{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T03:53:27Z","timestamp":1730260407243,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,10,30]],"date-time":"2023-10-30T00:00:00Z","timestamp":1698624000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,30]],"date-time":"2023-10-30T00:00:00Z","timestamp":1698624000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,10,30]]},"DOI":"10.1109\/icumt61075.2023.10333273","type":"proceedings-article","created":{"date-parts":[[2023,12,5]],"date-time":"2023-12-05T18:18:37Z","timestamp":1701800317000},"page":"243-249","source":"Crossref","is-referenced-by-count":0,"title":["Blockchain-Based Device Authentication Method in Industrial Internet of Things"],"prefix":"10.1109","author":[{"given":"Ivan R.","family":"Fedorov","sequence":"first","affiliation":[{"name":"ITMO University,Saint-Petersburg"}]},{"given":"Ivan B.","family":"Getmaniuk","sequence":"additional","affiliation":[{"name":"ITMO University,Saint-Petersburg"}]},{"given":"Sergey V.","family":"Bezzateev","sequence":"additional","affiliation":[{"name":"Saint-Petersburg State University of aerospace instrumentation,Saint-Petersburg"}]}],"member":"263","reference":[{"volume-title":"Gartner Expert Glossary","year":"2022","key":"ref1"},{"volume-title":"Ecosystem of the industrial Internet in Russia. Research. RAEC. Ros-telecom","year":"2017","key":"ref2"},{"volume-title":"Perspectives on the Internet of Things","year":"01\/19\/2023","author":"Vishnevsky","key":"ref3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2020.102355"},{"issue":"6","key":"ref5","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1109\/MM.2017.4241357","article-title":"Hardware designs for security in ultra-low-power IoT systems: An overview and survey","volume":"17","author":"Yang","year":"2017","journal-title":"IEEE Micro"},{"key":"ref6","first-page":"593","article-title":"Security and attack vector analysis of IoT devices","volume-title":"Security, Privacy, and Anonymity in Computation, Communication, and Storage: SpaCCS 2017 International Workshops","author":"Capellupo"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2834050.2834095"},{"issue":"2","key":"ref8","first-page":"26","volume":"60","author":"Lindqvist","year":"2017","journal-title":"The future of the Internet of Things \/\/Communications of the ACM."},{"key":"ref9","doi-asserted-by":"crossref","DOI":"10.1109\/ISCC.2018.8538636","article-title":"The evolution of bashlite and mirai iot botnets","volume-title":"2018 IEEE Symposium on Computers and Communications (ISCC)","author":"Marzano"},{"key":"ref10","first-page":"1093","article-title":"Understanding the mirai botnet","author":"Antonakakis","year":"2017","journal-title":"26th USENIX security symposium (USENIX Security 17)"},{"issue":"5","key":"ref11","doi-asserted-by":"crossref","first-page":"2985","DOI":"10.1109\/TII.2020.3023507","article-title":"Challenges and opportunities in securing the industrial internet of things","volume":"17","author":"Serror","year":"2020","journal-title":"IEEE Transactions on Industrial Informatics"},{"volume-title":"Zscaller","year":"2023","key":"ref12"},{"volume-title":"Automation world","year":"2023","key":"ref13"},{"volume-title":"Forbes","year":"2023","key":"ref14"},{"issue":"9","key":"ref15","doi-asserted-by":"crossref","first-page":"25344","DOI":"10.1109\/ACCESS.2021.3057766","article-title":"A taxonomy of security issues in Industrial Internet-of-Things: scoping review for existing solutions, future implications, and research challenges","author":"Jayalaxmi","year":"2021","journal-title":"IEEE Access"},{"issue":"1","key":"ref16","first-page":"40","article-title":"Authentication Methods In The Industrial Internet Of Things","volume":"30","author":"Getmaniuk","year":"2023","journal-title":"IT Security, [S. 1.]"},{"article-title":"MQTT For Complete Beginners: Learn The Basics of the MQTT Protocol","volume-title":"Steves internet guide","year":"2023","key":"ref17"},{"article-title":"TLS cipher suites in Windows Server 2022","volume-title":"Microsoft learn","year":"2023","key":"ref18"},{"issue":"1","key":"ref19","first-page":"891","article-title":"Security concerns and future trends of internet of things","volume-title":"2019 2nd international conference on intelligent computing, instrumentation and control technologies (ICICICT)","author":"Arora"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1007\/978-3-030-38677-1_4","article-title":"Blockchain frameworks","author":"Quasim","year":"2020","journal-title":"Decentralised Internet of Things: A Blockchain Perspective"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/WECONF51603.2021.9470519","article-title":"Blockchain in 5G Networks: Perfomance Evaluation of Private Blockchain","volume-title":"2021 Wave Electronics and its Application in Information and Telecommunication Systems (WECONF)","author":"Fedorov","year":"2021"},{"article-title":"The High-Level Protocol Specification Language","volume-title":"The AVISPA team","year":"2023","key":"ref22"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/tit.1983.1056650"}],"event":{"name":"2023 15th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","start":{"date-parts":[[2023,10,30]]},"location":"Ghent, Belgium","end":{"date-parts":[[2023,11,1]]}},"container-title":["2023 15th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10333257\/10333092\/10333273.pdf?arnumber=10333273","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T15:52:43Z","timestamp":1710431563000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10333273\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,30]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/icumt61075.2023.10333273","relation":{},"subject":[],"published":{"date-parts":[[2023,10,30]]}}}