{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T19:28:30Z","timestamp":1768418910597,"version":"3.49.0"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,8,27]],"date-time":"2019-08-27T00:00:00Z","timestamp":1566864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2019,8,27]],"date-time":"2019-08-27T00:00:00Z","timestamp":1566864000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1186\/s13638-019-1531-0","type":"journal-article","created":{"date-parts":[[2019,8,27]],"date-time":"2019-08-27T12:03:35Z","timestamp":1566907415000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["Efficient adaptive framework for securing the Internet of Things devices"],"prefix":"10.1186","volume":"2019","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5220-4908","authenticated-orcid":false,"given":"Umer","family":"Farooq","sequence":"first","affiliation":[]},{"given":"Najam","family":"Ul Hasan","sequence":"additional","affiliation":[]},{"given":"Imran","family":"Baig","sequence":"additional","affiliation":[]},{"given":"Naeem","family":"Shehzad","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,8,27]]},"reference":[{"key":"1531_CR1","unstructured":"D. Singh, G. Tripathi, A. J. Jara, in 2014 IEEE World Forum on Internet of Things (WF-IoT). A survey of internet-of-things: Future vision, architecture, challenges and services, (2014), pp. 287\u2013292."},{"key":"1531_CR2","doi-asserted-by":"publisher","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"15","author":"L Atzori","year":"2010","unstructured":"L Atzori, A Iera, G Morabito, The internet of things: A survey. Comput. Netw. 15:, 2787\u20132805 (2010). \n                    http:\/\/doi.org\/10.1016\/j.comnet.2010.05.010\n                    \n                  .","journal-title":"Comput. Netw"},{"issue":"4","key":"1531_CR3","doi-asserted-by":"publisher","first-page":"586","DOI":"10.1109\/TETC.2016.2606384","volume":"5","author":"A Mosenia","year":"2017","unstructured":"A Mosenia, N. K Jha, A comprehensive study of security of internet-of-things. IEEE Trans. Emerg. Top. Comput.5(4), 586\u2013602 (2017).","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"1531_CR4","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1016\/j.future.2017.09.082","volume":"82","author":"A. P Plageras","year":"2018","unstructured":"A. P Plageras, K. E Psannis, C Stergiou, H Wang, B. B Gupta, Efficient iot-based sensor big data collection\u2013processing and analysis in smart buildings. Futur. Gener. Comput. Syst.82:, 349\u2013357 (2018).","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"1","key":"1531_CR5","first-page":"27","volume":"5","author":"C Stergiou","year":"2018","unstructured":"C Stergiou, K. E Psannis, A. P Plageras, Y Ishibashi, B. -G Kim, et al., Algorithms for efficient digital media transmission over iot and cloud networking. J. Multimed. Inf. Syst.5(1), 27\u201334 (2018).","journal-title":"J. Multimed. Inf. Syst."},{"key":"1531_CR6","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1016\/j.future.2017.04.039","volume":"83","author":"V. A. Memos","year":"2018","unstructured":"V. A. Memos, K. E. Psannis, Y. Ishibashi, B. -G. Kim, B. B. Gupta, An efficient algorithm for media-based surveillance system (eamsus) in iot smart city framework. Futur. Gener. Comput. Syst.83:, 619\u2013628 (2018).","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"1","key":"1531_CR7","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1109\/TSUSC.2018.2817043","volume":"4","author":"K. E. Psannis","year":"2018","unstructured":"K. E. Psannis, C. Stergiou, B. B. Gupta, Advanced media-based smart big data on intelligent cloud systems. IEEE Trans. Sustain. Comput.4(1), 77\u201387 (2018).","journal-title":"IEEE Trans. Sustain. Comput."},{"issue":"8","key":"1531_CR8","doi-asserted-by":"publisher","first-page":"1174","DOI":"10.1109\/JPROC.2014.2322103","volume":"102","author":"M Zhang","year":"2014","unstructured":"M Zhang, A Raghunathan, N. K Jha, Trustworthiness of medical devices and body area networks. Proc. IEEE. 102(8), 1174\u20131188 (2014).","journal-title":"Proc. IEEE"},{"key":"1531_CR9","unstructured":"C. Li, A. Raghunathan, N. K. Jha, in 2011 IEEE 13th International Conference on e-Health Networking, Applications and Services. Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system, (2011), pp. 150\u2013156."},{"key":"1531_CR10","unstructured":"D. Halperin, T. S. Heydt-Benjamin, B. Ransford, S. S. Clark, B. Defend, W. Morgan, K. Fu, T. Kohno, W. H. Maisel, in 2008 IEEE Symposium on Security and Privacy (sp 2008). Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses, (2008), pp. 129\u2013142."},{"key":"1531_CR11","first-page":"174","volume":"19","author":"C Stergiou","year":"2018","unstructured":"C Stergiou, K. E Psannis, B. B Gupta, Y Ishibashi, Security, privacy & efficiency of sustainable cloud computing for big data & iot. Sustain. Comput. Inform. Syst.19:, 174\u2013184 (2018).","journal-title":"Sustain. Comput. Inform. Syst."},{"key":"1531_CR12","unstructured":"Y. Cherdantseva, J. Hilton, in 2013 International Conference on Availability, Reliability and Security. A reference model of information assurance & security, (2013), pp. 546\u2013555."},{"key":"1531_CR13","unstructured":"S. Vashi, J. Ram, J. Modi, S. Verma, C. Prakash, in 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC). Internet of Things (iot): A vision, architectural elements, and security issues, (2017), pp. 492\u2013496."},{"key":"1531_CR14","unstructured":"H. Suo, J. Wan, C. Zou, J. Liu, in 2012 International Conference on Computer Science and Electronics Engineering, vol. 3. Security in the internet of things: A review, (2012), pp. 648\u2013651."},{"key":"1531_CR15","unstructured":"M. M. Kermani, M. Zhang, A. Raghunathan, N. K. Jha, in 2013 26th International Conference on VLSI Design and 2013 12th International Conference on Embedded Systems. Emerging frontiers in embedded security, (2013), pp. 203\u2013208."},{"issue":"6","key":"1531_CR16","doi-asserted-by":"publisher","first-page":"1214","DOI":"10.1109\/TIFS.2016.2520910","volume":"11","author":"H. Salmani","year":"2016","unstructured":"H. Salmani, M. M. Tehranipoor, Vulnerability analysis of a circuit layout to hardware trojan insertion. IEEE Trans. Inf. Forensic Secur.11(6), 1214\u20131225 (2016).","journal-title":"IEEE Trans. Inf. Forensic Secur."},{"issue":"3","key":"1531_CR17","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1109\/TETC.2015.2478003","volume":"4","author":"A. M Nia","year":"2016","unstructured":"A. M Nia, S Sur-Kolay, A Raghunathan, N. K Jha, Physiological information leakage: A new frontier in health information security. IEEE Trans. Emerg. Top. Comput.4(3), 321\u2013334 (2016).","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"issue":"2","key":"1531_CR18","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1109\/TMC.2011.274","volume":"12","author":"E. Y. Vasserman","year":"2013","unstructured":"E. Y. Vasserman, N. Hopper, Vampire attacks: Draining life from wireless ad hoc sensor networks. IEEE Trans. Mob. Comput.12(2), 318\u2013332 (2013).","journal-title":"IEEE Trans. Mob. Comput."},{"key":"1531_CR19","unstructured":"B. Parno, A. Perrig, V. Gligor, in 2005 IEEE Symposium on Security and Privacy (S P\u201905). Distributed detection of node replication attacks in sensor networks, (2005), pp. 49\u201363."},{"key":"1531_CR20","unstructured":"K. Hu, A. N. Nowroz, S. Reda, F. Koushanfar, in 2013 Design, Automation Test in Europe Conference Exhibition (DATE). High-sensitivity hardware trojan detection using multimodal characterization, (2013), pp. 1271\u20131276."},{"key":"1531_CR21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28632-5_26","volume-title":"Strong Authentication for RFID Systems Using the AES Algorithm","author":"M. Feldhofer","year":"2004","unstructured":"M. Feldhofer, S. Dominikus, J. Wolkerstorfer, Strong Authentication for RFID Systems Using the AES Algorithm (Springer Berlin Heidelberg, Berlin, Heidelberg, 2004)."},{"issue":"3","key":"1531_CR22","first-page":"295","volume":"29","author":"U Farooq","year":"2017","unstructured":"U Farooq, M. F Aslam, Comparative analysis of different aes implementation techniques for efficient resource usage and better performance of an fpga. J. King Saud Univ. Comput. Inf. Sci.29(3), 295\u2013302 (2017).","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"key":"1531_CR23","unstructured":"M. Jung, H. Fiedler, R. Lerch, in Ecrypt Workshop on RFID and Lightweight Crypto. 8-bit microcontroller system with area efficient aes coprocessor for transponder applications, (2005), pp. 32\u201343."},{"key":"1531_CR24","unstructured":"S. Kulkarni, S. Durg, N. Iyer, in Computing for Sustainable Global Development (INDIACom), 2016 3rd International Conference on. Internet of things (iot) security (IEEE, 2016), pp. 821\u2013824."},{"key":"1531_CR25","unstructured":"G. A. Mills-Tettey, A. Stentz, M. B. Dias, The dynamic hungarian algorithm for the assignment problem with changing costs. Tech Report (2007)."},{"issue":"7","key":"1531_CR26","doi-asserted-by":"publisher","first-page":"1645","DOI":"10.1016\/j.future.2013.01.010","volume":"29","author":"J Gubbi","year":"2013","unstructured":"J Gubbi, R Buyya, S Marusic, M Palaniswami, Internet of things (iot): A vision, architectural elements, and future directions. Future Generation Computer Systems. 29(7), 1645\u20131660 (2013). Special sections: cyber-enabled distributed computing for ubiquitous cloud and network services & cloud computing and scientific applications, big data, scalable analytics, and beyond. \n                    http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167739X13000241\n                    \n                  .","journal-title":"Future Generation Computer Systems"},{"key":"1531_CR27","unstructured":"CISCO, The internet of things reference model. CISCO, Tech. Rep. (2014). Available: http:\/\/cdn.iotwf.com\/resources\/71\/IoT_Reference_Model_White_Paper_June_4_2014.pdf."},{"key":"1531_CR28","unstructured":"G Zhang, T Wang, G Wang, A Liu, W Jia, Detection of hidden data attacks combined fog computing and trust evaluation method in sensor-cloud system. Concurr. Comput. Pract. Experience, e5109 (2018). \n                    https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/cpe.5109\n                    \n                  ."}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-019-1531-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13638-019-1531-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-019-1531-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,25]],"date-time":"2020-08-25T23:05:47Z","timestamp":1598396747000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-019-1531-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,27]]},"references-count":28,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["1531"],"URL":"https:\/\/doi.org\/10.1186\/s13638-019-1531-0","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,8,27]]},"assertion":[{"value":"18 January 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 August 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 August 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"210"}}