{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T15:47:46Z","timestamp":1742399266225,"version":"3.37.3"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2022,9,5]],"date-time":"2022-09-05T00:00:00Z","timestamp":1662336000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,9,5]],"date-time":"2022-09-05T00:00:00Z","timestamp":1662336000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1007\/s11277-022-09930-5","type":"journal-article","created":{"date-parts":[[2022,9,5]],"date-time":"2022-09-05T03:14:23Z","timestamp":1662347663000},"page":"3511-3532","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Holistic Feistel Authenticated Learning-`Based Authorization for Protecting the Internet of Things from Cyber Attacks"],"prefix":"10.1007","volume":"127","author":[{"given":"Robbi","family":"Rahim","sequence":"first","affiliation":[]},{"given":"Manikandan","family":"Ramachandran","sequence":"additional","affiliation":[]},{"given":"Prassanna","family":"Jayachandran","sequence":"additional","affiliation":[]},{"given":"Hariharan","family":"Kalyanaraman","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3820-2081","authenticated-orcid":false,"given":"Vidhyacharan","family":"Bhaskar","sequence":"additional","affiliation":[]},{"given":"Ambeshwar","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,5]]},"reference":[{"key":"9930_CR1","doi-asserted-by":"publisher","first-page":"100059","DOI":"10.1016\/j.iot.2019.100059","volume":"7","author":"M Hasan","year":"2019","unstructured":"Hasan, M., Islam, M. M., Zarif, M. I. I., & Hashem, M. M. A. (2019). Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches. Internet of Things, 7, 100059.","journal-title":"Internet of Things"},{"issue":"1","key":"9930_CR2","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1186\/s13673-019-0190-9","volume":"9","author":"J-H Park","year":"2019","unstructured":"Park, J.-H., Salim, M. M., Jo, J. H., Sicato, J. C. S., Rathore, S., & Park, J. H. (2019). CIoT-Net: a scalable cognitive IoT based smart city network architecture. Human-centric Computing and Information Sciences, 9(1), 29.","journal-title":"Human-centric Computing and Information Sciences"},{"issue":"9","key":"9930_CR3","doi-asserted-by":"publisher","first-page":"e0202937","DOI":"10.1371\/journal.pone.0202937","volume":"13","author":"M Thakong","year":"2018","unstructured":"Thakong, M., Phimoltares, S., Jaiyen, S., & Lursinsap, C. (2018). One-pass-throw-away learning for cybersecurity in streaming non-stationary environments by dynamic stratum network. PLoS ONE, 13(9), e0202937.","journal-title":"PLoS ONE"},{"issue":"4","key":"9930_CR4","doi-asserted-by":"publisher","first-page":"586","DOI":"10.1109\/TETC.2016.2606384","volume":"5","author":"A Mosenia","year":"2016","unstructured":"Mosenia, A., & Jha, N. K. (2016). A comprehensive study of security of internet-of-things. IEEE Transactions on Emerging Topics in Computing, 5(4), 586\u2013602.","journal-title":"IEEE Transactions on Emerging Topics in Computing"},{"issue":"2","key":"9930_CR5","doi-asserted-by":"publisher","first-page":"1023","DOI":"10.1109\/JIOT.2017.2787962","volume":"5","author":"V Radisavljevic-Gajic","year":"2017","unstructured":"Radisavljevic-Gajic, V., Park, S., & Chasaki, D. (2017). Vulnerabilities of control systems in internet of things applications. IEEE Internet of Things Journal, 5(2), 1023\u20131032.","journal-title":"IEEE Internet of Things Journal"},{"key":"9930_CR6","volume-title":"Secure internet of things (IoT)-based smart-world critical infrastructures: Survey","author":"X Liu","year":"2019","unstructured":"Liu, X., Qian, C., Hatcher, W. G., Hansong, X., Liao, W., & Wei, Y. (2019). Secure internet of things (IoT)-based smart-world critical infrastructures: Survey. IEEE Access: Case Study and Research Opportunities."},{"issue":"12","key":"9930_CR7","doi-asserted-by":"publisher","first-page":"e0208168","DOI":"10.1371\/journal.pone.0208168","volume":"13","author":"OM Machidon","year":"2018","unstructured":"Machidon, O. M., Stanca, C., Ogrutan, P., Gerigan, C., & Aciu, L. (2018). Power-system protection device with IoT-based support for integration in smart environments. PLoS ONE, 13(12), e0208168.","journal-title":"PLoS ONE"},{"issue":"5","key":"9930_CR8","doi-asserted-by":"publisher","first-page":"935","DOI":"10.1016\/j.jcss.2014.02.003","volume":"80","author":"C Bailey","year":"2014","unstructured":"Bailey, C., Chadwick, D. W., & de Lemos, R. (2014). Self-adaptive federated authorization infrastructures. Journal of Computer and System Sciences, 80(5), 935\u2013952.","journal-title":"Journal of Computer and System Sciences"},{"issue":"5","key":"9930_CR9","doi-asserted-by":"publisher","first-page":"953","DOI":"10.1016\/j.jcss.2014.02.004","volume":"80","author":"A Shalan","year":"2014","unstructured":"Shalan, A., & Zulkernine, M. (2014). Software control flow error detection and correlation with system performance deviation. Journal of Computer and System Sciences, 80(5), 953\u2013972.","journal-title":"Journal of Computer and System Sciences"},{"issue":"5","key":"9930_CR10","doi-asserted-by":"publisher","first-page":"903","DOI":"10.1016\/j.jcss.2014.02.001","volume":"80","author":"Y Xie","year":"2014","unstructured":"Xie, Y., & Wang, G. (2014). Message matching-based greedy behavior detection in delay tolerant networks. Journal of Computer and System Sciences, 80(5), 903\u2013915.","journal-title":"Journal of Computer and System Sciences"},{"issue":"5","key":"9930_CR11","doi-asserted-by":"publisher","first-page":"973","DOI":"10.1016\/j.jcss.2014.02.005","volume":"80","author":"J Jang-Jaccard","year":"2014","unstructured":"Jang-Jaccard, J., & Nepal, S. (2014). A survey of emerging threats in cybersecurity. Journal of Computer and System Sciences, 80(5), 973\u2013993.","journal-title":"Journal of Computer and System Sciences"},{"issue":"1","key":"9930_CR12","doi-asserted-by":"publisher","first-page":"65","DOI":"10.13052\/jcsm2245-1439.414","volume":"4","author":"M Abomhara","year":"2015","unstructured":"Abomhara, M. (2015). Cyber security and the internet of things: Vulnerabilities, threats, intruders and attacks. Journal of Cyber Security and Mobility, 4(1), 65\u201388.","journal-title":"Journal of Cyber Security and Mobility"},{"key":"9930_CR13","doi-asserted-by":"crossref","unstructured":"Maglaras, L., Ferrag, M.A., Derhab, A., Mukherjee, M., Janicke, H. & Rallis, S. (2019). Threats, protection and attribution of cyber attacks on critical infrastructures. arXiv preprint arXiv:1901.03899.","DOI":"10.4108\/eai.15-10-2018.155856"},{"key":"9930_CR14","first-page":"1","volume":"2019","author":"M Park","year":"2019","unstructured":"Park, M., Han, J., Oh, H., & Lee, K. (2019). Threat assessment for android environment with connectivity to IoT devices from the perspective of situational awareness. Wireless Communications and Mobile Computing, 2019, 1\u201312.","journal-title":"Wireless Communications and Mobile Computing"},{"issue":"6","key":"9930_CR15","doi-asserted-by":"publisher","first-page":"167","DOI":"10.7753\/IJSEA0806.1004","volume":"8","author":"B Hyman","year":"2019","unstructured":"Hyman, B., Alisha, Z., & Gordon, S. (2019). Secure controls for smart cities; applications in intelligent transportation systems and smart buildings. International Journal of Science and Engineering Applications, 8(6), 167\u201371.","journal-title":"International Journal of Science and Engineering Applications"},{"key":"9930_CR16","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/978-3-030-12330-7_2","volume-title":"Security and privacy trends in the industrial internet of things","author":"G Spathoulas","year":"2019","unstructured":"Spathoulas, G., & Katsikas, S. (2019). Towards a secure industrial internet of things. Security and privacy trends in the industrial internet of things (pp. 29\u201345). Cham: Springer."},{"issue":"12","key":"9930_CR17","doi-asserted-by":"publisher","first-page":"e0209472","DOI":"10.1371\/journal.pone.0209472","volume":"13","author":"A Zubiaga","year":"2018","unstructured":"Zubiaga, A., Procter, R., & Maple, C. (2018). A longitudinal analysis of the public perception of the opportunities and challenges of the Internet of Things. PLoS ONE, 13(12), e0209472.","journal-title":"PLoS ONE"},{"issue":"7","key":"9930_CR18","doi-asserted-by":"publisher","first-page":"e0181124","DOI":"10.1371\/journal.pone.0181124","volume":"12","author":"Xu Wu","year":"2017","unstructured":"Wu, Xu., & Li, F. (2017). A multi-domain trust management model for supporting RFID applications of IoT. PLoS ONE, 12(7), e0181124.","journal-title":"PLoS ONE"},{"key":"9930_CR19","doi-asserted-by":"crossref","unstructured":"Dilek, S., \u00c7ak\u0131r, H., & Ayd\u0131n, M. (2015). Applications of artificial intelligence techniques to combating cyber crimes: A review. arXiv preprint arXiv:1502.03552.","DOI":"10.5121\/ijaia.2015.6102"},{"key":"9930_CR20","doi-asserted-by":"crossref","unstructured":"Elsaeidy, A., Elgendi, I., Munasinghe, K. S., Sharma, D., & Jamalipour, A. (2017). A smart city cyber security platform for narrowband networks. In 2017 27th International Telecommunication Networks and Applications Conference (ITNAC), pp. 1\u20136. IEEE.","DOI":"10.1109\/ATNAC.2017.8215388"},{"issue":"5","key":"9930_CR21","first-page":"503","volume":"50","author":"T Baker","year":"2019","unstructured":"Baker, T., Asim, M., MacDermott, \u00c1., Iqbal, F., Kamoun, F., Shah, B., Alfandi, O., & Hammoudeh, M. (2019). A secure fog-based platform for SCADA-based IoT critical infrastructure. Software: Practice and Experience., 50(5), 503\u201318.","journal-title":"Software: Practice and Experience."},{"issue":"4","key":"9930_CR22","doi-asserted-by":"publisher","first-page":"e0195487","DOI":"10.1371\/journal.pone.0195487","volume":"13","author":"H Tahir","year":"2018","unstructured":"Tahir, H., Tahir, R., & McDonald-Maier, K. (2018). On the security of consumer wearable devices in the internet of things. PLoS ONE, 13(4), e0195487.","journal-title":"PLoS ONE"},{"issue":"12","key":"9930_CR23","doi-asserted-by":"publisher","first-page":"e0207408","DOI":"10.1371\/journal.pone.0207408","volume":"13","author":"CF Weems","year":"2018","unstructured":"Weems, C. F., Ahmed, I., Richard III, G. G., Russell, J. D., & Neill, E. L. (2018). Susceptibility and resilience to cyber threat: Findings from a scenario decision program to measure secure and insecure computing behavior. PLoS ONE, 13(12), e0207408.","journal-title":"PLoS ONE"},{"issue":"5","key":"9930_CR24","doi-asserted-by":"publisher","first-page":"e0124472","DOI":"10.1371\/journal.pone.0124472","volume":"10","author":"Y-Z Chen","year":"2015","unstructured":"Chen, Y.-Z., Huang, Z.-G., Shouhuai, Xu., & Lai, Y.-C. (2015). Spatiotemporal patterns and predictability of cyberattacks. PLoS ONE, 10(5), e0124472.","journal-title":"PLoS ONE"},{"key":"9930_CR25","doi-asserted-by":"crossref","unstructured":"D\u00edaz L\u00f3pez, D., Uribe, M. B., Cely, C. S., Torres, A. V., Guataquira, N. M., Castro, S. M., Nespoli, P. & M\u00e1rmol, F. G. (2018) Shielding IoT against cyber-attacks: An event-based approach using SIEM. Wireless Communications and Mobile Computing.","DOI":"10.1155\/2018\/3029638"},{"key":"9930_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.compeleceng.2022.107716","volume":"98","author":"A Mihoub","year":"2022","unstructured":"Mihoub, A., Fredj, O. B., Cheikhrouhou, O., Derhab, A., & Krichen, M. (2022). Denial of service attack detection and mitigation for internet of things using looking-back-enabled machine learning techniques. Computers and Electrical Engineering, 98, 1\u201312.","journal-title":"Computers and Electrical Engineering"},{"issue":"6","key":"9930_CR27","first-page":"2327","volume":"6","author":"MM Rana","year":"2019","unstructured":"Rana, M. M., & Bo, R. (2019). IoT-based improved human motion estimations method Under cyber attacks. IEEE Internet of Things Journal IoT, 6(6), 2327-4662(c).","journal-title":"IEEE Internet of Things Journal IoT"},{"key":"9930_CR28","doi-asserted-by":"publisher","first-page":"74571","DOI":"10.1109\/ACCESS.2020.2988854","volume":"8","author":"A Samy","year":"2020","unstructured":"Samy, A., Haining, Y., & Zhang, H. (2020). Fog-based attack detection framework for internet of things using deep learning. IEEE Access, 8, 74571\u201385.","journal-title":"IEEE Access"},{"issue":"2","key":"9930_CR29","first-page":"2327","volume":"7","author":"MM Rana","year":"2019","unstructured":"Rana, M. M. (2019). IoT-based electric vehicle state estimation andcontrol algorithms under cyber attacks. IEEE Internet of Things Journal IoT, 7(2), 2327\u20134662.","journal-title":"IEEE Internet of Things Journal IoT"},{"issue":"17","key":"9930_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/JIOT.2021.3067667","volume":"8","author":"AN Jahromi","year":"2021","unstructured":"Jahromi, A. N., Karimipour, H., Dehghantanha, A., & Choo, K. K. R. (2021). Toward detection and attribution of cyber-attacks in IoT-enabled cyber-physical systems. IEEE Internet of Things Journal, 8(17), 1\u201311.","journal-title":"IEEE Internet of Things Journal"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-022-09930-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-022-09930-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-022-09930-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,9]],"date-time":"2022-12-09T09:20:59Z","timestamp":1670577659000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-022-09930-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,5]]},"references-count":30,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["9930"],"URL":"https:\/\/doi.org\/10.1007\/s11277-022-09930-5","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2022,9,5]]},"assertion":[{"value":"1 July 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 September 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"On behalf of all authors, the corresponding author states that there is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interests"}}]}}