{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,3]],"date-time":"2026-05-03T14:32:49Z","timestamp":1777818769918,"version":"3.51.4"},"reference-count":122,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,12,24]],"date-time":"2024-12-24T00:00:00Z","timestamp":1734998400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2024,12,24]],"date-time":"2024-12-24T00:00:00Z","timestamp":1734998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Internet Things"],"DOI":"10.1007\/s43926-024-00090-5","type":"journal-article","created":{"date-parts":[[2024,12,24]],"date-time":"2024-12-24T13:23:28Z","timestamp":1735046608000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":30,"title":["Internet of Things (IoT) applications security trends and challenges"],"prefix":"10.1007","volume":"4","author":[{"given":"Asif Ali","family":"Laghari","sequence":"first","affiliation":[]},{"given":"Hang","family":"Li","sequence":"additional","affiliation":[]},{"given":"Abdullah Ayub","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Yin","family":"Shoulin","sequence":"additional","affiliation":[]},{"given":"Shahid","family":"Karim","sequence":"additional","affiliation":[]},{"given":"Muhammad Adnan Kaim","family":"Khani","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,24]]},"reference":[{"key":"90_CR1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3353337","author":"S Yin","year":"2024","unstructured":"Yin S, Li H, Laghari AA, Gadekallu TR, Sampedro GA, Almadhor A. An anomaly detection model based on deep auto-encoder and capsule graph convolution via sparrow search algorithm in 6G Internet-of-everything. IEEE Internet Things J. 2024. https:\/\/doi.org\/10.1109\/JIOT.2024.3353337.","journal-title":"IEEE Internet Things J"},{"key":"90_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11042-023-17611-z","volume":"83","author":"Z Fatima","year":"2023","unstructured":"Fatima Z, Rehman AU, Hussain R, Karim S, Shakir M, Soomro KA, Laghari AA. Mobile crowdsensing with energy efficiency to control road congestion in internet cloud of vehicles: a review. Multimed Tools Appl. 2023;83:1\u201326.","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"90_CR3","first-page":"416","volume":"6","author":"M Sony","year":"2018","unstructured":"Sony M. Industry 4.0 and lean management: a proposed integration model and research propositions. Prod Manuf Res. 2018;6(1):416\u201332.","journal-title":"Prod Manuf Res"},{"key":"90_CR4","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/978-981-10-7578-0_5","volume-title":"Green Urea","author":"N Yahya","year":"2018","unstructured":"Yahya N. Agricultural 4.0: its implementation toward future sustainability. In: Green Urea. Singapore: Springer; 2018. p. 125\u201345."},{"issue":"7","key":"90_CR5","doi-asserted-by":"publisher","first-page":"1164","DOI":"10.3390\/app8071164","volume":"8","author":"YN Jeong","year":"2018","unstructured":"Jeong YN, Son SR, Jeong EH, Lee BK. An integrated self-diagnosis system for an autonomous vehicle based on an IoT gateway and deep learning. Appl Sci. 2018;8(7):1164.","journal-title":"Appl Sci"},{"key":"90_CR6","first-page":"1","volume":"20","author":"J Gao","year":"2023","unstructured":"Gao J, Li P, Laghari AA, Srivastava G, Gadekallu TR, Abbas S, Zhang J. Incomplete multiview clustering via semidiscrete optimal transport for multimedia data mining in IoT. ACM Trans Multimed Comput Commun Appl. 2023;20:1\u201320.","journal-title":"ACM Trans Multimed Comput Commun Appl"},{"issue":"1","key":"90_CR7","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1080\/23738871.2018.1472288","volume":"3","author":"E Jardine","year":"2018","unstructured":"Jardine E. Mind the denominator: towards a more effective measurement system for cybersecurity. J Cyber Policy. 2018;3(1):116\u201339.","journal-title":"J Cyber Policy"},{"key":"90_CR8","doi-asserted-by":"crossref","unstructured":"Khan AA, Laghari AA, Elmannai H, Shaikh AA, Bourouis S, Hadjouni M, Alroobaea R. GAN-IoTVS: a novel Internet of Multimedia Things-enabled Video Streaming Compression Model Using GAN and Fuzzy Logic. IEEE Sensors Journal. 2023.","DOI":"10.1109\/JSEN.2023.3316088"},{"key":"90_CR9","unstructured":"Khan AA, Laghari AA, Baqasah AM, Alroobaea R, Almadhor A, Sampedro GA, Kryvinska N. Blockchain-enabled infrastructural security solution for serverless consortium fog and edge computing."},{"key":"90_CR10","first-page":"100502","volume":"27","author":"AA Khan","year":"2024","unstructured":"Khan AA, Chen YL, Hajjej F, Shaikh AA, Yang J, Ku CS, Por LY. Digital forensics for the socio-cyber world (DF-SCW): a novel framework for deepfake multimedia investigation on social media platforms. Egypt Inf J. 2024;27:100502.","journal-title":"Egypt Inf J"},{"key":"90_CR11","doi-asserted-by":"crossref","unstructured":"Samie F, Bauer L, Henkel J. IoT technologies for embedded computing: a survey. In\u00a02016 International Conference on Hardware\/Software Codesign and System Synthesis (CODES+ ISSS), IEEE, 2016. pp. 1\u201310.","DOI":"10.1145\/2968456.2974004"},{"issue":"2","key":"90_CR12","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1109\/MCOM.2017.1600444CM","volume":"55","author":"Z Khan","year":"2017","unstructured":"Khan Z, Lehtomaki JJ, Iellamo SI, Vuohtoniemi R, Hossain E, Han Z. IoT connectivity in radar bands: a shared access model based on spectrum measurements. IEEE Commun Mag. 2017;55(2):88\u201396.","journal-title":"IEEE Commun Mag"},{"key":"90_CR13","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/978-3-030-30367-9_4","volume-title":"Intelligent Internet of Things","author":"F Firouzi","year":"2020","unstructured":"Firouzi F, Farahani B. Architecting IoT Cloud. In: Intelligent Internet of Things. Cham: Springer; 2020. p. 173\u2013241."},{"key":"90_CR14","unstructured":"Khan AA, Laghari AA, Shaikh ZA, Dacko-Pikiewicz Z, Kot S. Internet of Things (IoT) Security with Blockchain Technology: a State-of-the-Art Review. IEEE Access (2022)."},{"key":"90_CR15","unstructured":"Khan AA, Laghari AA, Baqasah AM, Alroobaea R, Gadekallu TR, Sampedro GA, Zhu Y. ORAN-B5G: a next generation open radio access network architecture with machine learning for beyond 5G in industrial 5.0. IEEE Transactions on Green Communications and Networking. 2024."},{"key":"90_CR16","doi-asserted-by":"crossref","unstructured":"Khan AA, Laghari AA, Alroobaea R, Baqasah AM, Alsafyani M, Bacarra R, Alsayaydeh JAJ. Secure remote sensing data with blockchain distributed ledger technology: a solution for smart cities. IEEE Access. 2024.","DOI":"10.1109\/ACCESS.2024.3401591"},{"key":"90_CR17","first-page":"8","volume":"38","author":"M Ammar","year":"2018","unstructured":"Ammar M, Russello G, Crispo B. Internet of Things: a survey on the security of IoT frameworks. J Inf Secur Appl. 2018;38:8\u201327.","journal-title":"J Inf Secur Appl"},{"key":"90_CR18","doi-asserted-by":"crossref","unstructured":"Kesavan G, Sanjeevi P, Viswanathan P. A 24 hour IoT framework for monitoring and managing home automation. In\u00a02016 international conference on inventive computation technologies (ICICT), IEEE, 2016. vol. 1, pp. 1\u20135.","DOI":"10.1109\/INVENTIVE.2016.7823205"},{"key":"90_CR19","doi-asserted-by":"crossref","unstructured":"Navani D, Jain S, Nehra MS. The Internet of Things (IoT): a study of architectural elements. In\u00a02017 13th international conference on signal-image technology & internet-based systems (SITIS), IEEE, 2017. pp. 473\u2013478.","DOI":"10.1109\/SITIS.2017.83"},{"key":"90_CR20","doi-asserted-by":"crossref","unstructured":"Mehmood, F., Khan, A. A., Wang, H., Karim, S., Khalid, U., & Zhao, F. (2024). BLPCA-Ledger: A Lightweight Plenum Consensus Protocols for Consortium Blockchain Based on the Hyperledger Indy.\u00a0Computer Standards & Interfaces, 103876.","DOI":"10.1016\/j.csi.2024.103876"},{"key":"90_CR21","doi-asserted-by":"publisher","first-page":"109343","DOI":"10.1016\/j.compeleceng.2024.109343","volume":"118","author":"AA Khan","year":"2024","unstructured":"Khan AA, Dhabi S, Yang J, Alhakami W, Bourouis S, Yee L. B-LPoET: a middleware lightweight Proof-of-Elapsed Time (PoET) for efficient distributed transaction execution and security on Blockchain using multithreading technology. Comput Electr Eng. 2024;118:109343.","journal-title":"Comput Electr Eng"},{"key":"90_CR22","doi-asserted-by":"crossref","unstructured":"Gusev M. A dew computing solution for IoT streaming devices. In\u00a02017 40th international convention on information and communication technology, electronics and microelectronics (MIPRO), IEEE, 2017. pp. 387\u2013392.","DOI":"10.23919\/MIPRO.2017.7973454"},{"key":"90_CR23","doi-asserted-by":"publisher","first-page":"132577","DOI":"10.1109\/ACCESS.2019.2941371","volume":"7","author":"C Santos","year":"2019","unstructured":"Santos C, Jim\u00e9nez JA, Espinosa F. Effect of event-based sensing on IoT node power efficiency. Case study: air quality monitoring in smart cities. IEEE Access. 2019;7:132577\u201386.","journal-title":"IEEE Access"},{"key":"90_CR24","doi-asserted-by":"publisher","first-page":"102047","DOI":"10.1016\/j.adhoc.2019.102047","volume":"98","author":"RS Alonso","year":"2020","unstructured":"Alonso RS, Sitt\u00f3n-Candanedo I, Garc\u00eda \u00d3, Prieto J, Rodr\u00edguez-Gonz\u00e1lez S. An intelligent Edge-IoT platform for monitoring livestock and crops in a dairy farming scenario. Ad Hoc Netw. 2020;98:102047.","journal-title":"Ad Hoc Netw"},{"issue":"12","key":"90_CR25","doi-asserted-by":"publisher","first-page":"3585","DOI":"10.3390\/s20123585","volume":"20","author":"P Placidi","year":"2020","unstructured":"Placidi P, Gasperini L, Grassi A, Cecconi M, Scorzoni A. Characterization of low-cost capacitive soil moisture sensors for IoT networks. Sensors. 2020;20(12):3585.","journal-title":"Sensors"},{"key":"90_CR26","doi-asserted-by":"crossref","unstructured":"Padwal SC, Kumar M, Balaramudu P, Jha CK. Analysis of environment changes using WSN for IOT applications. In\u00a02017 2nd international conference for convergence in technology (I2CT), IEEE, 2017. pp. 27\u201332.","DOI":"10.1109\/I2CT.2017.8226088"},{"key":"90_CR27","doi-asserted-by":"crossref","unstructured":"Ronen E, Shamir A. Extended functionality attacks on IoT devices: the case of smart lights. In\u00a02016 IEEE European symposium on security and privacy (EuroS&P), IEEE, 2016. pp. 3\u201312.","DOI":"10.1109\/EuroSP.2016.13"},{"key":"90_CR28","doi-asserted-by":"crossref","unstructured":"Siddula SS, Babu P, Jain PC. Water level monitoring and management of dams using IoT. In\u00a02018 3rd International Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU), IEEE, 2018. pp. 1\u20135.","DOI":"10.1109\/IoT-SIU.2018.8519843"},{"key":"90_CR29","doi-asserted-by":"crossref","unstructured":"Laghari AA, Li H, Karim S, Hyder W, Shoulin Y, Khan AA, Laghari RA. Internet of multimedia things (IoMT): A review.\u00a0The Review of Socionetwork Strategies\u00a02024; 1\u201329.","DOI":"10.1007\/s12626-024-00175-1"},{"key":"90_CR30","doi-asserted-by":"crossref","unstructured":"Kazi R, and Tiwari G. IoT based Interactive industrial home wireless system, energy management system and embedded data acquisition system to display on web page using GPRS, SMS & E-mail alert. In\u00a02015 International Conference on Energy Systems and Applications, IEEE, 2015. pp. 290\u2013295.","DOI":"10.1109\/ICESA.2015.7503358"},{"key":"90_CR31","doi-asserted-by":"crossref","unstructured":"Patil A, Deokar SA, Banderkar A. GRID TIE solar power plant data acquisition System using Internet of Things. In\u00a02018 International conference on information, communication, engineering and technology (ICICET), IEEE, 2018. pp. 1\u20134","DOI":"10.1109\/ICICET.2018.8533857"},{"key":"90_CR32","doi-asserted-by":"crossref","unstructured":"Sun J. Design and Development of the fire sensor system of fitness club based on the Internet of Things. In\u00a0The international conference on cyber security intelligence and analytics, Springer, Cham, 2020. pp. 617\u2013624.","DOI":"10.1007\/978-3-030-43306-2_87"},{"issue":"3","key":"90_CR33","doi-asserted-by":"publisher","first-page":"892","DOI":"10.3390\/s20030892","volume":"20","author":"BD Marah","year":"2020","unstructured":"Marah BD, Jing Z, Ma T, Alsabri R, Anaadumba R, Al-Dhelaan A, Al-Dhelaan M. Smartphone architecture for edge-centric iot analytics. Sensors. 2020;20(3):892.","journal-title":"Sensors"},{"key":"90_CR34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s00521-020-04772-3","volume":"32","author":"H HaddadPajouh","year":"2020","unstructured":"HaddadPajouh H, Khayami R, Dehghantanha A, Choo KKR, Parizi RM. AI4SAFE-IoT: an AI-powered secure architecture for edge layer of Internet of things. Neural Comput Appl. 2020;32:1\u201315.","journal-title":"Neural Comput Appl"},{"key":"90_CR35","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1016\/j.ins.2020.05.070","volume":"537","author":"D Mrozek","year":"2020","unstructured":"Mrozek D, Koczur A, Ma\u0142ysiak-Mrozek B. Fall detection in older adults with mobile IoT devices and machine learning in the cloud and on the edge. Inf Sci. 2020;537:132\u201347.","journal-title":"Inf Sci"},{"key":"90_CR36","first-page":"1","volume":"24","author":"AM Rahmani","year":"2020","unstructured":"Rahmani AM, Babaei Z, Souri A. Event-driven IoT architecture for data analysis of reliable healthcare application using complex event processing. Clust Comput. 2020;24:1\u201314.","journal-title":"Clust Comput"},{"key":"90_CR37","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1109\/ACCESS.2017.2757955","volume":"6","author":"PK Sharma","year":"2017","unstructured":"Sharma PK, Chen MY, Park JH. A software defined fog node based distributed blockchain cloud architecture for IoT. Ieee Access. 2017;6:115\u201324.","journal-title":"Ieee Access"},{"key":"90_CR38","doi-asserted-by":"crossref","unstructured":"Tyagi S, Agarwal A, Maheshwari P. A conceptual framework for IoT-based healthcare system using cloud computing. In\u00a02016 6th international conference-cloud system and big data engineering (Confluence), IEEE, 2016. pp. 503\u2013507.","DOI":"10.1109\/CONFLUENCE.2016.7508172"},{"key":"90_CR39","unstructured":"Vermesan O, Friess P, Internet of things: converging technologies for smart environments and integrated ecosystems. River publishers, 2013."},{"key":"90_CR40","doi-asserted-by":"publisher","first-page":"105052","DOI":"10.1016\/j.nanoen.2020.105052","volume":"76","author":"L Liu","year":"2020","unstructured":"Liu L, Shi Q, Lee C. A novel hybridized blue energy harvester aiming at all-weather IoT applications. Nano Energy. 2020;76:105052.","journal-title":"Nano Energy"},{"issue":"1","key":"90_CR41","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3372136","volume":"53","author":"L Lao","year":"2020","unstructured":"Lao L, Li Z, Hou S, Xiao B, Guo S, Yang Y. A survey of IoT applications in blockchain systems: architecture, consensus, and traffic modeling. ACM Comput Surv (CSUR). 2020;53(1):1\u201332.","journal-title":"ACM Comput Surv (CSUR)"},{"key":"90_CR42","doi-asserted-by":"publisher","first-page":"104456","DOI":"10.1016\/j.nanoen.2020.104456","volume":"70","author":"C Qiu","year":"2020","unstructured":"Qiu C, Fan W, Lee C, Yuce MR. Self-powered control interface based on Gray code with hybrid triboelectric and photovoltaics energy harvesting for IoT smart home and access control applications. Nano Energy. 2020;70:104456.","journal-title":"Nano Energy"},{"key":"90_CR43","unstructured":"Pathan MA, Deval N. IOT based smart office using wireless sensor Area Network.\u201d"},{"key":"90_CR44","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1007\/978-3-030-37468-6_27","volume-title":"Internet of Things (IOT)","author":"N Sami","year":"2020","unstructured":"Sami N, Mufti T, Sohail SS, Siddiqui J, Kumar D. Future Internet of Things (IOT) from cloud perspective: aspects, applications and challenges. In: Internet of Things (IOT). Cham: Springer; 2020. p. 515\u201332."},{"key":"90_CR45","doi-asserted-by":"publisher","first-page":"119281","DOI":"10.1016\/j.techfore.2018.04.024","volume":"153","author":"H Kumar","year":"2020","unstructured":"Kumar H, Singh MK, Gupta MP, Madaan J. Moving towards smart cities: solutions that lead to the smart city transformation framework. Technol Forecast Soc Change. 2020;153:119281.","journal-title":"Technol Forecast Soc Change"},{"key":"90_CR46","doi-asserted-by":"crossref","unstructured":"Mishra, Ravi, Anjali Pandey, and Jhalak Savariya. Application of Internet of Things: Last meter smart grid and smart energy efficient system. In\u00a02020 First International Conference on Power, Control and Computing Technologies (ICPC2T), IEEE, 2020. pp. 32\u201337.","DOI":"10.1109\/ICPC2T48082.2020.9071503"},{"key":"90_CR47","doi-asserted-by":"crossref","unstructured":"Zheng W, Sun K, Zhang X, Zhang Q, Israr A, Yang Q. Cellular communication for ubiquitous Internet of Things in smart grids: present and outlook. In\u00a02020 Chinese Control And Decision Conference (CCDC), IEEE, 2020. pp. 5592\u20135596.","DOI":"10.1109\/CCDC49329.2020.9164273"},{"key":"90_CR48","doi-asserted-by":"publisher","first-page":"9","DOI":"10.34257\/GJCSTGVOL20IS2PG9","volume":"20","author":"F Humaira","year":"2020","unstructured":"Humaira F, Islam MS, Luva SA, Rahman MB. A secure framework for IoT smart home by resolving session hijacking. Glob J Comput Sci Technol. 2020;20:9\u201320.","journal-title":"Glob J Comput Sci Technol"},{"key":"90_CR49","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-981-15-6044-6_2","volume-title":"Fog data analytics for IoT applications","author":"P Kansal","year":"2020","unstructured":"Kansal P, Sharma D, Kumar M. Introduction to fog data analytics for IoT applications. In: Fog data analytics for IoT applications. Singapore: Springer; 2020. p. 19\u201338."},{"issue":"4","key":"90_CR50","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1093\/joclec\/nhz018","volume":"15","author":"W Kerber","year":"2019","unstructured":"Kerber W. Data sharing in IoT ecosystems and competition law: the example of connected cars. J Compet Law Econ. 2019;15(4):381\u2013426.","journal-title":"J Compet Law Econ"},{"issue":"2","key":"90_CR51","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1365\/s40112-016-1065-3","volume":"5","author":"R Dev","year":"2016","unstructured":"Dev R. Connected cars & IoT\u2014emerging trends and predictions. Auto Tech Rev. 2016;5(2):12\u20133.","journal-title":"Auto Tech Rev"},{"key":"90_CR52","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/978-3-030-34328-6_6","volume-title":"Internet of Things in smart technologies for sustainable urban development","author":"K Suryawanshi","year":"2020","unstructured":"Suryawanshi K, Pandharkar M. The application scenario and dependence with IoT. In: Internet of Things in smart technologies for sustainable urban development. Cham: Springer; 2020. p. 91\u2013105."},{"issue":"13","key":"90_CR53","doi-asserted-by":"publisher","first-page":"3760","DOI":"10.3390\/s20133760","volume":"20","author":"A Shahzad","year":"2020","unstructured":"Shahzad A, Zhang K, Gherbi A. Intuitive development to examine collaborative iot supply chain system underlying privacy and security levels and perspective powering through proactive blockchain. Sensors. 2020;20(13):3760.","journal-title":"Sensors"},{"issue":"8","key":"90_CR54","doi-asserted-by":"publisher","first-page":"5565","DOI":"10.1109\/TII.2019.2933867","volume":"16","author":"H Yang","year":"2019","unstructured":"Yang H, Alphones A, Zhong W-D, Chen C, Xie X. Learning-based energy-efficient resource management by heterogeneous RF\/VLC for ultra-reliable low-latency industrial IoT networks. IEEE Trans Industr Inf. 2019;16(8):5565\u201376.","journal-title":"IEEE Trans Industr Inf"},{"key":"90_CR55","unstructured":"Turck M. Growing pains: the 2018 internet of things landscape. Mattturck Com 2018."},{"key":"90_CR56","doi-asserted-by":"crossref","unstructured":"Somesh S, Senthilnathan N, Sabarimuthu M, Santhosh Kumar A, Rishikeshanan R, Bala V. Real time implementation of home appliance control using ALEXA. In\u00a0IOP Conference Series: Materials Science and Engineering. IOP Publishing, 2020. vol. 937, no. 1, p. 012008","DOI":"10.1088\/1757-899X\/937\/1\/012008"},{"key":"90_CR57","doi-asserted-by":"crossref","unstructured":"Srivastava S, Babu MR. Generic architecture for ubiquitous IoT applications. In\u00a0Emerging research in data engineering systems and computer communications, Springer, Singapore, 2020. pp. 131\u2013143.","DOI":"10.1007\/978-981-15-0135-7_12"},{"key":"90_CR58","doi-asserted-by":"crossref","unstructured":"Jain A, Lalwani S, Jain S, Karandikar V. IoT-based smart doorbell using Raspberry Pi. In\u00a0International conference on advanced computing networking and informatics, Springer, Singapore, 2019. pp. 175\u2013181.","DOI":"10.1007\/978-981-13-2673-8_20"},{"key":"90_CR59","doi-asserted-by":"crossref","unstructured":"Thakur P, Shetty A, Pokharkar O, Shinde S. IoT Based portable smart lock. In\u00a0Proceedings 2019: conference on technologies for future cities (CTFC). 2019.","DOI":"10.2139\/ssrn.3360348"},{"key":"90_CR60","doi-asserted-by":"crossref","unstructured":"Zahid IM, Hasib MHH, Rahaman I, Islam MZ, Rashid MM. Smart vehicle protocol monitoring system by the internet of things platform. In\u00a02019 4th international conference on electrical information and communication technology (EICT), IEEE, 2019. pp. 1\u20134.","DOI":"10.1109\/EICT48899.2019.9068836"},{"key":"90_CR61","doi-asserted-by":"crossref","unstructured":"Becirovic S, S Mrdovic. Manual IoT forensics of a samsung gear S3 frontier smartwatch. In\u00a02019 international conference on software, telecommunications and computer networks (SoftCOM), IEEE, 2019. pp. 1\u20135.","DOI":"10.23919\/SOFTCOM.2019.8903845"},{"key":"90_CR62","doi-asserted-by":"crossref","unstructured":"Takiddeen N, Zualkernan I. Smartwatches as iot edge devices: a framework and survey. In\u00a02019 fourth international conference on fog and mobile edge computing (FMEC), IEEE, 2019. pp. 216\u2013222.","DOI":"10.1109\/FMEC.2019.8795338"},{"key":"90_CR63","doi-asserted-by":"crossref","unstructured":"Kim JE, Bessho M, Ken S. Towards a Smartwatch application to assist students with disabilities in an IoT-enabled campus. In\u00a02019 IEEE 1st global conference on life sciences and technologies (LifeTech), IEEE, 2019. pp. 243\u2013246.","DOI":"10.1109\/LifeTech.2019.8883995"},{"issue":"1","key":"90_CR64","doi-asserted-by":"publisher","first-page":"102043","DOI":"10.1016\/j.telpol.2020.102043","volume":"45","author":"SS Martins","year":"2021","unstructured":"Martins SS, Wernick C. Regional differences in residential demand for very high bandwidth broadband internet in 2025. Telecommun Policy. 2021;45(1):102043.","journal-title":"Telecommun Policy"},{"key":"90_CR65","doi-asserted-by":"crossref","unstructured":"Abdalrahman GA, Varol H. Defending Against Cyber-Attacks on the Internet of Things. In\u00a02019 7th international symposium on digital forensics and security (ISDFS), IEEE, 2019. pp. 1\u20136.","DOI":"10.1109\/ISDFS.2019.8757478"},{"key":"90_CR66","doi-asserted-by":"crossref","unstructured":"Hodo E, Bellekens X, Hamilton A, Dubouilh PL, Iorkyase E, Tachtatzis C, Atkinson R. Threat analysis of IoT networks using artificial neural network intrusion detection system. In\u00a02016 International symposium on networks, computers and communications (ISNCC), IEEE, 2016. pp. 1\u20136.","DOI":"10.1109\/ISNCC.2016.7746067"},{"key":"90_CR67","doi-asserted-by":"publisher","first-page":"82721","DOI":"10.1109\/ACCESS.2019.2924045","volume":"7","author":"V Hassija","year":"2019","unstructured":"Hassija V, Chamola V, Saxena V, Jain D, Goyal P, Sikdar B. A survey on IoT security: application areas, security threats, and solution architectures. IEEE Access. 2019;7:82721\u201343.","journal-title":"IEEE Access"},{"key":"90_CR68","doi-asserted-by":"crossref","unstructured":"Ferrando R, Stacey P. Classification of device behaviour in internet of things infrastructures: towards distinguishing the abnormal from security threats. In\u00a0Proceedings of the 1st international conference on internet of things and machine learning, 2017. pp. 1\u20137.","DOI":"10.1145\/3109761.3109791"},{"key":"90_CR69","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1016\/j.technovation.2017.09.003","volume":"68","author":"D Kiel","year":"2017","unstructured":"Kiel D, Arnold C, Voigt K-I. The influence of the Industrial Internet of Things on business models of established manufacturing companies\u2013A business level perspective. Technovation. 2017;68:4\u201319.","journal-title":"Technovation"},{"issue":"3","key":"90_CR70","doi-asserted-by":"publisher","first-page":"4831","DOI":"10.1109\/JIOT.2018.2870288","volume":"6","author":"T Wang","year":"2018","unstructured":"Wang T, Zhang G, Anfeng Liu Md, Bhuiyan ZA, Jin Q. A secure IoT service architecture with an efficient balance dynamics based on cloud and edge computing. IEEE Internet Things J. 2018;6(3):4831\u201343.","journal-title":"IEEE Internet Things J"},{"key":"90_CR71","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.comnet.2019.01.023","volume":"151","author":"KAP da Costa","year":"2019","unstructured":"da Costa KAP, Papa JP, Lisboa CO, Munoz R, de Albuquerque VHC. Internet of Things: a survey on machine learning-based intrusion detection approaches. Comput Netw. 2019;151:147\u201357.","journal-title":"Comput Netw"},{"issue":"1","key":"90_CR72","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1186\/s13677-018-0123-6","volume":"7","author":"MF Elrawy","year":"2018","unstructured":"Elrawy MF, Awad AI, Hamed HFA. Intrusion detection systems for IoT-based smart environments: a survey. J Cloud Comput. 2018;7(1):21.","journal-title":"J Cloud Comput"},{"key":"90_CR73","doi-asserted-by":"crossref","unstructured":"Chifor BC, Bica I, Patriciu VV. Mitigating DoS attacks in publish-subscribe IoT networks. In\u00a02017 9th international conference on electronics, computers and artificial intelligence (ECAI), IEEE, 2017. pp. 1\u20136.","DOI":"10.1109\/ECAI.2017.8166463"},{"key":"90_CR74","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1016\/j.future.2019.04.038","volume":"100","author":"HA Khattak","year":"2019","unstructured":"Khattak HA, Shah MA, Khan S, Ali I, Imran M. Perception layer security in Internet of Things. Future Gener Comput Syst. 2019;100:144\u201364.","journal-title":"Future Gener Comput Syst"},{"key":"90_CR75","doi-asserted-by":"crossref","unstructured":"Mirzamohammadi S, Chen JA, Sani AA, Mehrotra S, Tsudik G. Ditio: trustworthy auditing of sensor activities in mobile & IoT devices. In\u00a0Proceedings of the 15th ACM Conference on Embedded Network Sensor Systems, pp. 1\u201314. 2017.","DOI":"10.1145\/3131672.3131688"},{"key":"90_CR76","doi-asserted-by":"crossref","unstructured":"Morgner P, Pfennig S, Salzner D, Benenson Z. Malicious IoT implants: tampering with serial communication over the Internet. In\u00a0International Symposium on Research in Attacks, Intrusions, and Defenses, Springer, Cham, 2018. pp. 535\u2013555.","DOI":"10.1007\/978-3-030-00470-5_25"},{"key":"90_CR77","doi-asserted-by":"crossref","unstructured":"Maleh Y, Ezzati A, Belaissaoui M. An enhanced DTLS protocol for Internet of Things applications. In\u00a02016 International conference on wireless networks and mobile communications (WINCOM), IEEE, 2016. pp. 168\u2013173.","DOI":"10.1109\/WINCOM.2016.7777209"},{"key":"90_CR78","first-page":"1283472","volume":"2019","author":"GA Jaafar","year":"2019","unstructured":"Jaafar GA, Abdullah SM, Ismail S. Review of recent detection methods for HTTP DDoS attack. J Comput Netw Commun. 2019;2019:1283472.","journal-title":"J Comput Netw Commun"},{"issue":"12","key":"90_CR79","doi-asserted-by":"publisher","first-page":"251","DOI":"10.3390\/fi11120251","volume":"11","author":"Z Belghazi","year":"2019","unstructured":"Belghazi Z, Benamar N, Addaim A, Kerrache CA. Secure Wifi-Direct using key exchange for IoT device-to-device communications in a smart environment. Future Internet. 2019;11(12):251.","journal-title":"Future Internet"},{"issue":"1","key":"90_CR80","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1007\/s11277-019-06407-w","volume":"108","author":"S Balaji","year":"2019","unstructured":"Balaji S, Nathani K, Santhakumar R. IoT technology, applications and challenges: a contemporary survey. Wirel Pers Commun. 2019;108(1):363\u201388.","journal-title":"Wirel Pers Commun"},{"key":"90_CR81","doi-asserted-by":"publisher","first-page":"645","DOI":"10.1007\/978-981-15-5566-4_58","volume-title":"Intelligent computing and applications","author":"P Majumdar","year":"2021","unstructured":"Majumdar P, Singh A, Pandey A, Chaudhary P. A deep learning approach against botnet attacks to reduce the interference problem of IoT. In: Intelligent computing and applications. Singapore: Springer; 2021. p. 645\u201355."},{"key":"90_CR82","doi-asserted-by":"publisher","first-page":"6803801","DOI":"10.1155\/2019\/6803801","volume":"2019","author":"M Yin","year":"2019","unstructured":"Yin M, Chen X, Wang Q, Wang W, Wang Y. Dynamics on hybrid complex network: botnet modeling and analysis of medical IoT. Secur Commun Netw. 2019;2019:6803801.","journal-title":"Secur Commun Netw"},{"key":"90_CR83","doi-asserted-by":"crossref","unstructured":"Ali O, Ishak MK, Wuttisittikulkij L, Maung TZB. IoT Devices and Edge gateway provisioning, realtime analytics for simulated and virtually emulated devices. In\u00a02020 international conference on electronics, information, and communication (ICEIC), IEEE, 2020. pp. 1\u20135.","DOI":"10.1109\/ICEIC49074.2020.9051037"},{"key":"90_CR84","doi-asserted-by":"crossref","unstructured":"Kumar A, Lim TJ. Early detection of Mirai-like IoT bots in large-scale networks through sub-sampled packet traffic analysis. In\u00a0Future of Information and Communication Conference, Springer, Cham, 2019. pp. 847\u2013867.","DOI":"10.1007\/978-3-030-12385-7_58"},{"key":"90_CR85","doi-asserted-by":"crossref","unstructured":"Zahra SR, Chishti MA. Ransomware and Internet of Things: a new security Nightmare. In\u00a02019 9th international conference on cloud computing, data science & engineering (Confluence), IEEE, 2019. pp. 551\u2013555.","DOI":"10.1109\/CONFLUENCE.2019.8776926"},{"issue":"06","key":"90_CR86","first-page":"813","volume":"12","author":"Y Lu","year":"2023","unstructured":"Lu Y. Security and privacy of internet of things: a review of challenges and solutions. J Cyber Secur Mobil. 2023;12(06):813\u201344.","journal-title":"J Cyber Secur Mobil"},{"key":"90_CR87","doi-asserted-by":"crossref","unstructured":"Hameed A, Alomary A. Security issues in IoT: a survey. In\u00a02019 international conference on innovation and intelligence for informatics, computing, and technologies (3ICT), IEEE, 2019. pp. 1\u20135.","DOI":"10.1109\/3ICT.2019.8910320"},{"key":"90_CR88","doi-asserted-by":"publisher","first-page":"106776","DOI":"10.1016\/j.compeleceng.2020.106776","volume":"87","author":"F Al-Turjman","year":"2020","unstructured":"Al-Turjman F, Lemayian JP. Intelligence, security, and vehicular sensor networks in internet of things (IoT)-enabled smart-cities: an overview. Comput Electr Eng. 2020;87:106776.","journal-title":"Comput Electr Eng"},{"issue":"1","key":"90_CR89","first-page":"133","volume":"40","author":"J King","year":"2016","unstructured":"King J, Awad AI. A distributed security mechanism for resource-constrained IoT devices. Informatica. 2016;40(1):133\u201343.","journal-title":"Informatica"},{"key":"90_CR90","doi-asserted-by":"crossref","unstructured":"Tedeschi S, Emmanouilidis C, Farnsworth M, Mehnen J, Roy R. New threats for old manufacturing problems: Secure IoT-Enabled monitoring of legacy production machinery. In\u00a0IFIP International Conference on Advances in Production Management Systems, Springer, Cham; 2017 pp. 391\u2013398..","DOI":"10.1007\/978-3-319-66923-6_46"},{"key":"90_CR91","doi-asserted-by":"crossref","unstructured":"Yen IL, Bastani F, Solanki N, Huang Y, Hwang SY. Trustworthy computing in the dynamic iot cloud. In\u00a02018 IEEE International Conference on Information Reuse and Integration (IRI), IEEE, 2018. pp. 411\u2013418.","DOI":"10.1109\/IRI.2018.00067"},{"key":"90_CR92","doi-asserted-by":"crossref","unstructured":"Mahmoud R, Yousuf T, Aloul F, Zualkernan I. Internet of things (IoT) security: Current status, challenges and prospective measures. In\u00a02015 10th International Conference for Internet Technology and Secured Transactions (ICITST), IEEE, 2015.pp. 336\u2013341.","DOI":"10.1109\/ICITST.2015.7412116"},{"key":"90_CR93","doi-asserted-by":"publisher","first-page":"103387","DOI":"10.1016\/j.cose.2023.103387","volume":"132","author":"B Naqvi","year":"2023","unstructured":"Naqvi B, Perova K, Farooq A, Makhdoom I, Oyedeji S, Porras J. Mitigation strategies against the phishing attacks: a systematic literature review. Comput Secur. 2023;132:103387.","journal-title":"Comput Secur"},{"key":"90_CR94","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1016\/j.jnca.2014.11.011","volume":"49","author":"QM Ashraf","year":"2015","unstructured":"Ashraf QM, Habaebi MH. Autonomic schemes for threat mitigation in Internet of Things. J Netw Comput Appl. 2015;49:112\u201327.","journal-title":"J Netw Comput Appl"},{"key":"90_CR95","doi-asserted-by":"crossref","unstructured":"Markowsky L, Markowsky G. Scanning for vulnerable devices in the Internet of Things. In\u00a02015 IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), IEEE, 2015. vol. 1, pp. 463\u2013467.","DOI":"10.1109\/IDAACS.2015.7340779"},{"issue":"12","key":"90_CR96","doi-asserted-by":"publisher","first-page":"4102","DOI":"10.3390\/app10124102","volume":"10","author":"L Tawalbeh","year":"2020","unstructured":"Tawalbeh L, Muheidat F, Tawalbeh M, Quwaider M. IoT Privacy and security: challenges and solutions. Appl Sci. 2020;10(12):4102.","journal-title":"Appl Sci"},{"key":"90_CR97","doi-asserted-by":"publisher","first-page":"7981","DOI":"10.1109\/ACCESS.2020.2964646","volume":"8","author":"D Yu","year":"2020","unstructured":"Yu D, Zhang L, Chen Y, Ma Y, Chen J. Large-scale IoT devices firmware identification based on weak password. IEEE Access. 2020;8:7981\u201392.","journal-title":"IEEE Access"},{"key":"90_CR98","doi-asserted-by":"crossref","unstructured":"Kraijak S, and P Tuwanut. A survey on IoT architectures, protocols, applications, security, privacy, real-world implementation and future trends. 2015; 6\u20136.","DOI":"10.1049\/cp.2015.0714"},{"issue":"5","key":"90_CR99","doi-asserted-by":"publisher","first-page":"666","DOI":"10.1109\/TETCI.2019.2941757","volume":"4","author":"S Zhao","year":"2020","unstructured":"Zhao S, Li S, Qi L, Da Li X. Computational intelligence enabled cybersecurity for the internet of things. IEEE Trans Emerg Top Comput Intell. 2020;4(5):666\u201374.","journal-title":"IEEE Trans Emerg Top Comput Intell"},{"key":"90_CR100","doi-asserted-by":"crossref","unstructured":"Turk Y. A Self-Organizing management architecture for low powered wireless personal area networks. In\u00a02020 International Conference on Electrical, Communication, and Computer Engineering (ICECCE), IEEE, 2020. pp. 1\u20136.","DOI":"10.1109\/ICECCE49384.2020.9179259"},{"key":"90_CR101","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4053","volume":"33","author":"M Gajewski","year":"2020","unstructured":"Gajewski M, Batalla JM, Mastorakis G, Mavromoustakis CX. Anomaly traffic detection and correlation in Smart Home automation IoT systems. Trans Emerg Telecommun Technol. 2020;33: e4053.","journal-title":"Trans Emerg Telecommun Technol"},{"key":"90_CR102","doi-asserted-by":"publisher","first-page":"102096","DOI":"10.1016\/j.adhoc.2020.102096","volume":"101","author":"ZA Almusaylim","year":"2020","unstructured":"Almusaylim ZA, Alhumam A, Jhanjhi NZ. Proposing a secure RPL based Internet of Things routing protocol: a review. Ad Hoc Netw. 2020;101:102096.","journal-title":"Ad Hoc Netw"},{"issue":"8","key":"90_CR103","doi-asserted-by":"publisher","first-page":"2239","DOI":"10.3390\/s20082239","volume":"20","author":"SS Basu","year":"2020","unstructured":"Basu SS, Haxhibeqiri J, Baert M, Moons B, Karaagac A, Crombez P, Camerlynck P, Hoebeke J. An End-To-End LwM2M-based communication architecture for multimodal NB-IoT\/BLE devices. Sensors. 2020;20(8):2239.","journal-title":"Sensors"},{"key":"90_CR104","doi-asserted-by":"crossref","unstructured":"Yu S, Zhang X, Huang P, Guo L, Cheng L, Wang K. AuthCTC: defending against waveform emulation attack in heterogeneous IoT environments. In\u00a0Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, 2020. pp. 20\u201332.","DOI":"10.1145\/3320269.3384726"},{"issue":"3","key":"90_CR105","doi-asserted-by":"publisher","first-page":"758","DOI":"10.3390\/s20030758","volume":"20","author":"K Gu","year":"2020","unstructured":"Gu K, Zhang WB, Lim SJ, Sharma PK, Al-Makhadmeh Z, Tolba A. Reusable mesh signature scheme for protecting identity privacy of IoT devices. Sensors. 2020;20(3):758.","journal-title":"Sensors"},{"key":"90_CR106","doi-asserted-by":"publisher","first-page":"100306","DOI":"10.1016\/j.iot.2020.100306","volume":"12","author":"F Sadikin","year":"2020","unstructured":"Sadikin F, van Deursen T, Kumar S. A hybrid Zigbee IoT Intrusion detection system using secure and efficient data collection. Internet Things. 2020;12:100306.","journal-title":"Internet Things"},{"key":"90_CR107","doi-asserted-by":"publisher","first-page":"107558","DOI":"10.1016\/j.comnet.2020.107558","volume":"181","author":"M Safkhani","year":"2020","unstructured":"Safkhani M, Rostampour S, Bendavid Y, Bagheri N. IoT in medical & pharmaceutical: designing lightweight RFID security protocols for ensuring supply chain integrity. Comput Netw. 2020;181:107558.","journal-title":"Comput Netw"},{"issue":"6","key":"90_CR108","doi-asserted-by":"publisher","first-page":"1833","DOI":"10.3390\/s18061833","volume":"18","author":"R Sanchez-Iborra","year":"2018","unstructured":"Sanchez-Iborra R, S\u00e1nchez-G\u00f3mez J, P\u00e9rez S, Fern\u00e1ndez PJ, Santa J, Hern\u00e1ndez-Ramos JL, Skarmeta AF. Enhancing lorawan security through a lightweight and authenticated key management approach. Sensors. 2018;18(6):1833.","journal-title":"Sensors"},{"issue":"6","key":"90_CR109","doi-asserted-by":"publisher","first-page":"1888","DOI":"10.3390\/s18061888","volume":"18","author":"I You","year":"2018","unstructured":"You I, Kwon S, Choudhary G, Sharma V, Seo JT. An enhanced LoRaWAN security protocol for privacy preservation in IoT with a case study on a smart factory-enabled parking system. Sensors. 2018;18(6):1888.","journal-title":"Sensors"},{"key":"90_CR110","doi-asserted-by":"crossref","unstructured":"Al-Qaseemi SA, Almulhim HA, Almulhim MF, Chaudhry SR. IoT architecture challenges and issues: lack of standardization. In\u00a02016 Future Technologies Conference (FTC), IEEE. 2016. pp. 731\u2013738","DOI":"10.1109\/FTC.2016.7821686"},{"issue":"13","key":"90_CR111","doi-asserted-by":"publisher","first-page":"3625","DOI":"10.3390\/s20133625","volume":"20","author":"H Mrabet","year":"2020","unstructured":"Mrabet H, Belguith S, Alhomoud A, Jemai A. A survey of IoT security based on a layered architecture of sensing and data analysis. Sensors. 2020;20(13):3625.","journal-title":"Sensors"},{"key":"90_CR112","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1016\/j.cose.2017.05.012","volume":"70","author":"M Mohsin","year":"2017","unstructured":"Mohsin M, Anwar Z, Zaman F, Al-Shaer E. IoTChecker: a data-driven framework for security analytics of Internet of Things configurations. Comput Secur. 2017;70:199\u2013223.","journal-title":"Comput Secur"},{"issue":"10","key":"90_CR113","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3681","volume":"30","author":"F Marino","year":"2019","unstructured":"Marino F, Moiso C, Petracca M. PKIoT: a public key infrastructure for the Internet of Things. Trans Emerg Telecommun Technol. 2019;30(10): e3681.","journal-title":"Trans Emerg Telecommun Technol"},{"key":"90_CR114","doi-asserted-by":"publisher","first-page":"45325","DOI":"10.1109\/ACCESS.2018.2852563","volume":"6","author":"K-L Tsai","year":"2018","unstructured":"Tsai K-L, Huang Y-L, Leu F-Y, You I, Huang Y-L, Tsai C-H. AES-128 based secure low power communication for LoRaWAN IoT environments. IEEE Access. 2018;6:45325\u201334.","journal-title":"IEEE Access"},{"key":"90_CR115","doi-asserted-by":"publisher","first-page":"3554","DOI":"10.1016\/j.matpr.2021.07.295","volume":"80","author":"S Rekha","year":"2023","unstructured":"Rekha S, Thirupathi L, Renikunta S, Gangula R. Study of security issues and solutions in Internet of Things (IoT). Mater Today Proc. 2023;80:3554\u20139.","journal-title":"Mater Today Proc"},{"issue":"3","key":"90_CR116","doi-asserted-by":"publisher","first-page":"1085","DOI":"10.1007\/s11227-016-1849-x","volume":"73","author":"A Tewari","year":"2017","unstructured":"Tewari A, Gupta BB. Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags. J Supercomput. 2017;73(3):1085\u2013102.","journal-title":"J Supercomput"},{"key":"90_CR117","doi-asserted-by":"publisher","DOI":"10.1002\/dac.4443","volume":"33","author":"A Srivastava","year":"2020","unstructured":"Srivastava A, Gupta S, Quamara M, Chaudhary P, Aski VJ. Future IoT-enabled threats and vulnerabilities: state of the art, challenges, and future prospects. Int J Commun Syst. 2020;33: e4443.","journal-title":"Int J Commun Syst"},{"issue":"4","key":"90_CR118","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.6662","volume":"34","author":"M Waqas","year":"2022","unstructured":"Waqas M, Kumar K, Laghari AA, Saeed U, Rind MM, Shaikh AA, Hussain F, Rai A, Qazi AQ. Botnet attack detection in Internet of Things devices over cloud environment via machine learning. Concurr Comput Pract Exp. 2022;34(4): e6662.","journal-title":"Concurr Comput Pract Exp"},{"key":"90_CR119","doi-asserted-by":"publisher","first-page":"44879","DOI":"10.1109\/ACCESS.2023.3272899","volume":"11","author":"G Solomon","year":"2023","unstructured":"Solomon G, Zhang P, Brooks R, Liu Y. A secure and cost-efficient blockchain facilitated IoT software update framework. IEEE Access. 2023;11:44879\u201394.","journal-title":"IEEE Access"},{"key":"90_CR120","doi-asserted-by":"publisher","first-page":"11224","DOI":"10.1109\/JIOT.2023.3252594","volume":"10","author":"YR Siwakoti","year":"2023","unstructured":"Siwakoti YR, Bhurtel M, Rawat DB, Oest A, Johnson RC. Advances in IoT security: vulnerabilities, enabled criminal services, attacks and countermeasures. IEEE Internet Things J. 2023;10:11224\u201339.","journal-title":"IEEE Internet Things J"},{"key":"90_CR121","doi-asserted-by":"crossref","unstructured":"Narwani K, Liaquat F, Laghari AA, Awais Khan Jumani, Junaid Jamshed, and Muhammad Ibrar. Design and Implementation of an Internet of Things-Based Real-Time Five-Layer Security Surveillance System. International Conference on Artificial Intelligence and Communication Technology, Singapore: Springer Nature Singapore, 2023. pp. 307\u2013323.","DOI":"10.1007\/978-981-99-6641-7_26"},{"issue":"3","key":"90_CR122","doi-asserted-by":"publisher","first-page":"677","DOI":"10.3390\/electronics12030677","volume":"12","author":"AA Laghari","year":"2023","unstructured":"Laghari AA, Khan AA, Alkanhel R, Elmannai H, Bourouis S. Lightweight-biov: blockchain distributed ledger technology (bdlt) for internet of vehicles (iovs). Electronics. 2023;12(3):677.","journal-title":"Electronics"}],"container-title":["Discover Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-024-00090-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s43926-024-00090-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-024-00090-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,24]],"date-time":"2024-12-24T15:09:50Z","timestamp":1735052990000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s43926-024-00090-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,24]]},"references-count":122,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,12]]}},"alternative-id":["90"],"URL":"https:\/\/doi.org\/10.1007\/s43926-024-00090-5","relation":{},"ISSN":["2730-7239"],"issn-type":[{"value":"2730-7239","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,24]]},"assertion":[{"value":"8 August 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 December 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 December 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"36"}}