{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T16:13:22Z","timestamp":1774628002972,"version":"3.50.1"},"reference-count":119,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100006013","name":"United Arab Emirates University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100006013","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2021.3103725","type":"journal-article","created":{"date-parts":[[2021,8,9]],"date-time":"2021-08-09T20:25:56Z","timestamp":1628540756000},"page":"113292-113314","source":"Crossref","is-referenced-by-count":73,"title":["Recent Security Trends in Internet of Things: A Comprehensive Survey"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6731-7895","authenticated-orcid":false,"given":"Yasmine","family":"Harbi","sequence":"first","affiliation":[]},{"given":"Zibouda","family":"Aliouat","sequence":"additional","affiliation":[]},{"given":"Allaoua","family":"Refoufi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6524-7352","authenticated-orcid":false,"given":"Saad","family":"Harous","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"Exploiting Bluetooth low energy pairing vulnerability in telemedicine","author":"zegeye","year":"2015"},{"key":"ref38","article-title":"Attacks on the pairing protocol of Bluetooth v2. 1","author":"lindell","year":"2008"},{"key":"ref33","article-title":"ZigBee smart homes: A hacker&#x2019;s open house","author":"zillner","year":"2016","journal-title":"Proc CRESTCon Conf"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7252"},{"key":"ref31","year":"2017","journal-title":"LoRaWAN 1 1 Specification"},{"key":"ref30","first-page":"1","author":"winter","year":"2012","journal-title":"RPL IPv6 Routing Protocol for Low-Power and Lossy Networks"},{"key":"ref37","first-page":"1","article-title":"Bluetooth: With low energy comes low security","author":"ryan","year":"2013","journal-title":"Proc 7th USENIX Workshop Offensive Technol (WOOT)"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3098243.3098254"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2015.28"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2516102"},{"key":"ref28","first-page":"130","article-title":"Transmission of IPv6 packets over IEEE 802.15. 4 networks","volume":"4944","author":"montenegro","year":"2007","journal-title":"Internet Proposed Standard RFC"},{"key":"ref27","first-page":"7","volume":"1","year":"2010","journal-title":"Bluetooth Specification Version 4 0"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1278972.1278992"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3057766"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CECNet.2012.6201508"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2683200"},{"key":"ref24","year":"2006","journal-title":"ZigBee Document 053474r13"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC.2017.7868374"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2968501"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICSPS.2010.5555486"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2922646"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/IEEESTD.2003.94389"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01566-4_1"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/CSNT.2015.16"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2893172"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.09.019"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.3390\/s17071611"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2677520"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2659783"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.06.003"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2705076"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2018.8538636"},{"key":"ref40","first-page":"309","article-title":"Bypassing passkey authentication in Bluetooth low energy","volume":"2013","author":"rosa","year":"2013","journal-title":"IACR Cryptol ePrint Arch"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.12.018"},{"key":"ref3","first-page":"1","article-title":"The Internet of Things: How the next evolution of the internet is changing everything","volume":"1","author":"evans","year":"2011","journal-title":"Cisco white paper"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-017-0345-9"},{"key":"ref5","article-title":"Unlocking the potential of the Internet of Things","volume":"1","author":"manyika","year":"2015"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2869847"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ICBDSC.2016.7460363"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.03.012"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.11.025"},{"key":"ref46","author":"miller","year":"2016","journal-title":"LoRa security Building a Secure LoRa Solution"},{"key":"ref45","first-page":"459","article-title":"A taxonomy of attacks in RPL-based Internet of Things","volume":"18","author":"mayzaud","year":"2016","journal-title":"Int J Netw Secur"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2388550"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/IoTDI.2018.00022"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2462096.2462107"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2017.8116427"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/PERVASIVE.2015.7087034"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.14419\/jacst.v3i2.3321"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.06.004"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/ATNAC.2017.8215418"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/FiCloud.2016.30"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/ICCC47050.2019.9064352"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-020-03058-6"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2020.2964537"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2944400"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-019-00739-x"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2017.7917634"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1145\/3205977.3205993"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2019.2903254"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2844373"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.06.080"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2018.1700284"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.3390\/s19245539"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.01.012"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2874473"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700714"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.1900380"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-017-0343-y"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2016.7543884"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.01.010"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.02.055"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1145\/3131672.3131697"},{"key":"ref108","first-page":"13","article-title":"Fog computing and its role in the Internet of Things characterization of fog computing","author":"bonomi","year":"2016","journal-title":"Proc MCC Workshop Mobile Cloud Comput"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-020-03318-7"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2996214"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102494"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC.2019.8666450"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2941575"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00013"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2019.101948"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/ATNAC.2017.8215434"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.11.021"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2016.64"},{"key":"ref102","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1109\/PST.2016.7906930","article-title":"Using machine learning to secure IoT systems","author":"canedo","year":"2016","journal-title":"Proc 14th Annu Conf Privacy Secur Trust (PST)"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2918437"},{"key":"ref112","doi-asserted-by":"crossref","first-page":"1486","DOI":"10.11591\/ijeecs.v18.i3.pp1486-1493","article-title":"Mobile edge computing for Internet of Things (IoT): Security and privacy issues","volume":"18","author":"atiqur","year":"2020","journal-title":"Indonesian J Elect Eng Comput Sci"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700906"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2703922"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.3390\/s19051059"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2017.7986580"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2871204"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.04.027"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-019-06405-y"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2924045"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2935189"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2910750"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2976075"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2986444"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102761"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2909554"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-019-03087-y"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3390\/s20133625"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2017.080151"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3390\/s21051809"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2019.8923144"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2988293"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3052867"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2886384"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1201\/9780429324932-10"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2019.08.006"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.3390\/electronics8080827"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1145\/3360774.3360822"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-020-07134-3"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.08.042"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2990428"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2780232"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2018.08.003"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.11.033"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09509539.pdf?arnumber=9509539","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T19:57:26Z","timestamp":1639771046000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9509539\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":119,"URL":"https:\/\/doi.org\/10.1109\/access.2021.3103725","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}