{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T12:51:23Z","timestamp":1776775883196,"version":"3.51.2"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T00:00:00Z","timestamp":1776729600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T00:00:00Z","timestamp":1776729600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Internet Things"],"DOI":"10.1007\/s43926-025-00269-4","type":"journal-article","created":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T11:54:10Z","timestamp":1776772450000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A prototype for updating the \u201cthings\u201d in IoT: framework for cybersecurity implementation"],"prefix":"10.1007","volume":"6","author":[{"given":"Wael","family":"Al-Thohli","sequence":"first","affiliation":[]},{"given":"Ramalingam","family":"Dharmalingam","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,4,21]]},"reference":[{"key":"269_CR1","doi-asserted-by":"publisher","unstructured":"Ahmed, I., Ahmad, A., & Jeon, G. (2020). An IoT-Based Deep Learning Frame-work for Early Assessment of Covid-19. IEEE Internet of Things Journal. https:\/\/doi.org\/10.1109\/JIOT.2020.3034074","DOI":"10.1109\/JIOT.2020.3034074"},{"key":"269_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.103331","author":"M Achir","year":"2022","unstructured":"Achir M, Abdelli A, Mokdad L, Ben-Othman J, Ben J, Benothman J. Service discovery and selection in iot: a survey and a taxonomy. J Netw Comput Appl. 2022. https:\/\/doi.org\/10.1016\/j.jnca.2021.103331.","journal-title":"J Netw Comput Appl"},{"key":"269_CR3","doi-asserted-by":"publisher","DOI":"10.1145\/3703444","author":"AN Alsheavi","year":"2025","unstructured":"Alsheavi AN, Hawbani A, Othman W, Wang X, Qaid G, Zhao L, AlDubai A, Zhi L, Ismail AS, Jhaveri R, Alsamhi S, Al-Qaness MAA. IoT authentication protocols: challenges and comparative analysis. ACM-CSUR. 2025;57(5). https:\/\/doi.org\/10.1145\/3703444.","journal-title":"ACM-CSUR"},{"key":"269_CR4","unstructured":"Casagrande M, Cestaro R, Losiouk E, Conti M, Antonioli D. (2024). E-Trojans: Ransomware, tracking, DoS, and data leaks on battery-powered embedded systems. arXiv [Preprint]. Available from:\u00a0https:\/\/arxiv.org\/pdf\/2411.17184"},{"key":"269_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclepro.2021.126908","volume":"301","author":"W Choi","year":"2021","unstructured":"Choi W, Kim J, Lee SE, Park E. Smart home and Internet of Things: a bibliometric study. J Clean Prod. 2021;301:126908. https:\/\/doi.org\/10.1016\/j.jclepro.2021.126908.","journal-title":"J Clean Prod"},{"issue":"1","key":"269_CR6","doi-asserted-by":"publisher","first-page":"30","DOI":"10.3390\/fi17010030","volume":"17","author":"E Dritsas","year":"2025","unstructured":"Dritsas E, Trigka M. A survey on cybersecurity in IoT. Future Internet. 2025;17(1):30. https:\/\/doi.org\/10.3390\/fi17010030.","journal-title":"Future Internet"},{"issue":"3","key":"269_CR7","doi-asserted-by":"publisher","first-page":"1583","DOI":"10.1007\/s10207-023-00806-8","volume":"23","author":"E Ebrahimpour","year":"2024","unstructured":"Ebrahimpour E, Babaie S. Authentication in internet of things: protocols, attacks, and open issues\u2014a systematic literature review. Int J Inf Secur. 2024;23(3):1583\u2013602. https:\/\/doi.org\/10.1007\/s10207-023-00806-8.","journal-title":"Int J Inf Secur"},{"key":"269_CR8","doi-asserted-by":"publisher","unstructured":"El Jaouhari S. (2022). Toward secure firmware OTA updates for constrained IoT devices. In Proceedings of the 8th IEEE International Smart Cities Conference (ISC2 2022). https:\/\/doi.org\/10.1109\/ISC255366.2022.9922087","DOI":"10.1109\/ISC255366.2022.9922087"},{"key":"269_CR9","doi-asserted-by":"crossref","unstructured":"ElSayed Z, Abdelgawad A, Elsayed N. (2025). Cybersecurity and frequent cyber attacks on IoT devices in healthcare: Issues and solutions. arXiv [Preprint]. Available from:\u00a0https:\/\/arxiv.org\/pdf\/2501.11250","DOI":"10.1109\/ICMI65310.2025.11141075"},{"key":"269_CR10","doi-asserted-by":"publisher","first-page":"69765","DOI":"10.1109\/ACCESS.2024.3378592","volume":"12","author":"NTY Huan","year":"2024","unstructured":"Huan NTY, Zukarnain ZA. A survey on addressing IoT security issues by embedding blockchain technology solutions: review, attacks, current trends, and applications. IEEE Access. 2024;12:69765\u201382. https:\/\/doi.org\/10.1109\/ACCESS.2024.3378592.","journal-title":"IEEE Access"},{"key":"269_CR11","doi-asserted-by":"publisher","unstructured":"Jara AJ, Martinez IC, Sanchez JS. (2024). Cybersecurity Resilience Act (CRA) in practice for IoT devices: Getting ready for the NIS2. In Proceedings of the 2024 IEEE Smart Cities Futures Summit (SCFC 2024) p. 56\u201360. https:\/\/doi.org\/10.1109\/SCFC62024.2024.10698057","DOI":"10.1109\/SCFC62024.2024.10698057"},{"issue":"2","key":"269_CR12","doi-asserted-by":"publisher","first-page":"901","DOI":"10.1109\/JIOT.2020.3009228","volume":"8","author":"X Jiang","year":"2021","unstructured":"Jiang X, Zhang H, Barsallo Yi EA, Raghunathan N, Mousoulis C, Chaterji S, Peroulis D, Shakouri A, Bagchi S. Hybrid low-power wide-area mesh network for IoT applications. IEEE Internet Things J. 2021;8(2):901\u201315. https:\/\/doi.org\/10.1109\/JIOT.2020.3009228.","journal-title":"IEEE Internet Things J"},{"key":"269_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.techsoc.2020.101454","volume":"64","author":"LM Kipper","year":"2021","unstructured":"Kipper LM, Iepsen S, Dal Forno AJ, Frozza R, Furstenau L, Agnes J, et al. Scientific mapping to identify competencies required by Industry 4.0. Technol Soc. 2021;64:101454. https:\/\/doi.org\/10.1016\/j.techsoc.2020.101454.","journal-title":"Technol Soc"},{"issue":"5","key":"269_CR14","doi-asserted-by":"publisher","first-page":"1985","DOI":"10.12694\/SCPE.V26I5.4748","volume":"26","author":"N Mahadev","year":"2025","unstructured":"Mahadev N, L SV, R S, Premkumar A, Salim S, Natarajan R. Enhancing scalable user experience in smart home systems with ubiquitous virtual reality interfaces. Scalable Comput Pract Exp. 2025;26(5):1985\u20132001. https:\/\/doi.org\/10.12694\/SCPE.V26I5.4748.","journal-title":"Scalable Comput Pract Exp"},{"key":"269_CR15","doi-asserted-by":"publisher","DOI":"10.22214\/ijraset.2021.33013","author":"R Maurya","year":"2021","unstructured":"Maurya R, Nambiar KA, Babbe P, Kalokhe JP, Ingle YS, Shaikh NF. Application of RESTful APIs in IoT: a review. Int J Res Appl Sci Eng Technol. 2021. https:\/\/doi.org\/10.22214\/ijraset.2021.33013.","journal-title":"Int J Res Appl Sci Eng Technol"},{"key":"269_CR16","doi-asserted-by":"publisher","first-page":"41757","DOI":"10.1109\/ACCESS.2021.3065123","volume":"9","author":"N Mazhar","year":"2021","unstructured":"Mazhar N, Salleh R, Zeeshan M, Hameed MM. Role of device identification and manufacturer usage description in IoT security: a survey. IEEE Access. 2021;9:41757\u201386. https:\/\/doi.org\/10.1109\/ACCESS.2021.3065123.","journal-title":"IEEE Access"},{"issue":"3","key":"269_CR17","doi-asserted-by":"publisher","first-page":"968","DOI":"10.3390\/s24030968","volume":"24","author":"TM Mengistu","year":"2024","unstructured":"Mengistu TM, Kim T, Lin JW. A survey on heterogeneity taxonomy, security, and privacy preservation in the integration of IoT, wireless sensor networks, and federated learning. Sensors. 2024;24(3):968. https:\/\/doi.org\/10.3390\/s24030968.","journal-title":"Sensors"},{"issue":"4","key":"269_CR18","doi-asserted-by":"publisher","first-page":"50","DOI":"10.3390\/technologies8040050","volume":"8","author":"A Overmars","year":"2020","unstructured":"Overmars A, Venkatraman S. Towards a secure and scalable IoT infrastructure: a pilot deployment for a smart water monitoring system. Technologies. 2020;8(4):50. https:\/\/doi.org\/10.3390\/technologies8040050.","journal-title":"Technologies"},{"issue":"16","key":"269_CR19","doi-asserted-by":"publisher","first-page":"5124","DOI":"10.3390\/s25165124","volume":"25","author":"IC Panagou","year":"2025","unstructured":"Panagou IC, Katsoulis S, Nannos E, Zantalis F, Koulouras G. A comprehensive evaluation of IoT cloud platforms: a feature-driven review with a decision-making tool. Sensors. 2025;25(16):5124. https:\/\/doi.org\/10.3390\/s25165124.","journal-title":"Sensors"},{"issue":"2","key":"269_CR20","doi-asserted-by":"publisher","first-page":"590","DOI":"10.3390\/s24020590","volume":"24","author":"L Patrono","year":"2024","unstructured":"Patrono L, Almeida A, Distante C, Atzori L, Canavese D, Mannella L, Regano L, Basile C. Security at the edge for resource-limited IoT devices. Sensors. 2024;24(2):590. https:\/\/doi.org\/10.3390\/s24020590.","journal-title":"Sensors"},{"key":"269_CR21","doi-asserted-by":"publisher","unstructured":"Sun C, Xing R, Wu Y, Zhou G, Zheng F, Hu D. (2021). Design of over-the-air firmware update and management for IoT devices with cloud-based RESTful web services. In Proceedings of the 2021 China Automation Congress (CAC 2021) p. 5081\u20135085. https:\/\/doi.org\/10.1109\/CAC53003.2021.9727516","DOI":"10.1109\/CAC53003.2021.9727516"},{"key":"269_CR22","doi-asserted-by":"publisher","unstructured":"Yohan, A., & Lo, N.-W. (2020). FOTB: A secure blockchain-based firmware update framework for IoT environment. International Journal of Information Security, 19(3), 257\u2013278. https:\/\/doi.org\/10.1007\/s10207-019-00467-6","DOI":"10.1007\/s10207-019-00467-6"},{"issue":"3","key":"269_CR23","doi-asserted-by":"publisher","first-page":"1939","DOI":"10.1007\/s11276023-03598-w","volume":"30","author":"DA Zainaddin","year":"2024","unstructured":"Zainaddin DA, Hanapi ZM, Othman M, Zukarnain ZA, Abdullah MDH. Recent trends and future directions of congestion management strategies for routing in IoT-based wireless sensor networks: a thematic review. Wirel Netw. 2024;30(3):1939\u201383. https:\/\/doi.org\/10.1007\/s11276023-03598-w.","journal-title":"Wirel Netw"}],"container-title":["Discover Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00269-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s43926-025-00269-4","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00269-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T11:54:14Z","timestamp":1776772454000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s43926-025-00269-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,4,21]]},"references-count":23,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,12]]}},"alternative-id":["269"],"URL":"https:\/\/doi.org\/10.1007\/s43926-025-00269-4","relation":{},"ISSN":["2730-7239"],"issn-type":[{"value":"2730-7239","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,4,21]]},"assertion":[{"value":"2 April 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 December 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 April 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This study was reviewed and approved by the Research Committee, Majan University College, Muscat, Oman. Ethical approval was granted based on the ethical clearance form submitted as part of the institutional review process. All procedures in this research were conducted in accordance with the ethical and biosafety requirements of Majan University College and followed the guidelines outlined in the Springer Ethical and Biosecurity Policy.\u00a0Informed, voluntary consent to participate was obtained from all individuals prior to their inclusion in the study. Participants were informed about the purpose of the research, the procedures involved, confidentiality measures, and their right to withdraw at any stage without any consequences. As the study did not involve minors, parental or guardian consent was not required.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"50"}}