{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T07:21:40Z","timestamp":1767165700248,"version":"build-2238731810"},"reference-count":59,"publisher":"Wiley","license":[{"start":{"date-parts":[[2020,2,19]],"date-time":"2020-02-19T00:00:00Z","timestamp":1582070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Wireless Communications and Mobile Computing"],"published-print":{"date-parts":[[2020,2,19]]},"abstract":"<jats:p>In our daily life, Internet-of-Things (IoT) is everywhere and used in many more beneficial functionalities. It is used in our homes, hospitals, fire prevention, and reporting and controlling the environmental changes. Data security is the crucial requirement for IoT since the number of recent technologies in different domains is increasing day by day. Various attempts have been made to cater the user\u2019s demands for more security and privacy. However, a huge risk of security and privacy issues can arise among all those benefits. Digital document security and copyright protection are also important issues in IoT because they are distributed, reproduced, and disclosed with extensive use of communication technologies. The content of books, research papers, newspapers, legal documents, and web pages are based on plain text, and the ownership verification and authentication of such documents are essential. In the current domain of the Internet of Things, limited techniques are available for ownership verification and copyright protection. In the said perspective, this study includes the discussion about the approaches of text watermarking, IoT security challenges, IoT device limitations, and future research directions in the area of text watermarking.<\/jats:p>","DOI":"10.1155\/2020\/7105625","type":"journal-article","created":{"date-parts":[[2020,2,19]],"date-time":"2020-02-19T18:35:54Z","timestamp":1582137354000},"page":"1-15","source":"Crossref","is-referenced-by-count":17,"title":["Text Data Security and Privacy in the Internet of Things: Threats, Challenges, and Future Directions"],"prefix":"10.1155","volume":"2020","author":[{"given":"Umair","family":"Khadam","sequence":"first","affiliation":[{"name":"Department of Computer Science, University of Engineering and Technology, Taxila 47050, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7212-1408","authenticated-orcid":true,"given":"Muhammad Munwar","family":"Iqbal","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Engineering and Technology, Taxila 47050, Pakistan"}]},{"given":"Meshrif","family":"Alruily","sequence":"additional","affiliation":[{"name":"Faculty of Computer and Information Sciences, Jouf University, Sakaka City, Saudi Arabia"}]},{"given":"Mohammed A.","family":"Al Ghamdi","sequence":"additional","affiliation":[{"name":"Computer Science Department, Umm Al-Qura University, Makkah City, Saudi Arabia"}]},{"given":"Muhammad","family":"Ramzan","sequence":"additional","affiliation":[{"name":"Computer Science Department, Umm Al-Qura University, Makkah City, Saudi Arabia"}]},{"given":"Sultan H.","family":"Almotiri","sequence":"additional","affiliation":[{"name":"Department of Computer Science & IT, University of Sargodha, Sargodha, Pakistan"}]}],"member":"311","reference":[{"key":"1","first-page":"211","volume-title":"Internet of things security and privacy","year":"2019"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/mce.2018.2851722"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.02.029"},{"key":"4","year":"2018"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2916674"},{"issue":"3","key":"7","first-page":"50","volume":"3","year":"2015","journal-title":"International Journal of Technology and Research"},{"issue":"11","key":"8","first-page":"4309","volume":"5","year":"2009","journal-title":"International Journal of Innovative Computing, Information and Control"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-018-2337-2"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1080\/17517575.2019.1633689"},{"key":"12","year":"2019"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2019.2898113"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1292"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.2018.1701245"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2018.2882794"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2017.2694844"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.11.008"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.07.017"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1752"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/access.2018.2796585"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2016.1202356"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1016\/j.eij.2014.04.002"},{"issue":"8","key":"31","first-page":"4895","volume":"4","year":"2014","journal-title":"International Journal of Current Life Sciences"},{"issue":"3","key":"32","first-page":"550","volume":"4","year":"2015","journal-title":"DAV International Journal of Science"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1080\/02533839.2012.734470"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.11113\/jt.v75.5066"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.17706\/ijcee.2014.v6.857"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.12.023"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2017.02.005"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1109\/93.959104"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2017.03.091"},{"key":"44","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1738"},{"issue":"9","key":"45","first-page":"165","volume":"2","year":"2013","journal-title":"International Journal of Engineering and Innovative Technology (IJEIT)"},{"key":"46","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-5222-8"},{"key":"48","first-page":"8","volume":"5","year":"2014","journal-title":"International Journal of Computer Science Trends and Technology (IJCST)"},{"key":"50","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-3897-x"},{"issue":"48","key":"52","volume":"9","year":"2016","journal-title":"Indian Journal of Science and Technology"},{"issue":"2","key":"53","first-page":"223","volume":"1","year":"2009","journal-title":"International Journal of Recent Trends in Engineering"},{"key":"54","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2005.03.006"},{"key":"55","doi-asserted-by":"publisher","DOI":"10.4304\/jsw.8.8.2072-2079"},{"key":"56","doi-asserted-by":"publisher","DOI":"10.1109\/49.464718"},{"key":"64","doi-asserted-by":"publisher","DOI":"10.1007\/978-90-481-9112-3_25"},{"key":"71","doi-asserted-by":"publisher","DOI":"10.1109\/NOORIC.2013.20"},{"key":"75","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2016.12.007"},{"key":"76","doi-asserted-by":"publisher","DOI":"10.1007\/s11554-016-0647-2"},{"key":"77","first-page":"752","volume-title":"A framework for authentication of digital Quran","year":"2018"},{"key":"78","doi-asserted-by":"publisher","DOI":"10.4304\/jetwi.2.1.48-55"},{"key":"82","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2013.07.040"},{"key":"83","doi-asserted-by":"publisher","DOI":"10.1080\/02533839.2014.981210"},{"key":"86","year":"2018"},{"key":"87","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2018.07.007"},{"key":"88","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-5771-5"},{"key":"93","doi-asserted-by":"publisher","DOI":"10.17706\/IJCEE.2014.V6.857"},{"key":"94","doi-asserted-by":"publisher","DOI":"10.1147\/sj.353.0313"},{"key":"97","doi-asserted-by":"publisher","DOI":"10.1016\/j.csl.2008.04.001"},{"key":"99","year":"2004"},{"key":"100","doi-asserted-by":"publisher","DOI":"10.1109\/76.974678"},{"issue":"1","key":"103","first-page":"89","volume":"6","year":"2011","journal-title":"International Journal of Research and Reviews in Applied Sciences"},{"key":"105","doi-asserted-by":"publisher","DOI":"10.1016\/j.accinf.2005.07.001"},{"key":"106","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2017.08.004"}],"updated-by":[{"DOI":"10.1155\/2021\/4127341","type":"erratum","label":"Erratum","source":"publisher","updated":{"date-parts":[[2021,3,5]],"date-time":"2021-03-05T00:00:00Z","timestamp":1614902400000}}],"container-title":["Wireless Communications and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2020\/7105625.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2020\/7105625.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2020\/7105625.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,19]],"date-time":"2020-02-19T18:36:00Z","timestamp":1582137360000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/wcmc\/2020\/7105625\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2,19]]},"references-count":59,"alternative-id":["7105625","7105625"],"URL":"https:\/\/doi.org\/10.1155\/2020\/7105625","relation":{},"ISSN":["1530-8669","1530-8677"],"issn-type":[{"value":"1530-8669","type":"print"},{"value":"1530-8677","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,2,19]]}}}