{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T10:08:52Z","timestamp":1771063732706,"version":"3.50.1"},"reference-count":45,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"13","license":[{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2020AAA0107700"],"award-info":[{"award-number":["2020AAA0107700"]}]},{"name":"National Key Research and Development Program of China","award":["2018YFB0803600"],"award-info":[{"award-number":["2018YFB0803600"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972348"],"award-info":[{"award-number":["61972348"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072398"],"award-info":[{"award-number":["62072398"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Zhejiang Key Research and Development Plan","award":["2019C03133"],"award-info":[{"award-number":["2019C03133"]}]},{"name":"Leading Innovative and Entrepreneur Team Introduction Program of Zhejiang","award":["2018R01005"],"award-info":[{"award-number":["2018R01005"]}]},{"name":"Alibaba-Zhejiang University Joint Institute of Frontier Technologies"},{"DOI":"10.13039\/100017132","name":"Research Institute of Cyberspace Governance in Zhejiang University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100017132","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2021,7,1]]},"DOI":"10.1109\/jiot.2021.3050710","type":"journal-article","created":{"date-parts":[[2021,1,13]],"date-time":"2021-01-13T04:29:36Z","timestamp":1610512176000},"page":"10884-10895","source":"Crossref","is-referenced-by-count":28,"title":["G2F: A Secure User Authentication for Rapid Smart Home IoT Management"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8646-6650","authenticated-orcid":false,"given":"Hongwei","family":"Luo","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0906-445X","authenticated-orcid":false,"given":"Chao","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Hao","family":"Luo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6087-8243","authenticated-orcid":false,"given":"Fan","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5240-5200","authenticated-orcid":false,"given":"Feng","family":"Lin","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9582-0698","authenticated-orcid":false,"given":"Guoai","family":"Xu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","year":"2021","journal-title":"Alibaba cloud"},{"key":"ref38","year":"2021","journal-title":"U2F Libraries"},{"key":"ref33","first-page":"59","article-title":"Advanced hardware hacking techniques","volume":"12","author":"grand","year":"2004","journal-title":"Proc DEFCON Conf"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3084041.3084061"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3241539.3267743"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409959"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2017.7962667"},{"key":"ref36","first-page":"18","article-title":"A taxonomy of phishing: Attack types spanning economic, temporal, breadth, and target boundaries","volume":"1","author":"pienta","year":"2018","journal-title":"Proc 13th Pre-ICIS Workshop Inf Security Privacy"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3333165.3333169"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41284-4_11"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2019.8685568"},{"key":"ref40","year":"2021","journal-title":"AWS IoT"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/info7030044"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/2197237"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.03.013"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICUFN.2017.7993848"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2017.7917622"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2006.50"},{"key":"ref17","first-page":"1","author":"srinivas","year":"2015","journal-title":"Universal 2nd Factor (U2F) Overview"},{"key":"ref18","year":"2019","journal-title":"Client to authenticator protocol (CTAP)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2012.6289309"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057145"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455782"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MASS.2018.00047"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1290958.1290968"},{"key":"ref6","author":"rieck","year":"2016","journal-title":"Attacks on Fitness Trackers Revisited A Case-Study of Unfit Firmware Security"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2005.26"},{"key":"ref5","first-page":"134","article-title":"When firmware modifications attack: A case study of embedded exploitation","author":"cui","year":"2013","journal-title":"Proc Symp Network and Distributed System Security"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818024"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45472-5_24"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1071\/AH14090"},{"key":"ref9","first-page":"5","article-title":"Breaking cell phone authentication: Vulnerabilities in AKA, IMS and Android","author":"beekman","year":"2013","journal-title":"Proc 7th USENIX Workshop Offensive Technol"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICRCICN.2018.8718722"},{"key":"ref20","first-page":"1","article-title":"SMEPP: A secure middleware for embedded P2P","volume":"9","author":"benito","year":"2009","journal-title":"Proc ICT-MobileSummit"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2015.7346887"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CEEC.2014.6958565"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/IOT.2014.7030106"},{"key":"ref42","year":"2021","journal-title":"Yubikey"},{"key":"ref24","year":"2021","journal-title":"7 Most Infamous Cloud Security Breaches"},{"key":"ref41","year":"2021","journal-title":"Microsoft Azure"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700364"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2780232"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2012.6181122"},{"key":"ref43","year":"2021","journal-title":"Netem"},{"key":"ref25","first-page":"1227","article-title":"A survey on cloud computing security, challenges and threats","volume":"3","author":"choubey","year":"2011","journal-title":"Int J Comput Sci Eng"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/9462546\/09319261.pdf?arnumber=9319261","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:53:50Z","timestamp":1652194430000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9319261\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,1]]},"references-count":45,"journal-issue":{"issue":"13"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2021.3050710","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,7,1]]}}}