{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T15:59:36Z","timestamp":1759939176898},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2021,3,31]],"date-time":"2021-03-31T00:00:00Z","timestamp":1617148800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,3,31]],"date-time":"2021-03-31T00:00:00Z","timestamp":1617148800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J. Comput. Sci. Technol."],"published-print":{"date-parts":[[2021,4]]},"DOI":"10.1007\/s11390-020-9831-8","type":"journal-article","created":{"date-parts":[[2021,4,14]],"date-time":"2021-04-14T10:03:22Z","timestamp":1618394602000},"page":"419-433","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A Secure IoT Firmware Update Scheme Against SCPA and DoS Attacks"],"prefix":"10.1007","volume":"36","author":[{"given":"Yan-Hong","family":"Fan","sequence":"first","affiliation":[]},{"given":"Mei-Qin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yan-Bin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Kai","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Mu-Zhou","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,31]]},"reference":[{"issue":"2","key":"9831_CR1","doi-asserted-by":"publisher","first-page":"716","DOI":"10.1109\/JIOT.2017.2720635","volume":"5","author":"W Li","year":"2018","unstructured":"Li W, Song H, Zeng F. Policy-based secure and trustworthy sensing for Internet of things in smart cities. IEEE Internet of Things Journal, 2018, 5(2): 716-723. https:\/\/doi.org\/10.1109\/JIOT.2017.2720635.","journal-title":"IEEE Internet of Things Journal"},{"key":"9831_CR2","doi-asserted-by":"publisher","unstructured":"Patton M, Gross E, Chinn R et al. Uninvited connections: A study of vulnerable devices on the internet of things (IoT). In Proc. the 2014 IEEE Joint Intelligence and Security Informatics Conference, Sept. 2014, pp.232-235. https:\/\/doi.org\/10.1109\/JISIC.2014.43.","DOI":"10.1109\/JISIC.2014.43"},{"key":"9831_CR3","unstructured":"Antonakakis M, April T, Bailey M et al. Understanding the Mirai Botnet. In Proc. the 26th USENIX Security Symposium, Aug. 2017, pp.1093-1110."},{"key":"9831_CR4","doi-asserted-by":"publisher","unstructured":"Kim J, Chou P H. Energy-efficient progressive remote update for flash-based firmware of networked embedded systems. ACM Transactions on Design Automation of Electronic Systems, 2010, 16(1): Article No. 7. https:\/\/doi.org\/10.1145\/1870109.1870116.","DOI":"10.1145\/1870109.1870116"},{"key":"9831_CR5","doi-asserted-by":"publisher","unstructured":"Wurm J, Hoang K, Arias O et al. Security analysis on consumer and industrial IoT devices. In Proc. the 21st Asia and South Pacific Design Automation Conference, Jan. 2016, pp.519-524. https:\/\/doi.org\/10.1109\/ASPDAC.2016.7428064.","DOI":"10.1109\/ASPDAC.2016.7428064"},{"key":"9831_CR6","doi-asserted-by":"publisher","unstructured":"Radanliev P, De Roure D, Cannady S et al. Economic impact of IoT cyber risk \u2014 Analysing past and present to predict the future developments in IoT risk analysis and IoT cyber insurance. In Proc. the 2018 Living in the Internet of Things: Cybersecurity of the IoT, Mar. 2018, Article No. 3. https:\/\/doi.org\/10.1049\/cp.2018.0003.","DOI":"10.1049\/cp.2018.0003"},{"key":"9831_CR7","doi-asserted-by":"publisher","unstructured":"Cui A, Costello M, Stolfo S. When firmware modifications attack: A case study of embedded exploitation. In Proc. the 20th Annual Network and Distributed System Security Symposium, Feb. 2013. https:\/\/doi.org\/10.7916\/D8P55NKB.","DOI":"10.7916\/D8P55NKB"},{"key":"9831_CR8","doi-asserted-by":"publisher","unstructured":"Ronen E, Shamir A, Weingarten A O, O\u2019Flynn C. IoT goes nuclear: Creating a ZigBee chain reaction. In Proc. the 2017 IEEE Symposium on Security and Privacy, May 2017, pp.195-212. https:\/\/doi.org\/10.1109\/SP.2017.14.","DOI":"10.1109\/SP.2017.14"},{"key":"9831_CR9","doi-asserted-by":"publisher","unstructured":"Idrees M S, Schweppe H, Roudier Y et al. Secure automotive on-board protocols: A case of over-the-air firmware updates. In Proc. the 3rd Int. Workshop. Communication Technologies for Vehicles, Mar. 2011, pp.224-238. https:\/\/doi.org\/10.1007\/978-3-642-19786-4_20.","DOI":"10.1007\/978-3-642-19786-4_20"},{"key":"9831_CR10","doi-asserted-by":"publisher","unstructured":"Steger M, Karner M, Hillebrand J et al. Applicability of IEEE 802.11s for automotive wireless software updates. In Proc. the 13th International Conference on Telecommunications, Jul. 2015. https:\/\/doi.org\/10.1109\/ConTEL.2015.7231190.","DOI":"10.1109\/ConTEL.2015.7231190"},{"key":"9831_CR11","doi-asserted-by":"publisher","unstructured":"Prada-Delgado M A, V\u00e1zquez-Reyes A, Baturone I. Trustworthy firmware update for Internet-of-Thing devices using physical unclonable functions. In Proc. the 2017 Global Internet of Things Summit, Jun. 2017. https:\/\/doi.org\/10.1109\/GIOTS.2017.8016282.","DOI":"10.1109\/GIOTS.2017.8016282"},{"issue":"1","key":"9831_CR12","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1109\/TCE.2016.7448561","volume":"62","author":"BC Choi","year":"2016","unstructured":"Choi B C, Lee S H, Na J C, Lee J H. Secure firmware validation and update for consumer devices in home networking. IEEE Transactions on Consumer Electronics, 2016, 62(1): 39-44. https:\/\/doi.org\/10.1109\/TCE.2016.7448561.","journal-title":"IEEE Transactions on Consumer Electronics"},{"key":"9831_CR13","doi-asserted-by":"publisher","unstructured":"Yohan A, Lo N W. An over-the-blockchain firmware update framework for IoT devices. In Proc. the 2018 IEEE Conference on Dependable and Secure Computing, Dec. 2018. https:\/\/doi.org\/10.1109\/DESEC.2018.8625164.","DOI":"10.1109\/DESEC.2018.8625164"},{"issue":"3","key":"9831_CR14","doi-asserted-by":"publisher","first-page":"1152","DOI":"10.1007\/s11227-016-1870-0","volume":"73","author":"B Lee","year":"2017","unstructured":"Lee B, Lee J H. Blockchain-based secure firmware update for embedded devices in an Internet of Things environment. The Journal of Supercomputing, 2017, 73(3): 1152-1167. https:\/\/doi.org\/10.1007\/s11227-016-1870-0.","journal-title":"The Journal of Supercomputing"},{"issue":"11","key":"9831_CR15","doi-asserted-by":"publisher","first-page":"2290","DOI":"10.1109\/TCAD.2018.2858422","volume":"37","author":"N Asokan","year":"2018","unstructured":"Asokan N, Nyman N, Rattanavipanon N et al. ASSURED: Architecture for secure software update of realistic embedded devices. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2018, 37(11): 2290-2300. https:\/\/doi.org\/10.1109\/TCAD.2018.2858422.","journal-title":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"},{"key":"9831_CR16","doi-asserted-by":"publisher","unstructured":"O\u2019Flynn C, Chen Z. Side channel power analysis of an AES-256 bootloader. In Proc. the 28th IEEE Canadian Conference on Electrical and Computer Engineering, May 2015, pp.750-755. https:\/\/doi.org\/10.1109\/CCECE.2015.7129369.","DOI":"10.1109\/CCECE.2015.7129369"},{"key":"9831_CR17","doi-asserted-by":"crossref","unstructured":"Guillen O M, De Santis F, Brederlow R, Sigl G. Towards side-channel secure firmware updates. In Proc. the 9th Int. Symp. Foundations and Practice of Security, Oct. 2016, pp.345-360.","DOI":"10.1007\/978-3-319-51966-1_23"},{"key":"9831_CR18","unstructured":"Dworkin M. Recommendation for block cipher modes of operation: The CCM mode for authentication and confidentiality. Technical Report, National Institute of Standards and Technology, 2004. https:\/\/nvlp-ubs.nist.gov\/nistpubs\/Legacy\/SP\/nistspecialpublication8-00-38c.pdf, Dec. 2019."},{"key":"9831_CR19","unstructured":"IEEE. IEEE Standard for Information technology\u2014Telecommunications and information exchange between systems \u2014 Local and metropolitan area networks \u2014 Specific requirements \u2014 Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. IEEE Std 802.11, Jul. 2004."},{"key":"9831_CR20","doi-asserted-by":"crossref","unstructured":"Dworkin M. Recommendation for block cipher modes of operation: Methods and techniques. Technical Report, National Institute of Standards and Technology, 2001. https:\/\/nvlpubs.nist.gov\/nistpubs\/Legacy\/SP\/nistspecial-publication800-38a.pdf, Dec. 2019.","DOI":"10.6028\/NIST.SP.800-38a"},{"key":"9831_CR21","doi-asserted-by":"publisher","unstructured":"Kocher P, Jaffe J, Jun B. Differential power analysis. In Proc. the 19th Annual Int. Cryptology Conf., Aug. 1999, pp.388-397. https:\/\/doi.org\/10.1007\/3-540-48405-1_25.","DOI":"10.1007\/3-540-48405-1_25"},{"key":"9831_CR22","doi-asserted-by":"publisher","unstructured":"Brier E, Clavier C, Olivier F. Correlation power analysis with a leakage model. In Proc. the 6th International Workshop on Cryptographic Hardware and Embedded Systems, Aug. 2004, pp.16-29. https:\/\/doi.org\/10.1007\/978-3-540-28632-5_2.","DOI":"10.1007\/978-3-540-28632-5_2"}],"container-title":["Journal of Computer Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-020-9831-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11390-020-9831-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-020-9831-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,14]],"date-time":"2021-04-14T10:13:38Z","timestamp":1618395218000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11390-020-9831-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,31]]},"references-count":22,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,4]]}},"alternative-id":["9831"],"URL":"https:\/\/doi.org\/10.1007\/s11390-020-9831-8","relation":{},"ISSN":["1000-9000","1860-4749"],"issn-type":[{"value":"1000-9000","type":"print"},{"value":"1860-4749","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3,31]]},"assertion":[{"value":"9 July 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 February 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 March 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}