{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T10:58:19Z","timestamp":1761562699653},"reference-count":34,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1109\/icccnt49239.2020.9225520","type":"proceedings-article","created":{"date-parts":[[2020,10,15]],"date-time":"2020-10-15T16:00:38Z","timestamp":1602777638000},"page":"1-7","source":"Crossref","is-referenced-by-count":9,"title":["Hardcoded Credentials and Insecure Data Transfer in IoT: National and International Status"],"prefix":"10.1109","author":[{"given":"B. R.","family":"Chandavarkar","sequence":"first","affiliation":[]}],"member":"263","reference":[{"year":"2018","author":"hayden","journal-title":"How hard-coded credentials threaten ICS security","key":"ref33"},{"year":"2017","journal-title":"IoT Landscape and Nasscom Initiatives","key":"ref32"},{"year":"2019","author":"priya","journal-title":"Future of IoT in India - current market trends and use cases","key":"ref31"},{"year":"2017","journal-title":"IOT Botnets Targeting Vulnerable IP Cameras","key":"ref30"},{"year":"2017","author":"sarkhel","journal-title":"IoT Attacks India no 2 source country","key":"ref34"},{"year":"2016","author":"ragan","journal-title":"Here are the 61 passwords that powered the Mirao IoT botnet","key":"ref10"},{"year":"2019","author":"ciccone","journal-title":"Default Router Username and Password List","key":"ref11"},{"year":"2019","author":"miller","journal-title":"Hardcoded and embedded credentials are an IT security hazard Here's what you need to know","key":"ref12"},{"year":"2018","journal-title":"Study Attack on krebsonsecurity cost iot device owners $323k","key":"ref13"},{"year":"2016","journal-title":"malware from Krebs DDoS attack goes open source","article-title":"internet of things","key":"ref14"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/MC.2017.201"},{"key":"ref16","first-page":"1093","article-title":"Understanding the mirai botnet","author":"antonakakis","year":"2017","journal-title":"26th USENIX Security Symposium (USENIX Security 17)"},{"year":"2016","author":"edwards","journal-title":"Hajime Analysis of a Decentralized Internet Worm for IoT Devices","key":"ref17"},{"year":"2017","author":"spring","journal-title":"Mirai and Hajime Locked Into IoT Botnet Battle","key":"ref18"},{"year":"2017","author":"persirai","key":"ref19"},{"year":"2017","journal-title":"Mirai Botnet Affecting IoT Devices","key":"ref28"},{"year":"2019","journal-title":"Web of Things (WoT) Architecture","key":"ref4"},{"year":"2017","author":"saraswat","journal-title":"Cyber Security","key":"ref27"},{"year":"2019","author":"paul","journal-title":"CWE-798 Use of Hard-coded Credentials","key":"ref3"},{"year":"2017","author":"strom","journal-title":"9 ways to improve IoT device security","key":"ref6"},{"year":"2017","journal-title":"BrickerBot IoT Malware","key":"ref29"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/TETC.2016.2606384"},{"year":"2019","author":"paul","journal-title":"Top 10 IoT Vulnerabilities","key":"ref8"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1016\/j.iot.2018.11.003"},{"year":"2018","journal-title":"IoT Security Part 3 (101 IoT Top Ten Vulnerabilities)","key":"ref2"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/COMST.2019.2910750"},{"year":"2018","author":"pal","journal-title":"The Internet of Things (IoT) - Threats and Countermeasures","key":"ref1"},{"year":"2019","journal-title":"How to connect IoT device to the Internet","key":"ref20"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1145\/3229565.3229568"},{"year":"2018","journal-title":"6 Awesome & Useful IoT Protocols","key":"ref21"},{"year":"2019","journal-title":"Common Web Application Vulnerabilities","key":"ref24"},{"year":"2018","journal-title":"Securing your IoT device using SSL","key":"ref23"},{"year":"2019","author":"kupreev","journal-title":"DDoS attacks in Q1 2019","key":"ref26"},{"year":"2018","author":"kuzin","journal-title":"New trends in the world of IoT threats","key":"ref25"}],"event":{"name":"2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT)","start":{"date-parts":[[2020,7,1]]},"location":"Kharagpur, India","end":{"date-parts":[[2020,7,3]]}},"container-title":["2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9211590\/9225262\/09225520.pdf?arnumber=9225520","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T20:21:59Z","timestamp":1656361319000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9225520\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/icccnt49239.2020.9225520","relation":{},"subject":[],"published":{"date-parts":[[2020,7]]}}}