{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T16:26:59Z","timestamp":1775838419531,"version":"3.50.1"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2017,5,26]],"date-time":"2017-05-26T00:00:00Z","timestamp":1495756800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1007\/s11277-017-4434-6","type":"journal-article","created":{"date-parts":[[2017,5,26]],"date-time":"2017-05-26T05:17:30Z","timestamp":1495775850000},"page":"169-185","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":104,"title":["Cyber Security Threats to IoT Applications and Service Domains"],"prefix":"10.1007","volume":"95","author":[{"given":"Samuel","family":"Tweneboah-Koduah","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4994-4144","authenticated-orcid":false,"given":"Knud Erik","family":"Skouby","sequence":"additional","affiliation":[]},{"given":"Reza","family":"Tadayoni","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,26]]},"reference":[{"key":"4434_CR1","unstructured":"Statista. https:\/\/www.statista.com\/statistics\/471264\/iot-number-of-connected-devices-worldwide\/ ."},{"issue":"7","key":"4434_CR2","doi-asserted-by":"crossref","first-page":"1645","DOI":"10.1016\/j.future.2013.01.010","volume":"29","author":"J Gubbi","year":"2013","unstructured":"Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): A vision, architectural elements, and future directions. Future Generation Computer Systems, 29(7), 1645\u20131660.","journal-title":"Future Generation Computer Systems"},{"key":"4434_CR3","unstructured":"Karimi, K., & Atkinson, G. (2013). What the Internet of Things (IoT) needs to become a reality. White Paper, FreeScale and ARM."},{"issue":"1","key":"4434_CR4","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/MPRV.2011.85","volume":"11","author":"R Caceres","year":"2012","unstructured":"Caceres, R., & Friday, A. (2012). Ubicomp systems at 20: Progress, opportunities, and challenges. IEEE Pervasive Computing, 11(1), 14\u201321.","journal-title":"IEEE Pervasive Computing"},{"issue":"3","key":"4434_CR5","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1007\/s00779-011-0399-8","volume":"16","author":"TS L\u00f3pez","year":"2012","unstructured":"L\u00f3pez, T. S., Ranasinghe, D. C., Harrison, M., & McFarlane, D. (2012). Adding sense to the Internet of Things. Personal and Ubiquitous Computing, 16(3), 291\u2013308.","journal-title":"Personal and Ubiquitous Computing"},{"key":"4434_CR6","unstructured":"Lund, D., Turner, V., MacGillivray, C., & Morales, M. (2014). Worldwide and regional Internet of Things (IoT) 2014\u20132020 forecast: A virtuous circle of proven value and demand. IDC."},{"key":"4434_CR7","unstructured":"Matuszak, G., Bell, G., & Le, D. (2015). Security and the IoT ecosystem. KPMG, December 2015, 132631\u2013G."},{"key":"4434_CR8","doi-asserted-by":"crossref","unstructured":"Darianian, M., & Michael, M. P. (2008) Smart home mobile RFID-based Internet-of-Things systems and services. In International conference on advanced computer theory and engineering, 2008. ICACTE\u201908 (pp. 116\u2013120).","DOI":"10.1109\/ICACTE.2008.180"},{"key":"4434_CR9","unstructured":"Ashton, K. (2009). That \u2018Internet of Things\u2019 thing. RFID Journal, 22, 97\u2013114."},{"issue":"10","key":"4434_CR10","doi-asserted-by":"crossref","first-page":"2266","DOI":"10.1016\/j.comnet.2012.12.018","volume":"57","author":"R Roman","year":"2013","unstructured":"Roman, R., Zhou, J., & Lopez, J. (2013). On the features and challenges of security and privacy in distributed internet of things. Computer Networks, 57(10), 2266\u20132279.","journal-title":"Computer Networks"},{"key":"4434_CR11","unstructured":"ITU. (2005). ITU network reports, Internet of Things, Geneva."},{"key":"4434_CR12","unstructured":"Evans, D. L., Bond, P. J., & Bement, A. L., Jr. (2004). Standards for security categorization of federal information and information systems. Gaithersburg: U. S. Department of Commerce."},{"key":"4434_CR13","unstructured":"Pandya, D., & Patel, N. J. (2016). OWASP top 10 vulnerability analyses in government websites. International Journal of Enterprise Computing and Business Systems, 6(1)."},{"key":"4434_CR14","doi-asserted-by":"crossref","DOI":"10.1002\/9781118908785","volume-title":"Cybersecurity for executives: A practical approach","author":"GJ Touhill","year":"2014","unstructured":"Touhill, G. J., & Touhill, J. C. (2014). Cybersecurity for executives: A practical approach. Hoboken, NJ: Wiley."},{"key":"4434_CR15","unstructured":"CVE\u2014CVE-2016-5344. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-5344 . Accessed December 08, 2016."},{"key":"4434_CR16","unstructured":"CVE-2016-7571: Cross-site scripting (XSS) vulnerability in Drupal 8.x before 8.1.10 allows remote attackers to inject arbitrary web scr. http:\/\/www.cvedetails.com\/cve\/CVE-2016-7571\/ . Accessed December 08, 2016."},{"key":"4434_CR17","unstructured":"NVD\u2014Detail. https:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2016-8581 . Accessed December 08, 2016."},{"key":"4434_CR18","volume-title":"Internet of Things: Strategic research and innovation agenda","author":"O Vermesan","year":"2014","unstructured":"Vermesan, O., et al. (2014). Internet of Things: Strategic research and innovation agenda. Alborg: River Publishers."},{"key":"4434_CR19","volume-title":"Internet of Things: Converging technologies for smart environments and integrated ecosystems","author":"O Vermesan","year":"2013","unstructured":"Vermesan, O., & Friess, P. (2013). Internet of Things: Converging technologies for smart environments and integrated ecosystems. Alborg: River Publishers."},{"key":"4434_CR20","unstructured":"Quashie Azasoo, J., & Tweneboah-Koduah, S. (2016). Cybersecurity architecture in smart metering systems. In Smart living and privacy. Unpublished paper. CMI Annual Conference, Copenhagen, Denmark."},{"key":"4434_CR21","unstructured":"CVE-2016-8666\u2014Red hat customer portal. https:\/\/access.redhat.com\/security\/cve\/cve-2016-8666 . Accessed December 08, 2016."},{"key":"4434_CR22","unstructured":"IERC-European Research Cluster on the Internet of Things. http:\/\/www.internet-of-things-research.eu\/about_iot.htm . Accessed December 22, 2016."},{"key":"4434_CR23","unstructured":"Kosasi, C., Saragih, H., & Kom, M. (2014). How RFID Technology boosts Walmart\u2019s supply chain management. STMIK Pontianak Bakrie University."},{"key":"4434_CR24","unstructured":"Vulnerability distribution of cve security vulnerabilities by types. http:\/\/www.cvedetails.com\/vulnerabilities-by-types.php . Accessed December 08, 2016."}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-017-4434-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-4434-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-4434-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,23]],"date-time":"2023-08-23T19:12:00Z","timestamp":1692817920000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-017-4434-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,26]]},"references-count":24,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,7]]}},"alternative-id":["4434"],"URL":"https:\/\/doi.org\/10.1007\/s11277-017-4434-6","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,5,26]]}}}