{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T10:08:53Z","timestamp":1771063733462,"version":"3.50.1"},"reference-count":142,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.3006358","type":"journal-article","created":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T21:11:26Z","timestamp":1593637886000},"page":"120331-120350","source":"Crossref","is-referenced-by-count":127,"title":["Security Analysis of IoT Devices by Using Mobile Computing: A Systematic Literature Review"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4754-178X","authenticated-orcid":false,"given":"Bin","family":"Liao","sequence":"first","affiliation":[]},{"given":"Yasir","family":"Ali","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0126-9944","authenticated-orcid":false,"given":"Shah","family":"Nazir","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0861-2672","authenticated-orcid":false,"given":"Long","family":"He","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8373-2781","authenticated-orcid":false,"given":"Habib Ullah","family":"Khan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3264437.3264438"},{"key":"ref38","first-page":"785","article-title":"Security study of different threats in Internet of Things","author":"sahmi","year":"2018","journal-title":"Proc 3rd Int Conf Smart City Appl"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-77028-4_16"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/IConAC.2016.7604979"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2799522"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2877174"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-04372-8_8"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-72395-2_54"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3139937.3139938"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-49622-1_8"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2935189"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2015.7405513"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2600569"},{"key":"ref20","first-page":"27","article-title":"Internet of Things security issues and their solutions with blockchain technology characteristics: A systematic literature review","volume":"6","author":"sultan","year":"2018","journal-title":"American Journal of Computer Science and Technology"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/SERVICES.2015.12"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/PlatCon.2017.7883727"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2017.11.002"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.11.022"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.02.003"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.04.027"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-3700-7_1"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2019.101068"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.proeng.2012.08.234"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.07.003"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-0281-6_42"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1002\/sec.398"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/MobServ.2014.24"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/S1005-8885(13)60219-8"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2013.04.014"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.12.018"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2013.09.059"},{"key":"ref52","first-page":"726","article-title":"A security and privacy model for mobile RFID systems in the Internet of Things","author":"zhu","year":"2012","journal-title":"Proc IEEE 14th Int Conf Commun Technol"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-019-03718-9"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/4296934"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/s17071482"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2014.137"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ECAI.2017.8166453"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICIICII.2016.0069"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/2071639.2071656"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.5772\/intechopen.75190"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2018.3011051"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.nedt.2012.02.022"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2017.03.013"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/S1005-8885(10)60159-8"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1111\/0023-8333.00136"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2006.07.009"},{"key":"ref41","article-title":"Guidelines for performing systematic literature reviews in software engineering","author":"kitchenham","year":"2007"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/2601248.2601268"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2014.02.001"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1145\/3330431.3330457"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329849"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1145\/3301293.3302356"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2019.101989"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1145\/2906388.2906409"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1145\/2973750.2973778"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/2995289.2995298"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2019.8767250"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2016.03.003"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1145\/3322645.3322659"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1080\/07366981.2016.1181416"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2913438"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-69155-8_5"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1145\/2968456.2974008"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.1600492CM"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/5452870"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/6452157"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2019.8730887"},{"key":"ref78","first-page":"3","article-title":"Security and privacy in the IoT","author":"bertino","year":"2017","journal-title":"Proc Int Conf Inf Security Cryptol"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2019.1800229"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.08.050"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1080\/09720529.2019.1642628"},{"key":"ref135","first-page":"306","article-title":"An efficient approach for enhancing security in Internet of Things using the optimum authentication key","volume":"42","author":"kalyani","year":"2019","journal-title":"Int J Comput Appl"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA.2018.8612856"},{"key":"ref137","first-page":"1","article-title":"Research issues and challenges for multiple digital signatures","volume":"1","author":"hwang","year":"2005","journal-title":"IJ Network Security"},{"key":"ref60","first-page":"16","article-title":"Controlled Android application execution for the IoT infrastructure","author":"johnstone","year":"2015","journal-title":"International Internet of Things Summit"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/SIoT.2014.10"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1016\/j.bushor.2015.03.008"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26005-1_21"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/2846661.2846667"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/2846661.2846664"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2015.7347956"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2013.6673419"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCE.2015.119"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.3390\/fi9030027"},{"key":"ref67","first-page":"158","article-title":"Apps for environments: Running interoperable apps in smart environments with the meSchup IoT platform","author":"kubitza","year":"2016","journal-title":"International Workshop on Interoperability and Open-Source Solutions"},{"key":"ref142","article-title":"Understanding IoT security through the data crystal ball: Where we are now and where we are going to be","author":"zhang","year":"2017","journal-title":"arXiv 1703 09809"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-016-0573-x"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-017-0564-6"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-016-0513-6"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3284557.3284560"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1145\/3183440.3195101"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.11.007"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1145\/3215466.3215469"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.07.013"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243841"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2017.8004891"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-017-1084-3"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2016.10.012"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.09.032"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/IranianCEE.2017.7985436"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1016\/j.aci.2018.10.002"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/DSC.2017.13"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.10.021"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.06.053"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2018.8449780"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/ICRITO.2018.8748523"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2874808"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1007\/s41635-017-0029-7"},{"key":"ref99","first-page":"21","article-title":"Research on Internet of Things vulnerability based on complex network attack model","author":"liu","year":"2018","journal-title":"Proc Int Conf Space Inf Netw"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-97271-8_4"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-018-5856-5"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/I-SMAC.2018.8653728"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICEDSA.2016.7818534"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1080\/23742917.2018.1474592"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1186\/s13673-019-0183-8"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1504\/IJWS.2019.102208"},{"key":"ref15","first-page":"40","article-title":"A systematic literature review on the security challenges of Internet of Things and their classification","volume":"5","author":"fazal","year":"2017","journal-title":"International Journal of Research and Technology"},{"key":"ref118","first-page":"328","article-title":"Identification of remote IoT users using sensor data analytics","author":"batool","year":"2019","journal-title":"Proc Future Inf Commun Conf"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1145\/3055245.3055255"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2019.100050"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2861405"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JCN.2019.000048"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1145\/3139937.3139944"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1080\/02564602.2017.1414387"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CIMPS.2016.7802809"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93491-4_1"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/TEL-NET.2017.8343548"},{"key":"ref19","first-page":"25","article-title":"IOT and security-privacy concerns: A systematic mapping study","volume":"10","author":"witti","year":"2018","journal-title":"Int J Netw Security Appl"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2848099"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/WINCOM.2018.8629767"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.20"},{"key":"ref80","author":"li","year":"2017","journal-title":"Securing the Internet of Things"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/3029638"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-18732-3_8"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/ISED.2016.7977076"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-04984-3_2"},{"key":"ref122","first-page":"357","article-title":"Work-in-progress: Challenges in IoT security","author":"malempati","year":"2019","journal-title":"Proc Int Conf Remote Eng Virtual Instrum"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.07.036"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1080\/23738871.2017.1366536"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.5772\/intechopen.69734"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/ISEASP.2017.7976989"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.11.011"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/09130678.pdf?arnumber=9130678","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T01:09:42Z","timestamp":1641949782000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9130678\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":142,"URL":"https:\/\/doi.org\/10.1109\/access.2020.3006358","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}