{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:27:22Z","timestamp":1763468842030,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,21]],"date-time":"2022-11-21T00:00:00Z","timestamp":1668988800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,21]]},"DOI":"10.1145\/3569902.3569915","type":"proceedings-article","created":{"date-parts":[[2023,1,17]],"date-time":"2023-01-17T23:41:48Z","timestamp":1673998908000},"page":"67-72","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Compliance Evaluation of Cryptographic Security Requirements on IoT Gateways"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9916-1837","authenticated-orcid":false,"given":"Eduardo F.","family":"Felix","sequence":"first","affiliation":[{"name":"Department of Computing, Federal Rural University of Pernambuco, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4007-3891","authenticated-orcid":false,"given":"Fernando A. A.","family":"Lins","sequence":"additional","affiliation":[{"name":"Department of Computing, Federal Rural University of Pernambuco, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1721-9669","authenticated-orcid":false,"given":"Obionor O.","family":"N\u00f3brega","sequence":"additional","affiliation":[{"name":"Department of Computing, Federal Rural University of Pernambuco, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3944-0068","authenticated-orcid":false,"given":"Diego R.","family":"Gomes","sequence":"additional","affiliation":[{"name":"Department of Computing, Federal Rural University of Pernambuco, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9533-8017","authenticated-orcid":false,"given":"Bruno A.","family":"Jesus","sequence":"additional","affiliation":[{"name":"Department of Informatics Engineering, University of Coimbra, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5103-8541","authenticated-orcid":false,"given":"Marco","family":"Vieira","sequence":"additional","affiliation":[{"name":"Department of Informatics Engineering, University of Coimbra, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2023,1,17]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"FIPS\u00a0PUB 46. 1977. Data Encryption Standard (DES). NIST Springfield VA USA(1977).  FIPS\u00a0PUB 46. 1977. Data Encryption Standard (DES). NIST Springfield VA USA(1977)."},{"key":"e_1_3_2_1_3_1","volume-title":"NIST Special Publication 800-131A. Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths","author":"Barker Elaine","year":"2011","unstructured":"Elaine Barker and Allen Roginsky . 2011. NIST Special Publication 800-131A. Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths ( 2011 ). Elaine Barker and Allen Roginsky. 2011. NIST Special Publication 800-131A. Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths (2011)."},{"key":"e_1_3_2_1_4_1","volume-title":"Retrieved","author":"Kura Eclipse","year":"2015","unstructured":"Eclipse Kura 2015 . Eclipse Kura Documentation . Retrieved Mar 27, 2021 from http:\/\/eclipse.github.io\/kura\/ Eclipse Kura 2015. Eclipse Kura Documentation. Retrieved Mar 27, 2021 from http:\/\/eclipse.github.io\/kura\/"},{"key":"e_1_3_2_1_5_1","volume-title":"FIPS PUB 140-2 Change Notices (Dec. 3","author":"L Evans","year":"2002","unstructured":"Donald\u00a0 L Evans 2002. FIPS PUB 140-2 Change Notices (Dec. 3 , 2002 ) Security Requirements for Cryptographic Modules Category: Computer Security Subcategory : Cryptography. Mar 12 (November 2002), 1\u20132. Donald\u00a0L Evans 2002. FIPS PUB 140-2 Change Notices (Dec. 3, 2002) Security Requirements for Cryptographic Modules Category: Computer Security Subcategory: Cryptography. Mar 12 (November 2002), 1\u20132."},{"key":"e_1_3_2_1_6_1","volume-title":"2019 24th IEEE International Conference on Emerging Technologies and Factory Automation","author":"Hansch G.","year":"2019","unstructured":"G. Hansch , P. Schneider , K. Fischer and K. B\u00f6ttinger . 2019. A Unified Architecture for Industrial IoT Security Requirements in Open Platform Communications . 2019 24th IEEE International Conference on Emerging Technologies and Factory Automation ( 2019 ), 325\u2013332. G. Hansch, P. Schneider, K. Fischer and K. B\u00f6ttinger. 2019. A Unified Architecture for Industrial IoT Security Requirements in Open Platform Communications. 2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (2019), 325\u2013332."},{"volume-title":"Retrieved Fev 02","year":"2009","key":"e_1_3_2_1_7_1","unstructured":"IoTSF 2009 . NIST - IoT Security Foundation \u2013 make it safe to connect . Retrieved Fev 02 , 2022 from https:\/\/www.nist.gov\/ IoTSF 2009. NIST - IoT Security Foundation \u2013 make it safe to connect. Retrieved Fev 02, 2022 from https:\/\/www.nist.gov\/"},{"volume-title":"Retrieved Fev 19","year":"2015","key":"e_1_3_2_1_8_1","unstructured":"IoTSF 2015 . IoTSF - IoT Security Foundation \u2013 make it safe to connect . Retrieved Fev 19 , 2019 from https:\/\/www.iotsecurityfoundation.org\/ IoTSF 2015. IoTSF - IoT Security Foundation \u2013 make it safe to connect. Retrieved Fev 19, 2019 from https:\/\/www.iotsecurityfoundation.org\/"},{"volume-title":"Retrieved","year":"2021","key":"e_1_3_2_1_9_1","unstructured":"IoTSF 2021 . IoT Security Foundation \u2013 The Global Home of IoT Cybersecurity . Retrieved June 20, 2022 from https:\/\/www.iotsecurityfoundation.org\/ IoTSF 2021. IoT Security Foundation \u2013 The Global Home of IoT Cybersecurity. Retrieved June 20, 2022 from https:\/\/www.iotsecurityfoundation.org\/"},{"key":"e_1_3_2_1_10_1","volume-title":"d.]. ISA\/IEC 62443 Cybersecurity | ISA S\u00e3o Paulo Section. Retrieved","author":"ISAIEC","year":"2022","unstructured":"ISAIEC [n. d.]. ISA\/IEC 62443 Cybersecurity | ISA S\u00e3o Paulo Section. Retrieved March 3, 2022 from http:\/\/isasp.org.br\/isa-iec-62443-cybersecurity\/ ISAIEC [n. d.]. ISA\/IEC 62443 Cybersecurity | ISA S\u00e3o Paulo Section. Retrieved March 3, 2022 from http:\/\/isasp.org.br\/isa-iec-62443-cybersecurity\/"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.3745\/KTCCS.2018.7.7.183"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SIoT.2016.007"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3041049"},{"key":"e_1_3_2_1_14_1","first-page":"1520","article-title":"Internet of Things: Security Requirements, Attacks and Counter Measures","volume":"18","author":"Imdad M.","year":"2020","unstructured":"M. Imdad , D. Jacob , H. Mahdin , Z. Baharum , S. Shaharudin and M. Azmi . 2020 . Internet of Things: Security Requirements, Attacks and Counter Measures . IEEE Access 18 (2020), 1520 . M. Imdad, D. Jacob, H. Mahdin, Z. Baharum, S. Shaharudin and M. Azmi. 2020. Internet of Things: Security Requirements, Attacks and Counter Measures. IEEE Access 18(2020), 1520.","journal-title":"IEEE Access"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-7796-8_7"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3041327"},{"key":"e_1_3_2_1_17_1","unstructured":"DES NIST. 1980. Modes of Operation FIPS PUB 81.  DES NIST. 1980. Modes of Operation FIPS PUB 81."},{"key":"e_1_3_2_1_18_1","unstructured":"OPC 2008. Unified Architecture. Retrieved March 3 2022 from https:\/\/opcfoundation.org\/about\/opc-technologies\/opc-ua\/  OPC 2008. Unified Architecture. Retrieved March 3 2022 from https:\/\/opcfoundation.org\/about\/opc-technologies\/opc-ua\/"},{"key":"e_1_3_2_1_19_1","volume-title":"Retrieved Fev 19","author":"Foundation OWASP","year":"2001","unstructured":"OWASP Foundation 2001 . OWASP Foundation | Open Source Foundation for Application Security . Retrieved Fev 19 , 2022 from https:\/\/owasp.org\/ OWASP Foundation 2001. OWASP Foundation | Open Source Foundation for Application Security. Retrieved Fev 19, 2022 from https:\/\/owasp.org\/"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5219"},{"key":"e_1_3_2_1_21_1","first-page":"186","article-title":"186-2, Digital Signature Standard (DSS)","author":"Pub FIPS","year":"2001","unstructured":"FIPS Pub . 2001 . 186-2, Digital Signature Standard (DSS) , Federal Information Processing Standards Publication 186 - 182 . US Department of Commerce\/National Institute of Standard and Technology 15 (January 2001). FIPS Pub. 2001. 186-2, Digital Signature Standard (DSS), Federal Information Processing Standards Publication 186-2. US Department of Commerce\/National Institute of Standard and Technology 15 (January 2001).","journal-title":"Federal Information Processing Standards Publication"},{"key":"e_1_3_2_1_22_1","first-page":"1","article-title":"Requirements and Recommendations for IoT\/IIoT Models to Automate Security Assurance Through Threat Modeling, Security Analysis and Penetration Testing","volume":"18","author":"Ankele R.","year":"2019","unstructured":"R. Ankele , S. Marksteiner , K. Nahrgang , and H. Vallant . 2019 . Requirements and Recommendations for IoT\/IIoT Models to Automate Security Assurance Through Threat Modeling, Security Analysis and Penetration Testing . ACM Digital Library 18 (2019), 1 \u2013 8 . R. Ankele, S. Marksteiner, K. Nahrgang, and H. Vallant. 2019. Requirements and Recommendations for IoT\/IIoT Models to Automate Security Assurance Through Threat Modeling, Security Analysis and Penetration Testing. ACM Digital Library 18(2019), 1\u20138.","journal-title":"ACM Digital Library"},{"key":"e_1_3_2_1_23_1","first-page":"15","article-title":"FIPS Pub 180-1","volume":"17","author":"Standard Secure\u00a0Hash","year":"1995","unstructured":"Secure\u00a0Hash Standard . 1995 . FIPS Pub 180-1 . National Institute of Standards and Technology 17 , 180(1995), 15 . Secure\u00a0Hash Standard. 1995. FIPS Pub 180-1. National Institute of Standards and Technology 17, 180(1995), 15.","journal-title":"National Institute of Standards and Technology"},{"volume-title":"Retrieved","year":"2019","key":"e_1_3_2_1_24_1","unstructured":"ThingsBoard 2019 . ThingsBoard IoT Gateway Documentation . Retrieved Mar 21, 2021 from https:\/\/thingsboard.io\/docs\/iot-gateway\/ ThingsBoard 2019. ThingsBoard IoT Gateway Documentation. Retrieved Mar 21, 2021 from https:\/\/thingsboard.io\/docs\/iot-gateway\/"},{"volume-title":"Retrieved","year":"2015","key":"e_1_3_2_1_25_1","unstructured":"WebIOPi 2015 . WebIOPi Gateway Documentation . Retrieved Mar 21, 2021 from http:\/\/webiopi.trouch.com\/ WebIOPi 2015. WebIOPi Gateway Documentation. Retrieved Mar 21, 2021 from http:\/\/webiopi.trouch.com\/"},{"volume-title":"Retrieved","year":"2017","key":"e_1_3_2_1_26_1","unstructured":"WebThings 2017 . WebThings Documentation . Retrieved Mar 21, 2021 from https:\/\/webthings.io\/docs\/ WebThings 2017. WebThings Documentation. Retrieved Mar 21, 2021 from https:\/\/webthings.io\/docs\/"}],"event":{"name":"LADC 2022: Latin-American Symposium on Dependable Computing","acronym":"LADC 2022","location":"Fortaleza\/CE Brazil"},"container-title":["Proceedings of the 11th Latin-American Symposium on Dependable Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3569902.3569915","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3569902.3569915","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:07:50Z","timestamp":1750183670000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3569902.3569915"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,21]]},"references-count":25,"alternative-id":["10.1145\/3569902.3569915","10.1145\/3569902"],"URL":"https:\/\/doi.org\/10.1145\/3569902.3569915","relation":{},"subject":[],"published":{"date-parts":[[2022,11,21]]},"assertion":[{"value":"2023-01-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}