{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T06:12:22Z","timestamp":1774678342587,"version":"3.50.1"},"reference-count":45,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2016,5,1]],"date-time":"2016-05-01T00:00:00Z","timestamp":1462060800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Proc. IEEE"],"published-print":{"date-parts":[[2016,5]]},"DOI":"10.1109\/jproc.2015.2513672","type":"journal-article","created":{"date-parts":[[2016,3,2]],"date-time":"2016-03-02T19:11:22Z","timestamp":1456945882000},"page":"938-946","source":"Crossref","is-referenced-by-count":126,"title":["Using Smart Edge IoT Devices for Safer, Rapid Response With Industry IoT Control Operations"],"prefix":"10.1109","volume":"104","author":[{"given":"Michael W.","family":"Condry","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Catherine Blackadar","family":"Nelson","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04062-7_19"},{"key":"ref38","first-page":"465","article-title":"Biovault: Solving the problem of replay in biometrics","author":"tait","year":"0","journal-title":"Proc IFIP Conf E-Commerce E-Business E-Government"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/WIRELESSVITAE.2011.5940923"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCNT.2013.6726619"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2013.25"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICPHM.2013.6621448"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"259","DOI":"10.3233\/JCS-2010-0407","article-title":"Practical eaves dropping and skimming attacks on high-frequency RFID tokens","volume":"19","author":"hancke","year":"2011","journal-title":"J Comput Security"},{"key":"ref36","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4471-6524-8","author":"marcel","year":"2014","journal-title":"Handbook of Biometric Anti-Spoofing Trusted Biometrics Under Spoofing Attacks"},{"key":"ref35","year":"2015","journal-title":"Trustzone"},{"key":"ref34","year":"0","journal-title":"RealSense"},{"key":"ref10","article-title":"Researchers hijack teleoperated surgical robot: Remote surgery hacking threats","author":"storm","year":"2015","journal-title":"Computer World"},{"key":"ref40","first-page":"18","article-title":"A multi-factor security protocol for wireless payment&#x2014;Secure web authentication using mobile devices","author":"tiwari","year":"0","journal-title":"Proc of the IADIS Int Conf on Applied Computing"},{"key":"ref11","author":"wilhoit","year":"2013","journal-title":"Who's Really Attacking Your ICS Equipment?"},{"key":"ref12","year":"2006","journal-title":"Biometrics Frequently Asked Questions"},{"key":"ref13","article-title":"Biometric authentication techniques","author":"basishtha","year":"2013","journal-title":"M Tech Scholar"},{"key":"ref14","article-title":"What is multi-factor authentication, and how will it change in the future?","author":"myers","year":"2012","journal-title":"The Mac Security Blog"},{"key":"ref15","author":"scarfone","year":"2009","journal-title":"Guide to enterprise password management"},{"key":"ref16","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4471-6524-8","author":"marcel","year":"2014","journal-title":"Handbook of Biometric Anti-Spoofing Trusted Biometrics Under Spoofing Attacks"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2004.827372"},{"key":"ref18","year":"2003","journal-title":"Biometrics Advantages and disadvantages of technologies"},{"key":"ref19","year":"2013","journal-title":"Chaos Computer Club Breaks Apple TouchID"},{"key":"ref28","article-title":"California oil spill could cause long-term damage and &#x2018;smother' ecosystem","author":"carroll","year":"2015","journal-title":"The Guardian"},{"key":"ref4","author":"schneider","year":"2014","journal-title":"Understanding how IoT systems scale and evolve"},{"key":"ref27","article-title":"California oil spill grows to 9 miles along coast","year":"2015","journal-title":"HuffPost Green"},{"key":"ref3","year":"2015","journal-title":"Transforming brownfield to greenfield in the Internet of Thing"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-05624-1"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2366120"},{"key":"ref5","first-page":"14a","article-title":"Oil again fouling coast near site of historic spill","author":"nagourney","year":"2015","journal-title":"The New York Times"},{"key":"ref8","author":"bonaci","year":"2015","journal-title":"To make a robot secure An experimental analysis of cyber security threats against teleoperated surgical robotics"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2012.6389299"},{"key":"ref2","author":"sandor","year":"2013","journal-title":"Wind River Intel&s core technology provider or IoT"},{"key":"ref9","article-title":"UW researchers hack a teleoperated surgical robot to reveal security flaws","author":"langston","year":"2015","journal-title":"UWI Today"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2015.12"},{"key":"ref20","article-title":"Impact of artificial gummy fingers on fingerprint systems","volume":"4677","author":"matsumoto","year":"2002","journal-title":"Proc SPIE&#x2014;Int Soc Opt Eng"},{"key":"ref45","year":"2015","journal-title":"Internet of Things products and solutions"},{"key":"ref22","article-title":"Your face is NOT your password","author":"duc","year":"2009","journal-title":"Black Hat Briefings"},{"key":"ref21","article-title":"Apple's iPhone 5S fingerprint scanner hacked after just two days&#x2014;Using a copy of a print made from a photo","author":"woollaston","year":"2013","journal-title":"Daily Mail"},{"key":"ref42","author":"kagermann","year":"2013","journal-title":"Recommendations for Implementing the Strategic Initiative INDUSTRIE 4 0"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ISPA.2009.5297688"},{"key":"ref41","author":"woodward","year":"2004","journal-title":"Biometrics Identity Assurance in the Information Age"},{"key":"ref23","article-title":"Face recognition security, even with a &#x2018;Blink Test', is easy to trick","author":"moren","year":"2015","journal-title":"Popular Sci"},{"key":"ref44","year":"2015","journal-title":"The Internet of Things (IoT) starts with Intel inside"},{"key":"ref26","first-page":"57","article-title":"Fake fingers in fingerprint recognition: Glycerin supersedes gelatin","author":"barral","year":"2008","journal-title":"Formal to Practical Security"},{"key":"ref43","article-title":"Industry 4.0 in big data environment","volume":"26","author":"lee","year":"2013","journal-title":"Harting Tec News"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1504\/IJESDF.2014.060170"}],"container-title":["Proceedings of the IEEE"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/5\/7456363\/07423655.pdf?arnumber=7423655","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,14]],"date-time":"2024-06-14T18:48:32Z","timestamp":1718390912000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7423655\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5]]},"references-count":45,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/jproc.2015.2513672","relation":{},"ISSN":["0018-9219","1558-2256"],"issn-type":[{"value":"0018-9219","type":"print"},{"value":"1558-2256","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,5]]}}}