{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T04:59:36Z","timestamp":1772859576686,"version":"3.50.1"},"reference-count":98,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,4,24]],"date-time":"2019-04-24T00:00:00Z","timestamp":1556064000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1007\/s11277-019-06405-y","type":"journal-article","created":{"date-parts":[[2019,4,24]],"date-time":"2019-04-24T12:03:37Z","timestamp":1556107417000},"page":"325-344","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":65,"title":["A Review of Security in Internet of Things"],"prefix":"10.1007","volume":"108","author":[{"given":"Yasmine","family":"Harbi","sequence":"first","affiliation":[]},{"given":"Zibouda","family":"Aliouat","sequence":"additional","affiliation":[]},{"given":"Saad","family":"Harous","sequence":"additional","affiliation":[]},{"given":"Abdelhak","family":"Bentaleb","sequence":"additional","affiliation":[]},{"given":"Allaoua","family":"Refoufi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,4,24]]},"reference":[{"issue":"7","key":"6405_CR1","doi-asserted-by":"publisher","first-page":"1645","DOI":"10.1016\/j.future.2013.01.010","volume":"29","author":"J Gubbi","year":"2013","unstructured":"Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): A vision, architectural elements, and future directions. Future Generation Computer Systems, 29(7), 1645.","journal-title":"Future Generation Computer Systems"},{"key":"6405_CR2","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1016\/j.jnca.2014.01.014","volume":"42","author":"Z Yan","year":"2014","unstructured":"Yan, Z., Zhang, P., & Vasilakos, A. V. (2014). A survey on trust management for Internet of Things. Journal of Network and Computer Applications, 42, 120.","journal-title":"Journal of Network and Computer Applications"},{"key":"6405_CR3","unstructured":"Saif, I., Peasley, S., & Perinkolam, A. (2015). Safeguarding the Internet of Things: Being secure, vigilant, and resilient in the connected age. Deloitte Review, 17. \n                    https:\/\/www2.deloitte.com\/insights\/us\/en\/deloitte-review\/issue-17\/internet-of-things-data-security-and-privacy.html\n                    \n                  ."},{"key":"6405_CR4","volume-title":"Internet of Things: Converging technologies for smart environments and integrated ecosystems","author":"O Vermesan","year":"2013","unstructured":"Vermesan, O., & Friess, P. (2013). Internet of Things: Converging technologies for smart environments and integrated ecosystems. Aalborg: River Publishers."},{"key":"6405_CR5","unstructured":"Singh, S., & Singh, N. (2015). In 2015 International conference on Green computing and Internet of Things (ICGCIoT) (pp. 1577\u20131581). IEEE."},{"key":"6405_CR6","unstructured":"Borgohain, T., Kumar, U., & Sanyal, S. (2015). Survey of security and privacy issues of Internet of Things. arXiv preprint \n                    arXiv:1501.02211\n                    \n                  ."},{"issue":"8","key":"6405_CR7","doi-asserted-by":"publisher","first-page":"2481","DOI":"10.1007\/s11276-014-0761-7","volume":"20","author":"Q Jing","year":"2014","unstructured":"Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., & Qiu, D. (2014). Security of the Internet of Things: Perspectives and challenges. Wireless Networks, 20(8), 2481.","journal-title":"Wireless Networks"},{"key":"6405_CR8","unstructured":"Cesare, S. (2014). Breaking the security of physical devices. Presentation at Blackhat, 14. \n                    http:\/\/regmedia.co.uk\/2014\/08\/06\/dfgvhbhjkui867ujk5ytghj.pdf\n                    \n                  ."},{"key":"6405_CR9","unstructured":"Andrea, I., Chrysostomou, C., & Hadjichristofi, G. (2015). In 2015 IEEE symposium on computers and communication (ISCC) (pp. 180\u2013187). IEEE."},{"key":"6405_CR10","doi-asserted-by":"publisher","first-page":"684","DOI":"10.1016\/j.future.2015.09.021","volume":"56","author":"A Botta","year":"2016","unstructured":"Botta, A., De Donato, W., Persico, V., & Pescap\u00e9, A. (2016). Integration of cloud computing and Internet of Things: A survey. Future Generation Computer Systems, 56, 684.","journal-title":"Future Generation Computer Systems"},{"issue":"4","key":"6405_CR11","doi-asserted-by":"publisher","first-page":"2347","DOI":"10.1109\/COMST.2015.2444095","volume":"17","author":"A Al-Fuqaha","year":"2015","unstructured":"Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., & Ayyash, M. (2015). Internet of things: A survey on enabling technologies, protocols, and applications. IEEE Communications Surveys & Tutorials, 17(4), 2347.","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"2","key":"6405_CR12","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/MIC.2012.29","volume":"16","author":"C Bormann","year":"2012","unstructured":"Bormann, C., Castellani, A. P., & Shelby, Z. (2012). Coap: An application protocol for billions of tiny internet nodes. IEEE Internet Computing, 16(2), 62.","journal-title":"IEEE Internet Computing"},{"key":"6405_CR13","unstructured":"Rghioui, A., Bouhorma, M., & Benslimane, A. (2013). In 2013 5th International conference on information and communication technology for the Muslim world (ICT4M) (pp. 1\u20135). IEEE."},{"key":"6405_CR14","unstructured":"Ullah, S., Ali, M., Hussain, A. & Kwak, K. S. (2009). Applications of UWB technology. arXiv preprint \n                    arXiv:0911.1681\n                    \n                  ."},{"key":"6405_CR15","unstructured":"Madlmayr, G., Langer, J., Kantner, C., & Scharinger, J. (2008). In Third international conference on availability, reliability and security, 2008. ARES 08 (pp. 642\u2013647). IEEE."},{"issue":"3","key":"6405_CR16","first-page":"371","volume":"2","author":"K Curran","year":"2012","unstructured":"Curran, K., Millar, A., & Garvey, C. Mc. (2012). Near field communication. International Journal of Electrical and Computer Engineering, 2(3), 371.","journal-title":"International Journal of Electrical and Computer Engineering"},{"key":"6405_CR17","volume-title":"Networked RFID Systems & lightweight cryptography","author":"PH Cole","year":"2007","unstructured":"Cole, P. H., & Ranasinghe, D. C. (2007). Networked RFID Systems & lightweight cryptography. Berlin: Springer."},{"issue":"6","key":"6405_CR18","doi-asserted-by":"publisher","first-page":"522","DOI":"10.1109\/MDT.2007.178","volume":"24","author":"T Eisenbarth","year":"2007","unstructured":"Eisenbarth, T., & Kumar, S. (2007). A survey of lightweight-cryptography implementations. IEEE Design & Test of Computers, 24(6), 522\u2013533.","journal-title":"IEEE Design & Test of Computers"},{"key":"6405_CR19","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1016\/j.dcan.2017.04.003","volume":"4","author":"AR Sfar","year":"2017","unstructured":"Sfar, A. R., Natalizio, E., Challal, Y., & Chtourou, Z. (2017). A roadmap for security challenges in the Internet of Things. Digital Communications and Networks, 4, 118\u2013137.","journal-title":"Digital Communications and Networks"},{"key":"6405_CR20","unstructured":"Mendez, D. M., Papapanagiotou, I., & Yang, B. (2017). Internet of Things: Survey on security and privacy. arXiv preprint \n                    arXiv:1707.01879\n                    \n                  ."},{"issue":"5","key":"6405_CR21","doi-asserted-by":"publisher","first-page":"1250","DOI":"10.1109\/JIOT.2017.2694844","volume":"4","author":"Y Yang","year":"2017","unstructured":"Yang, Y., Wu, L., Yin, G., Li, L., & Zhao, H. (2017). A survey on security and privacy issues in Internet-of-Things. IEEE Internet of Things Journal, 4(5), 1250.","journal-title":"IEEE Internet of Things Journal"},{"key":"6405_CR22","unstructured":"Chahid, Y., Benabdellah, M., & Azizi, A. (2017). In 2017 International conference on wireless technologies, embedded and intelligent systems (WITS) (pp. 1\u20136). IEEE."},{"key":"6405_CR23","unstructured":"Oracevic, A., Dilek, S., & Ozdemir, S. (2017). In 2017 International symposium on networks, computers and communications (ISNCC) (pp. 1\u20136). IEEE."},{"key":"6405_CR24","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.jnca.2017.04.002","volume":"88","author":"FA Alaba","year":"2017","unstructured":"Alaba, F. A., Othman, M., Hashem, I. A. T., & Alotaibi, F. (2017). Internet of things security: A survey. Journal of Network and Computer Applications, 88, 10.","journal-title":"Journal of Network and Computer Applications"},{"issue":"6","key":"6405_CR25","first-page":"383","volume":"8","author":"MA Razzaq","year":"2017","unstructured":"Razzaq, M. A., Gill, S. H., Qureshi, M. A., & Ullah, S. (2017). Security issues in the Internet of Things (IoT): A comprehensive study. International Journal of Advanced Computer Science and Applications, 8(6), 383.","journal-title":"International Journal of Advanced Computer Science and Applications"},{"key":"6405_CR26","unstructured":"Riahi, A., Natalizio, E., Challal, Y., Mitton, N., & Iera, A. (2014). In 2014 International conference on computing, networking and communications (ICNC) (pp. 183\u2013188). IEEE."},{"key":"6405_CR27","unstructured":"Ronen, E., & Shamir, A. (2016). In 2016 IEEE European symposium on security and privacy (EuroS&P) (pp. 3\u201312). IEEE."},{"key":"6405_CR28","unstructured":"Zhao, K., & Ge, L. (2013). In 2013 9th International conference on computational intelligence and security (CIS) (pp. 663\u2013667). IEEE."},{"issue":"6","key":"6405_CR29","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1145\/990680.990707","volume":"47","author":"A Perrig","year":"2004","unstructured":"Perrig, A., Stankovic, J., & Wagner, D. (2004). Security in wireless sensor networks. Communications of the ACM, 47(6), 53.","journal-title":"Communications of the ACM"},{"key":"6405_CR30","unstructured":"Mo, Y., & Sinopoli, B. (2009). In 47th Annual Allerton conference on communication, control, and computing, 2009. Allerton 2009 (pp. 911\u2013918). IEEE."},{"issue":"2","key":"6405_CR31","first-page":"29","volume":"2","author":"V Soni","year":"2013","unstructured":"Soni, V., Modi, P., & Chaudhri, V. (2013). Detecting sinkhole attack in wireless sensor network. International Journal of Application or Innovation in Engineering & Management, 2(2), 29.","journal-title":"International Journal of Application or Innovation in Engineering & Management"},{"issue":"12","key":"6405_CR32","doi-asserted-by":"publisher","first-page":"3224","DOI":"10.1109\/TAC.2014.2351871","volume":"59","author":"P Lee","year":"2014","unstructured":"Lee, P., Clark, A., Bushnell, L., & Poovendran, R. (2014). A passivity framework for modeling and mitigating wormhole attacks on networked control systems. IEEE Transactions on Automatic Control, 59(12), 3224.","journal-title":"IEEE Transactions on Automatic Control"},{"issue":"8","key":"6405_CR33","doi-asserted-by":"publisher","first-page":"20799","DOI":"10.3390\/s150820799","volume":"15","author":"X Yang","year":"2015","unstructured":"Yang, X., He, X., Yu, W., Lin, J., Li, R., Yang, Q., et al. (2015). Towards a low-cost remote memory attestation for the smart grid. Sensors, 15(8), 20799.","journal-title":"Sensors"},{"issue":"4","key":"6405_CR34","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/SURV.2009.090404","volume":"11","author":"A Mpitziopoulos","year":"2009","unstructured":"Mpitziopoulos, A., Gavalas, D., Konstantopoulos, C., & Pantziou, G. (2009). A survey on jamming attacks and countermeasures in WSNs. IEEE Communications Surveys & Tutorials, 11(4), 42\u201356.","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"6405_CR35","unstructured":"Ghafir, I., Prenosil, V., Alhejailan, A., & Hammoudeh, M. (2016). In 2016 IEEE 4th international conference on future Internet of Things and cloud (FiCloud) (pp. 145\u2013149). IEEE."},{"issue":"5","key":"6405_CR36","doi-asserted-by":"publisher","first-page":"1125","DOI":"10.1109\/JIOT.2017.2683200","volume":"4","author":"J Lin","year":"2017","unstructured":"Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., & Zhao, W. (2017). A survey on Internet of Things: Architecture, enabling technologies, security and privacy, and applications. IEEE Internet of Things Journal, 4(5), 1125.","journal-title":"IEEE Internet of Things Journal"},{"issue":"2","key":"6405_CR37","first-page":"136","volume":"1","author":"RP Padhy","year":"2011","unstructured":"Padhy, R. P., Patra, M. R., & Satapathy, S. C. (2011). Cloud computing: Security issues and research challenges. International Journal of Computer Science and Information Technology & Security (IJCSITS), 1(2), 136.","journal-title":"International Journal of Computer Science and Information Technology & Security (IJCSITS)"},{"key":"6405_CR38","unstructured":"Nawir, M., Amir, A., Yaakob, N., & Lynn, O. B. (2016). In 2016 3rd International conference on electronic design (ICED) (pp. 321\u2013326). IEEE."},{"issue":"1","key":"6405_CR39","first-page":"1","volume":"4","author":"E Alsaadi","year":"2015","unstructured":"Alsaadi, E., & Tubaishat, A. (2015). Internet of Things: Features, challenges, and vulnerabilities. International Journal of Advanced Computer Science and Information Technology, 4(1), 1.","journal-title":"International Journal of Advanced Computer Science and Information Technology"},{"key":"6405_CR40","unstructured":"Misra, S., Krishna, P. V., Agarwal, H., Saxena, A., & Obaidat, M. S. (2011). In 2011 International conference on Internet of Things (iThings\/CPSCom) and 4th international conference on cyber, physical and social computing (pp. 114\u2013122). IEEE."},{"issue":"10","key":"6405_CR41","doi-asserted-by":"publisher","first-page":"2266","DOI":"10.1016\/j.comnet.2012.12.018","volume":"57","author":"R Roman","year":"2013","unstructured":"Roman, R., Zhou, J., & Lopez, J. (2013). On the features and challenges of security and privacy in distributed Internet of Things. Computer Networks, 57(10), 2266.","journal-title":"Computer Networks"},{"key":"6405_CR42","unstructured":"Khoo, B. (2011). In 2011 International conference on Internet of Things (iThings\/CPSCom) and 4th international conference on cyber, physical and social computing (pp. 709\u2013712). IEEE."},{"issue":"2","key":"6405_CR43","first-page":"7","volume":"3","author":"BS Thakur","year":"2013","unstructured":"Thakur, B. S., & Chaudhary, S. (2013). Content sniffing attack detection in client and server side: A survey. International Journal of Advanced Computer Research, 3(2), 7.","journal-title":"International Journal of Advanced Computer Research"},{"issue":"5","key":"6405_CR44","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1007\/s10796-009-9210-z","volume":"12","author":"A Mitrokotsa","year":"2010","unstructured":"Mitrokotsa, A., Rieback, M. R., & Tanenbaum, A. S. (2010). Classifying rfid attacks and defenses. Information Systems Frontiers, 12(5), 491.","journal-title":"Information Systems Frontiers"},{"issue":"9","key":"6405_CR45","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1016\/S1353-4858(07)70080-6","volume":"2007","author":"A Laurie","year":"2007","unstructured":"Laurie, A. (2007). Practical attacks against RFID. Network Security, 2007(9), 4.","journal-title":"Network Security"},{"issue":"01","key":"6405_CR46","first-page":"59","volume":"11","author":"DN Sushma","year":"2011","unstructured":"Sushma, D. N., & Nandal, V. (2011). Security threats in wireless sensor networks. IJCSMS International Journal of Computer Science & Management Studies, 11(01), 59.","journal-title":"IJCSMS International Journal of Computer Science & Management Studies"},{"issue":"5","key":"6405_CR47","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1109\/JIOT.2014.2344013","volume":"1","author":"K Zhang","year":"2014","unstructured":"Zhang, K., Liang, X., Lu, R., & Shen, X. (2014). Sybil attacks and their defenses in the Internet of Things. IEEE Internet of Things Journal, 1(5), 372.","journal-title":"IEEE Internet of Things Journal"},{"issue":"10","key":"6405_CR48","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1145\/1290958.1290968","volume":"50","author":"TN Jagatic","year":"2007","unstructured":"Jagatic, T. N., Johnson, N. A., Jakobsson, M., & Menczer, F. (2007). Social phishing. Communications of the ACM, 50(10), 94.","journal-title":"Communications of the ACM"},{"key":"6405_CR49","unstructured":"Zhang, J., Gu, D., Guo, Z., & Zhang, L. (2010). In 2010 3rd International conference on advanced computer theory and engineering (ICACTE) (Vol.\u00a06, pp. V6\u201361). IEEE."},{"issue":"3","key":"6405_CR50","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1007\/s11277-011-0385-5","volume":"61","author":"T Heer","year":"2011","unstructured":"Heer, T., Garcia-Morchon, O., Hummen, R., Keoh, S. L., Kumar, S. S., & Wehrle, K. (2011). Security challenges in the IP-based Internet of Things. Wireless Personal Communications, 61(3), 527.","journal-title":"Wireless Personal Communications"},{"key":"6405_CR51","unstructured":"Hossain, M. M., Fotouhi, M., & Hasan, R. (2015). In 2015 IEEE world congress on services (SERVICES) (pp. 21\u201328). IEEE."},{"issue":"7","key":"6405_CR52","doi-asserted-by":"publisher","first-page":"1497","DOI":"10.1016\/j.adhoc.2012.02.016","volume":"10","author":"D Miorandi","year":"2012","unstructured":"Miorandi, D., Sicari, S., De Pellegrini, F., & Chlamtac, I. (2012). Internet of things: Vision, applications and research challenges. Ad Hoc Networks, 10(7), 1497.","journal-title":"Ad Hoc Networks"},{"issue":"3","key":"6405_CR53","doi-asserted-by":"publisher","first-page":"567","DOI":"10.1007\/s11277-011-0384-6","volume":"61","author":"S Alam","year":"2011","unstructured":"Alam, S., Chowdhury, M. M., & Noll, J. (2011). Interoperability of security-enabled Internet of Things. Wireless Personal Communications, 61(3), 567.","journal-title":"Wireless Personal Communications"},{"key":"6405_CR54","unstructured":"Babar, S., Stango, A., Prasad, N., Sen, J., & Prasad, R. (2011). In 2011 2nd International conference on wireless communication, vehicular technology, information theory and aerospace & electronic systems technology (Wireless VITAE) (pp. 1\u20135). IEEE."},{"issue":"3","key":"6405_CR55","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1109\/JIOT.2015.2460333","volume":"3","author":"J Singh","year":"2016","unstructured":"Singh, J., Pasquier, T., Bacon, J., Ko, H., & Eyers, D. (2016). Twenty security considerations for cloud-supported Internet of Things. IEEE Internet of Things Journal, 3(3), 269.","journal-title":"IEEE Internet of Things Journal"},{"issue":"5","key":"6405_CR56","doi-asserted-by":"publisher","first-page":"618","DOI":"10.1016\/j.clsr.2015.07.002","volume":"31","author":"RH Weber","year":"2015","unstructured":"Weber, R. H. (2015). Internet of Things: Privacy issues revisited. Computer Law & Security Review, 31(5), 618.","journal-title":"Computer Law & Security Review"},{"key":"6405_CR57","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-44230-3","volume-title":"Security challenges and approaches in Internet of Things","author":"S Misra","year":"2017","unstructured":"Misra, S., Maheswaran, M., & Hashmi, S. (2017). Security challenges and approaches in Internet of Things. Berlin: Springer."},{"issue":"05","key":"6405_CR58","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L. (2002). k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(05), 557.","journal-title":"International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems"},{"key":"6405_CR59","unstructured":"Machanavajjhala, A., Gehrke, J., Kifer, D., & Venkitasubramaniam, M. (2006). In Proceedings of the 22nd international conference on data engineering, 2006. ICDE\u201906 (pp. 24\u201324). IEEE."},{"key":"6405_CR60","unstructured":"Li, N., Li, T., & Venkatasubramanian, S. (2007). In IEEE 23rd international conference on data engineering, 2007. ICDE 2007 (pp. 106\u2013115). IEEE."},{"issue":"1","key":"6405_CR61","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1016\/j.csi.2007.11.013","volume":"31","author":"P Peris-Lopez","year":"2009","unstructured":"Peris-Lopez, P., Hernandez-Castro, J. C., Estevez-Tapiador, J. M., & Ribagorda, A. (2009). LAMED: A PRNG for EPC class-1 generation-2 RFID specification. Computer Standards & Interfaces, 31(1), 88.","journal-title":"Computer Standards & Interfaces"},{"key":"6405_CR62","unstructured":"Melia-Segui, J., Garcia-Alfaro, J., & Herrera-Joancomarti, J. (2010). In International conference on financial cryptography and data security (pp. 34\u201346). Springer."},{"key":"6405_CR63","doi-asserted-by":"publisher","first-page":"82","DOI":"10.20533\/ijrfidsc.2046.3715.2013.0011","volume":"2","author":"K Mandal","year":"2013","unstructured":"Mandal, K., Fan, X., & Gong, G. (2013). Warbler: A lightweight pseudorandom number generator for EPC C1 Gen2 passive RFID tags. International Journal of RFID Security and Cryptography, 2, 82.","journal-title":"International Journal of RFID Security and Cryptography"},{"key":"6405_CR64","unstructured":"Mace, F., Standaert, F. X., Quisquater, J. J., et al. (2007). In Proceedings of the third international conference on RFID security-RFIDSec (pp. 103\u2013114)."},{"key":"6405_CR65","unstructured":"Gong, Z., Nikova, S., & Law, Y. W. (2011). In International workshop on radio frequency identification: Security and privacy issues (pp. 1\u201318). Springer."},{"key":"6405_CR66","first-page":"585","volume":"2015","author":"R Beaulieu","year":"2015","unstructured":"Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., & Wingers, L. (2015). Simon and speck: Block ciphers for the Internet of Things. IACR Cryptology ePrint Archive, 2015, 585.","journal-title":"IACR Cryptology ePrint Archive"},{"issue":"1","key":"6405_CR67","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1504\/IJWMC.2007.013798","volume":"2","author":"M Hell","year":"2007","unstructured":"Hell, M., Johansson, T., & Meier, W. (2007). Grain: A stream cipher for constrained environments. International Journal of Wireless and Mobile Computing, 2(1), 86.","journal-title":"International Journal of Wireless and Mobile Computing"},{"key":"6405_CR68","unstructured":"David, M., Ranasinghe, D. C., & Larsen, T. (2011). In 2011 IEEE international conference on RFID (RFID) (pp. 176\u2013183). IEEE."},{"key":"6405_CR69","unstructured":"Fan, X., Mandal, K. & Gong, G. (2013). In International conference on heterogeneous networking for quality, reliability, security and robustness (pp. 617\u2013632). Springer."},{"issue":"15","key":"6405_CR70","doi-asserted-by":"publisher","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L Atzori","year":"2010","unstructured":"Atzori, L., Iera, A., & Morabito, G. (2010). The Internet of Things: A survey. Computer Networks, 54(15), 2787.","journal-title":"Computer Networks"},{"key":"6405_CR71","unstructured":"Bogdanov, A., Kne\u017eevi\u0107, M., Leander, G., Toz, D., Var\u0131c\u0131, K., & Verbauwhede, I. (2011). In International workshop on cryptographic hardware and embedded systems (pp. 312\u2013325). Springer."},{"key":"6405_CR72","unstructured":"Berger, T. P., D\u2019Hayer, J., Marquet, K., Minier, M., & Thomas, G. (2012). In International conference on cryptology in Africa (pp. 306\u2013323). Springer."},{"issue":"2","key":"6405_CR73","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1007\/s00145-012-9125-6","volume":"26","author":"JP Aumasson","year":"2013","unstructured":"Aumasson, J. P., Henzen, L., Meier, W., & Naya-Plasencia, M. (2013). Quark: A lightweight hash. Journal of cryptology, 26(2), 313.","journal-title":"Journal of cryptology"},{"key":"6405_CR74","unstructured":"Abyaneh, M. R. S. (2012). Security analysis of lightweight schemes for RFID systems, PhD thesis, University of Bergen, Norway."},{"key":"6405_CR75","unstructured":"Greenstadt, R., & Beal, J. (2008). In Proceedings of the 1st ACM workshop on AISec (pp. 27\u201330). ACM."},{"issue":"5\u20136","key":"6405_CR76","doi-asserted-by":"publisher","first-page":"1189","DOI":"10.1016\/j.mcm.2013.02.006","volume":"58","author":"S Gusmeroli","year":"2013","unstructured":"Gusmeroli, S., Piccione, S., & Rotondi, D. (2013). A capability-based security approach to manage access control in the Internet of Things. Mathematical and Computer Modelling, 58(5\u20136), 1189.","journal-title":"Mathematical and Computer Modelling"},{"issue":"4","key":"6405_CR77","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1504\/IJSN.2012.053461","volume":"7","author":"J Liu","year":"2012","unstructured":"Liu, J., Xiao, Y., & Chen, C. P. (2012). Internet of Things\u2019 authentication and access control. International Journal of Security and Networks, 7(4), 228.","journal-title":"International Journal of Security and Networks"},{"key":"6405_CR78","unstructured":"Bouij-Pasquier, I., Ouahman, A. A., El\u00a0Kalam, A. A., & de\u00a0Montfort, M. O. (2015). In 2015 IEEE\/ACS 12th international conference of computer systems and applications (AICCSA) (pp. 1\u20138). IEEE."},{"issue":"3","key":"6405_CR79","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1145\/365230.365252","volume":"9","author":"JB Dennis","year":"1966","unstructured":"Dennis, J. B., & Van Horn, E. C. (1966). Programming semantics for multiprogrammed computations. Communications of the ACM, 9(3), 143.","journal-title":"Communications of the ACM"},{"issue":"4","key":"6405_CR80","first-page":"309","volume":"1","author":"PN Mahalle","year":"2013","unstructured":"Mahalle, P. N., Anggorojati, B., Prasad, N. R., Prasad, R., et al. (2013). Identity authentication and capability based access control (iacac) for the Internet of Things. Journal of Cyber Security and Mobility, 1(4), 309.","journal-title":"Journal of Cyber Security and Mobility"},{"issue":"3\/4","key":"6405_CR81","first-page":"1","volume":"3","author":"JL Hern\u00e1ndez-Ramos","year":"2013","unstructured":"Hern\u00e1ndez-Ramos, J. L., Jara, A. J., Marin, L., & Skarmeta, A. F. (2013). Distributed capability-based access control for the Internet of Things. Journal of Internet Services and Information Security (JISIS), 3(3\/4), 1.","journal-title":"Journal of Internet Services and Information Security (JISIS)"},{"key":"6405_CR82","unstructured":"Mahalle, P. N., Thakre, P. A., Prasad, N. R., & Prasad, R. (2013). In 2013 3rd International conference on wireless communications, vehicular technology, information theory and aerospace & electronic systems (VITAE) (pp. 1\u20135). IEEE."},{"key":"6405_CR83","unstructured":"Pathan, A. S. K., Lee, H. W., & Hong, C. S. (2006). In The 8th international conference on advanced communication technology, 2006. ICACT 2006 (Vol.\u00a02, p. 6). IEEE."},{"key":"6405_CR84","unstructured":"Oriwoh, E., al\u00a0Khateeb, H., & Conrad, M. (2016). In International conference on computing and technology innovation (CTI 2015)."},{"issue":"2\u20133","key":"6405_CR85","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1023\/A:1008354106356","volume":"19","author":"N Koblitz","year":"2000","unstructured":"Koblitz, N., Menezes, A., & Vanstone, S. (2000). The state of elliptic curve cryptography. Designs, Codes and Cryptography, 19(2\u20133), 173.","journal-title":"Designs, Codes and Cryptography"},{"key":"6405_CR86","unstructured":"Fan, J., Batina, L., & Verbauwhede, I. (2008). In International workshop on selected areas in cryptography (pp. 387\u2013400). Springer."},{"key":"6405_CR87","unstructured":"Coetzee, L., & Eksteen, J. (2011). In IST-Africa conference proceedings, 2011 (pp. 1\u20139). IEEE."},{"key":"6405_CR88","unstructured":"Etalle, S., den Hartog, J., & Marsh, S. (2007). In Proceedings of the 1st international conference on autonomic computing and communication systems (ICST) (p. 5). Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering."},{"key":"6405_CR89","unstructured":"Kasinathan, P., Pastrone, C., Spirito, M. A., & Vinkovits, M. (2013). In 2013 IEEE 9th international conference on wireless and mobile computing, networking and communications (WiMob) (pp. 600\u2013607). IEEE."},{"issue":"6","key":"6405_CR90","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1109\/MWC.2013.6704479","volume":"20","author":"Z Sheng","year":"2013","unstructured":"Sheng, Z., Yang, S., Yu, Y., Vasilakos, A., Mccann, J., & Leung, K. (2013). A survey on the IETF protocol suite for the Internet of Things: Standards, challenges, and opportunities. IEEE Wireless Communications, 20(6), 91.","journal-title":"IEEE Wireless Communications"},{"key":"6405_CR91","unstructured":"Suo, H., Wan, J., Zou, C. & Liu, J. (2012). In 2012 International conference on computer science and electronics engineering (ICCSEE) (Vol.\u00a03, pp. 648\u2013651). IEEE."},{"key":"6405_CR92","unstructured":"Sridhar, S., & Smys, S. (2017). In 2017 International conference on inventive systems and control (ICISC) (pp. 1\u20135). IEEE."},{"issue":"6","key":"6405_CR93","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1145\/1568318.1568324","volume":"56","author":"O Regev","year":"2009","unstructured":"Regev, O. (2009). On lattices, learning with errors, random linear codes, and cryptography. Journal of the ACM (JACM), 56(6), 34.","journal-title":"Journal of the ACM (JACM)"},{"issue":"6","key":"6405_CR94","doi-asserted-by":"publisher","first-page":"1844","DOI":"10.1109\/JIOT.2017.2707489","volume":"4","author":"T Song","year":"2017","unstructured":"Song, T., Li, R., Mei, B., Yu, J., Xing, X., & Cheng, X. (2017). A privacy preserving communication protocol for iot applications in smart homes. IEEE Internet of Things Journal, 4(6), 1844.","journal-title":"IEEE Internet of Things Journal"},{"key":"6405_CR95","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1016\/j.future.2016.12.036","volume":"76","author":"F Li","year":"2017","unstructured":"Li, F., Hong, J., & Omala, A. A. (2017). Efficient certificateless access control for industrial Internet of Things. Future Generation Computer Systems, 76, 285.","journal-title":"Future Generation Computer Systems"},{"issue":"6","key":"6405_CR96","doi-asserted-by":"publisher","first-page":"1945","DOI":"10.1109\/JIOT.2017.2706698","volume":"4","author":"R Li","year":"2017","unstructured":"Li, R., Song, T., Capurso, N., Yu, J., Couture, J., & Cheng, X. (2017). IoT applications on secure smart shopping system. IEEE Internet of Things Journal, 4(6), 1945.","journal-title":"IEEE Internet of Things Journal"},{"key":"6405_CR97","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.jnca.2016.11.017","volume":"89","author":"Y Yang","year":"2017","unstructured":"Yang, Y., Zheng, X., & Tang, C. (2017). Lightweight distributed secure data management system for health Internet of Things. Journal of Network and Computer Applications, 89, 26.","journal-title":"Journal of Network and Computer Applications"},{"issue":"4","key":"6405_CR98","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1109\/TSUSC.2017.2716953","volume":"2","author":"N Li","year":"2017","unstructured":"Li, N., Liu, D., & Nepal, S. (2017). Lightweight mutual authentication for iot and its applications. IEEE Transactions on Sustainable Computing, 2(4), 359.","journal-title":"IEEE Transactions on Sustainable Computing"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-019-06405-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-019-06405-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-019-06405-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,22]],"date-time":"2020-04-22T23:24:03Z","timestamp":1587597843000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-019-06405-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,24]]},"references-count":98,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,9]]}},"alternative-id":["6405"],"URL":"https:\/\/doi.org\/10.1007\/s11277-019-06405-y","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,4,24]]},"assertion":[{"value":"24 April 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}