{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T16:27:31Z","timestamp":1770740851367,"version":"3.49.0"},"reference-count":39,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.23919\/iconac.2017.8082057","type":"proceedings-article","created":{"date-parts":[[2017,11,2]],"date-time":"2017-11-02T21:36:33Z","timestamp":1509658593000},"page":"1-6","source":"Crossref","is-referenced-by-count":82,"title":["IoT based smart home: Security challenges, security requirements and solutions"],"prefix":"10.23919","author":[{"given":"Waqar","family":"Ali","sequence":"first","affiliation":[]},{"given":"Ghulam","family":"Dustgeer","sequence":"additional","affiliation":[]},{"given":"Muhammad","family":"Awais","sequence":"additional","affiliation":[]},{"given":"Munam Ali","family":"Shah","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"1","article-title":"Lightweight lattice based homomorphic privacy-preserving aggregation cherme for home area networks","author":"abdallah","year":"2014","journal-title":"2014 Sixth International Conference on Wireless Communications and Signal Processing (WCSP)"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2320093"},{"key":"ref33","author":"bugeja","year":"2016","journal-title":"On Privacy and Security Challenges in Smart Connected Homes"},{"key":"ref32","author":"gaboardi","year":"2017","journal-title":"Special issue on the theory and practice of differential privacy"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-44924-1_7"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2017.7917634"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2012.6231161"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICMCS.2014.6911150"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-3252-2"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclepro.2016.10.006"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2013.10.022"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.enbuild.2016.08.008"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2013.11.001"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/PES.2011.6038996"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2627399"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPEIC.2015.7259486"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/IMF.2015.17"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/PRISMS.2014.6970594"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-012-1013-4"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s10708-013-9516-8"},{"key":"ref28","article-title":"SECURITY ISSUES IN INTERNET OF THINGS","author":"singh sayana","year":"2016","journal-title":"Glob Challenges-Role Sci Techno! Imparting their Solut TIT&S Bhiwani"},{"key":"ref4","first-page":"447","author":"hcrnandoz-mufioz","year":"2011","journal-title":"Smart Cities at the Forefront of the Future Internet"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2320093"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.01.010"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2015.09.003"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.12.018"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.44"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600297CM"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/IMF.2015.17"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2014.6997467"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-014-9492-7"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/PES.2008.4596535"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.jare.2014.02.006"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.122111.00145"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77090-9_12"},{"key":"ref23","first-page":"345","author":"jeong","year":"2006","journal-title":"Secure User Authentication Mechanism in Digital Home Network Environments"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.4236\/wsn.2016.84006"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2015.7389663"}],"event":{"name":"2017 23rd International Conference on Automation and Computing (ICAC)","location":"Huddersfield, United Kingdom","start":{"date-parts":[[2017,9,7]]},"end":{"date-parts":[[2017,9,8]]}},"container-title":["2017 23rd International Conference on Automation and Computing (ICAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8067274\/8081956\/08082057.pdf?arnumber=8082057","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,11,30]],"date-time":"2017-11-30T20:06:47Z","timestamp":1512072407000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8082057\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":39,"URL":"https:\/\/doi.org\/10.23919\/iconac.2017.8082057","relation":{},"subject":[],"published":{"date-parts":[[2017,9]]}}}