{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T08:26:58Z","timestamp":1765268818062,"version":"3.37.3"},"reference-count":57,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,9,22]],"date-time":"2021-09-22T00:00:00Z","timestamp":1632268800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,9,22]],"date-time":"2021-09-22T00:00:00Z","timestamp":1632268800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,9,22]],"date-time":"2021-09-22T00:00:00Z","timestamp":1632268800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100009614","name":"Petroleum Technology Development Fund","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100009614","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,9,22]]},"DOI":"10.1109\/smartnets50376.2021.9555410","type":"proceedings-article","created":{"date-parts":[[2021,10,6]],"date-time":"2021-10-06T14:12:13Z","timestamp":1633529533000},"page":"1-8","source":"Crossref","is-referenced-by-count":5,"title":["Industrial and Consumer Internet of Things: Cyber Security Considerations, Threat Landscape, and Countermeasure Opportunities"],"prefix":"10.1109","author":[{"given":"Stephen","family":"Ugwuanyi","sequence":"first","affiliation":[]},{"given":"James","family":"Irvine","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Advanced Manufacturing Innovation Ecosystems: The Case of Massachusetts","year":"2017","author":"Uygun","key":"ref1"},{"article-title":"Intelligent internet of things (IoT) node demonstrator for device monitoring and control in the oil and gas sector","year":"2019","author":"Ugwuanyi","key":"ref2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700625"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICSEMR.2014.7043637"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/AFRCON.2017.8095602"},{"article-title":"Protecting the connected barrels Cybersecurity for upstream oil and gas A report by Deloitte Center for Energy Solutions","year":"2017","author":"Anshu","key":"ref6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2509994"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2018.8489489"},{"article-title":"Hackers Use DDoS Attack To Cut Heat To Apartments","year":"2016","author":"Mathews","key":"ref9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.201"},{"article-title":"Ransomware Attack Shuts Down Colonial Pipeline: NPR","year":"2021","author":"PE\u00d1ALOZA","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1515\/9781501505775"},{"key":"ref13","first-page":"60","article-title":"Cyber security","author":"Clusters","year":"2010"},{"author":"Issues","key":"ref14","article-title":"Alasdair Gilchrist IoT Security Issues"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2017.110"},{"issue":"139","key":"ref16","volume":"2013","author":"Raza","year":"2013","journal-title":"Lightweight Security Solutions for The Internet of Things"},{"issue":"July","key":"ref17","article-title":"Design, implementation and experimentation of a protocol stack for the Internet of Things","author":"Candidate","year":"2012"},{"issue":"September","key":"ref18","first-page":"1","article-title":"Why We Build Testbeds: First Results","author":"Industrial","year":"2017"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2015.7301644"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2902961.2903045"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/apccas.2018.8605707"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/IMFEDK.2016.7521693"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2016.7845456"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ISSCC.2016.7417955"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2868824"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICACT.2014.6778915"},{"year":"2018","key":"ref27","article-title":"Traffic-Aware Patching for IoT Device Cyber Security"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700621"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/access.2018.2863244"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICIT.2017.7915546"},{"article-title":"An Integrated Security Protocol Communication Scheme for Internet of Things using the Locator \/ ID Separation Protocol Network","year":"2017","author":"Raheem","key":"ref31"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2788919"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.26599\/TST.2018.9010032"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/NOTERE.2015.7293504"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2018.2799227"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2805696"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.8.7.1480-1487"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/DependSys51298.2020.00023"},{"key":"ref39","article-title":"Internet of Things Security and Challenges","author":"Bhattarai","year":"2018","journal-title":"IEEE Computer"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2747942"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2016.7783703"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3023507"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2691349"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/PHM.2017.8079208"},{"issue":"4","key":"ref45","first-page":"1026","article-title":"The State of IPv6 Deployment: A global Review","volume":"8","author":"Ugwuanyi","year":"2017"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/UEMCON.2017.8249015"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ASPDAC.2016.7428064"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ISNCC49221.2020.9297267"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ICSIGSYS.2018.8372775"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ETECHNXT.2018.8385291"},{"article-title":"Cleartext Data Transmissions in Consumer IoT Medical Devices","year":"2018","author":"Wood","key":"ref51"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01341-6"},{"issue":"6","key":"ref53","first-page":"39","article-title":"Hybrid Cryptographic Technique U Sing Rsa","volume":"6","author":"Shankar","year":"2014"},{"article-title":"Comparative Study of Different Cryptographic Algorithms for Data Security in Cloud Computing","year":"2017","author":"Sharma","key":"ref54"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ICIII.2009.569"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2649687"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT-Europe47291.2020.9248932"}],"event":{"name":"2021 International Conference on Smart Applications, Communications and Networking (SmartNets)","start":{"date-parts":[[2021,9,22]]},"location":"Glasgow, United Kingdom","end":{"date-parts":[[2021,9,24]]}},"container-title":["2021 International Conference on Smart Applications, Communications and Networking (SmartNets)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9555400\/9553005\/09555410.pdf?arnumber=9555410","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,24]],"date-time":"2024-01-24T01:32:09Z","timestamp":1706059929000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9555410\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,22]]},"references-count":57,"URL":"https:\/\/doi.org\/10.1109\/smartnets50376.2021.9555410","relation":{},"subject":[],"published":{"date-parts":[[2021,9,22]]}}}