{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T08:30:09Z","timestamp":1765269009243,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100017413","name":"Innovation Fund","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100017413","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,2]]},"DOI":"10.1109\/iotsms62296.2024.10710271","type":"proceedings-article","created":{"date-parts":[[2024,10,14]],"date-time":"2024-10-14T17:22:50Z","timestamp":1728926570000},"page":"33-37","source":"Crossref","is-referenced-by-count":1,"title":["Power Cost for Secure and Reliable IoT"],"prefix":"10.1109","author":[{"given":"Erik","family":"Gottschalk","sequence":"first","affiliation":[{"name":"Technical University of Denmark (DTU),Dept. of Electrical and Photonics Engineering,Kgs. Lyngby,Denmark"}]}],"member":"263","reference":[{"journal-title":"Graph, 2024, in Statista","article-title":"Number of Internet of Things (IoT) connections worldwide from 2022 to 2023, with forecasts from 2024 to 2033 (in billions)","year":"2024","key":"ref1"},{"journal-title":"Graph, 2023, in Statista","article-title":"Annual number of Internet of Things (IoT) malware attacks worldwide from 2018 to 2022 (in millions)","year":"2024","key":"ref2"},{"article-title":"Inside Mirai the infamous IoT botnet: A retrospective analysis","year":"2017","author":"Bursztein","key":"ref3"},{"article-title":"Global hackers raid Verkada\u2019s clients\u2019 video surveillance data-securityinfowatch.com","year":"2024","author":"Lasky","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/scvt.2017.8240313"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/cisis.2014.25"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/isncc.2018.8531068"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/vtcspring.2018.8417653"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3390\/s20174794"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2019.00049"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2024.105009"},{"key":"ref12","article-title":"Security challenges and limitations in IoT environments","volume":"19","author":"Al-Sharekh","year":"2019","journal-title":"IJCSNS International Journal of Computer Science and Network Security"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2019.8767250"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM50824.2020.9269083"},{"article-title":"Benchmarking software implementations of 1st round candidates of the NIST LWC project on microcontrollers","volume-title":"csrc.nist.rip","author":"Renner","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3390\/s18061675"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3410992.3411008"},{"journal-title":"Internet Requests for Comments, RFC Editor, RFC 2544, 1999","article-title":"Benchmarking methodology for network interconnect devices","author":"Bradner","key":"ref18"},{"year":"2022","key":"ref19","article-title":"Recommended criteria for cybersecurity labeling for consumer Internet of Things (IoT) products"}],"event":{"name":"2024 11th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","start":{"date-parts":[[2024,9,2]]},"location":"Malm\u00f6, Sweden","end":{"date-parts":[[2024,9,5]]}},"container-title":["2024 11th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10710136\/10710182\/10710271.pdf?arnumber=10710271","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,15]],"date-time":"2024-10-15T04:57:36Z","timestamp":1728968256000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10710271\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,2]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/iotsms62296.2024.10710271","relation":{},"subject":[],"published":{"date-parts":[[2024,9,2]]}}}