{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T19:52:43Z","timestamp":1774295563969,"version":"3.50.1"},"reference-count":45,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100003407","name":"Ministero dell?Istruzione, dell?Universit? e della Ricerca","doi-asserted-by":"publisher","award":["PE00000005"],"award-info":[{"award-number":["PE00000005"]}],"id":[{"id":"10.13039\/501100003407","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003407","name":"Ministero dell?Istruzione, dell?Universit? e della Ricerca","doi-asserted-by":"publisher","award":["PON R&I 2014-2020"],"award-info":[{"award-number":["PON R&I 2014-2020"]}],"id":[{"id":"10.13039\/501100003407","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100014810","name":"Fondazione di Sardegna","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100014810","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/access.2023.3331820","type":"journal-article","created":{"date-parts":[[2023,11,9]],"date-time":"2023-11-09T19:02:42Z","timestamp":1699556562000},"page":"129156-129172","source":"Crossref","is-referenced-by-count":11,"title":["Privacy and Security Best Practices for IoT Solutions"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1910-9551","authenticated-orcid":false,"given":"Matteo","family":"Anedda","sequence":"first","affiliation":[{"name":"Department of Electrical and Electronic Engineering (UdR CNIT of Cagliari), University of Cagliari, Cagliari, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8745-1327","authenticated-orcid":false,"given":"Alessandro","family":"Floris","sequence":"additional","affiliation":[{"name":"Department of Electrical and Electronic Engineering (UdR CNIT of Cagliari), University of Cagliari, Cagliari, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1298-7960","authenticated-orcid":false,"given":"Roberto","family":"Girau","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering (DISI), University of Bologna, Bologna, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0615-6546","authenticated-orcid":false,"given":"Mauro","family":"Fadda","sequence":"additional","affiliation":[{"name":"Department of Biomedical Science, University of Sassari, Sassari, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4420-3363","authenticated-orcid":false,"given":"Pietro","family":"Ruiu","sequence":"additional","affiliation":[{"name":"Department of Biomedical Science, University of Sassari, Sassari, Italy"}]},{"given":"Massimo","family":"Farina","sequence":"additional","affiliation":[{"name":"Department of Electrical and Electronic Engineering (UdR CNIT of Cagliari), University of Cagliari, Cagliari, Italy"}]},{"given":"Alessandro","family":"Bonu","sequence":"additional","affiliation":[{"name":"Department of Electrical and Electronic Engineering (UdR CNIT of Cagliari), University of Cagliari, Cagliari, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6450-4609","authenticated-orcid":false,"given":"Daniele D.","family":"Giusto","sequence":"additional","affiliation":[{"name":"Department of Electrical and Electronic Engineering (UdR CNIT of Cagliari), University of Cagliari, Cagliari, Italy"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Internet of Things statistics for 2022\u2014Taking Things Apart","author":"Jovanovic","year":"2022"},{"key":"ref2","volume-title":"2020 Unit 42 IoT Threat Report","year":"2020"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3211093"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ISC251055.2020.9239005"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.108771"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-020-07649-9"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2020.100312"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.prime.2023.100158"},{"key":"ref9","volume-title":"Security and Privacy Controls for Information Systems and Organizations","year":"2022"},{"key":"ref10","first-page":"64","volume-title":"Report From the Commission to the European Parliament, the Council, the European Economic and Social Committee: Report on the Safety and Liability Implications of Artificial Intelligence, the Internet of Things and Robotics","year":"2020"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2694844"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2017.04.003"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3390\/app10124102"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109154"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00034"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SOCA.2014.58"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3032436"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2994777"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3272484"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/GIOTS49054.2020.9119590"},{"key":"ref21","volume-title":"Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the Protection of Natural Persons With Regard to the Processing of Personal Data and on the Free Movement of Such Data, and Repealing Directive 95\/46\/EC (General Data Protection Regulation)","year":"2016"},{"key":"ref22","volume-title":"California Consumer Privacy Act (CCPA)\u2014State of California\u2014Department of Justice","year":"2021"},{"key":"ref23","volume-title":"The PRC Personal Information Protection Law","year":"2021"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3390\/en14164861"},{"key":"ref25","volume-title":"Gemalto Survey Confirms That Consumers Lack Confidence in IoT Device Security","year":"2017"},{"key":"ref26","volume-title":"The Trust Opportunity: Exploring Consumer Attitudes to the Internet of Things","year":"2019"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108040"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108005"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2023.103577"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-58424-9_19"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3079916"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2616022"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2015.2487976"},{"key":"ref34","volume-title":"Hash Functions |CSRC","year":"2017"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24654-1_13"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/CAC.2017.8242883"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2022.3153691"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2023.3244827"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3203388"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3199694"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3157714"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2022.3151475"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3092938"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3008533"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2023.3257835"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10005208\/10314498.pdf?arnumber=10314498","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T21:16:11Z","timestamp":1710364571000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10314498\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":45,"URL":"https:\/\/doi.org\/10.1109\/access.2023.3331820","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}