{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T22:23:31Z","timestamp":1765232611376,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,8,27]],"date-time":"2018-08-27T00:00:00Z","timestamp":1535328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,8,27]]},"DOI":"10.1145\/3230833.3232800","type":"proceedings-article","created":{"date-parts":[[2018,8,13]],"date-time":"2018-08-13T12:29:48Z","timestamp":1534163388000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Security Threats and Possible Countermeasures in IoT Applications Covering Different Industry Domains"],"prefix":"10.1145","author":[{"given":"Musa G.","family":"Samaila","sequence":"first","affiliation":[{"name":"Instituto de Telecomunica\u00e7\u00f5es, and Department of Computer Science, Universidade da Beira Interior, Covilh\u00e3, Portugal, Centre for Geodesy and Geodynamics, National Space Research and Development Agency, Toro, Bauchi State, Nigeria"}]},{"given":"Jo\u00e3o B. F.","family":"Sequeiros","sequence":"additional","affiliation":[{"name":"Instituto de Telecomunica\u00e7\u00f5es, and Department of Computer Science, Universidade da Beira Interior, Covilh\u00e3, Portugal"}]},{"given":"M\u00e1rio M.","family":"Freire","sequence":"additional","affiliation":[{"name":"Instituto de Telecomunica\u00e7\u00f5es, and Department of Computer Science, Universidade da Beira Interior, Covil\u00e3, Portugal"}]},{"given":"Pedro R. M.","family":"In\u00e1cio","sequence":"additional","affiliation":[{"name":"Instituto de Telecomunica\u00e7\u00f5es, and Department of Computer Science, Universidade da Beira Interior, Covilh\u00e3, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2018,8,27]]},"reference":[{"volume-title":"6th ESA Workshop on Satellite Navigation Technologies (Navitec 2012) European Workshop on GNSS Signals and Signal Processing. 1--7.","author":"Borio D.","key":"e_1_3_2_1_1_1","unstructured":"D. Borio , C. O'Driscoll , and J. Fortuny . 2012. GNSS Jammers: Effects and countermeasures . In 6th ESA Workshop on Satellite Navigation Technologies (Navitec 2012) European Workshop on GNSS Signals and Signal Processing. 1--7. D. Borio, C. O'Driscoll, and J. Fortuny. 2012. GNSS Jammers: Effects and countermeasures. In 6th ESA Workshop on Satellite Navigation Technologies (Navitec 2012) European Workshop on GNSS Signals and Signal Processing. 1--7."},{"key":"e_1_3_2_1_2_1","unstructured":"P. Boughton. 2018. World's Smallest Seismic Sensor for the Internet of Things. (2018). http:\/\/www.engineerlive.com\/content\/world-s-smallest-seismic-sensor-internet-things  P. Boughton. 2018. World's Smallest Seismic Sensor for the Internet of Things. (2018). http:\/\/www.engineerlive.com\/content\/world-s-smallest-seismic-sensor-internet-things"},{"volume-title":"IFIP\/IEEE International Symposium on Integrated Network Management (IM). 606--611","author":"Cervantes C.","key":"e_1_3_2_1_3_1","unstructured":"C. Cervantes , D. Poplade , M. Nogueira , and A. Santos . 2015. Detection of Sinkhole Attacks for Supporting Secure Routing on 6LoWPAN for Internet of Things . In IFIP\/IEEE International Symposium on Integrated Network Management (IM). 606--611 . C. Cervantes, D. Poplade, M. Nogueira, and A. Santos. 2015. Detection of Sinkhole Attacks for Supporting Secure Routing on 6LoWPAN for Internet of Things. In IFIP\/IEEE International Symposium on Integrated Network Management (IM). 606--611."},{"key":"e_1_3_2_1_4_1","volume-title":"Random Key Predistribution Schemes for Sensor Networks. In Symposium on Security and Privacy","author":"Chan H.","year":"2003","unstructured":"H. Chan , A. Perrig , and D. Song . 2003 . Random Key Predistribution Schemes for Sensor Networks. In Symposium on Security and Privacy , 2003 . 197--213. H. Chan, A. Perrig, and D. Song. 2003. Random Key Predistribution Schemes for Sensor Networks. In Symposium on Security and Privacy, 2003. 197--213."},{"volume-title":"International Conference on Computing, Communication and Automation (ICCCA). 630--636","author":"Das A.","key":"e_1_3_2_1_5_1","unstructured":"A. Das , Rishikesh, and P. N. Astya . 2017. A Relative Survey of Various LEACH based Routing Protocols in Wireless Sensor Networks . In International Conference on Computing, Communication and Automation (ICCCA). 630--636 . A. Das, Rishikesh, and P. N. Astya. 2017. A Relative Survey of Various LEACH based Routing Protocols in Wireless Sensor Networks. In International Conference on Computing, Communication and Automation (ICCCA). 630--636."},{"volume-title":"IEEE International Conference on Internet of Things (iThings). 748--755","author":"Firdous S. N.","key":"e_1_3_2_1_6_1","unstructured":"S. N. Firdous , Z. Baig , C. Valli , and A. Ibrahim . 2017. Modelling and Evaluation of Malicious Attacks against the IoT MQTT Protocol . In IEEE International Conference on Internet of Things (iThings). 748--755 . S. N. Firdous, Z. Baig, C. Valli, and A. Ibrahim. 2017. Modelling and Evaluation of Malicious Attacks against the IoT MQTT Protocol. In IEEE International Conference on Internet of Things (iThings). 748--755."},{"volume-title":"International Conference on Cyber Security And Protection Of Digital Services (Cyber Security). 1--7.","author":"Fraunholz D.","key":"e_1_3_2_1_7_1","unstructured":"D. Fraunholz , D. Krohmer , S. D. Anton , and H. Dieter Schotten . 2017. Investigation of Cyber Crime Conducted by Abusing Weak or Default Passwords with a Medium Interaction Honeypot . In International Conference on Cyber Security And Protection Of Digital Services (Cyber Security). 1--7. D. Fraunholz, D. Krohmer, S. D. Anton, and H. Dieter Schotten. 2017. Investigation of Cyber Crime Conducted by Abusing Weak or Default Passwords with a Medium Interaction Honeypot. In International Conference on Cyber Security And Protection Of Digital Services (Cyber Security). 1--7."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPOT.2014.2357491"},{"volume-title":"Earthquake Monitoring and Warning System. In International Conference on Advances in Electrical Engineering (ICAEE). 109--112","author":"Hoque R.","key":"e_1_3_2_1_9_1","unstructured":"R. Hoque , S. Hassan , M. A. Sadaf , A. Galib , and T. F. Karim . 2015 . Earthquake Monitoring and Warning System. In International Conference on Advances in Electrical Engineering (ICAEE). 109--112 . R. Hoque, S. Hassan, M. A. Sadaf, A. Galib, and T. F. Karim. 2015. Earthquake Monitoring and Warning System. In International Conference on Advances in Electrical Engineering (ICAEE). 109--112."},{"volume-title":"5th International Conference on Digital Information Processing and Communications (ICDIPC). 159--164","author":"Ibrahim M.","key":"e_1_3_2_1_10_1","unstructured":"M. Ibrahim , A. Elgamri , S. Babiker , and A. Mohamed . 2015. Internet of Things based Smart Environmental Monitoring using the Raspberry-Pi Computer . In 5th International Conference on Digital Information Processing and Communications (ICDIPC). 159--164 . M. Ibrahim, A. Elgamri, S. Babiker, and A. Mohamed. 2015. Internet of Things based Smart Environmental Monitoring using the Raspberry-Pi Computer. In 5th International Conference on Digital Information Processing and Communications (ICDIPC). 159--164."},{"volume-title":"The Mirai Botnet and the IoT Zombie Armies. In IEEE Military Communications Conference (MILCOM). 267--272","author":"Kambourakis G.","key":"e_1_3_2_1_11_1","unstructured":"G. Kambourakis , C. Kolias , and A. Stavrou . 2017 . The Mirai Botnet and the IoT Zombie Armies. In IEEE Military Communications Conference (MILCOM). 267--272 . G. Kambourakis, C. Kolias, and A. Stavrou. 2017. The Mirai Botnet and the IoT Zombie Armies. In IEEE Military Communications Conference (MILCOM). 267--272."},{"volume-title":"Real Time Monitoring Alert System for Landslide. In 2nd International Conference on Contemporary Computing and Informatics (IC3I). 584--589","author":"Kapoor S.","key":"e_1_3_2_1_12_1","unstructured":"S. Kapoor , H. Pahuja , and B. Singh . 2016 . Real Time Monitoring Alert System for Landslide. In 2nd International Conference on Contemporary Computing and Informatics (IC3I). 584--589 . S. Kapoor, H. Pahuja, and B. Singh. 2016. Real Time Monitoring Alert System for Landslide. In 2nd International Conference on Contemporary Computing and Informatics (IC3I). 584--589."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2017.18"},{"key":"e_1_3_2_1_14_1","first-page":"1","article-title":"Redundant Reader Elimination in Large-Scale Distributed RFID Networks","volume":"99","author":"Ma M.","year":"2018","unstructured":"M. Ma , P. Wang , and C. H. Chu . 2018 . Redundant Reader Elimination in Large-Scale Distributed RFID Networks . IEEE Internet of Things Journal PP , 99 (2018), 1 -- 1 . M. Ma, P. Wang, and C. H. Chu. 2018. Redundant Reader Elimination in Large-Scale Distributed RFID Networks. IEEE Internet of Things Journal PP, 99 (2018), 1--1.","journal-title":"IEEE Internet of Things Journal PP"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2689040"},{"volume-title":"Data and Control Points: A Programming Model for Resource-constrained IoT Cloud Edge Devices. In IEEE International Conference on Systems, Man, and Cybernetics (SMC). 3535--3540","author":"Nastic S.","key":"e_1_3_2_1_16_1","unstructured":"S. Nastic , H. L. Truong , and S. Dustdar . 2017 . Data and Control Points: A Programming Model for Resource-constrained IoT Cloud Edge Devices. In IEEE International Conference on Systems, Man, and Cybernetics (SMC). 3535--3540 . S. Nastic, H. L. Truong, and S. Dustdar. 2017. Data and Control Points: A Programming Model for Resource-constrained IoT Cloud Edge Devices. In IEEE International Conference on Systems, Man, and Cybernetics (SMC). 3535--3540."},{"key":"e_1_3_2_1_17_1","unstructured":"D. Niewolny. 2014. How the Internet of Things Is Revolutionizing Healthcare. (2014). http:\/\/cache.freescale.com\/files\/corporate\/doc\/white_paper\/IOTREVH\\EALCARWP.pdf (accessed 20.02.15).  D. Niewolny. 2014. How the Internet of Things Is Revolutionizing Healthcare. (2014). http:\/\/cache.freescale.com\/files\/corporate\/doc\/white_paper\/IOTREVH\\EALCARWP.pdf (accessed 20.02.15)."},{"volume-title":"Security Requirements Analysis for the IoT. In International Conference on Platform Technology and Service (PlatCon). 1--6.","author":"Oh S. R.","key":"e_1_3_2_1_19_1","unstructured":"S. R. Oh and Y. G. Kim . 2017 . Security Requirements Analysis for the IoT. In International Conference on Platform Technology and Service (PlatCon). 1--6. S. R. Oh and Y. G. Kim. 2017. Security Requirements Analysis for the IoT. In International Conference on Platform Technology and Service (PlatCon). 1--6."},{"volume-title":"Application of Artificial Intelligence in Internet of Things. In 9th International Conference on Computational Intelligence and Communication Networks (CICN). 169--173","author":"Osuwa A. A.","key":"e_1_3_2_1_20_1","unstructured":"A. A. Osuwa , E. B. Ekhoragbon , and L. T. Fat . 2017 . Application of Artificial Intelligence in Internet of Things. In 9th International Conference on Computational Intelligence and Communication Networks (CICN). 169--173 . A. A. Osuwa, E. B. Ekhoragbon, and L. T. Fat. 2017. Application of Artificial Intelligence in Internet of Things. In 9th International Conference on Computational Intelligence and Communication Networks (CICN). 169--173."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700299"},{"volume-title":"IoT Security Framework for Smart Water System. In IEEE\/ACS 14th International Conference on Computer Systems and Applications (AICCSA). 1285--1292","author":"Pacheco J.","key":"e_1_3_2_1_22_1","unstructured":"J. Pacheco , D. Ibarra , A. Vijay , and S. Hariri . 2017 . IoT Security Framework for Smart Water System. In IEEE\/ACS 14th International Conference on Computer Systems and Applications (AICCSA). 1285--1292 . J. Pacheco, D. Ibarra, A. Vijay, and S. Hariri. 2017. IoT Security Framework for Smart Water System. In IEEE\/ACS 14th International Conference on Computer Systems and Applications (AICCSA). 1285--1292."},{"volume-title":"International Conference on Micro-Electronics and Telecommunication Engineering (ICMETE). 121--126","author":"Patel B. D.","key":"e_1_3_2_1_23_1","unstructured":"B. D. Patel and A. D. Patel . 2016. A Trust Based Solution for Detection of Network Layer Attacks in Sensor Networks . In International Conference on Micro-Electronics and Telecommunication Engineering (ICMETE). 121--126 . B. D. Patel and A. D. Patel. 2016. A Trust Based Solution for Detection of Network Layer Attacks in Sensor Networks. In International Conference on Micro-Electronics and Telecommunication Engineering (ICMETE). 121--126."},{"key":"e_1_3_2_1_24_1","first-page":"1","article-title":"Digital Twin and Big Data Towards Smart Manufacturing and Industry 4.0: 360 Degree Comparison","volume":"99","author":"Qi Q.","year":"2018","unstructured":"Q. Qi and F. Tao . 2018 . Digital Twin and Big Data Towards Smart Manufacturing and Industry 4.0: 360 Degree Comparison . IEEE Access PP , 99 (2018), 1 -- 1 . Q. Qi and F. Tao. 2018. Digital Twin and Big Data Towards Smart Manufacturing and Industry 4.0: 360 Degree Comparison. IEEE Access PP, 99 (2018), 1--1.","journal-title":"IEEE Access PP"},{"volume-title":"IEEE Global Communications Conference (GLOBECOM). 1--6.","author":"Qiu Y.","key":"e_1_3_2_1_25_1","unstructured":"Y. Qiu and M. Ma . 2016. APMIPv6-Based Secured Mobility Scheme for 6LoWPAN . In IEEE Global Communications Conference (GLOBECOM). 1--6. Y. Qiu and M. Ma. 2016. APMIPv6-Based Secured Mobility Scheme for 6LoWPAN. In IEEE Global Communications Conference (GLOBECOM). 1--6."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.20"},{"volume-title":"Networks of the Future","author":"Samaila M. G.","key":"e_1_3_2_1_27_1","unstructured":"M. G. Samaila , J. B. F. Sequeiros , A. F. P. P. Correia , M. M. Freire , and P. R. M. In\u00e1cio . 2018. Networks of the Future . CRC Press , Chapter A Quick Perspective on the Current State of IoT Security: A Survey, 431--464. M. G. Samaila, J. B. F. Sequeiros, A. F. P. P. Correia, M. M. Freire, and P. R. M. In\u00e1cio. 2018. Networks of the Future. CRC Press, Chapter A Quick Perspective on the Current State of IoT Security: A Survey, 431--464."},{"volume-title":"Multimedia Security Perspectives in IoT. In Sixth International Conference on Innovative Computing Technology (INTECH). 550--555","author":"Shifa A.","key":"e_1_3_2_1_28_1","unstructured":"A. Shifa , M. N. Asghar , and M. Fleury . 2016 . Multimedia Security Perspectives in IoT. In Sixth International Conference on Innovative Computing Technology (INTECH). 550--555 . A. Shifa, M. N. Asghar, and M. Fleury. 2016. Multimedia Security Perspectives in IoT. In Sixth International Conference on Innovative Computing Technology (INTECH). 550--555."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICGCIoT.2015.7380718"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2015.7389052"},{"volume-title":"Control Systems and the Internet of Things -Shrinking the Factory. In 56th FITCE Congress. 68--73","author":"Smith E.","key":"e_1_3_2_1_31_1","unstructured":"E. Smith and L. Fuller . 2017 . Control Systems and the Internet of Things -Shrinking the Factory. In 56th FITCE Congress. 68--73 . E. Smith and L. Fuller. 2017. Control Systems and the Internet of Things -Shrinking the Factory. In 56th FITCE Congress. 68--73."},{"volume-title":"Taxonomy of Malware Analysis in the IoT. In 12th International Conference on Computer Engineering and Systems (ICCES). 519--529","author":"Soliman S. W.","key":"e_1_3_2_1_32_1","unstructured":"S. W. Soliman , M. A. Sobh , and A. M. Bahaa-Eldin . 2017 . Taxonomy of Malware Analysis in the IoT. In 12th International Conference on Computer Engineering and Systems (ICCES). 519--529 . S. W. Soliman, M. A. Sobh, and A. M. Bahaa-Eldin. 2017. Taxonomy of Malware Analysis in the IoT. In 12th International Conference on Computer Engineering and Systems (ICCES). 519--529."},{"key":"e_1_3_2_1_33_1","volume-title":"When Smart Wearables Meet Intelligent Vehicles: Challenges and Future Directions. IEEE Wireless Communications 24","author":"Sun W.","year":"2017","unstructured":"W. Sun , J. Liu , and H. Zhang . 2017 . When Smart Wearables Meet Intelligent Vehicles: Challenges and Future Directions. IEEE Wireless Communications 24 , 3 ( Jun. 2017 ), 58--65. W. Sun, J. Liu, and H. Zhang. 2017. When Smart Wearables Meet Intelligent Vehicles: Challenges and Future Directions. IEEE Wireless Communications 24, 3 (Jun. 2017), 58--65."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmsy.2018.04.007"},{"volume-title":"13th IEEE International Workshop on Factory Communication Systems (WFCS). 1--6.","author":"Varga P.","key":"e_1_3_2_1_35_1","unstructured":"P. Varga , S. Plosz , G. Soos , and C. Hegedus . May, 2017. Security Threats and Issues in Automation IoT ,. In 13th IEEE International Workshop on Factory Communication Systems (WFCS). 1--6. P. Varga, S. Plosz, G. Soos, and C. Hegedus. May, 2017. Security Threats and Issues in Automation IoT,. In 13th IEEE International Workshop on Factory Communication Systems (WFCS). 1--6."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2016.162"},{"key":"e_1_3_2_1_37_1","volume-title":"What is a Barbie Doll?","author":"EK.","year":"2015","unstructured":"wiseGE EK. 2015. What is a Barbie Doll? ( 2015 ). http:\/\/www.wisegeek.com\/what-is-a-barbie-doll.htm (accessed 19.02.15). wiseGEEK. 2015. What is a Barbie Doll? (2015). http:\/\/www.wisegeek.com\/what-is-a-barbie-doll.htm (accessed 19.02.15)."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1049\/el.2016.0760"}],"event":{"name":"ARES 2018: International Conference on Availability, Reliability and Security","sponsor":["Universit\u00e4t Hamburg Universit\u00e4t Hamburg"],"location":"Hamburg Germany","acronym":"ARES 2018"},"container-title":["Proceedings of the 13th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230833.3232800","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3230833.3232800","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:07:50Z","timestamp":1750212470000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230833.3232800"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,27]]},"references-count":37,"alternative-id":["10.1145\/3230833.3232800","10.1145\/3230833"],"URL":"https:\/\/doi.org\/10.1145\/3230833.3232800","relation":{},"subject":[],"published":{"date-parts":[[2018,8,27]]},"assertion":[{"value":"2018-08-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}