{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T12:57:29Z","timestamp":1777640249826,"version":"3.51.4"},"reference-count":55,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T00:00:00Z","timestamp":1564617600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T00:00:00Z","timestamp":1564617600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T00:00:00Z","timestamp":1564617600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1109\/mwscas.2019.8884913","type":"proceedings-article","created":{"date-parts":[[2019,10,31]],"date-time":"2019-10-31T23:44:38Z","timestamp":1572565478000},"page":"560-565","source":"Crossref","is-referenced-by-count":14,"title":["Security Taxonomy in IoT \u2013 A Survey"],"prefix":"10.1109","author":[{"given":"Phillip","family":"Williams","sequence":"first","affiliation":[]},{"given":"Pablo","family":"Rojas","sequence":"additional","affiliation":[]},{"given":"Magdy","family":"Bayoumi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"The Threat ofCatastrophic IIoT Security Problems Grows","author":"buntz","year":"2018"},{"key":"ref38","article-title":"What About Security for Industrial IoT & Internet of Things Sensor Devices?","author":"pultar","year":"2017"},{"key":"ref33","article-title":"IoT Medical Devices Security Vulnerabilities on WiFi Networks","year":"0"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.31"},{"key":"ref31","article-title":"R7-2015-17 and R7-2015-24: Fisher-Price Smart Toy hereO GPS Platform Vulnerabilities (Fixed)","author":"stanislav","year":"2016"},{"key":"ref30","article-title":"Security and Privacy Analyses of Internet of Things Children&#x2019;s Toys","author":"chu","year":"0","journal-title":"IEEE Internet of Things Journal"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS.2009.4808850"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897886"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2017.8116427"},{"key":"ref34","article-title":"Who Will Secure the Internet of Things?","author":"feamster","year":"2016"},{"key":"ref28","article-title":"Enhancing automotive cybersecurity in Europe","author":"dimitra","year":"2018"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.23919\/ICACT.2018.8323685"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2014.2351612"},{"key":"ref2","article-title":"A Survey on Internet of Things: Security and Privacy Issues","volume":"90","author":"kumar","year":"2014","journal-title":"International Journal of Computer Applications"},{"key":"ref1","article-title":"Baseline Security Recommendations for IoT","year":"2017"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICTCS.2017.34"},{"key":"ref22","article-title":"Child safety smartwatches &#x2018;easy&#x2019; to hack, watchdog says","author":"venable","year":"2017"},{"key":"ref21","article-title":"Building the Internet of Things","author":"hoogendoorn","year":"2014"},{"key":"ref24","first-page":"27","author":"khattab","year":"2016","journal-title":"RFID security a lightweight paradigm"},{"key":"ref23","first-page":"1","article-title":"RFID security issues & challenges","author":"kulkarni","year":"2014","journal-title":"2014 International Conference on Electronics and Communication Systems (ICECS) ICECS"},{"key":"ref26","article-title":"A UPnP vulnerability hides bad traffic in a new way","author":"bacon","year":"2018"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2707465"},{"key":"ref50","article-title":"Internet of Things Security: Challenges and Best Practices","author":"bryk","year":"2018"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2017.8254011"},{"key":"ref55","article-title":"Non-Repudiation in Practice","author":"tsai","year":"0","journal-title":"Information Security Officer"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2016.7568882"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2549047"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.Workshops.2017.72"},{"key":"ref10","article-title":"Securing the Internet of Things Opportunity: Putting Cybersecurity at the Heart of IoT","year":"0"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14478-3_42"},{"key":"ref40","article-title":"The Security Challenges Facing Industrial IoT","author":"longley","year":"2016"},{"key":"ref12","article-title":"Cisco 2018 Annual Cybersecurity Report","year":"0"},{"key":"ref13","article-title":"Target credit card hack: What you need to know","author":"wallace","year":"2013"},{"key":"ref14","first-page":"256","article-title":"Security and Privacy Threats in IoT Architectures","author":"kozlov","year":"2012","journal-title":"7th International Conference on Body Area Networks BODYNETS 2012"},{"key":"ref15","article-title":"The Internet of Everything &#x2013; Harnessing the Full Potential of Internet of Things","author":"parulkar","year":"0"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2017.3680960"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2017.8038503"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICEngTechnol.2017.8308153"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICIOTA.2017.8073627"},{"key":"ref4","article-title":"ITU internet reports 2005: The internet of things","year":"2005","journal-title":"International Telecommunication Union report"},{"key":"ref3","article-title":"That &#x2019;internet of things&#x2019; thing in the real world, things matter more than ideas","author":"ashton","year":"2009","journal-title":"RFID Journal"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SCORED.2017.8305419"},{"key":"ref5","author":"vermesan","year":"2012","journal-title":"The Internet of Things 2012-New Horizons"},{"key":"ref8","article-title":"Popular Internet of Things Forecast of 50 Billion Devices by 2020 Is Outdated","author":"nordrum","year":"2016"},{"key":"ref7","article-title":"The Internet of Things How the Next Evolution of the Internet Is Changing Everything","author":"evans","year":"2011"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2852563"},{"key":"ref9","article-title":"Internet of Things Forecast","year":"0"},{"key":"ref46","article-title":"Baby Monitor Hack Could Happen to 40,000 Other Foscam Users","author":"hill","year":"2013"},{"key":"ref45","first-page":"1","author":"macaulay","year":"2016","journal-title":"RIoT Control Understanding and Managing Risks and the Internet of Things"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ICFCC.2009.79"},{"key":"ref47","year":"2015","journal-title":"Hackers remotely kill a jeep on the highwaywith me in it"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2018.8647762"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2747942"},{"key":"ref44","article-title":"IoT Calamity: The Panda Monium","year":"2017"},{"key":"ref43","article-title":"FDA Issues Alert Over Vulnerable Hospira Drug Pumps","author":"kovacs","year":"2015"}],"event":{"name":"2019 IEEE 62nd International Midwest Symposium on Circuits and Systems (MWSCAS)","location":"Dallas, TX, USA","start":{"date-parts":[[2019,8,4]]},"end":{"date-parts":[[2019,8,7]]}},"container-title":["2019 IEEE 62nd International Midwest Symposium on Circuits and Systems (MWSCAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8882388\/8884793\/08884913.pdf?arnumber=8884913","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T21:55:37Z","timestamp":1658094937000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8884913\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8]]},"references-count":55,"URL":"https:\/\/doi.org\/10.1109\/mwscas.2019.8884913","relation":{},"subject":[],"published":{"date-parts":[[2019,8]]}}}