{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T16:33:41Z","timestamp":1775666021163,"version":"3.50.1"},"reference-count":99,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"13","license":[{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100006754","name":"Army Research Laboratory","doi-asserted-by":"publisher","award":["W911NF-20-2-0277"],"award-info":[{"award-number":["W911NF-20-2-0277"]}],"id":[{"id":"10.13039\/100006754","id-type":"DOI","asserted-by":"publisher"}]},{"name":"PayPal Research","award":["PP2020-21"],"award-info":[{"award-number":["PP2020-21"]}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2039583"],"award-info":[{"award-number":["2039583"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2023,7,1]]},"DOI":"10.1109\/jiot.2023.3252594","type":"journal-article","created":{"date-parts":[[2023,3,6]],"date-time":"2023-03-06T18:44:17Z","timestamp":1678128257000},"page":"11224-11239","source":"Crossref","is-referenced-by-count":103,"title":["Advances in IoT Security: Vulnerabilities, Enabled Criminal Services, Attacks, and Countermeasures"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-7074-1188","authenticated-orcid":false,"given":"Yuba Raj","family":"Siwakoti","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Science, Howard University, Washington, DC, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0699-4889","authenticated-orcid":false,"given":"Manish","family":"Bhurtel","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Science, Howard University, Washington, DC, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3638-3464","authenticated-orcid":false,"given":"Danda B.","family":"Rawat","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Science, Howard University, Washington, DC, USA"}]},{"given":"Adam","family":"Oest","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Science, Howard University, Washington, DC, USA"}]},{"given":"R. C.","family":"Johnson","sequence":"additional","affiliation":[{"name":"Fraud Defense Cyber Center, PayPal Inc., Scottsdale, AZ, USA"}]}],"member":"263","reference":[{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2019.2953740"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58201-2_19"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101648"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2020.100227"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.2966951"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313489"},{"key":"ref55","year":"2018","journal-title":"Know Your IOT Security Risk How Hackable"},{"key":"ref54","author":"gretzky","year":"2017","journal-title":"Evilginx-Advanced Phishing with Two-factor Authentication Bypass"},{"key":"ref51","first-page":"361","article-title":"Sunrise to sunset: Analyzing the end-to-end life cycle and effectiveness of phishing attacks at scale","author":"oest","year":"2020","journal-title":"Proc 29th USENIX Security Symp ( USENIX Security)"},{"key":"ref50","year":"2015","journal-title":"Criminal hideouts for lease Bulletproof hosting services"},{"key":"ref46","author":"shrobe","year":"2018","journal-title":"Fixing a Hole The Labor Market for Bugs"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052715"},{"key":"ref48","author":"kamluk","year":"2016","journal-title":"Adwind&#x2014;A Cross Platform RAT"},{"key":"ref47","author":"manyika","year":"2015","journal-title":"A Labor Market That Works Connecting Talent With Opportunity in the Digital Age"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ECRIME.2017.7945053"},{"key":"ref41","year":"2022","journal-title":"Trellix"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.17"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.55"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/s10458-016-9342-8"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2924045"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.18196\/jrc.2150"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s41635-017-0029-7"},{"key":"ref4","year":"2022","journal-title":"DDoS Attack That Disrupted Internet Was Largest of Its Kind in History Experts Say&#x2014;Hacking&#x2014;The Guardian"},{"key":"ref3","year":"2020","journal-title":"Amnesia 33 Identify and Mitigate the Risk From Vulnerabilities Lurking in Millions of IoT OT and IT Device"},{"key":"ref6","year":"2022","journal-title":"Owlet baby wi-fi monitor &#x201C;worst IoT security of 2016"},{"key":"ref5","year":"2022","journal-title":"Webcam Maker Takes FTC's Heat for Internet-of-Things Security Failure"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741650"},{"key":"ref35","author":"gonchrov","year":"2012","journal-title":"Russian Underground 101"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3317549.3323404"},{"key":"ref37","year":"2022","journal-title":"Offensive Security"},{"key":"ref36","year":"2011","journal-title":"Tracking Cyber Crime Scan4you net (Private AV Checker)"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2016.2646687"},{"key":"ref30","year":"2022","journal-title":"0day Today Agreement&#x2014;0Day Today Exploit Database Vulnerability 0Day New Exploits Buy and Sell Private Exploit Shellcode by 0Day Today Team"},{"key":"ref33","author":"maor","year":"2018","journal-title":"No Money Mule No Problem Recruitment Website Kits for Sale"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2501654.2501663"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2013.01.002"},{"key":"ref38","author":"reuter","year":"2005","journal-title":"Chasing Dirty Money The Fight Against Money Laundering[M]"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-6353-9_46"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/8847099"},{"key":"ref26","first-page":"1","article-title":"Security trends in Internet of Things: A survey","volume":"3","author":"bhatt","year":"2021","journal-title":"SN Appl Sci"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/5579148"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2021.100365"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-5400-1_68"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2021.100389"},{"key":"ref28","year":"2022","journal-title":"National Vulnerability Database"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-7998-8954-0.ch081"},{"key":"ref29","article-title":"The Internet of Things in the cybercrime underground","author":"hilt","year":"0","journal-title":"Trend Micro Research"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2018.3011051"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.11.022"},{"key":"ref15","doi-asserted-by":"crossref","DOI":"10.15760\/honors.579","article-title":"Internet of Things security: Ongoing threats and proposed solutions","author":"strba","year":"2018"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/5483472"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1145\/3211933.3211946"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2812239"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2019.100129"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2020.101779"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417892"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2018.2880806"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1016\/j.comnet.2018.11.025","article-title":"Current research on Internet of Things (IoT) security: A survey","volume":"148","author":"hassan","year":"2019","journal-title":"Comput Netw"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3199674"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2986444"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2988293"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2565198"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2524258"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35326-0_52"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2015.2404803"},{"key":"ref91","first-page":"993","author":"nan","year":"2015","journal-title":"Proc 24th USENIX Security Symp ( USENIX Security)"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2009.60"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2010.23"},{"key":"ref86","first-page":"1","article-title":"A critical analysis on the security concerns of Internet of Things (IoT)","volume":"111","author":"khairi","year":"2015","journal-title":"Perception"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1145\/3487552.3487833"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.5120\/5056-7374"},{"key":"ref87","first-page":"14","article-title":"Classification of RFID attacks","volume":"15693","author":"mitrokotsa","year":"2010","journal-title":"GEN"},{"key":"ref82","article-title":"Enhancing IoT security through network softwarization and virtual security appliances","volume":"28","author":"zarca","year":"2018","journal-title":"Int J Netw Manag"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/IOTSMS52051.2020.9340224"},{"key":"ref84","first-page":"1169","article-title":"All things considered: An analysis of IoT devices on home networks","author":"kumar","year":"2019","journal-title":"Proc 28th USENIX Security Symp ( USENIX Security)"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.3390\/fi12030055"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2018.08.021"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/RICE.2018.8627903"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2017.7917634"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3077803"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2020.3031358"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1007\/s42521-021-00044-4"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.3390\/s21041034"},{"key":"ref2","author":"sinha","year":"2022","journal-title":"State of IoT 2021 Number of Connected IoT Devices Growing % to 12 3 B"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2910750"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2017.8004904"},{"key":"ref70","article-title":"Analyzing the IoT threat landscape within university network environments using honeypots","author":"peinert","year":"2020"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-74644-5_3"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1145\/3406115"},{"key":"ref68","first-page":"906","article-title":"System hardening and security monitoring for IoT devices to mitigate IoT security vulnerabilities and threats","volume":"12","author":"choi","year":"2018","journal-title":"KSII Trans Internet Inf Syst"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/3365995"},{"key":"ref69","year":"2022","journal-title":"OWASP Internet of Things Project - OWASP"},{"key":"ref64","year":"2020","journal-title":"Ripple 20 19 Zero-Day Vulnerabilities Amplified by the Supply Chain"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2017.8254011"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.3390\/s21062039"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2021.102728"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.2825478"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-64483-7_11"},{"key":"ref61","first-page":"172","article-title":"IoT security vulnerability: A case study of a Web camera","author":"seralathan","year":"2018","journal-title":"Proc IEEE 20th Int Conf Adv Commun Technol (ICACT)"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/6488907\/10159464\/10059147-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/10159464\/10059147.pdf?arnumber=10059147","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,10]],"date-time":"2023-07-10T19:36:21Z","timestamp":1689017781000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10059147\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,1]]},"references-count":99,"journal-issue":{"issue":"13"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2023.3252594","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,7,1]]}}}