{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T06:39:47Z","timestamp":1774679987731,"version":"3.50.1"},"reference-count":101,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T00:00:00Z","timestamp":1633046400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T00:00:00Z","timestamp":1633046400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SOCA"],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.1007\/s11761-021-00327-z","type":"journal-article","created":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T20:29:18Z","timestamp":1633120158000},"page":"257-271","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Security and privacy in the Internet of Things: threats and challenges"],"prefix":"10.1007","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8976-7894","authenticated-orcid":false,"given":"Youakim","family":"Badr","sequence":"first","affiliation":[]},{"given":"Xiaoyang","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Mansour Naser","family":"Alraja","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,1]]},"reference":[{"key":"327_CR1","unstructured":"ITU-T (2012) ITU-T Recommendation Y.2069 Terms and Definitions for the Internet of Things, Series Y: Global Information Infrastructure, Internet Protocol Aspects and Next-Generation Networks. http:\/\/www.itu.int\/ITU-T\/recommendations\/rec.aspx?rec=11700"},{"key":"327_CR2","unstructured":"IDC (2019) The Growth in Connected IoT Devices Is Expected to Generate 79.4ZB of Data in 2025. (2019). https:\/\/www.idc.com\/getdoc.jsp?containerId=prUS45213219"},{"key":"327_CR3","unstructured":"SANS Institute (2014) Securing the Internet of Things Survey. https:\/\/www.sans.org\/reading-room\/whitepapers\/analyst\/securing-internet-things-survey-34785"},{"key":"327_CR4","unstructured":"Wind River (2015) Security in the Internet of Things: Lessons from the Past for the Connected Future"},{"key":"327_CR5","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/j.clsr.2009.11.008","volume":"26","author":"H Weber Rolf","year":"2010","unstructured":"Weber Rolf H (2010) Internet of Things new security and privacy challenges. Comput Law Secur Rev 26:23\u201330","journal-title":"Comput Law Secur Rev"},{"key":"327_CR6","doi-asserted-by":"crossref","unstructured":"Medaglia CM, Serbanati A (2010) An overview of privacy and security issues in the Internet of Things. The Internet of Things. In: Giusto D, Iera A, Morabito G, Atzori L (Eds.). Springer, pp 389\u2013395","DOI":"10.1007\/978-1-4419-1674-7_38"},{"issue":"10","key":"327_CR7","doi-asserted-by":"publisher","first-page":"2266","DOI":"10.1016\/j.comnet.2012.12.018","volume":"57","author":"R Roman","year":"2013","unstructured":"Roman R, Zhou J, Lopez J (2013) On the features and challenges of security and privacy in distributed internet of things. Comput Netw 57(10):2266\u20132279","journal-title":"Comput Netw"},{"key":"327_CR8","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.comnet.2014.11.008","volume":"76","author":"S Sicari","year":"2015","unstructured":"Sicari S, Rizzardi A, Grieco LA, Coen-Porisini A (2015) Security, privacy and trust in internet of things: the road ahead. Comput Netw 76:146\u2013164","journal-title":"Comput Netw"},{"key":"327_CR9","unstructured":"Sen J (2010) Privacy preservation technologies in internet of things. In: The international conference on emerging trends in mathematics. Technology and Management, pp 496\u2013504"},{"issue":"8","key":"327_CR10","doi-asserted-by":"publisher","first-page":"2481","DOI":"10.1007\/s11276-014-0761-7","volume":"20","author":"Q Jing","year":"2014","unstructured":"Jing Q, Vasilakos AV, Wan J, Lu J, Qiu D (2014) Security of the internet of things: perspectives and challenges. Wirel Netw 20(8):2481\u20132501","journal-title":"Wirel Netw"},{"key":"327_CR11","unstructured":"Vikas BO (2015) Internet of things (IoT): a survey on privacy issues and security (2015)"},{"key":"327_CR12","unstructured":"Covington MJ, Carskadden R (2013) Threat implications of the internet of things. In: 5th international conference on cyber conflict (CyCon). IEEE, pp 1\u201312"},{"key":"327_CR13","doi-asserted-by":"crossref","unstructured":"Deng J, Han R, Mishra S (2003) Security support for in-network processing in wireless sensor networks. In: Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks. ACM, pp 83\u201393","DOI":"10.1145\/986858.986870"},{"key":"327_CR14","unstructured":"Fremantle P (2015) A reference architecture for the internet of things. https:\/\/wso2.com\/whitepapers\/a-reference-architecture-for-the-internet-of-things"},{"key":"327_CR15","unstructured":"Padmavathi DG, Shanmugapriya M (2009) A survey of attacks, security mechanisms and challenges in wireless sensor networks. arXiv preprint. arXiv:0909.0576"},{"issue":"2","key":"327_CR16","doi-asserted-by":"publisher","first-page":"128","DOI":"10.4304\/jcm.6.2.128-142","volume":"6","author":"Y Ren","year":"2011","unstructured":"Ren Y, Oleshchuk V, Li FY, Ge X (2011) Security in mobile wireless sensor networks a survey. J Commun 6(2):128\u2013142","journal-title":"J Commun"},{"key":"327_CR17","unstructured":"ITU-T (2012) ITU-T Recommendation Y. 2060 Overview of the Internet of Things, Series Y: Global Information Infrastructure, Internet Protocol Aspects and Next-Generation Networks. http:\/\/www.itu.int\/ITU-T\/recommendations\/rec.aspx?rec=11559"},{"key":"327_CR18","unstructured":"Greenemeier L (2015) Recall shows that a hack attack on car controls is a credible threat. Scientific American"},{"key":"327_CR19","doi-asserted-by":"crossref","unstructured":"Walters JP, Liang Z, Shi W, Chaudhary V (2007) Wireless sensor network security: a survey. Security in distributed, grid, mobile, and pervasive computing 1(2007):367","DOI":"10.1201\/9780429119347-20"},{"issue":"9","key":"327_CR20","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1109\/MC.2011.291","volume":"44","author":"R Roman","year":"2011","unstructured":"Roman R, Najera P, Lopez J (2011b) Securing the internet of things. Computer 44(9):51\u201358","journal-title":"Computer"},{"key":"327_CR21","doi-asserted-by":"crossref","unstructured":"Agrawal P, Trivedi B (2019) A survey on android malware and their detection techniques. In: 2019 IEEE international conference on electrical, computer and communication technologies (ICECCT), pp 1\u20136","DOI":"10.1109\/ICECCT.2019.8868951"},{"key":"327_CR22","doi-asserted-by":"crossref","unstructured":"Mahmoud R et al (2015) Internet of things (IoT) security: current status, challenges and prospective measures. In: Proceedings of the 2015 10th international conference for internet technology and secured transactions (ICITST). IEEE, pp 336\u2013341","DOI":"10.1109\/ICITST.2015.7412116"},{"key":"327_CR23","doi-asserted-by":"crossref","unstructured":"Vasilomanolakis E et al (2015) On the security and privacy of internet of things architectures and systems. In: 2015 International workshop on secure internet of things (SIoT). IEEE 2015, pp 49\u201357","DOI":"10.1109\/SIOT.2015.9"},{"key":"327_CR24","unstructured":"Isaac M, Frenkel S (2018) Facebook security breach exposes accounts of 50 million users. The New York Times. https:\/\/www.nytimes.com\/2018\/09\/28\/technology\/facebook-hack-data-breach.html (visited on 01\/21\/2019)"},{"key":"327_CR25","unstructured":"CSPAN (2017) Senate Banking Committee Hearing on Equifax Data Breach. https:\/\/www.c-span.org\/video\/?434469-1\/equifax-ceo-testifies-senate-banking-panel (visited on 04\/28\/2020)"},{"key":"327_CR26","unstructured":"Borgohain T, Kumar U, Sanyal S (2015) Survey of security and privacy issues of internet of things. arXiv:1501.02211 [cs]"},{"key":"327_CR27","unstructured":"Covington MJ, Carskadden R (2013) Threat implications of the internet of things. In: 2013 5th international conference on cyber conflict (CyCon). IEEE, pp 1\u201312"},{"issue":"1","key":"327_CR28","first-page":"202","volume":"2","author":"A Nada","year":"2021","unstructured":"Nada A, Omer R, Charith P (2021) Security and privacy requirements for the internet of things: a survey. ACM Trans Internet Things 2(1):202","journal-title":"ACM Trans Internet Things"},{"key":"327_CR29","doi-asserted-by":"crossref","unstructured":"Dimitriou T (2005) A lightweight RFID protocol to protect against traceability and cloning attacks. In: Security and privacy for emerging areas in communications networks, 2005. IEEE, pp 59\u201366","DOI":"10.1109\/SECURECOMM.2005.4"},{"key":"327_CR30","doi-asserted-by":"crossref","unstructured":"Evans D, Eyers DM (2012) Efficient data tagging for managing privacy in the internet of things. In: Proceedings of the 2012 IEEE international conference on green computing and communications (GreenCom). IEEE, pp 244\u2013248","DOI":"10.1109\/GreenCom.2012.45"},{"key":"327_CR31","unstructured":"Wang Y, Wen Q (2012) A privacy enhanced DNS scheme for the internet of things. In: Proceedings of the international conference on communication technology & application. IET"},{"key":"327_CR32","doi-asserted-by":"publisher","first-page":"120331","DOI":"10.1109\/ACCESS.2020.3006358","volume":"8","author":"B Liao","year":"2020","unstructured":"Liao B, Ali Y, Nazir S, He L, Khan HU (2020) Security analysis of IoT devices by using mobile computing: a systematic literature review. IEEE Access 8:120331\u2013120350","journal-title":"IEEE Access"},{"key":"327_CR33","unstructured":"Alizadeh M, Zamani M, Shahemabadic AR, Shayan J, Azarnik A (2013) A survey on attacks in RFID networks. Open Int J Inf 1:1"},{"issue":"5","key":"327_CR34","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1007\/s10796-009-9210-z","volume":"12","author":"A Mitrokotsa","year":"2010","unstructured":"Mitrokotsa A, Rieback MR, Tanenbaum AS (2010) Classifying RFID attacks and defenses. Inf Syst Front 12(5):491\u2013505","journal-title":"Inf Syst Front"},{"key":"327_CR35","unstructured":"Hancke GP, Kuhn MG (2005) An RFID distance bounding protocol. In: First international conference on security and privacy for emerging areas in communications networks (SecureComm). IEEE, pp 67\u201373"},{"key":"327_CR36","doi-asserted-by":"crossref","unstructured":"Singelee D, Preneel B (2005) Location verification using secure distance bounding protocols. In: IEEE international conference on conference mobile adhoc and sensor systems. IEEE, 7 pp","DOI":"10.1109\/MOBIQ.2007.4451066"},{"key":"327_CR37","doi-asserted-by":"crossref","unstructured":"Rhee K, Kwak J, Kim S, Won D (2005) Challenge-response based RFID authentication protocol for distributed database environment. In: Security in pervasive computing. Springer, pp 70\u201384","DOI":"10.1007\/978-3-540-32004-3_9"},{"key":"327_CR38","doi-asserted-by":"crossref","unstructured":"Tuyls P, Batina L (2006) RFID-tags for anti-counterfeiting. In: Topics in cryptologyCT-RSA. Springer, pp 115\u2013131","DOI":"10.1007\/11605805_8"},{"issue":"7","key":"327_CR39","first-page":"89","volume":"7","author":"L Mirowski","year":"2007","unstructured":"Mirowski L, Hartnett J (2007) Deckard: a system to detect change of RFID tag ownership. Int J Comput Sci Netw Secur 7(7):89\u201398","journal-title":"Int J Comput Sci Netw Secur"},{"issue":"1","key":"327_CR40","first-page":"31","volume":"5","author":"T Kavitha","year":"2010","unstructured":"Kavitha T, Sridharan D (2010) Security vulnerabilities in wireless sensor networks: a survey. J Inf Assur Secur 5(1):31\u201344","journal-title":"J Inf Assur Secur"},{"issue":"2","key":"327_CR41","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1016\/S1570-8705(03)00008-8","volume":"1","author":"C Karlof","year":"2003","unstructured":"Karlof C, Wagner D (2003) Secure routing in wireless sensor networks: attacks and counter-measures. Ad hoc Netw 1(2):293\u2013315","journal-title":"Ad hoc Netw"},{"key":"327_CR42","unstructured":"Saxena M (2007) Security in wireless sensor networks-a layer based classification. Department of Computer Science, Purdue University"},{"key":"327_CR43","unstructured":"Yu Y, Govindan R, Estrin D (2001) Geographical and energy aware routing: a recursive data dissemination protocol for wireless sensor networks. Technical Report. Technical report ucla\/csd- tr-01-0023, UCLA Computer Science Department"},{"issue":"1","key":"327_CR44","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/MPRV.2008.6","volume":"7","author":"DR Raymond","year":"2008","unstructured":"Raymond DR, Midkiff SF (2008) Denial-of-service in wireless sensor networks: attacks and defenses. IEEE Pervasive Comput 7(1):74\u201381","journal-title":"IEEE Pervasive Comput"},{"key":"327_CR45","doi-asserted-by":"crossref","unstructured":"Parno B, Perrig A, Gligor V (2005) Distributed detection of node replication attacks in sensor networks. In: IEEE symposium on security and privacy. IEEE, pp 49\u201363","DOI":"10.1109\/SP.2005.8"},{"issue":"2007","key":"327_CR46","first-page":"1","volume":"80","author":"Tom Karygiannis","year":"2007","unstructured":"Karygiannis Tom, Eydt Bernard, Barber Greg, Bunn Lynn, Phillips Ted (2007) Guidelines for securing radio frequency identification (RFID) systems. NIST Spec Publ 80(2007):1\u2013154","journal-title":"NIST Spec Publ"},{"key":"327_CR47","doi-asserted-by":"crossref","unstructured":"Sarma S, Weis S, Engels D (2002) RFID systems and security and privacy implications. In: Cryptographic hardware and embedded systems (CHES). Number 2523 in Lecture Notes in Computer Science. Springer, Berlin Heidelberg, pp 454\u2013469","DOI":"10.1007\/3-540-36400-5_33"},{"key":"327_CR48","doi-asserted-by":"crossref","unstructured":"Wang Y, Attebury G, Ramamurthy B (2006) A survey of security issues in wireless sensor networks. (2006)","DOI":"10.1109\/COMST.2006.315852"},{"issue":"10","key":"327_CR49","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MC.2002.1039518","volume":"35","author":"AD Wood","year":"2002","unstructured":"Wood AD, Stankovic J (2002) Denial of service in sensor networks. Computer 35(10):54\u201362","journal-title":"Computer"},{"key":"327_CR50","unstructured":"Sen J (2010) A survey on wireless sensor network security. arXiv preprint. arXiv:1011.1529 (2010)"},{"key":"327_CR51","doi-asserted-by":"crossref","unstructured":"Newsome J, Shi E, Song D, Perrig A (2004) The sybil attack in sensor networks: analysis & defenses. The 3rd international symposium on Information processing in sensor networks. ACM, pp 259\u2013268","DOI":"10.1145\/984622.984660"},{"key":"327_CR52","doi-asserted-by":"crossref","unstructured":"Zhang Q, Wang P, Reeves DS, Ning P (2005) Defending against sybil attacks in sensor networks. In: 25th IEEE international conference on distributed computing systems workshops. IEEE, pp 185\u2013191","DOI":"10.1109\/ICDCSW.2005.57"},{"key":"327_CR53","doi-asserted-by":"crossref","unstructured":"Sarma D, Kumar H, Kar A (2006) Security threats in wireless sensor networks. In: The 40th annual 2006 international carnahan conference on security technology. IEEE, pp 243\u2013 251","DOI":"10.1109\/CCST.2006.313457"},{"key":"327_CR54","unstructured":"GS1 (2014) EPC Tag Data Standard (2014). http:\/\/www.gs1.org\/epc\/tag-data-standard"},{"key":"327_CR55","doi-asserted-by":"crossref","unstructured":"Weis SA, Sarma SE, Rivest RL, Engels DW (2004) Security and privacy aspects of low-cost radio frequency identification systems. In: Hutter D, Mller G, Stephan W, Ullmann M (Eds) Security in pervasive computing. Number 2802 in Lecture Notes in Computer Science. Springer, pp 201\u2013212","DOI":"10.1007\/978-3-540-39881-3_18"},{"key":"327_CR56","doi-asserted-by":"crossref","unstructured":"Juels A, Brainard J (2004) Soft blocking: flexible blocker tags on the cheap. In: The ACM workshop on privacy in the electronic society. ACM, pp 1\u20137","DOI":"10.1145\/1029179.1029181"},{"key":"327_CR57","doi-asserted-by":"crossref","unstructured":"Rieback MR, Crispo B, Tanenbaum AS (2005) RFID guardian: a battery-powered mobile device for RFID privacy management. In: Information security and privacy. Springer, pp 184\u2013194","DOI":"10.1007\/11506157_16"},{"issue":"8","key":"327_CR58","first-page":"2007","volume":"45","author":"S Kinoshita","year":"2004","unstructured":"Kinoshita S, Hoshino F, Komuro T, Fujimura A, Ohkubo M (2004) Low-cost RFID privacy protection scheme. IPS J 45(8):2007\u20132021","journal-title":"IPS J"},{"key":"327_CR59","unstructured":"J\u00f8sang A, Pope S (2005) User centric identity management. In: Proceedings of the AusCERT Asia Pacific information technology security conference, Brisbane, Australia, pp 22\u201326"},{"key":"327_CR60","unstructured":"J\u00f8sang A, Zomai MA, Suriadi S (2007) Usability and privacy in identity management architectures. In: Proceedings of the Fifth Australasian symposium on ACSW frontiers, Ballarat, Australia, 30 January\u20132 February 2007"},{"key":"327_CR61","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/MSP.2008.50","volume":"6","author":"E Maler","year":"2008","unstructured":"Maler E, Reed D (2008) The venn of identity: options and issues in federated identity management. IEEE Secur Priv 6:16\u201323","journal-title":"IEEE Secur Priv"},{"key":"327_CR62","unstructured":"Nakamoto S (2008) Bitcoin: a peer-to-peer electronic cash system. https:\/\/bitcoin.org\/bitcoin.pdf. Accessed 31 Aug 2018"},{"key":"327_CR63","unstructured":"Ethereum\u2014A next-generation smart contract and decentralized application platform. https:\/\/github.com\/Ethereum\/wiki\/wiki\/White-Paper. Accessed 31 Aug 2018"},{"key":"327_CR64","doi-asserted-by":"crossref","unstructured":"Zhu X, Badr Y, Pacheco J, Hariri S (2017) Autonomic identity framework for the internet of things. In: Proceedings of the 2017 international conference on cloud and autonomic computing (ICCAC), Tucson, AZ, USA, 18\u201322, pp 69\u201379","DOI":"10.1109\/ICCAC.2017.14"},{"issue":"5","key":"327_CR65","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1023\/A:1016598314198","volume":"8","author":"P Adrian","year":"2002","unstructured":"Adrian P, Robert S, Justin DT, Victor W, Culler DE (2002) SPINS: security protocols for sensor networks. Wirel Netw 8(5):521\u2013534","journal-title":"Wirel Netw"},{"key":"327_CR66","doi-asserted-by":"crossref","unstructured":"Zhou Y, Fang Y (2006) A scalable key agreement scheme for large scale networks. In: The 2006 IEEE international conference on networking, sensing and control (ICNSC). IEEE, pp 631\u2013636","DOI":"10.1109\/ICNSC.2006.1673219"},{"key":"327_CR67","doi-asserted-by":"crossref","unstructured":"Zhou Y, Fang Y (2006) Scalable link-layer key agreement in sensor networks. In: Military communications conference (MILCOM). IEEE, pp 1\u20136","DOI":"10.1109\/MILCOM.2006.302079"},{"issue":"3","key":"327_CR68","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/COMST.2008.4625802","volume":"10","author":"Z Yun","year":"2008","unstructured":"Yun Z, Yuguang F, Yanchao Z (2008) Securing wireless sensor networks: a survey. Commun Surv Tutor 10(3):6\u201328","journal-title":"Commun Surv Tutor"},{"issue":"6","key":"327_CR69","doi-asserted-by":"publisher","first-page":"918","DOI":"10.1016\/j.adhoc.2011.11.008","volume":"10","author":"C Shi","year":"2012","unstructured":"Shi C, Luo X, Traynor P, Ammar MH, Zegura EW (2012) Arden: anonymous networking in delay tolerant networks. Ad Hoc Netw 10(6):918\u2013930","journal-title":"Ad Hoc Netw"},{"key":"327_CR70","doi-asserted-by":"crossref","unstructured":"Zhu B, Wan Z, Kankanhalli MS, Bao F, Deng RH (2004) Anonymous secure routing in mobile ad-hoc networks. In: The 29th Annual IEEE international conference on local computer networks. IEEE, pp 102\u2013108","DOI":"10.1109\/LCN.2004.21"},{"issue":"11","key":"327_CR71","doi-asserted-by":"publisher","first-page":"1899","DOI":"10.1016\/j.comnet.2010.03.002","volume":"54","author":"X Lu","year":"2010","unstructured":"Lu X, Hui P, Towsley D, Pu J, Xiong Z (2010) Anti-localization anonymous routing for delay tolerant network. Comput Netw 54(11):1899\u20131910","journal-title":"Comput Netw"},{"issue":"10","key":"327_CR72","doi-asserted-by":"publisher","first-page":"1926","DOI":"10.1109\/JSAC.2011.111203","volume":"29","author":"K Defrawy","year":"2011","unstructured":"Defrawy K, Tsudik G (2011) Privacy-preserving location-based on-demand routing in MANETs. IEEE J Sel Areas Commun 29(10):1926\u20131934","journal-title":"IEEE J Sel Areas Commun"},{"key":"327_CR73","doi-asserted-by":"crossref","unstructured":"Gruteser M, Grunwald D (2003) Anonymous usage of location-based services through spatial and temporal cloaking. In: The 1st international conference on mobile systems, applications and services. ACM, pp 31\u201342","DOI":"10.1145\/1066116.1189037"},{"key":"327_CR74","unstructured":"BUTLER (2014) uBiquitous, secUre inTernet-of-Things with Location and contExt-awaReness. https:\/\/cordis.europa.eu\/project\/rcn\/101349_en.html (visited on 08\/19\/2018)"},{"key":"327_CR75","unstructured":"NIST (1998) Skipjack and KEA Algorithm Specifications Version 2.0"},{"key":"327_CR76","unstructured":"Ronald R (1992) The MD5 message-digest algorithm. http:\/\/tools.ietf.org\/html\/rfc1321?ref=driverlayer.com"},{"key":"327_CR77","doi-asserted-by":"crossref","unstructured":"Rivest RL (1995) The RC5 encryption algorithm. In: Fast software encryption. Springer, pp 86\u201396","DOI":"10.1007\/3-540-60590-8_7"},{"key":"327_CR78","doi-asserted-by":"crossref","unstructured":"Daemen J, Rijmen V (2002) The design of Rijndael, AES\u2014The Advanced Encryption Standard. Springer-Verlag (238 pp)","DOI":"10.1007\/978-3-662-04722-4_1"},{"issue":"1","key":"327_CR79","first-page":"1","volume":"21","author":"B Schneier","year":"1998","unstructured":"Schneier B, Kelsey J, Whiting D, Wagner D, Hall C (1998) Twofish: a 128-bit block cipher. Current 21(1):1\u201327","journal-title":"Current"},{"key":"327_CR80","doi-asserted-by":"crossref","unstructured":"Matsui M (1997) New block encryption algorithm MISTY. In: Fast software encryption. Springer, pp 54\u201368","DOI":"10.1007\/BFb0052334"},{"key":"327_CR81","unstructured":"3GPP (1999) Specification of the 3GPP confidentiality and integrity algorithms document 2: KASUMI specification. ETSI\/SAGE Specification Version 1:SAGE"},{"key":"327_CR82","unstructured":"Aoki K, Ichikawa T, Kanda M, Matsui M, Moriai S, Nakajima J, Tokita T (2001) Specification of Camellia \u2013 a 128-Bit Block Cipher. http:\/\/info.isl.ntt.co.jp\/camellia\/"},{"issue":"1","key":"327_CR83","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1145\/1138127.1138130","volume":"2","author":"WL Yee","year":"2006","unstructured":"Yee WL, Jeroen D, Pieter H (2006) Survey and benchmark of block ciphers for wireless sensor networks. ACM Trans Sens Netw 2(1):65\u201393","journal-title":"ACM Trans Sens Netw"},{"key":"327_CR84","first-page":"125","volume":"1997","author":"Bruce Schneier","year":"1997","unstructured":"Schneier Bruce (1997) Cover and title pages. Appl Cryptogr 1997:125\u2013147","journal-title":"Appl Cryptogr"},{"key":"327_CR85","doi-asserted-by":"crossref","unstructured":"Eastlake D, Paul J (2001) US Secure Hash Algorithm 1 (SHA1). Technical Report. http:\/\/www.rfc-editor.org\/info\/rfc3174","DOI":"10.17487\/rfc3174"},{"key":"327_CR86","doi-asserted-by":"crossref","unstructured":"Ganesan P, Venugopalan R, Peddabachagari P, Dean A, Mueller F, Sichitiu M (2003) Analyzing and modeling encryption overhead for sensor network nodes. In: The 2nd ACM international conference on Wireless sensor networks and applications. ACM, pp 151\u2013159","DOI":"10.1145\/941350.941372"},{"key":"327_CR87","unstructured":"Rabin MO (1979) Digitalized signatures and public-key functions as intractable as factorization. Technical Report, DTIC Document"},{"key":"327_CR88","doi-asserted-by":"crossref","unstructured":"Hoffstein J, Pipher J, Silverman JH (1998) NTRU: a ring-based public key cryptosystem. In: Algorithmic number theory. Springer, pp 267\u2013288","DOI":"10.1007\/BFb0054868"},{"issue":"2","key":"327_CR89","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest RL, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120\u2013126","journal-title":"Commun ACM"},{"key":"327_CR90","doi-asserted-by":"crossref","unstructured":"Miller V (1986) Use of elliptic curves in cryptography. In: Advances in cryptologyCRYPTO85 proceedings. Springer, pp 417\u2013426","DOI":"10.1007\/3-540-39799-X_31"},{"key":"327_CR91","doi-asserted-by":"crossref","unstructured":"Gura N, Patel A, Wander A, Eberle H, Shantz S (2004) Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In: Cryptographic hardware and embedded systems (CHES). Springer, pp 119\u2013132","DOI":"10.1007\/978-3-540-28632-5_9"},{"key":"327_CR92","doi-asserted-by":"crossref","unstructured":"Wander AS, Gura N, Eberle H, Gupta V, Shantz SC (2005) Energy analysis of public-key cryptography for wireless sensor networks. In: 3rd International conference on pervasive computing and communications (PerCom). IEEE, pp 324\u2013328","DOI":"10.1109\/PERCOM.2005.18"},{"key":"327_CR93","unstructured":"Ning P, Liu A, Kampanakis P (2007) TinyECC: elliptic curve cryptography for sensor networks. Online (September, 2005)"},{"issue":"2","key":"327_CR94","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.compeleceng.2011.01.009","volume":"37","author":"R Rodrigo","year":"2011","unstructured":"Rodrigo R, Cristina A, Javier L, Nicolas S (2011) Key management systems for sensor networks in the context of the internet of things. Comput Electr Eng 37(2):147\u2013159","journal-title":"Comput Electr Eng"},{"issue":"4","key":"327_CR95","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/SURV.2009.090404","volume":"11","author":"M Aristides","year":"2009","unstructured":"Aristides M, Damianos G, Charalampos K, Grammati P (2009) A survey on jamming attacks and countermeasures in WSNs. Commun Surv Tutor 11(4):42\u201356","journal-title":"Commun Surv Tutor"},{"issue":"2","key":"327_CR96","doi-asserted-by":"publisher","first-page":"1191","DOI":"10.1109\/COMST.2019.2962586","volume":"22","author":"M Stoyanova","year":"2020","unstructured":"Stoyanova M, Nikoloudakis Y, Panagiotakis S, Pallis E, Markakis EK (2020) A survey on the internet of things (IoT) forensics: challenges, approaches, and open issues. IEEE Commun Surv Tutor 22(2):1191\u20131221","journal-title":"IEEE Commun Surv Tutor"},{"issue":"2","key":"327_CR97","doi-asserted-by":"publisher","first-page":"881","DOI":"10.1109\/JIOT.2020.3008906","volume":"8","author":"BK Mohanta","year":"2021","unstructured":"Mohanta BK, Jena D, Ramasubbareddy S, Daneshmand M, Gandomi AH (2021) Addressing security and privacy issues of IoT using blockchain technology. IEEE Internet Things J 8(2):881\u2013888","journal-title":"IEEE Internet Things J"},{"key":"327_CR98","doi-asserted-by":"crossref","unstructured":"Ma M, Lin W, Pan D, Wang P, Zhou Y, Liang X (2017) Data and decision intelligence for internet of things: putting human in the loop. In: IEEE international conference on big data security on cloud, IEEE international conference on high performance and smart computing (HPSC), and IEEE international conference on intelligent data and security (IDS), pp 190\u2013195","DOI":"10.1109\/BigDataSecurity.2017.49"},{"key":"327_CR99","doi-asserted-by":"publisher","first-page":"28417","DOI":"10.1109\/ACCESS.2018.2836677","volume":"6","author":"C Garrido-Hidalgo","year":"2018","unstructured":"Garrido-Hidalgo C, Hortelano D, Roda-Sanchez L, Olivares T, Ruiz MC, Lopez V (2018) IoT heterogeneous mesh network deployment for human-in-the-loop challenges towards a social and sustainable industry 4.0. IEEE Access 6:28417\u201328437","journal-title":"IEEE Access"},{"key":"327_CR100","unstructured":"Lorrie FC (2008) A framework for reasoning about the human in the loop. UPSEC, 15 p"},{"key":"327_CR101","doi-asserted-by":"crossref","unstructured":"Salam MA, Koone ME, Thirumuruganathan S, Das G, Roy SB(2019) A human-in-the-loop attribute design framework for classification. The World Wide Web Conference (WWW). Association for Computing Machinery, pp 1612\u20131622","DOI":"10.1145\/3308558.3313547"}],"container-title":["Service Oriented Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11761-021-00327-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11761-021-00327-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11761-021-00327-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T06:23:22Z","timestamp":1725863002000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11761-021-00327-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,1]]},"references-count":101,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["327"],"URL":"https:\/\/doi.org\/10.1007\/s11761-021-00327-z","relation":{},"ISSN":["1863-2386","1863-2394"],"issn-type":[{"value":"1863-2386","type":"print"},{"value":"1863-2394","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,10,1]]},"assertion":[{"value":"3 February 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 July 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 August 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 October 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declaration"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}