10.14569\/ijacsa.2017.081141","DOI":"10.14569\/ijacsa.2017.081141"},{"key":"11389_CR9","doi-asserted-by":"publisher","unstructured":"Goyal M, Dutta M (2018) Intrusion Detection of Wormhole Attack in IoT: A Review. 2018 Int Conf Circuits Syst Digit Enterp Technol (ICCSDET). https:\/\/doi.org\/10.1109\/iccsdet.2018.8821160","DOI":"10.1109\/iccsdet.2018.8821160"},{"key":"11389_CR10","doi-asserted-by":"publisher","unstructured":"Iqbal H, Naaz S (2019) Wireshark as a Tool for Detection of Various LAN Attacks. Int J Comput Sci Eng 7(5):833\u2013837. https:\/\/doi.org\/10.26438\/ijcse\/v7i5.833837","DOI":"10.26438\/ijcse\/v7i5.833837"},{"key":"11389_CR11","doi-asserted-by":"publisher","unstructured":"Kavianpour A, Anderson M (2017) An Overview of Wireless Network Security. 2017 IEEE 4th Int Conf Cyber Secur Cloud Comput (Cscloud). https:\/\/doi.org\/10.1109\/cscloud.2017.45","DOI":"10.1109\/cscloud.2017.45"},{"key":"11389_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2016\/5974586","volume":"2016","author":"G Liu","year":"2016","unstructured":"Liu G, Jiang D (2016) 5G: Vision and Requirements for Mobile Communication System towards Year 2020. Chin J Eng\u00a02016:1\u20138. https:\/\/doi.org\/10.1155\/2016\/5974586","journal-title":"Chinese Journal Of Engineering"},{"key":"11389_CR13","doi-asserted-by":"publisher","unstructured":"Mahmoud R, Yousuf T, Aloul F, Zualkernan I (2015a) Internet of things (IoT) security: Current status, challenges and prospective measures. 2015 10th Int Conf Internet Technol Secur Trans (ICITST). https:\/\/doi.org\/10.1109\/icitst.2015.7412116","DOI":"10.1109\/icitst.2015.7412116"},{"key":"11389_CR14","doi-asserted-by":"publisher","unstructured":"Mahmoud R, Yousuf T, Aloul F, Zualkernan I (2015b) Cyber Security and Internet of Things: Vulnerabilities, Threats, Intruders and Attacks. J Cyber Secur Mobil 4(1):65\u201388. https:\/\/doi.org\/10.13052\/jcsm2245-1439.414","DOI":"10.13052\/jcsm2245-1439.414"},{"key":"11389_CR15","doi-asserted-by":"publisher","unstructured":"Mavromoustakis CX, Mastorakis G, Batalla JM (Eds.) (2016) Internet of Things (IoT) in 5G Mobile Technologies. Model Optim Sci Technol. Published. https:\/\/doi.org\/10.1007\/978-3-319-30913-2","DOI":"10.1007\/978-3-319-30913-2"},{"key":"11389_CR16","doi-asserted-by":"publisher","unstructured":"Mielczarek W, Mo\u0144 T (2015) USB Data Capture and Analysis in Windows Using USBPcap and Wireshark. Comput Netw 431\u2013443.\u00a0https:\/\/doi.org\/10.1007\/978-3-319-19419-6_41","DOI":"10.1007\/978-3-319-19419-6_41"},{"key":"11389_CR17","doi-asserted-by":"publisher","unstructured":"Nawir M, Amir A, Yaakob N, Lynn OB (2016) Internet of Things (IoT): Taxonomy of security attacks. 2016 3rd Int Conf Electron Des (ICED). Published. https:\/\/doi.org\/10.1109\/iced.2016.7804660","DOI":"10.1109\/iced.2016.7804660"},{"key":"11389_CR18","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1016\/j.csi.2016.12.008","volume":"54","author":"P Neves","year":"2017","unstructured":"Neves P, Cal\u00e9 R, Costa M, Gaspar G, Alcaraz-Calero J, Wang Q, Nightingale J, Bernini G, Carrozzo G, Valdivieso N, Garc\u00eda Villalba LJ, Barros M, Gravas A, Santos J, Maia R, Preto R (2017) Future mode of operations for 5G \u2013 The SELFNET approach enabled by SDN\/NFV. Comput Stand Interfaces 54:229\u2013246. https:\/\/doi.org\/10.1016\/j.csi.2016.12.008","journal-title":"Computer Standards & Interfaces"},{"issue":"14","key":"11389_CR19","doi-asserted-by":"publisher","first-page":"18383","DOI":"10.1007\/s11042-018-5660-y","volume":"77","author":"H Noura","year":"2018","unstructured":"Noura H, Chehab A, Sleem L, Noura M, Couturier R, Mansour M (2018) One round cipher algorithm for multimedia IoT devices. Multimed Tools Appl 77(14):18383\u201318413. https:\/\/doi.org\/10.1007\/s11042-018-5660-y","journal-title":"Multimedia Tools And Applications"},{"key":"11389_CR20","doi-asserted-by":"publisher","unstructured":"Rong C, Zhao G, Yan L, Cayirci E, Cheng H (2013) RFID Security. Comput\u00a0Inf\u00a0Secur\u00a0Handb 345\u2013361.\u00a0https:\/\/doi.org\/10.1016\/b978-0-12-394397-2.00018-0","DOI":"10.1016\/b978-0-12-394397-2.00018-0"},{"key":"11389_CR21","doi-asserted-by":"publisher","unstructured":"Sarma R, Barbhuiya F (2019) Internet of Things: Attacks and Defences. 2019 7th Int Conf Smart Comput Commun (ICSCC). https:\/\/doi.org\/10.1109\/icscc.2019.8843649","DOI":"10.1109\/icscc.2019.8843649"},{"key":"11389_CR22","doi-asserted-by":"publisher","unstructured":"Sun H, Bonetta D, Humer C, Binder W (2018) Efficient dynamic analysis for Node. js. Proc 27th Int Conf Compiler Constr. https:\/\/doi.org\/10.1145\/3178372.3179527","DOI":"10.1145\/3178372.3179527"},{"key":"11389_CR23","doi-asserted-by":"publisher","unstructured":"Sasipriya S, Vigneshram R (2016) An overview of cognitive radio in 5G wireless communications. 2016 IEEE Int Conf Comput Intell Comput Res (ICCIC). https:\/\/doi.org\/10.1109\/iccic.2016.7919725","DOI":"10.1109\/iccic.2016.7919725"},{"key":"11389_CR24","doi-asserted-by":"publisher","unstructured":"Usha D, Bobby M (2018) Privacy Issues In Smart Home Devices Using Internet Of Things \u2013 A Survey. Int J Adv Res 6(10):566\u2013568. https:\/\/doi.org\/10.21474\/ijar01\/7839","DOI":"10.21474\/ijar01\/7839"},{"key":"11389_CR25","doi-asserted-by":"publisher","unstructured":"Zhou X, Tang X (2011) Research and implementation of RSA algorithm for encryption and decryption. Proc\u00a02011 6th Int Forum Strat Technol. https:\/\/doi.org\/10.1109\/ifost.2011.6021216","DOI":"10.1109\/ifost.2011.6021216"},{"key":"11389_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2020.103433","volume":"71","author":"C Zunino","year":"2020","unstructured":"Zunino C, Valenzano A, Obermaisser R, Petersen S (2020) Factory Communications at the Dawn of the Fourth Industrial Revolution. Comput Stand Interfaces 71:103433. https:\/\/doi.org\/10.1016\/j.csi.2020.103433","journal-title":"Computer Standards & Interfaces"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11389-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-11389-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11389-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,29]],"date-time":"2022-09-29T09:35:06Z","timestamp":1664444106000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-11389-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,12]]},"references-count":26,"journal-issue":{"issue":"26","published-print":{"date-parts":[[2022,11]]}},"alternative-id":["11389"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-11389-8","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2021,8,12]]},"assertion":[{"value":"10 October 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 July 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 July 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 August 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human rights"}},{"value":"The authors declare that they have no conflict of interest.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}]}}