{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:48:50Z","timestamp":1774540130927,"version":"3.50.1"},"reference-count":160,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001769","name":"Charles Sturt University Open Access Publishing Scheme 2023","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001769","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/access.2023.3268064","type":"journal-article","created":{"date-parts":[[2023,4,18]],"date-time":"2023-04-18T17:39:34Z","timestamp":1681839574000},"page":"39295-39317","source":"Crossref","is-referenced-by-count":59,"title":["Security and Privacy for Low Power IoT Devices on 5G and Beyond Networks: Challenges and Future Directions"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8113-1296","authenticated-orcid":false,"given":"Jonathan","family":"Cook","sequence":"first","affiliation":[{"name":"School of Computing, Mathematics and Engineering, Charles Sturt University, Port Macquarie, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7717-2773","authenticated-orcid":false,"given":"Sabih Ur","family":"Rehman","sequence":"additional","affiliation":[{"name":"School of Computing, Mathematics and Engineering, Charles Sturt University, Port Macquarie, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6112-8874","authenticated-orcid":false,"given":"M. Arif","family":"Khan","sequence":"additional","affiliation":[{"name":"School of Computing, Mathematics and Engineering, Charles Sturt University, Wagga Wagga, NSW, Australia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TMSCS.2015.2498605"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-23983-1_5"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2494382"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3390\/app11104580"},{"key":"ref5","first-page":"450","article-title":"A reliable communication framework and its use in Internet of Things (IoT)","volume":"10","author":"Alam","year":"2018","journal-title":"CSEIT1835111"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-44860-2_1"},{"key":"ref8","volume-title":"Security in Computing","author":"Pfleeger","year":"2015"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.271"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-79766-9_1"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858303"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.3390\/app10124102"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-33124-9_11"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/FiCloud.2018.00022"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MOCAST.2018.8376645"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICTE-V50708.2020.9113777"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCIS48478.2019.8974481"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-018-0481-x"},{"key":"ref19","volume-title":"Standards Development\u2014What is a Standard\u2014Standards Australia","year":"2022"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107345"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3032896"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3103320"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2020.101377"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101856"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SmartWorld.2018.00317"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/1032761"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/UEMCON.2017.8249043"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.3390\/s21051709"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2009.282"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MTS.2018.2826079"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2020.07.003"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/EuCNC\/6GSummit51104.2021.9482503"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3108618"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.3390\/S20133625"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1002\/poi3.285"},{"key":"ref36","volume-title":"Internet of Things in Communications Occasional Paper","year":"2022"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1090\/dimacs\/002\/05"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/293411.293461"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.7763\/JACN.2015.V3.176"},{"key":"ref40","volume-title":"Internet Trends 2019 by Mary Meeker (I Am Not the Author)","year":"2022"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1051\/shsconf\/20196504016"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.jretconser.2019.03.012"},{"key":"ref43","volume-title":"Internet Growth Statistics 1995 to 2019\u2014The Global Village Online","year":"2019"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.3390\/s150204430"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851194"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1002\/sec.795"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2558446"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2015.12.001"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.3390\/sym12040676"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2002.993780"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12030482"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2017.7927129"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/9629381"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2941972"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2010.5671814"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2879615"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/SENSORS52175.2022.9967208"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-022-01552-9"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-3226-4_11"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-023-03234-7"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2584538"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/I-SMAC.2017.8058399"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/ICITST.2015.7412116"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.22373\/cj.v2i2.3453"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.12"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSIT.2010.5563900"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.11.025"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.3390\/inf07030044"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2694844"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/CAIS.2018.8442002"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/CCUBE.2017.8394143"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2021.10.004"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3031966"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2019.01.005"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2019.2935035"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1016\/j.egyr.2021.08.124"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/ICCMC.2019.8819719"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.3390\/en14092657"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/ISQED51717.2021.9424330"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.3390\/s23031639"},{"key":"ref81","article-title":"The malicious use of artificial intelligence: Forecasting, prevention, and mitigation","author":"Brundage","year":"2018","journal-title":"arXiv:1802.07228"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2023.01.006"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2022.04.007"},{"issue":"3","key":"ref84","first-page":"11","article-title":"Does machine learning really work?","volume":"18","author":"Mitchell","year":"1997","journal-title":"AI Mag."},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1016\/j.heliyon.2019.e01802"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2986444"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.437"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1631\/FITEE.1800573"},{"key":"ref89","volume-title":"Reinventing Cybersecurity With Artificial Intelligence","author":"Tolido","year":"2019"},{"key":"ref90","first-page":"103","article-title":"Benefit from AI in cybersecurity","volume-title":"Proc. 11th Int. Conf. Bus. Inf. Secur. (BISEC)","author":"Lazi\u0107"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1177\/0894439321994623"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.3390\/app10144718"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2019.2941757"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-021-09976-0"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-0199-9_30"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00186"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-020-04989-3"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-1420-3_137"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1108\/RMJ-12-2015-0042"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.3390\/app11209372"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC.2018.8539529"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/QRS-C.2018.00034"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2018.8343163"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/LDAV.2011.6092320"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3004662"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC51071.2022.9771549"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/SPIN.2019.8711591"},{"issue":"1","key":"ref108","first-page":"51","article-title":"Consortium blockchains: Overview, applications and challenges","volume":"11","author":"Dib","year":"2018","journal-title":"Int. J. Adv. Telecommun."},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737490"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/DSA.2018.00015"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1016\/j.bcra.2021.100021"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109515"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2018.8328736"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/ISCIT.2018.8587927"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2014.6979610"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2013.126"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2016.11.078"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/ICPCSI.2017.8391982"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1145\/1053331.1053343"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.sj.8350019"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.113"},{"key":"ref122","first-page":"89","article-title":"Out of the loop: How automated software updates cause unintended security consequences","volume-title":"Proc. 10th Symp. Usable Privacy Secur. (SOUPS)","author":"Wash"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1002\/dac.4169"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1177\/1527476411415699"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57959-7"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1080\/13600834.2019.1573501"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-023-04539-3"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.08.004"},{"key":"ref129","volume-title":"Strava Has Published Details About Secret Military Bases, and an Australian Was the First to Know","author":"Bogle","year":"2018"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1057\/s41599-020-0495-3"},{"key":"ref131","volume-title":"Teen monitoring Elon Musk\u2019s jet \u2018tracking Gates, Bezos and Drake too\u2019","author":"Neate","year":"2022"},{"key":"ref132","volume-title":"A Teenager Tracked Elon Musk\u2019s Jet on Twitter. Then Came the Direct Message","author":"Vigdor","year":"2022"},{"key":"ref133","volume-title":"ADS-B Rules","year":"2022"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1080\/01972243.2021.1897914"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/IoTDI.2018.00042"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486369"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/MOBISECSERV.2019.8686545"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC.2017.7868439"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.3390\/s20205897"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/FMEC49853.2020.9144755"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3109886"},{"key":"ref142","volume-title":"Statement of Intent Regarding the Security of the Internet of Things","year":"2019"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/CSCN.2019.8931393"},{"key":"ref144","first-page":"31","article-title":"Is your television spying on you? The Internet of Things needs more than self-regulation","volume":"93","author":"Manwaring","year":"2021","journal-title":"Internet Things Needs More than Self-Regulation Comput. Law, J. Austral. New Zealand Societies Comput. Law"},{"key":"ref145","volume-title":"Securing the Internet of Things for Consumers","year":"2020"},{"key":"ref146","volume-title":"Radiocommunications (Low Interference Potential Devices) Class Licence 2015","year":"2015"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3063686"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2918990"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2015.92"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.108076"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2019.100157"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/EuCNC\/6GSummit51104.2021.9482609"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1109\/ICCChina.2015.7448706"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2697718"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.3390\/electronics8090981"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3082430"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.3390\/s21010036"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.3390\/app11178117"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1038\/s41928-019-0355-6"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1080\/23270012.2021.1882350"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10005208\/10103890.pdf?arnumber=10103890","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T02:41:38Z","timestamp":1709260898000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10103890\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":160,"URL":"https:\/\/doi.org\/10.1109\/access.2023.3268064","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}