{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T15:49:15Z","timestamp":1762876155732},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,11,13]],"date-time":"2019-11-13T00:00:00Z","timestamp":1573603200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,11,13]],"date-time":"2019-11-13T00:00:00Z","timestamp":1573603200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"published-print":{"date-parts":[[2020,1]]},"DOI":"10.1007\/s42979-019-0047-3","type":"journal-article","created":{"date-parts":[[2019,11,13]],"date-time":"2019-11-13T14:02:41Z","timestamp":1573653761000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["AutoAdd: Automated Bootstrapping of an IoT Device on a Network"],"prefix":"10.1007","volume":"1","author":[{"given":"Anoop Kumar","family":"Pandey","sequence":"first","affiliation":[]},{"given":"Balaji","family":"Rajendran","sequence":"additional","affiliation":[]},{"given":"V. S. Kumari","family":"Roshni","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,13]]},"reference":[{"key":"47_CR1","unstructured":"Amazon Alexa. https:\/\/developer.amazon.com\/alexa."},{"key":"47_CR2","unstructured":"Google Home. https:\/\/assistant.google.com\/platforms\/speakers\/."},{"key":"47_CR3","unstructured":"Wink smart home hubs knocked out by security certificate. https:\/\/www.engadget.com\/2015\/04\/19\/wink-home-automation-hub-bricked\/. Accessed 8 Aug 2018."},{"key":"47_CR4","unstructured":"https:\/\/motherboard.vice.com\/en_us\/topic\/The-Internet-of-Hackable-Things. Accessed 27 Oct 2019."},{"key":"47_CR5","unstructured":"http:\/\/www.faz.net\/aktuell\/wirtschaft\/diginomics\/grosse-internationale-allianz-gegen-cyber-attacken-15451953-p2.html?printPagedArticle=true#pageIndex_1. Accessed 16 Feb 2018."},{"key":"47_CR6","unstructured":"Nordrum A. Popular internet of things forecast of 50 billion devices by 2020 is outdated. IEEE. 2016. https:\/\/spectrum.ieee.org\/tech-talk\/telecom\/internet\/popular-internet-of-things-forecast-of-50-billion-devices-by-2020-is-outdated. Accessed 18 Aug 2016."},{"key":"47_CR7","unstructured":"iCloud leaks of celebrity photos. https:\/\/en.wikipedia.org\/wiki\/ICloud_leaks_of_celebrity_photos. Accessed 25 July 2016."},{"key":"47_CR8","unstructured":"The Internet of Things Will Turn Large-Scale Hacks into Real World Disasters. https:\/\/motherboard.vice.com\/en_us\/article\/qkjzwp\/the-internet-of-things-will-cause-the-first-ever-large-scale-internet-disaster. Accessed 3 Oct 2019."},{"key":"47_CR9","unstructured":"Message from Apple. https:\/\/www.apple.com\/in\/iphone-battery-and-performance\/. Accessed 6 Aug 2013."},{"key":"47_CR10","unstructured":"Princeton Survey. https:\/\/freedom-to-tinker.com\/2016\/01\/19\/who-will-secure-the-internet-of-things\/. Accessed 4 July 2016."},{"key":"47_CR11","unstructured":"WannaCry ransomware attack. https:\/\/en.wikipedia.org\/wiki\/WannaCry_ransomware_attack. Accessed 19 Jan 2016."},{"key":"47_CR12","unstructured":"EternalBlue. https:\/\/en.wikipedia.org\/wiki\/EternalBlue. Accessed 4 Nov 2019."},{"key":"47_CR13","unstructured":"DoublePulsar. https:\/\/en.wikipedia.org\/wiki\/DoublePulsar. Accessed 17 Oct 2019."},{"key":"47_CR14","unstructured":"Opportunistic Security: Some Protection Most of the Time. https:\/\/tools.ietf.org\/html\/rfc7435. Accessed Dec 2014."},{"key":"47_CR15","unstructured":"The Resurrecting Duckling: Security Issues for Ad hoc Wireless Networks. https:\/\/www.cl.cam.ac.uk\/~fms27\/papers\/1999-StajanoAnd-duckling.pdf. Accessed 26 Apr 2018."},{"key":"47_CR16","unstructured":"Enrollment over Secure Transport. https:\/\/tools.ietf.org\/html\/rfc7030. Accessed 14 June 1999."},{"key":"47_CR17","unstructured":"Bootstrapping Remote Secure Key Infrastructures (BRSKI). https:\/\/tools.ietf.org\/html\/draft-ietf-anima-bootstrapping-keyinfra-15. Accessed Oct 2013."},{"key":"47_CR18","unstructured":"Aura T, Sethi M. Nimble out-of-band authentication for EAP (EAP-NOOB). Draft-aura-eap-noob-01 (work in progress). 2016."},{"key":"47_CR19","unstructured":"Song Z, Molina J, Gordon J. Hardware trust anchor. U.S. Patent 8,505,103, issued August 6. 2013."}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-019-0047-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s42979-019-0047-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-019-0047-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,12]],"date-time":"2020-11-12T00:50:26Z","timestamp":1605142226000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s42979-019-0047-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,13]]},"references-count":19,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,1]]}},"alternative-id":["47"],"URL":"https:\/\/doi.org\/10.1007\/s42979-019-0047-3","relation":{},"ISSN":["2662-995X","2661-8907"],"issn-type":[{"value":"2662-995X","type":"print"},{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,11,13]]},"assertion":[{"value":"1 April 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 October 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 November 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with Ethical Standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}],"article-number":"46"}}