{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T16:25:57Z","timestamp":1775492757658,"version":"3.50.1"},"reference-count":225,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2021,3,15]],"date-time":"2021-03-15T00:00:00Z","timestamp":1615766400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,3,15]],"date-time":"2021-03-15T00:00:00Z","timestamp":1615766400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,3,15]],"date-time":"2021-03-15T00:00:00Z","timestamp":1615766400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Ph.D. stipend scholarship from CSIRO Data61","award":["50050661"],"award-info":[{"award-number":["50050661"]}]},{"name":"International Tuition Fee scholarship from School of Science, RMIT"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2021,3,15]]},"DOI":"10.1109\/jiot.2020.3026493","type":"journal-article","created":{"date-parts":[[2020,9,24]],"date-time":"2020-09-24T20:53:54Z","timestamp":1600980834000},"page":"4132-4156","source":"Crossref","is-referenced-by-count":124,"title":["Lightweight Cryptographic Protocols for IoT-Constrained Devices: A Survey"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3413-1039","authenticated-orcid":false,"given":"Muhammad Nauman","family":"Khan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6222-282X","authenticated-orcid":false,"given":"Asha","family":"Rao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6353-8359","authenticated-orcid":false,"given":"Seyit","family":"Camtepe","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1080\/09720529.2014.995967"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.3390\/s18051554"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-69811-3_70"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2120634"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.3390\/s19163612"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2014.10.010"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422725"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.02.034"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.04.002"},{"key":"ref168","article-title":"End-to-end data security for IoT: From a cloud of encryptions to encryption in the cloud","author":"canteaut","year":"2017","journal-title":"Proc Cesar Conf"},{"key":"ref169","first-page":"244","volume":"4986","author":"de canni\u00e8re","year":"2008","journal-title":"Trivium"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/0376-5075(83)90042-9"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40403-0_7"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1186\/s13173-019-0085-7"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2019.06.004"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/SMC.2015.231"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/UCC.2014.55"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2014.2300753"},{"key":"ref36","year":"2016","journal-title":"Internet of Things Global Standards Initiative"},{"key":"ref35","year":"2020","journal-title":"Conference Portal"},{"key":"ref34","year":"2020","journal-title":"SCImago Consejo Superior de In-vestigaciones Cient ificas (CSIC)"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2898376"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44987-6_28"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2019.8675165"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2306328"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSNT.2011.6181997"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1145\/3236010"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.11.017"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.4946"},{"key":"ref187","author":"kumar","year":"2018","journal-title":"Lightweight cryptography for distributed PKI based MANETS"},{"key":"ref186","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1016\/j.procs.2016.02.027","article-title":"Establishment of light weight cryptography for resource constraint environment using FPGA","volume":"78","author":"chanthini","year":"2016","journal-title":"Procedia Comput Sci"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3935"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-1002-1_51"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.05.002"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2976075"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2900957"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2019.8767250"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-12330-7_4"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01560-2_8"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.11.026"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.107037"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3292674"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-145"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.03.005"},{"key":"ref154","author":"antonopoulos","year":"2014","journal-title":"Mastering Bitcoin Unlocking Digital Cryptocurrencies"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1145\/3372136"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-018-0193-x"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.11.022"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1145\/3125503.3125626"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2874473"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2817523"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2846040"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2986444"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-15538-4_1"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1109\/GIOTS.2017.8016272"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2016.7427078"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.15439\/2014F503"},{"key":"ref57","first-page":"3","article-title":"Mobile edge computing: Challenges for future virtual network embedding algorithms","volume":"1","author":"beck","year":"2014","journal-title":"Proc 8th Int Conf Adv Eng Comput Appl Sci (ADVCOMP)"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/2677046.2677052"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/2342509.2342513"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7120041"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2009.82"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/IMPACT.2015.7365193"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-3075-3_15"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93387-0_23"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1109\/AiCIS.2018.00042"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2017.080151"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-5953-8_54"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1109\/HPCS.2017.117"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2016.40"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2019.8730784"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39568-7_5"},{"key":"ref4","first-page":"21","article-title":"Pacemakers: A survey on development history, cyber-security threats and countermeasures","volume":"2","author":"boulos","year":"2016","journal-title":"Int J Innov Stud Sci Eng Technol"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2015.04.007"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ISMICT.2019.8743971"},{"key":"ref5","author":"curley","year":"2019","journal-title":"Hackers Can Access Pacemakers but Don&#x2019;t Panic Just Yet"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TBCAS.2014.2377073"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2912998"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2884906"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.11.031"},{"key":"ref157","year":"2019","journal-title":"Lightweight Cryptography Project"},{"key":"ref9","author":"takahashi","year":"2011","journal-title":"Insulin Pump Hacker Says Vendor Medtronic is Ignoring Security Risk"},{"key":"ref158","author":"kraft","year":"2018","journal-title":"An introduction to number theory with cryptography"},{"key":"ref46","author":"evans","year":"2011","journal-title":"The Internet of Things How the next Evolution of the Internet Is Changing Everything"},{"key":"ref45","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1007\/978-1-4419-8237-7_13","author":"kopetz","year":"2011","journal-title":"Real-Time Systems"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/IBCAST.2014.6778179"},{"key":"ref47","author":"vermesan","year":"2013","journal-title":"Internet of Things Converging Technologies for Smart Environments and Integrated Ecosystems"},{"key":"ref42","article-title":"Internet of Things: Architectures, protocols, and applications","volume":"2017","author":"rajesh","year":"2017","journal-title":"J Elect Comput Eng"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.01.010"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2015.08.002"},{"key":"ref43","year":"2014","journal-title":"The Internet of Things Reference Model"},{"key":"ref73","year":"2020","journal-title":"Galileo Getting Started Guide"},{"key":"ref72","year":"2019","journal-title":"Introduction to Intel&#x00AE; Galileo Boards"},{"key":"ref71","year":"2019","journal-title":"SparkFun ESP8266 Thing&#x2014;Dev Board"},{"key":"ref70","year":"2020","journal-title":"SparkFun ESP8266 Thing"},{"key":"ref76","year":"2020","journal-title":"Adafruit HUZZAH32&#x2014;ESP32 Feather Board"},{"key":"ref77","year":"2012","journal-title":"Arduino Microcontroller Feature Comparison"},{"key":"ref74","year":"2020","journal-title":"Overview Intel&#x00AE; Galileo Board Documentation Internet of Things"},{"key":"ref75","year":"2020","journal-title":"Internet of Things IoT"},{"key":"ref78","year":"2020","journal-title":"Arduino Uno"},{"key":"ref79","year":"2020","journal-title":"Raspberrypi Products"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.05.093"},{"key":"ref62","author":"giust","year":"2018","journal-title":"MEC deployments in 4G and evolution towards 5G"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2019.02.009"},{"key":"ref63","year":"2019","journal-title":"Self-Driving Cars Will Create 2 Petabytes of Data What are the Big Data Opportunities for the Car Industry?"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2579198"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/CIOT.2016.7872914"},{"key":"ref66","author":"cynthia","year":"2016","journal-title":"75 Top IoT Devices"},{"key":"ref67","year":"2015","journal-title":"CC3200 SimpleLink Wi-Fi and Internet-of-Things Solution a Single-Chip Wireless MCU"},{"key":"ref68","year":"2018","journal-title":"CC3200MOD SimpleLink&#x2122; Microcontroller and Wi-Fi&#x00AE; Network Processor Module&#x2014;LaunchPad Hardware"},{"key":"ref69","year":"2019","journal-title":"IoT Hardware Guide"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48329-2_40"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-76900-2_12"},{"key":"ref199","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897879"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2969223"},{"key":"ref194","doi-asserted-by":"crossref","first-page":"288","DOI":"10.1007\/978-3-540-72738-5_19","article-title":"Identity-based proxy re-encryption","volume":"4521","author":"green","year":"2007","journal-title":"Applied Cryptography and Network Security"},{"key":"ref195","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.09.052"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17259-6_11"},{"key":"ref95","year":"2019","journal-title":"Definition Edge Devices"},{"key":"ref94","year":"2019","journal-title":"Microsoft Azure HB Series Virtual Machine"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpat.2019.102007"},{"key":"ref93","year":"2019","journal-title":"Amazon Elastic Compute Cloud Compute Optimized Instances- Hardware Specification"},{"key":"ref191","first-page":"37","article-title":"Efficient and secure data storage operations for mobile cloud computing","author":"zhou","year":"2012","journal-title":"Proc 8th Int Conf Netw Serv Manag (CNSM) Workshop Syst Virtualization Manag (SVM)"},{"key":"ref92","year":"2019","journal-title":"Switches Cisco Industrial Ethernet 5000 Series"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-019-04088-y"},{"key":"ref91","year":"2017","journal-title":"Router Cisco ASR 900U Series Route Switch"},{"key":"ref90","year":"2020","journal-title":"Industrial Wireless Network Routers"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.11.003"},{"key":"ref99","author":"mogull","year":"2017","journal-title":"Security Guidance for Critical Areas of Focus in Cloud Computing"},{"key":"ref96","author":"tordera","year":"2016","journal-title":"What is a fog node a tutorial on current concepts towards a common definition"},{"key":"ref97","year":"2015","journal-title":"Cisco Fog Computing Solutions Unleash the power of the Internet of Things"},{"key":"ref82","year":"2020","journal-title":"GSM Arena"},{"key":"ref81","year":"2020","journal-title":"Device Specifications Comparison and Reviews"},{"key":"ref84","year":"2020","journal-title":"WiFi Routers"},{"key":"ref83","author":"higgins","year":"2016","journal-title":"Linksys EA9500 Max-Stream AC5400 MU-MIMO Gigabit Router"},{"key":"ref80","year":"2020","journal-title":"Raspberry Pi 3 Model B"},{"key":"ref89","year":"2020","journal-title":"Cisco 500 Series WPAN Industrial Routers"},{"key":"ref85","year":"2020","journal-title":"WiFi Routers"},{"key":"ref86","year":"2015","journal-title":"Iot Gateways"},{"key":"ref87","year":"2020","journal-title":"Iot Gateways"},{"key":"ref88","year":"2020","journal-title":"Intel iot gateway"},{"key":"ref200","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329825"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.05.058"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-21373-2_4"},{"key":"ref209","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.04.015"},{"key":"ref203","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2822822"},{"key":"ref204","article-title":"Outsourcing the decryption of ABE ciphertexts","volume":"3","author":"green","year":"2011","journal-title":"Proc Usenix Security Symp"},{"key":"ref201","doi-asserted-by":"publisher","DOI":"10.18494\/SAM.2019.2227"},{"key":"ref202","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-017-0462-0"},{"key":"ref207","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2013.2277656"},{"key":"ref208","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.02.023"},{"key":"ref205","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01001-9_10"},{"key":"ref206","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04873-4_4"},{"key":"ref211","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2018.2876226"},{"key":"ref210","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.08.006"},{"key":"ref212","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0028479"},{"key":"ref213","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2017.2710190"},{"key":"ref214","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2018.01.013"},{"key":"ref215","article-title":"Tim cook says apple to add security alerts for iCloud users","volume":"5","author":"wakabayashi","year":"2014","journal-title":"Wall Street J"},{"key":"ref216","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.02.001"},{"key":"ref217","first-page":"174","article-title":"Optimizing energy efficiency of secured IoT communication by OpenHip","author":"ka?uch","year":"2019","journal-title":"Proc 42nd Int Conf Telecommun Signal Process (TSP)"},{"key":"ref218","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2015.7247581"},{"key":"ref219","author":"nabil","year":"2018","journal-title":"Security and Privacy in Smart Sensor Networks"},{"key":"ref220","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-019-00446-x"},{"key":"ref222","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-017-0602-5"},{"key":"ref221","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.12.018"},{"key":"ref225","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.12.031"},{"key":"ref224","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2019.100093"},{"key":"ref223","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-014-9492-7"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2017.07.001"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/SECONW.2015.7328144"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2584538"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2698078"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.07.049"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1145\/2741948.2741951"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2016.91"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2694844"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.3390\/electronics8080827"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.11.009"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2767608"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1145\/3288599.3288643"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.881746"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2924045"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/KBEI.2019.8734958"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.2825478"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2017.2687918"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2017.7952524"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102630"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/ICE.2017.8279999"},{"key":"ref2","first-page":"1","article-title":"Opening Pandora&#x2019;s box: Effective techniques for reverse engineering IoT devices","author":"shwartz","year":"2017","journal-title":"Proc Int Conf Smart Card Res Adv Appl"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11227-5_23"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"ref145","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1109\/PST.2016.7906930","article-title":"Using machine learning to secure IoT systems","author":"ca\u00f1edo","year":"2016","journal-title":"Proc 14th Annu Conf Privacy Security Trust (PST)"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/CSCS.2013.58"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2014.94"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1002\/9781118821930.ch17"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2012.01.006"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-014-0761-7"},{"key":"ref104","article-title":"Energy consumption of Internet of Things applications and services","author":"gray","year":"2018"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2917555"},{"key":"ref102","first-page":"1944e","article-title":"Security policy monitoring of BPMN-based service compositions","volume":"30","author":"asim","year":"2018","journal-title":"Journal of Software: Evolution and Process"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.05.008"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2749422"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2009.60"},{"key":"ref10","author":"atherton","year":"2013","journal-title":"How Dick Cheney Took His Heart Offline To Thwart Hackers"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CAC.2018.8623230"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.11591\/ijeecs.v18.i1.pp158-166"},{"key":"ref13","year":"2020","journal-title":"ATmega4808"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.IR.8114"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SIoT.2016.012"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-017-0494-4"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2016.11.012"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/6562953"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2016.10.022"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2881444"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2767291"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2019.10.006"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/CMC.2010.34"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.09.002"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.3485"},{"key":"ref115","year":"2014","journal-title":"Hooking What is Hooking?"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.05.003"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2012.2224144"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2733225"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2016.0054"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/9371274\/09205259.pdf?arnumber=9205259","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:53:46Z","timestamp":1652194426000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9205259\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,15]]},"references-count":225,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2020.3026493","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3,15]]}}}