{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:34:29Z","timestamp":1774539269738,"version":"3.50.1"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,4,3]],"date-time":"2025-04-03T00:00:00Z","timestamp":1743638400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,4,3]],"date-time":"2025-04-03T00:00:00Z","timestamp":1743638400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,5]]},"DOI":"10.1007\/s12083-025-01923-y","type":"journal-article","created":{"date-parts":[[2025,4,5]],"date-time":"2025-04-05T06:33:31Z","timestamp":1743834811000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Mudscan: Double authentication based secure control mechanism for MUD enable IoT networks"],"prefix":"10.1007","volume":"18","author":[{"given":"Suvrima","family":"Datta","sequence":"first","affiliation":[]},{"given":"Venkanna","family":"U.","sequence":"additional","affiliation":[]},{"given":"Mallikharjuna Rao","family":"K","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,3]]},"reference":[{"issue":"4","key":"1923_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3539736","volume":"3","author":"M Safi","year":"2022","unstructured":"Safi M et al (2022) A survey on IoT profiling, fingerprinting, and identification. ACM Trans Int Things 3(4):1\u201339","journal-title":"ACM Trans Int Things"},{"issue":"1","key":"1923_CR2","doi-asserted-by":"publisher","first-page":"645","DOI":"10.1109\/TMC.2022.3220720","volume":"23","author":"S Duan","year":"2022","unstructured":"Duan S et al (2022) MOTO: Mobility-aware online task offloading with adaptive load balancing in small-cell MEC. IEEE Trans Mob Comput 23(1):645\u2013659","journal-title":"IEEE Trans Mob Comput"},{"key":"1923_CR3","doi-asserted-by":"crossref","unstructured":"Griffioen H, Doerr C (2020) Examining mirai\u2019s battle over the internet of things. Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security","DOI":"10.1145\/3372297.3417277"},{"issue":"11","key":"1923_CR4","doi-asserted-by":"publisher","first-page":"9305","DOI":"10.1109\/JIOT.2021.3055843","volume":"8","author":"GK Verma","year":"2021","unstructured":"Verma GK et al (2021) SCBS: A short certificate-based signature scheme with efficient aggregation for industrial-Internet-of-Things environment. IEEE Internet Things J 8(11):9305\u20139316","journal-title":"IEEE Internet Things J"},{"key":"1923_CR5","doi-asserted-by":"crossref","unstructured":"Lu H et al (2024) CODE+: Fast and Accurate Inference for Compact Distributed IoT Data Collection. IEEE Trans Parallel Distr Syst","DOI":"10.1109\/TPDS.2024.3453607"},{"key":"1923_CR6","doi-asserted-by":"publisher","first-page":"1217","DOI":"10.1007\/s12083-017-0608-y","volume":"11","author":"Y Jang","year":"2018","unstructured":"Jang Y, Kim JM, Lee WG (2018) Development and application of internet of things educational tool based on peer to peer network. Peer-to-Peer Netw Appl 11:1217\u20131229","journal-title":"Peer-to-Peer Netw Appl"},{"issue":"12","key":"1923_CR7","doi-asserted-by":"publisher","first-page":"9640","DOI":"10.1109\/JIOT.2021.3135789","volume":"9","author":"D Breitenbacher","year":"2021","unstructured":"Breitenbacher D et al (2021) HADES-IoT: A practical and effective host-based anomaly detection system for IoT devices (extended version). IEEE Int Things J 9(12):9640\u20139658","journal-title":"IEEE Int Things J"},{"key":"1923_CR8","doi-asserted-by":"crossref","unstructured":"Lu H et al (2023) Fl-amm: Federated learning augmented map matching with heterogeneous cellular moving trajectories. IEEE J Sel Areas Commun","DOI":"10.1109\/JSAC.2023.3322841"},{"issue":"2","key":"1923_CR9","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1007\/s12083-019-00739-x","volume":"13","author":"S Hong","year":"2020","unstructured":"Hong S (2020) P2P networking based internet of things (IoT) sensor node authentication by Blockchain. Peer-to-Peer Netw Appl 13(2):579\u2013589","journal-title":"Peer-to-Peer Netw Appl"},{"issue":"1","key":"1923_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TDSC.2020.2997898","volume":"19","author":"A Hamza","year":"2020","unstructured":"Hamza A et al (2020) Verifying and monitoring iots network behavior using mud profiles. IEEE Trans Dependable Secure Comput 19(1):1\u201318","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"9","key":"1923_CR11","doi-asserted-by":"publisher","first-page":"2688","DOI":"10.1109\/JLT.2020.2966517","volume":"38","author":"Y Yan","year":"2020","unstructured":"Yan Y et al (2020) P4-enabled smart nic: Enabling sliceable and service-driven optical data centres. J Lightwave Technol 38(9):2688\u20132694","journal-title":"J Lightwave Technol"},{"key":"1923_CR12","doi-asserted-by":"crossref","unstructured":"Hamza A et al (2018) Clear as MUD: Generating, validating and applying IoT behavioral profiles. Proceedings of the 2018 Workshop on IoT Security and Privacy","DOI":"10.1145\/3229565.3229566"},{"key":"1923_CR13","unstructured":"MUD Maker tool (2020). https:\/\/www.mudmaker.org"},{"key":"1923_CR14","unstructured":"Ranganathan M, Montgomery D, El Mimouni OI (2019) Soft MUD: Implementing manufacturer usage descriptions on OpenFlow SDN switches"},{"key":"1923_CR15","doi-asserted-by":"crossref","unstructured":"Hamza A et al (2019) Detecting volumetric attacks on lot devices via sdn-based monitoring of mud activity. Proceedings of the 2019 ACM Symposium on SDN Research","DOI":"10.1145\/3314148.3314352"},{"key":"1923_CR16","doi-asserted-by":"crossref","unstructured":"Hamza A, Gharakheili HH, Sivaraman V (2018) Combining MUD policies with SDN for IoT intrusion detection. Proceedings of the 2018 Workshop on IoT Security and Privacy","DOI":"10.1145\/3229565.3229571"},{"key":"1923_CR17","unstructured":"Feraudo A et al (2020) SoK: Beyond IoT MUD Deployments-Challenges and Future Directions. (2020). arXiv preprint arXiv:2004.08003"},{"key":"1923_CR18","doi-asserted-by":"crossref","unstructured":"Feraudo A et al (2020) CoLearn: Enabling federated learning in MUD-compliant IoT edge networks. Proceedings of the Third ACM International Workshop on Edge Systems, Analytics and Networking","DOI":"10.1145\/3378679.3394528"},{"key":"1923_CR19","doi-asserted-by":"crossref","unstructured":"Afek Y et al (2020) NFV-based IoT security for home networks using MUD. NOMS 2020-2020 IEEE\/IFIP Network Operations and Management Symposium. IEEE","DOI":"10.1109\/NOMS47738.2020.9110329"},{"key":"1923_CR20","doi-asserted-by":"crossref","unstructured":"Datta S, Kotha A, Venkanna U (2024) XNetIoT: An Extreme Quantized Neural Network Architecture For IoT Environment Using P4. IEEE Trans Netw Serv Manag","DOI":"10.1109\/TNSM.2024.3423317"},{"key":"1923_CR21","doi-asserted-by":"publisher","first-page":"126265","DOI":"10.1109\/ACCESS.2021.3111477","volume":"9","author":"JL Hern\u00e1ndez-Ramos","year":"2021","unstructured":"Hern\u00e1ndez-Ramos JL et al (2021) Defining the behavior of IoT devices through the mud standard: Review, challenges, and research directions. IEEE Access 9:126265\u2013126285","journal-title":"IEEE Access"},{"key":"1923_CR22","doi-asserted-by":"crossref","unstructured":"Datta S et al (2022) iDAM: A Distributed MUD Framework for Mitigation of Volumetric Attacks in IoT Networks. 2022 13th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP), IEEE","DOI":"10.1109\/CSNDSP54353.2022.9908058"},{"key":"1923_CR23","doi-asserted-by":"crossref","unstructured":"Garc\u00eda SNM et al (2024) Integrating the manufacturer usage description standard in the modelling of cyber-physical systems. Comp Stand Interf 87:103777","DOI":"10.1016\/j.csi.2023.103777"},{"key":"1923_CR24","doi-asserted-by":"publisher","first-page":"149444","DOI":"10.1109\/ACCESS.2019.2947157","volume":"7","author":"SN Matheu","year":"2019","unstructured":"Matheu SN et al (2019) Extending MUD profiles through an automated IoT security testing methodology. IEEE Access 7:149444\u2013149463","journal-title":"IEEE Access"},{"issue":"1","key":"1923_CR25","first-page":"1","volume":"27","author":"N-F Polychronou","year":"2021","unstructured":"Polychronou N-F et al (2021) A comprehensive survey of attacks without physical access targeting hardware vulnerabilities in iot\/iiot devices, and their detection mechanisms. ACM Trans Design Autom Electron Syst (TODAES) 27(1):1\u201335","journal-title":"ACM Trans Design Autom Electron Syst (TODAES)"},{"key":"1923_CR26","doi-asserted-by":"crossref","unstructured":"Zhang M et al (2020) Poseidon: Mitigating volumetric ddos attacks with programmable switches. the 27th Network and Distributed System Security Symposium (NDSS 2020)","DOI":"10.14722\/ndss.2020.24007"},{"key":"1923_CR27","unstructured":"Liu Z et al (2021) Jaqen: A High-PerformanceSwitch-Native approach for detecting and mitigating volumetric DDoS attacks with programmable switches. 30th USENIX Security Symposium (USENIX Security 21)"},{"key":"1923_CR28","doi-asserted-by":"crossref","unstructured":"Carvalho RN et al (2021) Detecting ddos attacks on sdn data plane with machine learning. 2021 Ninth International Symposium on Computing and Networking Workshops (CANDARW). IEEE","DOI":"10.1109\/CANDARW53999.2021.00030"},{"key":"1923_CR29","doi-asserted-by":"crossref","unstructured":"Dimolianis M, Pavlidis A, Maglaris V (2021) SYN flood attack detection and mitigation using machine learning traffic classification and programmable data plane filtering. 2021 24th Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN). IEEE","DOI":"10.1109\/ICIN51074.2021.9385540"},{"key":"1923_CR30","doi-asserted-by":"crossref","unstructured":"Kamath R, Sivalingam KM (2021) Machine learning based flow classification in DCNs using P4 switches. 2021 International Conference on Computer Communications and Networks (ICCCN). IEEE","DOI":"10.1109\/ICCCN52240.2021.9522272"},{"key":"1923_CR31","doi-asserted-by":"crossref","unstructured":"Nguyen TD et al (2019) D\u00cfoT: A federated self-learning anomaly detection system for IoT. 2019 IEEE 39th International conference on distributed computing systems (ICDCS). IEEE","DOI":"10.1109\/ICDCS.2019.00080"},{"issue":"1","key":"1923_CR32","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1109\/JIOT.2021.3079916","volume":"9","author":"C Xenofontos","year":"2021","unstructured":"Xenofontos C et al (2021) Consumer, commercial, and industrial iot (in) security: Attack taxonomy and case studies. IEEE Internet Things J 9(1):199\u2013221","journal-title":"IEEE Internet Things J"},{"key":"1923_CR33","doi-asserted-by":"publisher","first-page":"102143","DOI":"10.1016\/j.sysarc.2021.102143","volume":"116","author":"B Vignau","year":"2021","unstructured":"Vignau B et al (2021) The evolution of IoT Malwares, from 2008 to 2019: Survey, taxonomy, process simulator and perspectives. J Syst Architect 116:102143","journal-title":"J Syst Architect"},{"key":"1923_CR34","doi-asserted-by":"crossref","unstructured":"Gad AR, Nashat AA, Barkat TM (2021) Intrusion detection system using machine learning for vehicular ad hoc networks based on ToN-IoT dataset. IEEE Access 9:142206\u2013142217","DOI":"10.1109\/ACCESS.2021.3120626"},{"issue":"3","key":"1923_CR35","doi-asserted-by":"publisher","first-page":"2832","DOI":"10.1109\/TNSM.2021.3055900","volume":"18","author":"T Osi\u0144ski","year":"2021","unstructured":"Osi\u0144ski T et al (2021) A runtime-enabled p4 extension to the open vswitch packet processing pipeline. IEEE Trans Netw Serv Manage 18(3):2832\u20132845","journal-title":"IEEE Trans Netw Serv Manage"},{"key":"1923_CR36","unstructured":"NIST MUD:-https:\/\/www.nccoe.nist.gov\/projects\/securing-home-iot-devices-using-mud (2020)"},{"key":"1923_CR37","unstructured":"Zheng C et al (2022) IIsy: Practical in-network classification. arXiv preprint arXiv:2205.08243"},{"issue":"3","key":"1923_CR38","doi-asserted-by":"publisher","first-page":"3468","DOI":"10.1109\/JSYST.2021.3070404","volume":"16","author":"MN Aman","year":"2021","unstructured":"Aman MN, Javaid U, Sikdar B (2021) IoT-proctor: a secure and lightweight device patching framework for mitigating malware spread in IoT networks. IEEE Syst J 16(3):3468\u20133479","journal-title":"IEEE Syst J"},{"issue":"2","key":"1923_CR39","doi-asserted-by":"publisher","first-page":"927","DOI":"10.1109\/JIOT.2020.3010023","volume":"8","author":"J Wang","year":"2020","unstructured":"Wang J et al (2020) IoT-praetor: Undesired behaviors detection for IoT devices. IEEE Internet Things J 8(2):927\u2013940","journal-title":"IEEE Internet Things J"},{"key":"1923_CR40","unstructured":"http:\/\/www.secdev.org\/projects\/scapy (Python pachage)"},{"key":"1923_CR41","unstructured":"UNSW Bot-IoT Dataset. https:\/\/research.unsw.edu.au\/projects\/bot-iot-dataset:10.21227\/q70p-q449"},{"key":"1923_CR42","doi-asserted-by":"publisher","unstructured":"IoT Network Intrusion Dataset. https:\/\/doi.org\/10.21227\/q70p-q449,10.21227\/q70p-q449","DOI":"10.21227\/q70p-q449,10.21227\/q70p-q449"},{"key":"1923_CR43","unstructured":"Busse-Grawitz C et al (2019) pforest: In-network inference with random forests. arXiv preprint arXiv:1909.05680"},{"key":"1923_CR44","doi-asserted-by":"crossref","unstructured":"Lee J-H, Singh K (2020) Switchtree: in-network computing and traffic analyses with random forests. Neural Computing and Applications 1\u201312","DOI":"10.1007\/s00521-020-05440-2"},{"issue":"1","key":"1923_CR45","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3437537","volume":"2","author":"N Alhirabi","year":"2021","unstructured":"Alhirabi N, Rana O, Perera C (2021) Security and privacy requirements for the internet of things: A survey. ACM Transactions on Internet of Things 2(1):1\u201337","journal-title":"ACM Transactions on Internet of Things"},{"key":"1923_CR46","doi-asserted-by":"crossref","unstructured":"Chowdhury M et al (2021) A novel insider attack and machine learning based detection for the internet of things. ACM Transactions on Internet of Things 2(4):1\u201323","DOI":"10.1145\/3466721"},{"key":"1923_CR47","doi-asserted-by":"crossref","unstructured":"Krishnan P et al (2021) MUD-based behavioral profiling security framework for software-defined IoT networks. IEEE Internet Things J 9(9):6611\u20136622","DOI":"10.1109\/JIOT.2021.3113577"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-01923-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-01923-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-01923-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,10]],"date-time":"2025-05-10T02:33:33Z","timestamp":1746844413000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-01923-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,3]]},"references-count":47,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,5]]}},"alternative-id":["1923"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-01923-y","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4,3]]},"assertion":[{"value":"15 April 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 February 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 April 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not Applicable","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"Not Applicable","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to Publish"}},{"value":"The authors declare no Conflict of interest.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}],"article-number":"139"}}