{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T20:35:32Z","timestamp":1776112532926,"version":"3.50.1"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,4,5]],"date-time":"2019-04-05T00:00:00Z","timestamp":1554422400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1186\/s13638-019-1402-8","type":"journal-article","created":{"date-parts":[[2019,4,5]],"date-time":"2019-04-05T13:03:08Z","timestamp":1554469388000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":76,"title":["Secure-MQTT: an efficient fuzzy logic-based approach to detect DoS attack in MQTT protocol for internet of things"],"prefix":"10.1186","volume":"2019","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4308-944X","authenticated-orcid":false,"given":"Haripriya","family":"A. P.","sequence":"first","affiliation":[]},{"given":"Kulothungan","family":"K.","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,4,5]]},"reference":[{"issue":"15","key":"1402_CR1","doi-asserted-by":"publisher","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L Atzori","year":"2010","unstructured":"L. Atzori, A. Iera, G. Morabito, The Internet of Things: a survey. Comput. Netw. 54(15), 2787\u20132805 (2010)","journal-title":"Comput. Netw."},{"key":"1402_CR2","unstructured":"P. Sethi, S.R. Sarangi, Internet of Things: architectures, protocols, and applications. Can. J. Electr. Comput. Eng. 2017(2017), 1\u201325 (2017)"},{"issue":"1","key":"1402_CR3","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1109\/MIC.2018.112102200","volume":"22","author":"C Gomez","year":"2018","unstructured":"C. Gomez, A. Arcia-Moret, J. Crowcroft, TCP in the Internet of Things: from ostracism to prominence. IEEE Internet Comput. 22(1), 29\u201341 (2018)","journal-title":"IEEE Internet Comput."},{"issue":"2","key":"1402_CR4","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/s11761-015-0174-1","volume":"10","author":"H Lampesberger","year":"2016","unstructured":"H. Lampesberger, Technologies for web and cloud service interaction: a survey. SOCA 10(2), 71\u2013110 (2016)","journal-title":"SOCA"},{"key":"1402_CR5","doi-asserted-by":"crossref","unstructured":"S. Vinoski, Advanced message queuing protocol. IEEE Internet Comput. 10(6), 87\u201389 (2006)","DOI":"10.1109\/MIC.2006.116"},{"key":"1402_CR6","first-page":"8","volume":"38","author":"M Ammar","year":"2018","unstructured":"M. Ammar, G. Russello, B. Crispo, Internet of Things: A survey on the security of IoT frameworks. J. Inf. Secur. Appl. 38, 8\u201327 (2018)","journal-title":"J. Inf. Secur. Appl."},{"issue":"13","key":"1402_CR7","doi-asserted-by":"publisher","first-page":"265","DOI":"10.21105\/joss.00265","volume":"2","author":"RA Light","year":"2017","unstructured":"R.A. Light, Mosquitto: server and client implementation of the MQTT protocol. J. Open Source Softw. 2(13), 265 (2017)","journal-title":"J. Open Source Softw."},{"key":"1402_CR8","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.comnet.2018.04.001","volume":"139","author":"S Shadroo","year":"2018","unstructured":"S. Shadroo, A.M. Rahmani, Systematic survey of big data and data mining in internet of things. Comput. Netw. 139, 19\u201347 (2018)","journal-title":"Comput. Netw."},{"issue":"4","key":"1402_CR9","doi-asserted-by":"publisher","first-page":"1681","DOI":"10.1007\/s11277-016-3355-0","volume":"91","author":"S Jang","year":"2016","unstructured":"S. Jang, D. Lim, J. Kang, I. Joe, An efficient device authentication protocol without certification authority for Internet of Things. Wirel. Pers. Commun. 91(4), 1681\u20131695 (2016)","journal-title":"Wirel. Pers. Commun."},{"issue":"17","key":"1402_CR10","doi-asserted-by":"publisher","first-page":"4330","DOI":"10.1002\/sec.1610","volume":"9","author":"A Oyler","year":"2016","unstructured":"A. Oyler, H. Saiedian, Security in automotive telematics: a survey of threats and risk mitigation strategies to counter the existing and emerging attack vectors. Secur. Commun. Netw. 9(17), 4330\u20134340 (2016)","journal-title":"Secur. Commun. Netw."},{"issue":"4","key":"1402_CR11","doi-asserted-by":"publisher","first-page":"5335","DOI":"10.1007\/s11277-016-3744-4","volume":"96","author":"S Pang","year":"2017","unstructured":"S. Pang, D. Komosny, L. Zhu, R. Zhang, A. Sarrafzadeh, T. Ban, D. Inoue, Malicious events grouping via behavior based darknet traffic flow analysis. Wirel. Pers. Commun. 96(4), 5335\u20135353 (2017)","journal-title":"Wirel. Pers. Commun."},{"key":"1402_CR12","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.jnca.2017.02.009","volume":"84","author":"BB Zarpel\u00e3o","year":"2017","unstructured":"B.B. Zarpel\u00e3o, R.S. Miani, C.T. Kawakani, S.C. de Alvarenga, A survey of intrusion rjr. J. Netw. Comput. Appl. 84, 25\u201337 (2017)","journal-title":"J. Netw. Comput. Appl."},{"issue":"1","key":"1402_CR13","first-page":"229","volume":"99","author":"M Roesch","year":"1999","unstructured":"M. Roesch, Snort: Lightweight intrusion detection for networks. Lisa 99(1), 229\u2013238 (1999)","journal-title":"Lisa"},{"issue":"12","key":"1402_CR14","doi-asserted-by":"publisher","first-page":"24188","DOI":"10.3390\/s141224188","volume":"14","author":"D Oh","year":"2014","unstructured":"D. Oh, D. Kim, W.W. Ro, A malicious pattern detection engine for embedded security systems in the Internet of Things. Sensors 14(12), 24188\u201324211 (2014)","journal-title":"Sensors"},{"key":"1402_CR15","first-page":"515","volume-title":"Attack model and detection scheme for botnet on 6LoWPAN Management Enabling the Future Internet for Changing Business and New Computing Services, Lecture Notes in Computer Science 5787","author":"E Cho","year":"2009","unstructured":"E. Cho, J. Kim, C. Hong, Attack model and detection scheme for botnet on 6LoWPAN Management Enabling the Future Internet for Changing Business and New Computing Services, Lecture Notes in Computer Science 5787 (Springer, Berlin, Heidelberg, 2009), pp. 515\u2013518"},{"issue":"4","key":"1402_CR16","first-page":"16","volume":"4","author":"R Stephen","year":"2017","unstructured":"R. Stephen, L. Arockiam, Intrusion detection system to detect sinkhole attack on RPL protocol in Internet of Things. Int. J. Electr. Electron. Comput. Sci. 4(4), 16\u201320 (2017)","journal-title":"Int. J. Electr. Electron. Comput. Sci."},{"key":"1402_CR17","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1016\/j.engappai.2014.02.001","volume":"32","author":"S Shamshirband","year":"2014","unstructured":"S. Shamshirband, A. Patel, N.B. Anuar, M.L.M. Kiah, A. Abraham, Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks. Eng. Appl. Artif. Intell. 32, 228\u2013241 (2014)","journal-title":"Eng. Appl. Artif. Intell."},{"issue":"3","key":"1402_CR18","first-page":"131","volume":"7","author":"D Lavrova","year":"2015","unstructured":"D. Lavrova, A. Pechenkin, Applying correlation and regression analysis to detect security incidents in the internet of things. Int. J. Commun. Netw. Inf. Secur. 7(3), 131 (2015)","journal-title":"Int. J. Commun. Netw. Inf. Secur."},{"issue":"8","key":"1402_CR19","doi-asserted-by":"publisher","first-page":"2661","DOI":"10.1016\/j.adhoc.2013.04.014","volume":"11","author":"S Raza","year":"2013","unstructured":"S. Raza, L. Wallgren, T. Voigt, SVELTE: Real-time intrusion detection in the Internet of Things. Ad Hoc Netw. 11(8), 2661\u20132674 (2013)","journal-title":"Ad Hoc Netw."},{"issue":"8","key":"1402_CR20","doi-asserted-by":"publisher","first-page":"794326","DOI":"10.1155\/2013\/794326","volume":"9","author":"L Wallgren","year":"2013","unstructured":"L. Wallgren, S. Raza, T. Voigt, Routing attacks and countermeasures in the RPL-based internet of things. Int. J. Distrib. Sens. Netw. 9(8), 794326 (2013)","journal-title":"Int. J. Distrib. Sens. Netw."},{"issue":"6","key":"1402_CR21","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1016\/j.ifacol.2016.07.169","volume":"49","author":"MA Prada","year":"2016","unstructured":"M.A. Prada, P. Reguera, S. Alonso, A. Mor\u00e1n, J.J. Fuertes, M. Dom\u00ednguez, Communication with resource-constrained devices through MQTT for control education. IFAC-PapersOnLine 49(6), 150\u2013155 (2016)","journal-title":"IFAC-PapersOnLine"},{"issue":"4","key":"1402_CR22","doi-asserted-by":"publisher","first-page":"2347","DOI":"10.1109\/COMST.2015.2444095","volume":"17","author":"A Al-Fuqaha","year":"2015","unstructured":"A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, M. Ayyash, Internet of Things: a survey on enabling technologies, protocols, and applications. IEEE Commun. Surv. Tutorials 17(4), 2347\u20132376 (2015)","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"6","key":"1402_CR23","doi-asserted-by":"publisher","first-page":"1107","DOI":"10.1109\/TFUZZ.2011.2161584","volume":"19","author":"L Yang","year":"2011","unstructured":"L. Yang, Q. Shen, Adaptive fuzzy interpolation. IEEE Trans. Fuzzy Syst. 19(6), 1107\u20131126 (2011)","journal-title":"IEEE Trans. Fuzzy Syst."},{"issue":"2","key":"1402_CR24","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1109\/TFUZZ.2005.859324","volume":"14","author":"Z Huang","year":"2006","unstructured":"Z. Huang, Q. Shen, Fuzzy interpolative reasoning via scale and move transformations. IEEE Trans. Fuzzy Syst. 14(2), 340\u2013359 (2006)","journal-title":"IEEE Trans. Fuzzy Syst."},{"issue":"3","key":"1402_CR25","doi-asserted-by":"publisher","first-page":"901","DOI":"10.1007\/s40815-017-0378-y","volume":"20","author":"E Pourjavad","year":"2018","unstructured":"E. Pourjavad, A. Shahin, The application of Mamdani fuzzy inference system in evaluating green supply chain management performance. Int. J. Fuzzy Syst. 20(3), 901\u2013912 (2018)","journal-title":"Int. J. Fuzzy Syst."},{"key":"1402_CR26","first-page":"791","volume-title":"3rd International Conference on IEEE Communication Systems Software and Middleware and Workshops, 2008","author":"U Hunkeler","year":"2008","unstructured":"U. Hunkeler, H.L. Truong, A. Stanford-Clark, in 3rd International Conference on IEEE Communication Systems Software and Middleware and Workshops, 2008. MQTT-S A publish\/subscribe protocol for Wireless Sensor Networks (2008), pp. 791\u2013798"}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-019-1402-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13638-019-1402-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-019-1402-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,3]],"date-time":"2020-04-03T23:06:35Z","timestamp":1585955195000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-019-1402-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,5]]},"references-count":26,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["1402"],"URL":"https:\/\/doi.org\/10.1186\/s13638-019-1402-8","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,4,5]]},"assertion":[{"value":"30 May 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 March 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 April 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Publisher\u2019s Note"}}],"article-number":"90"}}