{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T21:05:17Z","timestamp":1768338317994,"version":"3.49.0"},"reference-count":41,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Consumer Electron. Mag."],"published-print":{"date-parts":[[2022,5,1]]},"DOI":"10.1109\/mce.2021.3079635","type":"journal-article","created":{"date-parts":[[2021,5,14]],"date-time":"2021-05-14T19:47:03Z","timestamp":1621021623000},"page":"59-68","source":"Crossref","is-referenced-by-count":19,"title":["The State of IoT Security: Unequivocal Appeal to Cybercriminals, Onerous to Defenders"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8463-1034","authenticated-orcid":false,"given":"Mohammed","family":"Alsheikh","sequence":"first","affiliation":[{"name":"The University of Michigan - Flint, Flint, MI, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0074-358X","authenticated-orcid":false,"given":"Liam","family":"Konieczny","sequence":"additional","affiliation":[{"name":"The University of Michigan - Flint, Flint, MI, USA"}]},{"given":"Michael","family":"Prater","sequence":"additional","affiliation":[{"name":"The University of Michigan - Flint, Flint, MI, USA"}]},{"given":"Gabe","family":"Smith","sequence":"additional","affiliation":[{"name":"The University of Michigan - Flint, Flint, MI, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7207-6683","authenticated-orcid":false,"given":"Suleyman","family":"Uludag","sequence":"additional","affiliation":[{"name":"The University of Michigan - Flint, Flint, MI, USA"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107593"},{"key":"ref38","article-title":"Privacy by design: The 7 foundational principles","volume":"5","author":"cavoukian","year":"2009"},{"key":"ref33","article-title":"NIST special publication 800-207, zero trust architecture","author":"rose","year":"2020"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.357"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2917223"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-011-0124-7"},{"key":"ref37","article-title":"A. Research Ecosystem for secure computing","year":"2020"},{"key":"ref36","article-title":"The IoT attack surface: Threats and security solutions","year":"2019"},{"key":"ref35","article-title":"The seven properties of highly secure devices","author":"hunt","year":"2017"},{"key":"ref34","article-title":"the IIoT attack surface: Threats and security solutions","year":"2019"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2852491"},{"key":"ref40","article-title":"NIST lightweight cryptography project","year":"2021"},{"key":"ref11","article-title":"Iot trend watch 2018","author":"morelli","year":"2018"},{"key":"ref12","article-title":"secure attack landscape update first half (H1) of 2020","year":"2020"},{"key":"ref13","article-title":"The sprawling reach of complex threats, 2019 Annual Security Roundup","year":"2020"},{"key":"ref14","article-title":"2020 global IoT\/ICS risk report","year":"2019"},{"key":"ref15","first-page":"1092","article-title":"Understanding the Mirai Botnet","author":"antonakakis","year":"2017","journal-title":"Proc Usenix Secur Symp"},{"key":"ref16","article-title":"Palo Alto networks unit 42 2020 IoT threat report","year":"2020"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2019.2953740"},{"key":"ref18","article-title":"Forescout amnesia:33 white paper: Identify and mitigate the risk from vulnerabilities lurking in millions of IoT, OT and IT devices","author":"santos","year":"2020"},{"key":"ref19","article-title":"5 must-haves to look for in a best-in-class IoT security solution","year":"2020"},{"key":"ref4","first-page":"97","article-title":"That &#x2018;Internet of Things&#x2019; thing","volume":"22","author":"ashton","year":"2009","journal-title":"RFID J"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.11.026"},{"key":"ref3","article-title":"The hidden costs of cybercrime","author":"smith","year":"2020"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2935189"},{"key":"ref6","article-title":"IDC futurescape: Worldwide IT\/OT convergence 2021 predictions","author":"lang","year":"2020"},{"key":"ref29","article-title":"Netscout threat intelligence report, issue 5: Findings from 1H 2020","author":"hummel","year":"2020"},{"key":"ref5","first-page":"1","article-title":"The Internet of Things: An overview","volume":"80","author":"rose","year":"2015","journal-title":"The Internet Society"},{"key":"ref8","article-title":"In-depth: Industry 4.0 2020, statista digital market outlook","author":"mehta","year":"0"},{"key":"ref7","article-title":"National Institute of Standards and Technology special publication 1900-202, cyber-physical systems and Internet of Things","author":"greer","year":"2019"},{"key":"ref2","article-title":"Rogue robots: Testing the limits of an industrial robot's security","author":"maggi","year":"2017"},{"key":"ref1","article-title":"2020 global threat intelligence report","year":"2020"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.11.016"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2910750"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.11.025"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2855563"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102779"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2016.07.002"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2020.100312"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2924045"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2020.100227"}],"container-title":["IEEE Consumer Electronics Magazine"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/5962380\/9770318\/09431680.pdf?arnumber=9431680","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,6]],"date-time":"2022-06-06T20:16:51Z","timestamp":1654546611000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9431680\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,1]]},"references-count":41,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/mce.2021.3079635","relation":{},"ISSN":["2162-2248","2162-2256"],"issn-type":[{"value":"2162-2248","type":"print"},{"value":"2162-2256","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,5,1]]}}}