{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T19:40:19Z","timestamp":1772912419698,"version":"3.50.1"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2023,7,21]],"date-time":"2023-07-21T00:00:00Z","timestamp":1689897600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,7,21]],"date-time":"2023-07-21T00:00:00Z","timestamp":1689897600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Netw Syst Manage"],"published-print":{"date-parts":[[2023,10]]},"DOI":"10.1007\/s10922-023-09754-z","type":"journal-article","created":{"date-parts":[[2023,7,21]],"date-time":"2023-07-21T05:01:49Z","timestamp":1689915709000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Security Evaluation of Authentication Requirements in IoT Gateways"],"prefix":"10.1007","volume":"31","author":[{"given":"Diego R.","family":"Gomes","sequence":"first","affiliation":[]},{"given":"Fernando A. Aires","family":"Lins","sequence":"additional","affiliation":[]},{"given":"Obionor O.","family":"N\u00f3brega","sequence":"additional","affiliation":[]},{"given":"Eduardo F.","family":"Felix","sequence":"additional","affiliation":[]},{"given":"Bruno A.","family":"Jesus","sequence":"additional","affiliation":[]},{"given":"Marco","family":"Vieira","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,21]]},"reference":[{"key":"9754_CR1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2947723","volume":"7","author":"T Nandy","year":"2019","unstructured":"Nandy, T., Idris, M.Y.I.B., Noor, R.M., Kiah, L.M., Lun, L.S., Juma\u2019at, N.B.A., Ahmedy, I., Ghani, N.A., Bhattacharyya, S.: Review on security of internet of things authentication mechanism. IEEE Access 7, 151054 (2019)","journal-title":"IEEE Access"},{"issue":"11","key":"9754_CR2","doi-asserted-by":"publisher","first-page":"8667","DOI":"10.1109\/JIOT.2020.3041049","volume":"8","author":"FAA Lins","year":"2020","unstructured":"Lins, F.A.A., Vieira, M.: Security requirements and solutions for iot gateways: A comprehensive study. IEEE Internet Things J. 8(11), 8667 (2020)","journal-title":"IEEE Internet of Things Journal"},{"key":"9754_CR3","unstructured":"AT &T. Intelligent Business. https:\/\/www.business.att.com\/learn\/research-reports\/att-intelligent-business-report.html (2021). Accessed 3 Sept 2021"},{"key":"9754_CR4","unstructured":"IoT Security Foundation. Secure Design Best Practice Guides\u2014Release v2. https:\/\/www.iotsecurityfoundation.org\/wp-content\/uploads\/2019\/12\/Best-Practice-Guides-Release-2_Digitalv3.pdf (2019). Accessed 14 July 2022"},{"issue":"1","key":"9754_CR5","doi-asserted-by":"publisher","first-page":"317","DOI":"10.25046\/aj040131","volume":"4","author":"S Narayanaswamy","year":"2019","unstructured":"Narayanaswamy, S., Kumar, A.V.: Application layer security authentication protocols for the internet of things: a survey. Adv. Sci. Technol. Eng. Syst. J. 4(1), 317 (2019)","journal-title":"Adv Sci Technol Eng Syst J"},{"key":"9754_CR6","doi-asserted-by":"crossref","unstructured":"Prathibha, L., Fatima, K.: 2018 Second International Conference on Intelligent Computing and Control Systems (ICICCS), pp. 673\u2013678. IEEE, New York (2018)","DOI":"10.1109\/ICCONS.2018.8663111"},{"key":"9754_CR7","unstructured":"IoTSF IoT Security Compliance Framework Release 2.1 May 2020. https:\/\/www.iotsecurityfoundation.org\/tag\/release-2-1\/. Accessed 14 July 2022"},{"key":"9754_CR8","unstructured":"OWASP IoT Security Verification Standard. https:\/\/owasp.org\/www-pdf-archive\/OWASP-IoT-Top-10-2018-final.pdf. Accessed 16 May 2021"},{"key":"9754_CR9","unstructured":"v2 Authentication verification requirements\u2014OWASP Annotated Application Security Verification Standard 3.0.0 documentation. https:\/\/owasp-aasvs.readthedocs.io\/en\/latest\/v2.html. Accessed 16 May 2021"},{"key":"9754_CR10","unstructured":"ENISA, E.: European Union Agency for Cybersecurity Heraklion, Greece (2017)"},{"key":"9754_CR11","unstructured":"IoT Security & Privacy Trust Framework. https:\/\/internetsociety.org\/wp-content\/uploads\/2018\/05\/iot_trust_framework2.5a_EN.pdf. Accessed 6 June 2021"},{"key":"9754_CR12","unstructured":"Cyber Security for Consumer Internet of Things\u2014Baseline Requirements 2020. https:\/\/etsi.org\/deliver\/etsi_en\/303600_303699\/303645\/02.01.00_30\/en_303645v020100v.pdf. Accessed 7 June 2021"},{"key":"9754_CR13","unstructured":"CSA IoT Security Controls Framework Version 2. https:\/\/cloudsecurityalliance.org\/artifacts\/csa-iot-security-controls-framework-v2\/. Accessed 6 June 2021"},{"key":"9754_CR14","unstructured":"GSMA IoT Security Assessment Checklist https:\/\/gsma.com\/security\/resources\/clp-17-gsma-iot-security-assessment-checklist-v3-0\/. Accessed 8 Apr 2021"},{"key":"9754_CR15","doi-asserted-by":"crossref","unstructured":"Donzia, S.K.Y., Kim, H.K., Hwang, H.J.: International Conference on Computational Science\/Intelligence and Applied Informatics, pp. 49\u201358. Springer, Heidelberg (2018)","DOI":"10.1007\/978-3-319-96806-3_4"},{"key":"9754_CR16","doi-asserted-by":"crossref","unstructured":"Dickel, H., Podolskiy, V., Gerndt, M.: 2019 IEEE 12th Conference on Service-Oriented Computing and Applications (SOCA), pp. 17\u201324. IEEE, New York (2019)","DOI":"10.1109\/SOCA.2019.00011"},{"key":"9754_CR17","unstructured":"Poess, M., Nambiar, R., Kulkarni, K., Narasimhadevara, C., Rabl, T., Jacobsen, H.A.: 2018 IEEE 34th International Conference on Data Engineering (ICDE), pp. 1519\u20131530. IEEE, New York (2018)"},{"key":"9754_CR18","doi-asserted-by":"crossref","unstructured":"Ali, O., Ishak, M.K., Wuttisittikulkij, L., Maung, T.Z.B.: 2020 International Conference on Electronics, Information, and Communication (ICEIC), pp. 1\u20135. IEEE, New York (2020)","DOI":"10.1109\/ICEIC49074.2020.9051037"},{"key":"9754_CR19","doi-asserted-by":"crossref","unstructured":"M.\u00a0Qui\u00f1ones-Cuenca, H.P. Pachar\u00a0Bravo, J.\u00a0Mart\u00ednez-Curipoma, L.\u00a0Qui\u00f1ones, R.\u00a0Torres: Desarrollo y evaluaci\u00f3n de un gateway m\u00f3vil IoT para redes 4G LTE. Enfoque UTE 11(4), 16 (2020)","DOI":"10.29019\/enfoqueute.v11n4.634"},{"issue":"3","key":"9754_CR20","first-page":"1520","volume":"18","author":"M Imdad","year":"2020","unstructured":"Imdad, M., Jacob, D.W., Mahdin, H., Baharum, Z., Shaharudin, S.M., Azmi, M.S.: Internet of things (IoT); security requirements, attacks and counter measures. Indones. J. Electr. Eng. Comput. Sci. 18(3), 1520 (2020)","journal-title":"Science"},{"key":"9754_CR21","unstructured":"Hansch, G., Schneider, P., Fischer, K., B\u00f6ttinger, K.: In 2019 24th ieee international conference on emerging technologies and factory automation (etfa), pp. 325\u2013332. IEEE, New York (2019)"},{"key":"9754_CR22","unstructured":"Ankele, R., Marksteiner, S., Nahrgang, K., Vallant, H.: Proceedings of the 14th International Conference on Availability, Reliability and Security, pp. 1\u20138. ACM, New York (2019)"},{"issue":"13","key":"9754_CR23","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5219","volume":"32","author":"P Papcun","year":"2020","unstructured":"Papcun, P., Kajati, E., Cupkova, D., Mocnej, J., Miskuf, M., Zolotova, I.: Edge\u2010enabled IoT gateway criteria selection and evaluation. Concurr. Comput. Pract. Exp. 32(13), e5219 (2020)","journal-title":"Concurrency and Computation: Practice and Experience"},{"key":"9754_CR24","doi-asserted-by":"crossref","unstructured":"Kamalrudin, M., Ibrahim, A.A., Sidek, S.: Asia Pacific Requirements Engineering Conference, pp. 87\u201396. Springer, Cham (2017)","DOI":"10.1007\/978-981-10-7796-8_7"},{"key":"9754_CR25","first-page":"342","volume":"8","author":"VR Kebande","year":"2018","unstructured":"Kebande, V.R., Menza, N.K., Venter, H.S.: Digital forensic readiness framework for smart homes. Int. J. Adv. Sci. Eng. Info. Technol. 8, 342 (2018)","journal-title":"Engineering and Information Technology"},{"key":"9754_CR26","unstructured":"Ali, W., Dustgeer, G., Awais, M., Shah, M.A.: 2017 23rd International Conference on Automation and Computing (ICAC), pp. 1\u20136. IEEE, New York (2017)"},{"key":"9754_CR27","unstructured":"Oh, S.R., Kim, Y.G.: 2017 International Conference on Platform Technology and Service (PlatCon), pp. 1\u20136. IEEE, New York (2017)"},{"key":"9754_CR28","doi-asserted-by":"crossref","unstructured":"Jaiswal, S., Gupta, D.: Proceedings of International Conference on Communication and Networks, pp. 419\u2013427. Springer, Cahm (2017)","DOI":"10.1007\/978-981-10-2750-5_44"},{"key":"9754_CR29","unstructured":"Rodriguez, J.D.P., Schreckling, D., Posegga, J.: 2016 International Workshop on Secure Internet of Things (SIoT), pp. 1\u201310. IEEE, New York (2016)"},{"key":"9754_CR30","doi-asserted-by":"publisher","unstructured":"Zbo\u0159il, J., Huj\u0148\u00e1k, O., Malinka, K.: 2023 International Conference on Information Networking (ICOIN). IEEE, New York (2023). https:\/\/doi.org\/10.1109\/icoin56518.2023.10049047","DOI":"10.1109\/icoin56518.2023.10049047"},{"key":"9754_CR31","unstructured":"Amar, Y., Haddadi, H., Mortier, R., Brown, A., Colley, J.A., Crabtree, A.: An analysis of home IoT network traffic and behaviour. Preprint at https:\/\/arxiv.org\/abs\/1803.05368 (2018)"},{"key":"9754_CR32","doi-asserted-by":"crossref","unstructured":"Mukalazi, A., Boyac\u0131, A.: 2022 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), pp. 1\u20138. (2022)","DOI":"10.1109\/HORA55278.2022.9800035"},{"key":"9754_CR33","doi-asserted-by":"publisher","unstructured":"Felix, E.F., Lins, F.A.A., N\u00f3brega, O.O., Gomes, D.R., Jesus, B.A., Vieira, M.: Proceedings of the 11th Latin-American Symposium on Dependable Computing. ACM, New York (2022). https:\/\/doi.org\/10.1145\/3569902.3569915","DOI":"10.1145\/3569902.3569915"},{"key":"9754_CR34","doi-asserted-by":"publisher","unstructured":"Zuway, M.A.E., Farkash, H.M.: 2022 IEEE 21st International Conference on Sciences and Techniques of Automatic Control and Computer Engineering (STA)). IEEE, New York (2022). https:\/\/doi.org\/10.1109\/sta56120.2022.10019124","DOI":"10.1109\/sta56120.2022.10019124"},{"key":"9754_CR35","unstructured":"Top 10 Web Application Security Risks. https:\/\/owasp.org\/www-project-top-ten\/. Accessed 11 May 2023"},{"key":"9754_CR36","unstructured":"OWASP\u00aeZed Attack Proxy (ZAP). https:\/\/www.zaproxy.org\/. Accessed 11 May 2023"},{"key":"9754_CR37","unstructured":"OMG: Business Process Model and Notation (BPMN), Version 2.0 (2011). http:\/\/www.omg.org\/spec\/BPMN\/2.0"},{"key":"9754_CR38","unstructured":"Eclipse Kura Documentation. http:\/\/eclipse.github.io\/kura\/. Accessed 27 Mar 2021"},{"key":"9754_CR39","unstructured":"ThingsBoard IoT Gateway Documentation. https:\/\/thingsboard.io\/docs\/iot-gateway\/. Accessed 21 Mar 2021"},{"key":"9754_CR40","unstructured":"WebIOPi Gateway Documentation. http:\/\/webiopi.trouch.com\/. Accessed 21 Mar 2021"},{"key":"9754_CR41","unstructured":"WebThings Documentation. https:\/\/webthings.io\/docs\/. Accessed 20 Mar 2021"}],"container-title":["Journal of Network and Systems Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-023-09754-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10922-023-09754-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-023-09754-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,24]],"date-time":"2024-10-24T19:22:32Z","timestamp":1729797752000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10922-023-09754-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,21]]},"references-count":41,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,10]]}},"alternative-id":["9754"],"URL":"https:\/\/doi.org\/10.1007\/s10922-023-09754-z","relation":{},"ISSN":["1064-7570","1573-7705"],"issn-type":[{"value":"1064-7570","type":"print"},{"value":"1573-7705","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,7,21]]},"assertion":[{"value":"3 September 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 May 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 June 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 July 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no relevant financial or non-financial interests to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not Applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"The authors also inform that no human participants or animals were involved in the research.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Research Involving in Human and Animal Participants"}}],"article-number":"67"}}