{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T06:12:21Z","timestamp":1774678341158,"version":"3.50.1"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,7]]},"DOI":"10.1109\/indin.2015.7281913","type":"proceedings-article","created":{"date-parts":[[2015,10,1]],"date-time":"2015-10-01T17:59:09Z","timestamp":1443722349000},"page":"1243-1250","source":"Crossref","is-referenced-by-count":44,"title":["Securing smart maintenance services: Hardware-security and TLS for MQTT"],"prefix":"10.1109","author":[{"given":"Christian","family":"Lesjak","sequence":"first","affiliation":[]},{"given":"Daniel","family":"Hein","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Hofmann","sequence":"additional","affiliation":[]},{"given":"Martin","family":"Maritsch","sequence":"additional","affiliation":[]},{"given":"Andreas","family":"Aldrian","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Priller","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Ebner","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Ruprechter","sequence":"additional","affiliation":[]},{"given":"Gunther","family":"Pregartner","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"MQTT version 3.1.1","author":"banks","year":"2014","journal-title":"Oasis Standard OASIS"},{"key":"ref11","article-title":"The Transport Layer Security (TLS) Protocol Version 1.2","author":"dierks","year":"0","journal-title":"Internet Engineering Task Force"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382204"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382205"},{"key":"ref14","article-title":"An empirical study of cryptographic misuse in Android applications","author":"egele","year":"2013","journal-title":"ACM SIGSAC"},{"key":"ref15","article-title":"Cyber-physical systems: A perspective at the centennial","volume":"100","author":"kim","year":"2012","journal-title":"Proceedings of the IEEE"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ASWN.2008.10"},{"key":"ref17","article-title":"SEC 2: Recommended Elliptic Curve Domain Parameters","author":"brown","year":"2010","journal-title":"Certicom Research Std"},{"key":"ref18","article-title":"Recommendation for key management, special publication 800&#x2013;57 part 1 rev. 3","year":"2012","journal-title":"NIST Tech Rep"},{"key":"ref19","article-title":"Lucky thirteen: Breaking the TLS and DTLS record protocols","author":"alfardan","year":"2013","journal-title":"IEEE Symposium on Security and Privacy SP"},{"key":"ref4","author":"delsing","year":"0","journal-title":"ARROWHEAD framework"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2014.7005136"},{"key":"ref6","article-title":"Estado - enabling smart services for industrial equipment through a secured, transparent and ad-hoc data transmission online","author":"lesjak","year":"2014","journal-title":"ICITST"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2014.7005086"},{"key":"ref8","author":"matherly","year":"0","journal-title":"(2009) Shodan computer search engine"},{"key":"ref7","article-title":"Industrial control systems security: What is happening?","author":"krotofil","year":"2013","journal-title":"IEEE INDIN"},{"key":"ref2","article-title":"Framework fuer das agile Entwickeln von IKT-basierten Dienstleistungen unter Nutzung von Smart Services","author":"aschbacher","year":"2014"},{"key":"ref1","article-title":"Recommendations for implementing the strategic initiative INDUSTRIE 4.0. Final report","author":"kagermann","year":"2013"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/INCoS.2011.175"},{"key":"ref20","article-title":"The security and performance of the galois\/counter mode (GCM) of operation","author":"mcgrew","year":"2004","journal-title":"INDOCRYPT"}],"event":{"name":"2015 IEEE 13th International Conference on Industrial Informatics (INDIN)","location":"Cambridge, United Kingdom","start":{"date-parts":[[2015,7,22]]},"end":{"date-parts":[[2015,7,24]]}},"container-title":["2015 IEEE 13th International Conference on Industrial Informatics (INDIN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7270516\/7281697\/07281913.pdf?arnumber=7281913","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,25]],"date-time":"2017-03-25T00:31:37Z","timestamp":1490401897000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7281913\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/indin.2015.7281913","relation":{},"subject":[],"published":{"date-parts":[[2015,7]]}}}