{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T10:49:01Z","timestamp":1770288541792,"version":"3.49.0"},"reference-count":208,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2019,4,22]],"date-time":"2019-04-22T00:00:00Z","timestamp":1555891200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JSAN"],"abstract":"<jats:p>As Internet of Things (IoT) involvement increases in our daily lives, several security and privacy concerns like linkability, unauthorized conversations, and side-channel attacks are raised. If they are left untouched, such issues may threaten the existence of IoT. They derive from two main reasons. One is that IoT objects are equipped with limited capabilities in terms of computation power, memory, and bandwidth which hamper the direct implementation of traditional Internet security techniques. The other reason is the absence of widely-accepted IoT security and privacy guidelines and their appropriate implementation techniques. Such guidelines and techniques would greatly assist IoT stakeholders like developers and manufacturers, paving the road for building secure IoT systems from the start and, thus, reinforcing IoT security and privacy by design. In order to contribute to such objective, we first briefly discuss the primary IoT security goals and recognize IoT stakeholders. Second, we propose a comprehensive list of IoT security and privacy guidelines for the edge nodes and communication levels of IoT reference architecture. Furthermore, we point out the IoT stakeholders such as customers and manufacturers who will benefit most from these guidelines. Moreover, we identify a set of implementation techniques by which such guidelines can be accomplished, and possible attacks against previously-mentioned levels can be alleviated. Third, we discuss the challenges of IoT security and privacy guidelines, and we briefly discuss digital rights management in IoT. Finally, through this survey, we suggest several open issues that require further investigation in the future. To the best of the authors\u2019 knowledge, this work is the first survey that covers the above-mentioned objectives.<\/jats:p>","DOI":"10.3390\/jsan8020022","type":"journal-article","created":{"date-parts":[[2019,4,22]],"date-time":"2019-04-22T11:02:53Z","timestamp":1555930973000},"page":"22","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":72,"title":["A Comprehensive Study of Security and Privacy Guidelines, Threats, and Countermeasures: An IoT Perspective"],"prefix":"10.3390","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0874-2642","authenticated-orcid":false,"given":"Hezam Akram","family":"Abdul-Ghani","sequence":"first","affiliation":[{"name":"Geneva School of Economics and Management, Geneva University, 1211 Geneva, Switzerland"}]},{"given":"Dimitri","family":"Konstantas","sequence":"additional","affiliation":[{"name":"Geneva School of Economics and Management, Geneva University, 1211 Geneva, Switzerland"}]}],"member":"1968","published-online":{"date-parts":[[2019,4,22]]},"reference":[{"key":"ref_1","unstructured":"Mendez, D., Papapanagiotou, I., and Yang, B. (2017). Internet of Things: Survey on Security and Privacy. arXiv."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"197","DOI":"10.3390\/a6020197","article-title":"Enforcing Security Mechanisms in the IP-Based Internet of Things: An Algorithmic Overview","volume":"6","author":"Cirani","year":"2013","journal-title":"Algorithms"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1016\/j.dcan.2017.04.003","article-title":"A roadmap for security challenges in the Internet of Things","volume":"4","author":"Natalizio","year":"2018","journal-title":"Digit. Commun. Netw."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Kim, D., Choi, J.Y., and Hong, J.E. (2017). Evaluating energy efficiency of Internet of Things software architecture based on reusable software components. Int. J. Distrib. Sens. Netw., 13.","DOI":"10.1177\/1550147716682738"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1109\/MWC.2010.5675776","article-title":"SNAIL: An IP-based wireless sensor network approach to the internet of things","volume":"17","author":"Hong","year":"2010","journal-title":"IEEE Wirel. Commun."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Fouladgar, S., Mainaud, B., Masmoudi, K., and Afifi, H. (2006). Tiny 3-TLS: A Trust Delegation Protocol for Wireless Sensor Networks, Springer.","DOI":"10.1007\/11964254_5"},{"key":"ref_7","unstructured":"Granjal, J., Monteiro, E., and Silva, J. (2013, January 22\u201324). End-to-end transport-layer security for Internet-integrated sensing applications with mutual and delegated ECC public-key authentication. Proceedings of the 2013 IFIP Networking Conference, Brooklyn, NY, USA."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Brachmann, M., Keoh, S.L., Morchon, O.G., and Kumar, S.S. (August, January 30). End-to-end transport security in the IP-based internet of things. Proceedings of the 2012 21st International Conference on Computer Communications and Networks (ICCCN 2012), Munich, Germany.","DOI":"10.1109\/ICCCN.2012.6289292"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"2710","DOI":"10.1016\/j.adhoc.2013.05.003","article-title":"DTLS based security and two-way authentication for the Internet of Things","volume":"11","author":"Kothmayr","year":"2013","journal-title":"Ad Hoc Netw."},{"key":"ref_10","unstructured":"Russell, B., Garlati, C., and Lingenfelter, D. (2015). Security Guidance for Early Adopters of the Internet of Things (IoT), Cloud Security Alliance Publishing. Mobile Working Group Peer Reviewed Document."},{"key":"ref_11","unstructured":"Lau, D. (2019, April 08). Secure Bootloader Implementation. Available online: https:\/\/www.nxp.com\/docs\/en\/application-note\/AN4605.pdf."},{"key":"ref_12","unstructured":"BITAG (2016). Internet of Things (IoT) Security and Privacy Recommendations, BITAG."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Perera, C., McCormick, C., Bandara, A.K., Price, B.A., and Nuseibeh, B. (2016, January 7\u20139). Privacy-by-Design Framework for Assessing Internet of Things Applications and Platforms. Proceedings of the 6th International Conference on the Internet of Things\u2014IoT\u201916, Stuttgart, Germany.","DOI":"10.1145\/2991561.2991566"},{"key":"ref_14","unstructured":"U.S. Department of Homeland Security (2016). Strategic Principles for Securing the Internet of Things (IoT) Introduction and Overview."},{"key":"ref_15","unstructured":"IoT Security Foundation (2016). IoT Security Compliance Framework, IoT Security Foundation."},{"key":"ref_16","unstructured":"OWASP (2019, April 08). IoT Security Guidance\u2014OWASP. Available online: https:\/\/www.owasp.org\/index.php\/Main_Page."},{"key":"ref_17","unstructured":"Ross, M., Jara, A.J., and Cosenza, A. (2017). Baseline Security Recommendations for IoT, ENISA."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"1645","DOI":"10.1016\/j.future.2013.01.010","article-title":"Internet of Things (IoT): A vision, architectural elements, and future directions","volume":"29","author":"Gubbi","year":"2013","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","article-title":"The Internet of Things: A survey","volume":"54","author":"Atzori","year":"2010","journal-title":"Comput. Netw."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Akram Abdul-Ghani, H., Konstantas, D., and Mahyoub, M. (2018). A Comprehensive IoT Attacks Survey Based on a Building-Blocked Reference Model. Int. J. Adv. Comput. Sci. Appl. (IJACSA), 9.","DOI":"10.14569\/IJACSA.2018.090349"},{"key":"ref_21","unstructured":"Cisco (2014). The Internet of Things Reference Model. Internet of Things World Forum, Cisco."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"1174","DOI":"10.1109\/JPROC.2014.2322103","article-title":"Trustworthiness of medical devices and body area networks","volume":"102","author":"Zhang","year":"2014","journal-title":"Proc. IEEE"},{"key":"ref_23","unstructured":"Li, C., Raghunathan, A., and Jha, N.K. (2011, January 13\u201315). Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system. Proceedings of the 2011 IEEE 13th International Conference on e-Health Networking, Applications and Services, HEALTHCOM 2011, Columbia, MO, USA."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Cherdantseva, Y., and Hilton, J. (2013, January 2\u20136). A Reference Model of Information Assurance & Security. Proceedings of the 2013 International Conference on Availability, Reliability and Security, Regensburg, Germany.","DOI":"10.1109\/ARES.2013.72"},{"key":"ref_25","unstructured":"Parno, B., Perrig, A., and Gligor, V. (2005, January 8\u201311). Distributed Detection of Node Replication Attacks in Sensor Networks. Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, USA."},{"key":"ref_26","unstructured":"Guzman, A. (2017). IoT Penetration Testing Cookbook, Packt Publishing."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1007\/s10836-013-5369-9","article-title":"To cite this version: Secure JTAG implementation using Schnorr Protocol","volume":"29","author":"Das","year":"2013","journal-title":"J. Electron. Test."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Vishwakarma, G., and Lee, W. (2018). Exploiting JTAG and Its Mitigation in IOT: A Survey. Future Internet, 10.","DOI":"10.3390\/fi10120121"},{"key":"ref_29","unstructured":"UL LLC (2017). List of IOT Security Top 20 Design Principles, UL LLC. White Paper."},{"key":"ref_30","unstructured":"Angrishi, K. (2017). Turning Internet of Things(IoT) into Internet of Vulnerabilities (IoV): IoT Botnets. arXiv."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Kanuparthi, A., Karri, R., and Addepalli, S. (2013, January 4). Hardware and embedded security in the context of internet of things. Proceedings of the 2013 ACM workshop on Security, privacy & dependability for cyber vehicles\u2014CyCAR \u201913, Berlin, Germany.","DOI":"10.1145\/2517968.2517976"},{"key":"ref_32","unstructured":"European Research Cluster on The Internet of Things (IERC) (2015). Internet of Things: IoT Governance, Privacy and Security Issues. European Research Cluster on the Internet of Things, IERC."},{"key":"ref_33","first-page":"489","article-title":"A Comprehensive Analysis on the Security Threats and their Countermeasures of IoT","volume":"8","year":"2017","journal-title":"Int. J. Adv. Comput. Sci. Appl. (IJACSA)"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Baashirah, R., and Abuzneid, A. (2018). Survey on prominent RFID authentication protocols for passive tags. Sensors (Switzerland), 18.","DOI":"10.3390\/s18103584"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"586","DOI":"10.1109\/TETC.2016.2606384","article-title":"A Comprehensive Study of Security of Internet-of-Things","volume":"5","author":"Jha","year":"2017","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Dofe, J., Frey, J., and Yu, Q. (2016, January 22\u201325). Hardware security assurance in emerging IoT applications. Proceedings of the IEEE International Symposium on Circuits and Systems, Montreal, QC, Canada.","DOI":"10.1109\/ISCAS.2016.7538981"},{"key":"ref_37","unstructured":"Abendroth, B., Kleiner, A., and Nicholas, P. (2017). Cybersecurity Policy for the Internet of Things, Microsoft Corporation."},{"key":"ref_38","unstructured":"James, M. (2017). Secure by Design: Improving the Cyber Security of Consumer Internet of Things Report, Department for Digital, Culture Media & Sport."},{"key":"ref_39","unstructured":"Alliance, A.S.C. (2016). Embedded Hardware Security for IoT Applications, Smart Card Alliance."},{"key":"ref_40","unstructured":"Corser, G., Fink, G.A., and Bielby, J. (2017). Internet of Things (IoT) Security Best Practices; IEEE Internet Technology Policy Community, IEEE. White Paper."},{"key":"ref_41","unstructured":"Microsoft (2017). The Right Secure Hardware for Your IoT Deployment, Microsoft Corporation."},{"key":"ref_42","unstructured":"Cisco (2015). The Internet of Things: Reduce Security Risks with Automated Policies, Cisco. Cisco White Paper."},{"key":"ref_43","unstructured":"IoT Alliance Australia (2017). Internet of Things Security Guideline, IoT Alliance Australia."},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Syamsuddin, I., Dillon, T., Chang, E., and Han, S. (2008, January 11\u201313). A survey of RFID authentication protocols based on Hash-chain method. Proceedings of the 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008, Busan, Korea.","DOI":"10.1109\/ICCIT.2008.314"},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1109\/JSAC.2005.861395","article-title":"RFID Security and Privacy: A Research Survey","volume":"24","author":"Juels","year":"2006","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Rieback, M.R., Crispo, B., and Tanenbaum, A.S. (2005). RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management. Australasian Conference on Information Security and Privacy, Springer.","DOI":"10.1007\/11506157_16"},{"key":"ref_47","unstructured":"Ohkubo, M., Suzuki, K., and Kinoshita, S. (2018, January 5\u20138). Hash-chain based forward- secure privacy protection scheme for low-cost RFID. Proceedings of the Scandinavian Conference on Information Systems, Odder, Denmark."},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., and Ribagorda, A. (2006, January 20\u201322). RFID Systems: A Survey on Security Threats and Proposed Solutions. Proceedings of the IFIP International Conference on Personal Wireless Communications, Albacete, Spain.","DOI":"10.1007\/11872153_14"},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1007\/978-3-540-39881-3_18","article-title":"Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems","volume":"2802","author":"Weis","year":"2003","journal-title":"Secur. Pervasive Comput."},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Ye, X., Feng, J., Gong, H., He, C., and Feng, W. (2015, January 1\u20134). An anti-trojans design approach based on activation probability analysis. Proceedings of the 2015 IEEE International Conference on Electron Devices and Solid-State Circuits, EDSSC 2015, Singapore.","DOI":"10.1109\/EDSSC.2015.7285146"},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1109\/MDT.2010.7","article-title":"A survey of hardware trojan taxonomy and detection","volume":"27","author":"Tehranipoor","year":"2010","journal-title":"IEEE Des. Test Comput."},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Christianson, B., Crispo, B., Malcolm, J.A., and Roe, M. (1999). The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks. International Workshop on Security Protocols, Springer.","DOI":"10.1007\/10720107_24"},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Martin, T., Hsiao, M., Dong, H., and Krishnaswami, J. (2004, January 14\u201317). Denial-of-service attacks on battery-powered mobile computers. Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications, Washington, DC, USA.","DOI":"10.1109\/PERCOM.2004.1276868"},{"key":"ref_54","doi-asserted-by":"crossref","unstructured":"Brandt, A., Buron, J., and Porcu, G. (2010). Home Automation Routing Requirements in Low-Power and Lossy Networks, IETF.","DOI":"10.17487\/rfc5826"},{"key":"ref_55","unstructured":"Harley, D., and Malcho, J. (2019, April 08). Stuxnet Under the Microscope. Available online: https:\/\/www.esetnod32.ru\/company\/viruslab\/analytics\/doc\/Stuxnet_Under_the_Microscope.pdf."},{"key":"ref_56","unstructured":"Hernandez, G., Arias, O., Buentello, D., and Jin, Y. (2014). Smart Nest Thermostat: A Smart Spy in Your Home. Black Hat USA, 1\u20138."},{"key":"ref_57","unstructured":"TEMPEST (2019, April 08). SideChannel. Available online: https:\/\/sidechannel.tempestsi.com\/."},{"key":"ref_58","unstructured":"Vuagnoux, M., and Pasini, S. (2009, January 10\u201314). Compromising Electromagnetic Emanations of Wired and Wireless Keyboards. Proceedings of the 18th Conference on USENIX Security Symposium, Montreal, QC, Canada."},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1109\/TETC.2015.2478003","article-title":"Physiological Information Leakage: A New Frontier in Health Information Security","volume":"4","author":"Raghunathan","year":"2016","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"ref_60","unstructured":"Federal Trade Commission (2015). Internet of Things: Privacy and Security in a Connected World, FTC. FTC Staff Report."},{"key":"ref_61","unstructured":"Hancke, G.P. (2019, April 01). Eavesdropping Attacks on High-Frequency RFID Tokens. Available online: http:\/\/www.rfidblog.org.uk\/Hancke-RFIDSec2008-Talk.pdf;."},{"key":"ref_62","unstructured":"Zhen-hua, D., Jin-tao, L.I., Bo, F., Zhen-hua, D., and Bo, F. (2008, January 10\u201312). A Taxonomy Model of RFID Security Threats. Proceedings of the 2008 11th IEEE International Conference on Communication Technology, Hangzhou, China."},{"key":"ref_63","doi-asserted-by":"crossref","unstructured":"Juels, A., Rivest, R.L., and Szydlo, M. (2003, January 27\u201330). The Blocker Tag: Selective Blocking of RFID Tags for The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy. Proceedings of the 10th ACM Conference on Computer and Communication Security\u2014CCS \u201903, Washington, DC, USA.","DOI":"10.1145\/948125.948126"},{"key":"ref_64","doi-asserted-by":"crossref","unstructured":"Iwase, T., Nozaki, Y., Yoshikawa, M., and Kumaki, T. (2015, January 27\u201330). Detection technique for hardware Trojans using machine learning in frequency domain. Proceedings of the 2015 IEEE 4th Global Conference on Consumer Electronics (GCCE), Osaka, Japan.","DOI":"10.1109\/GCCE.2015.7398569"},{"key":"ref_65","doi-asserted-by":"crossref","unstructured":"Rooney, C., Seeam, A., and Bellekens, X. (2018). Creation and Detection of Hardware Trojans Using Non-Invasive Off-The-Shelf Technologies. Electronics, 7.","DOI":"10.3390\/electronics7070124"},{"key":"ref_66","doi-asserted-by":"crossref","first-page":"246","DOI":"10.1016\/j.micpro.2014.01.003","article-title":"A study on the efficiency of hardware Trojan detection based on path-delay fingerprinting","volume":"38","author":"Nejat","year":"2014","journal-title":"Microprocess. Microsyst."},{"key":"ref_67","doi-asserted-by":"crossref","unstructured":"Yoshimizu, N. (2014, January 6\u20137). Hardware trojan detection by symmetry breaking in path delays. Proceedings of the 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), Arlington, VA, USA.","DOI":"10.1109\/HST.2014.6855579"},{"key":"ref_68","doi-asserted-by":"crossref","unstructured":"Hu, K., Nowroz, A.N., Reda, S., and Koushanfar, F. (2013, January 18\u201322). High-Sensitivity Hardware Trojan Detection Using Multimodal Characterization. Proceedings of the Design, Automation & Test in Europe Conference & Exhibition (DATE), Grenoble, France.","DOI":"10.7873\/DATE.2013.263"},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"426","DOI":"10.1016\/j.vlsi.2016.01.004","article-title":"A survey of hardware Trojan threat and defense","volume":"55","author":"Li","year":"2016","journal-title":"Integration"},{"key":"ref_70","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1007\/s41635-018-0037-2","article-title":"Surveying the Hardware Trojan Threat Landscape for the Internet-of-Things","volume":"2","author":"Venugopalan","year":"2018","journal-title":"J. Hardw. Syst. Secur."},{"key":"ref_71","doi-asserted-by":"crossref","unstructured":"Msgna, M., Markantonakis, K., Naccache, D., and Mayes, K. (2014). Verifying Software Integrity in Embedded Systems: A Side Channel Approach, Springer.","DOI":"10.1007\/978-3-319-10175-0_18"},{"key":"ref_72","doi-asserted-by":"crossref","unstructured":"Msgna, M., Markantonakis, K., and Mayes, K. (2013, January 25\u201327). The B-Side of Side Channel Leakage: Control Flow Security in Embedded Systems. Proceedings of the International Conference on Security and Privacy in Communication Systems, Sydney, Australia.","DOI":"10.1007\/978-3-319-04283-1_18"},{"key":"ref_73","doi-asserted-by":"crossref","first-page":"160","DOI":"10.1109\/TMSCS.2016.2569467","article-title":"Malicious Firmware Detection with Hardware Performance Counters","volume":"2","author":"Stergiou","year":"2016","journal-title":"IEEE Trans. Multi-Scale Comput. Syst."},{"key":"ref_74","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/MDT.2010.9","article-title":"Attacks and defenses for JTAG","volume":"27","author":"Rosenfeld","year":"2010","journal-title":"IEEE Des. Test Comput."},{"key":"ref_75","doi-asserted-by":"crossref","unstructured":"Clark, C.J. (2010, January 13\u201314). Anti-tamper JTAG TAP design enables DRM to JTAG registers and P1687 on-chip instruments. Proceedings of the 2010 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2010, Anaheim, CA, USA.","DOI":"10.1109\/HST.2010.5513119"},{"key":"ref_76","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2994601","article-title":"Secure and Flexible Trace-Based Debugging of Systems-on-Chip","volume":"22","author":"Backer","year":"2017","journal-title":"ACM Trans. Des. Autom. Electron. Syst."},{"key":"ref_77","doi-asserted-by":"crossref","unstructured":"Peris-lopez, P., Hernandez-castro, J.C., Estevez-tapiador, J.M., and Ribagorda, A. (2006, January 3\u20136). M2AP: A Minimalist Mutual-Authentication Protocol for Low-cost RFID Tags Pedro. Proceedings of the Third International Conference, UIC 2006, Wuhan, China.","DOI":"10.1007\/11833529_93"},{"key":"ref_78","unstructured":"Jung, M., Fiedler, H.L., Fiedler, H.L., and Lerch, R.G. (2005, January 14\u201315). 8-bit-microcontroller system with area efficient AES coprocessor for transponder applications. Proceedings of the Workshop on RFID and Lightweight Crypto, Graz, Austria."},{"key":"ref_79","doi-asserted-by":"crossref","first-page":"25","DOI":"10.20943\/01201801.2533","article-title":"Symmetric Encryption Algorithm for RFID Systems Using a Dynamic Generation of Key","volume":"15","author":"Labbi","year":"2018","journal-title":"Int. J. Comput. Sci. Issues"},{"key":"ref_80","doi-asserted-by":"crossref","unstructured":"Choi, E.Y., Lee, S.M., and Lee, D.H. (2005, January 6\u20139). Efficient RFID Authentication Protocol for Ubiquitous Computing Environment. Proceedings of the International Conference on Embedded and Ubiquitous Computing, Nagasaki, Japan.","DOI":"10.1007\/11596042_97"},{"key":"ref_81","unstructured":"Dimitriou, T. (2005, January 5\u20139). A Lightweight RFID Protocol to Protect against Traceability and Cloning Attacks. Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM\u201905), Athens, Greece."},{"key":"ref_82","doi-asserted-by":"crossref","unstructured":"Lee, S.M., Hwang, Y.J., Lee, D.H., and Lim, J.I. (2005). Efficient Authentication for Low-Cost RFID Systems, Springer.","DOI":"10.1007\/11424758_65"},{"key":"ref_83","doi-asserted-by":"crossref","unstructured":"Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., and Ribagorda, A. (2006, January 17\u201321). AAP: A Minimalist 1286 Mutual-Authentication Protocol for Low-cost RFID Tags. Proceedings of the International Conference on Ubiquitous Intelligence and Computing, Orange County, CA, USA.","DOI":"10.1007\/11833529_93"},{"key":"ref_84","unstructured":"Molnar, D., and Wagner, D. (2014, January 25\u201329). Privacy and security in library RFID. Proceedings of the 11th ACM Conference on Computer and Communications Security\u2014CCS \u201904, Washington, DC, USA."},{"key":"ref_85","doi-asserted-by":"crossref","unstructured":"Surendran, S., Nassef, A., and Beheshti, B.D. (2018, January 4). A survey of cryptographic algorithms for IoT devices. Proceedings of the IEEE Long Island Systems, Applications and Technology Conference, LISAT, New York, NY, USA.","DOI":"10.1109\/LISAT.2018.8378034"},{"key":"ref_86","unstructured":"Carluccio, D., Lemke, K., and Paar, C. (2005, January 14\u201315). Electromagnetic Side Channel Analysis of a Contactless Smart Card: First Results. Proceedings of the ECrypt Workshop on RFID and Lightweight Crypto, Graz, Austria."},{"key":"ref_87","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1145\/2000502.2000503","article-title":"0 FinFET-Based Power Management for Improved DPA Resistance with Low Overhead","volume":"7","author":"Zhang","year":"2011","journal-title":"ACM J. Emerg. Technol. Comput. Syst."},{"key":"ref_88","doi-asserted-by":"crossref","unstructured":"Osvik, D.A., Shamir, A., and Tromer, E. (2006, January 13\u201317). Cache Attacks and Countermeasures: The Case of AES. Proceedings of the Cryptographers\u2019 Track at the RSA Conference, San Jose, CA, USA.","DOI":"10.1007\/11605805_1"},{"key":"ref_89","unstructured":"Sen, J. (2019, April 08). Security in Wireless Sensor Networks. Available online: https:\/\/arxiv.org\/ftp\/arxiv\/papers\/1301\/1301.5065.pdf."},{"key":"ref_90","doi-asserted-by":"crossref","unstructured":"Rosenfeld, K., Gavas, E., and Karri, R. (2010, January 13\u201314). Sensor physical unclonable functions. Proceedings of the IEEE International Symposium on Hardware-Oriented Security and Trust, Anaheim, CA, USA.","DOI":"10.1109\/HST.2010.5513103"},{"key":"ref_91","doi-asserted-by":"crossref","unstructured":"Guin, U., Dimase, D., and Tehranipoor, M. (2014). Counterfeit Integrated Circuits: Detection, Avoidance, and the Challenges Ahead, Springer.","DOI":"10.1007\/s10836-013-5430-8"},{"key":"ref_92","doi-asserted-by":"crossref","unstructured":"Cortese, P.F., Gemmiti, F., Palazzi, B., Pizzonia, M., and Rimondini, M. (2011, January 17\u201319). Efficient and practical authentication of PUF-based RFID tags in supply chains. Proceedings of the 2010 IEEE International Conference on RFID-Technology and Applications, Guangzhou, China.","DOI":"10.1109\/RFID-TA.2010.5529941"},{"key":"ref_93","first-page":"61","article-title":"PUF-Based RFID Authentication Secure and Private under Memory Leakage","volume":"3","author":"Moriyama","year":"2013","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref_94","doi-asserted-by":"crossref","unstructured":"Hristozov, S., Heyszl, J., Wagner, S., and Sigl, G. (2018, January 18). Practical Runtime Attestation for Tiny IoT Devices. Proceedings of the 2018 Workshop on Decentralized IoT Security and Standards, San Diego, CA, USA.","DOI":"10.14722\/diss.2018.23011"},{"key":"ref_95","unstructured":"Trusted Computing Group (2011). TPM Main Specification, Trusted Computing Group."},{"key":"ref_96","unstructured":"Limited, A. (2019, April 01). ARM Security Technology Building a Secure System using TrustZone \u00ae Technology. Available online: http:\/\/infocenter.arm.com\/help\/topic\/com.arm.doc.prd29-genc-009492c\/PRD29-GENC-009492C -trustzone-security-whitepaper.pdf."},{"key":"ref_97","doi-asserted-by":"crossref","first-page":"685219","DOI":"10.1155\/2011\/685219","article-title":"Secure Rateless Deluge: Pollution-Resistant Reprogramming and Data Dissemination for Wireless Sensor Networks","volume":"2011","author":"Law","year":"2011","journal-title":"EURASIP J. Wirel. Commun. Network."},{"key":"ref_98","unstructured":"Saiful Islam Mamun, M., Sultanul Kabir, A., Sakhawat Hossen, M., and Hayat Khan, M. (2012). Policy Based Intrusion Detection and Response System in Hierarchical WSN Architecture. arXiv."},{"key":"ref_99","doi-asserted-by":"crossref","first-page":"2072","DOI":"10.1016\/j.phpro.2012.03.352","article-title":"2012 International Conference on Solid State Devices and Materials Science Intrusion Detection for Wireless Sensor Network Based on Traffic Prediction Model peer-review under responsibility of [name organizer]","volume":"25","author":"Zhijie","year":"2012","journal-title":"Phys. Procedia"},{"key":"ref_100","unstructured":"Hindy, H., Brosset, D., Bayne, E., Seeam, A., Tachtatzis, C., Atkinson, R., and Bellekens, X. (2018). A Taxonomy and Survey of Intrusion Detection System Design Techniques, Network Threats and Datasets. arXiv."},{"key":"ref_101","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2542049","article-title":"A survey of intrusion detection techniques for cyber-physical systems","volume":"46","author":"Mitchell","year":"2014","journal-title":"ACM Comput. Surv."},{"key":"ref_102","first-page":"1370","article-title":"002\u2014A Survey of Intrusion Detection Systems in Wireless Sensor Networks","volume":"14","author":"Butun","year":"2014","journal-title":"IEEE Sens. J."},{"key":"ref_103","doi-asserted-by":"crossref","unstructured":"Mozzaquatro, B.A., Agostinho, C., Goncalves, D., Martins, J., and Jardim-goncalves, R. (2018). An Ontology-Based Cybersecurity Framework for the Internet of Things. Sensors, 18.","DOI":"10.3390\/s18093053"},{"key":"ref_104","unstructured":"INTEL COMPANY (2019, April 01). Managing the IoT Lifecycle from Design through End-of-Life. Available online: https:\/\/www.iotone.com\/guide\/managing-the-iot-lifecycle-from-design-through-end-of-life\/g923."},{"key":"ref_105","unstructured":"Samyde, J.J.Q. (2001, January 19\u201321). ElectroMagnetic Analysis (EMA): Measures and Counter-measures for Smart Card. Proceedings of the International Conference on Research in Smart Cards (E-smart 2001), Cannes, France."},{"key":"ref_106","doi-asserted-by":"crossref","unstructured":"Juels, A., and Brainard, J. (2004, January 28). Soft Blocking: Flexible Blocker Tags on the Cheap. Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, Washington, DC, USA.","DOI":"10.1145\/1029179.1029181"},{"key":"ref_107","doi-asserted-by":"crossref","unstructured":"Chen, Y.Y., Lu, J.C., Chen, S.I., and Jan, J.K. (2009, January 18\u201320). A low-cost RFID authentication protocol with location privacy protection. Proceedings of the 5th International Conference on Information Assurance and Security, IAS 2009, Xi\u2019an, China.","DOI":"10.1109\/IAS.2009.77"},{"key":"ref_108","doi-asserted-by":"crossref","unstructured":"Lesperance, N., Kulkarni, S., and Cheng, K.T. (2015, January 19\u201322). Hardware Trojan Detection Using Exhaustive Testing of k -bit Subspaces. Proceedings of the The 20th Asia and South Pacific Design Automation Conference, Chiba, Japan.","DOI":"10.1109\/ASPDAC.2015.7059101"},{"key":"ref_109","doi-asserted-by":"crossref","unstructured":"Subhra Chakraborty, R., Wolff, F., Paul, S., Papachristou, C., and Bhunia, S. (2009). MERO: A Statistical Approach for Hardware Trojan Detection, Springer. Technical Report.","DOI":"10.1007\/978-3-642-04138-9_28"},{"key":"ref_110","doi-asserted-by":"crossref","unstructured":"Pierce, L., and Tragoudas, S. (2011, January 13\u201315). Multi-level secure JTAG architecture. Proceedings of the 2011 IEEE 17th International On-Line Testing Symposium, IOLTS, Athens, Greece.","DOI":"10.1109\/IOLTS.2011.5993845"},{"key":"ref_111","doi-asserted-by":"crossref","unstructured":"Mauw, S., and Piramuthu, S. (2012, January 13\u201314). A PUF-based authentication protocol to address ticket-switching of RFID-tagged items. Proceedings of the International Workshop on Security and Trust Management (STM 2012), Pisa, Italy.","DOI":"10.1007\/978-3-642-38004-4_14"},{"key":"ref_112","doi-asserted-by":"crossref","unstructured":"Dragomir, D., Gheorghe, L., Costea, S., and Radovici, A. (2016, January 26\u201330). A Survey on Secure Communication Protocols for IoT Systems. Proceedings of the 2016 International Workshop on Secure Internet of Things (SIoT), Crete, Greece.","DOI":"10.1109\/SIoT.2016.012"},{"key":"ref_113","doi-asserted-by":"crossref","first-page":"1125","DOI":"10.1109\/JIOT.2017.2683200","article-title":"A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications","volume":"4","author":"Lin","year":"2017","journal-title":"IEEE Internet Things J."},{"key":"ref_114","doi-asserted-by":"crossref","unstructured":"Deshmukh, S., and Sonavane, S.S. (2017, January 23\u201325). Security protocols for Internet of Things: A survey. Proceedings of the 2017 International Conference On Nextgen Electronic Technologies: Silicon to Software, ICNETS2 2017, Chennai, Indiam.","DOI":"10.1109\/ICNETS2.2017.8067900"},{"key":"ref_115","doi-asserted-by":"crossref","first-page":"78","DOI":"10.5752\/10.5752\/P.2316-9451.2013v1n2p78","article-title":"Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications","volume":"1","author":"Agrawal","year":"2015","journal-title":"Abakos"},{"key":"ref_116","doi-asserted-by":"crossref","unstructured":"Ven\u010dkauskas, A., Morkevicius, N., Bagdonas, K., Dama\u0161evi\u010dius, R., and Maskeli\u016bnas, R. (2018). A lightweight protocol for secure video streaming. Sensors, 18.","DOI":"10.3390\/s18051554"},{"key":"ref_117","doi-asserted-by":"crossref","first-page":"1910","DOI":"10.1109\/JIOT.2017.2749883","article-title":"A Survey of Potential Security Issues in Existing Wireless Sensor Network Protocols","volume":"4","author":"McCann","year":"2017","journal-title":"IEEE Internet Things J."},{"key":"ref_118","doi-asserted-by":"crossref","unstructured":"Jebri, S., Abid, M., and Bouallegue, A. (2015, January 14\u201316). An efficient scheme for anonymous communication in IoT. Proceedings of the 2015 11th International Conference on Information Assurance and Security (IAS), Marrakech, Morocco.","DOI":"10.1109\/ISIAS.2015.7492763"},{"key":"ref_119","doi-asserted-by":"crossref","first-page":"1241","DOI":"10.1109\/COMST.2016.2515516","article-title":"M2M Security: Challenges and Solutions","volume":"18","author":"Barki","year":"2016","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_120","first-page":"275","article-title":"Security enhanced and cost-effective user authentication scheme for wireless sensor networks","volume":"47","author":"Liu","year":"2018","journal-title":"Inf. Technol. Control"},{"key":"ref_121","first-page":"459","article-title":"A taxonomy of attacks in RPL-based internet of things","volume":"18","author":"Mayzaud","year":"2016","journal-title":"Int. J. Netw. Sec."},{"key":"ref_122","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1109\/MWC.2013.6704479","article-title":"A survey on the ietf protocol suite for the internet of things: standards, challenges, and opportunities","volume":"20","author":"Sheng","year":"2013","journal-title":"IEEE Wirel. Commun."},{"key":"ref_123","unstructured":"Sarikaya, B., Ohba, Y., Moskowitz, R., Cao, Z., and Cragie, R. (2012). Security Bootstrapping Solution for Resource- Constrained Devices, IETF. Technical Report for the Internet Engineering Task Force."},{"key":"ref_124","doi-asserted-by":"crossref","first-page":"527","DOI":"10.1007\/s11277-011-0385-5","article-title":"Security Challenges in the IP-based Internet of Things","volume":"61","author":"Heer","year":"2011","journal-title":"Wirel. Person. Commun."},{"key":"ref_125","doi-asserted-by":"crossref","unstructured":"Vasilomanolakis, E., Daubert, J., Luthra, M., Gazis, V., Wiesmaier, A., and Kikiras, P. (2015, January 21\u201325). On the Security and Privacy of Internet of Things Architectures and Systems. Proceedings of the 2015 International Workshop on Secure Internet of Things, SIoT 2015, Vienna, Austria.","DOI":"10.1109\/SIOT.2015.9"},{"key":"ref_126","unstructured":"Han, J., Kamber, M., and Pei, J. (2011). Data Mining. Concepts and Techniques, Morgan Kaufmann. [3rd ed.]."},{"key":"ref_127","doi-asserted-by":"crossref","first-page":"1497","DOI":"10.1016\/j.adhoc.2012.02.016","article-title":"Internet of things: Vision, applications and research challenges","volume":"10","author":"Miorandi","year":"2012","journal-title":"Ad Hoc Netw."},{"key":"ref_128","doi-asserted-by":"crossref","unstructured":"Alharby, S., Harris, N., Weddell, A., and Reeve, J. (2018, January 3\u20135). Impact of duty cycle protocols on security cost of IoT. Proceedings of the 2018 9th International Conference on Information and Communication Systems, ICICS 2018, Irbid, Jordan.","DOI":"10.1109\/IACS.2018.8355436"},{"key":"ref_129","doi-asserted-by":"crossref","unstructured":"Domingo-Pascual, J.J., Shavitt, Y., and Uhlig, S. (2011, January 27). Traffic Monitoring and Analysis. Proceedings of the Third International Workshop, TMA 2011, Vienna, Austria.","DOI":"10.1007\/978-3-642-20305-3"},{"key":"ref_130","unstructured":"Naoui, S., Elhdhili, M.E., and Saidane, L.A. (November, January 30). Security analysis of existing IoT key management protocols. Proceedings of the IEEE\/ACS International Conference on Computer Systems and Applications, AICCSA, Hammamet, Tunisia."},{"key":"ref_131","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1109\/MIC.2012.29","article-title":"CoAP: An Application Protocol for Billions of Tiny Internet Nodes","volume":"16","author":"Bormann","year":"2012","journal-title":"IEEE Internet Comput."},{"key":"ref_132","doi-asserted-by":"crossref","unstructured":"Raza, S., Trabalza, D., and Voigt, T. (2012, January 16\u201318). 6LoWPAN compressed DTLS for CoAP. Proceedings of the IEEE International Conference on Distributed Computing in Sensor Systems, DCOSS, Hangzhou, China.","DOI":"10.1109\/DCOSS.2012.55"},{"key":"ref_133","doi-asserted-by":"crossref","unstructured":"Singh, M., Rajan, M.A., Shivraj, V.L., and Balamuralidhar, P. (2015, January 4\u20136). Secure MQTT for Internet of Things (IoT). Proceedings of the 2015 5th International Conference on Communication Systems and Network Technologies, CSNT, Gwalior, India.","DOI":"10.1109\/CSNT.2015.16"},{"key":"ref_134","doi-asserted-by":"crossref","first-page":"1294","DOI":"10.1109\/COMST.2015.2388550","article-title":"Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues","volume":"17","author":"Granjal","year":"2015","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_135","unstructured":"Keoh, S.L., Kumar, S.S., Garcia-Morchon, O., and Dijk, E. (2015). DTLS-Based Mul-Ticast Security for Low-Power and Lossy, IETF. Technical Report for the Internet Engineering Task Force."},{"key":"ref_136","doi-asserted-by":"crossref","unstructured":"Sethi, M., Arkko, J., and Keranen, A. (2012, January 22\u201325). End-to-end security for sleepy smart object networks. Proceedings of the Conference on Local Computer Networks, LCN, Clearwater, FL, USA.","DOI":"10.1109\/LCNW.2012.6424089"},{"key":"ref_137","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1016\/j.comcom.2010.02.013","article-title":"Reputation-based role assignment for role-based access control in wireless sensor networks","volume":"34","author":"Misra","year":"2011","journal-title":"Comput. Commun."},{"key":"ref_138","doi-asserted-by":"crossref","unstructured":"Walters, J.P., Liang, Z., Shi, W., and Chaudhary, V. (2007). Wireless Sensor Network Security: A Survey. Security in Distributed, Grid, Mobile, and Pervasive Computing, CRC Press.","DOI":"10.1201\/9780849379253-20"},{"key":"ref_139","doi-asserted-by":"crossref","unstructured":"Rajan, A., Jithish, J., and Sankaran, S. (2017, January 13\u201316). Sybil attack in IOT: Modelling and defenses. Proceedings of the 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), Udupi, India.","DOI":"10.1109\/ICACCI.2017.8126193"},{"key":"ref_140","first-page":"647","article-title":"A Survey on Gray Hole Attack in MANET","volume":"2","author":"Shanmuganathan","year":"2012","journal-title":"IRACST-Int. J. Comput. Netw. Wirel. Commun. (IJCNWC)"},{"key":"ref_141","first-page":"8","article-title":"DoS Attacks on different Layers of WSN: A Review","volume":"130","author":"Sahni","year":"2015","journal-title":"Int. J. Comput. Appl."},{"key":"ref_142","unstructured":"Phelan, T. (2019, April 08). Datagram Transport Layer Security (DTLS) over the Datagram Congestion Control Protocol (DCCP). Available online: https:\/\/https:\/\/tools.ietf.org\/html\/draft-ietf-dccp-dtls-06."},{"key":"ref_143","doi-asserted-by":"crossref","unstructured":"Moskowitz, R., Nikander, P., and Jokela, T.H. (2008). Host Identity Protocol, IETF. Technical Report for Internet Engineering Task Force.","DOI":"10.17487\/rfc5201"},{"key":"ref_144","doi-asserted-by":"crossref","unstructured":"Kaufman, C. (2005). Internet Key Exchange (IKEv2) Protocol, Internet Engineering Task Force (IETF). Technical Report.","DOI":"10.17487\/rfc4306"},{"key":"ref_145","unstructured":"Moskowitz, R. (2019, April 08). HIP Diet EXchange (DEX). Available online: https:\/\/tools.ietf.org\/html\/draft-moskowitz-hip-rg-dex-05."},{"key":"ref_146","doi-asserted-by":"crossref","unstructured":"Wook Jung, S., and Jung, S. (2015). Secure Bootstrapping and Rebootstrapping for Resource-Constrained Thing in Internet of Things. Int. J. Distrib. Sens. Netw.","DOI":"10.1155\/2015\/174383"},{"key":"ref_147","unstructured":"Sarikaya, B., Sethi, M., and Sangi, A.R. (2018). Secure IoT Bootstrapping: A Survey, IETF. Technical Report for Internet Engineering Task Force."},{"key":"ref_148","doi-asserted-by":"crossref","unstructured":"Montenegro, G., Kushalnagar, N., Hui, J., and Culler, D. (2007). Transmission of IPv6 Packets over IEEE 802.15.4 Networks, IETF. Technical Report for Internet Engineering Task Force.","DOI":"10.17487\/rfc4944"},{"key":"ref_149","unstructured":"Watteyne, T., Palattella, M., and Grieco, L. (2019, April 08). Using IEEE 802.15.4e Time-Slotted Channel Hopping (TSCH) in the Internet of Things (IoT): Problem Statement. Available online: https:\/\/www.rfc-editor.org\/rfc\/rfc7554.txt."},{"key":"ref_150","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1016\/j.compeleceng.2011.01.009","article-title":"Key Management Systems for Sensor Networks in the Context of the Internet of Things","volume":"37","author":"Roman","year":"2011","journal-title":"Comput. Electr. Eng."},{"key":"ref_151","unstructured":"ArchRock Corporation (2019, April 08). Phynet n4x Series. Available online: https:\/\/www.businesswire.com\/news\/home\/20081014005655\/en\/Arch-Rock-Adds."},{"key":"ref_152","unstructured":"Moskowitz, R., and Hummen, R. (2017). HIP Diet EXchange (DEX), Internet Engineering Task Force (IETF)."},{"key":"ref_153","doi-asserted-by":"crossref","unstructured":"Dierks, T., and Allen, C. (1999). The TLS Protocol, Internet Engineering Task Force (IETF).","DOI":"10.17487\/rfc2246"},{"key":"ref_154","doi-asserted-by":"crossref","unstructured":"Hummen, R., Ziegeldorf, J.H., Shafagh, H., Raza, S., and Wehrle, K. (2013, January 19). Towards Viable Certificate-based Authentication for the Internet of Things. Proceedings of the 2nd ACM Workshop on Hot Topics on Wireless Network Security and Privacy, Budapest, Hungary.","DOI":"10.1145\/2463183.2463193"},{"key":"ref_155","doi-asserted-by":"crossref","first-page":"1938","DOI":"10.1002\/dac.2444","article-title":"Network-layer security for the Internet of Things using TinyOS and BLIP","volume":"27","author":"Granjal","year":"2014","journal-title":"Int. J. Commun. Syst."},{"key":"ref_156","first-page":"5968","article-title":"Secure communication for the Internet of Things\u2014A comparison of link-layer security and IPsec for 6LoWPAN","volume":"9","author":"Raza","year":"2014","journal-title":"Int. J. Appl. Eng. Res."},{"key":"ref_157","unstructured":"Raza, S., Voigt, T., and Jutvik, V. (2012, January 23). Lightweight IKEv2: A Key Management Solution for both the Compressed IPsec and the IEEE 802.15.4 Security. Proceedings of the IETF Workshop on Smart Object Security, Paris, France."},{"key":"ref_158","doi-asserted-by":"crossref","unstructured":"Hummen, R., Hiller, J., Wirtz, H., Henze, M., Shafagh, H., and Wehrle, K. (2013, January 17\u201319). 6LoWPAN fragmentation attacks and mitigation mechanisms. Proceedings of the Sixth ACM conference on Security and Privacy in Wireless and Mobile Networks\u2014WiSec \u201913, Budapest, Hungary.","DOI":"10.1145\/2462096.2462107"},{"key":"ref_159","doi-asserted-by":"crossref","unstructured":"Raza, S., Duquennoy, S., Chung, T., Yazar, D., Voigt, T., and Roedig, U. (2011, January 27\u201329). Securing Communication in 6LoWPAN with Compressed IPsec. Proceedings of the 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS), Barcelona, Spain.","DOI":"10.1109\/DCOSS.2011.5982177"},{"key":"ref_160","doi-asserted-by":"crossref","unstructured":"Granjal, J., Monteiro, E., and Silva, J.S. (2010, January 6\u201310). Enabling Network-Layer Security on IPv6 Wireless Sensor Networks. Proceedings of the 2010 IEEE Global Telecommunications Conference GLOBECOM, Miami, FL, USA.","DOI":"10.1109\/GLOCOM.2010.5684293"},{"key":"ref_161","doi-asserted-by":"crossref","unstructured":"Hummen, R., Wirtz, H., Ziegeldorf, J.H., Hiller, J., and Wehrle, K. (2013, January 7\u201310). Tailoring end-to-end IP security protocols to the internet of things. Proceedings of the International Conference on Network Protocols, ICNP, Goettingen, Germany.","DOI":"10.1109\/ICNP.2013.6733571"},{"key":"ref_162","unstructured":"Winter, T., Thubert, P., Brandt, A., Hui, J., Kelsey, R., Levis, P., Pister, K., Struik, R., Vasseur, J.P., and Alexander, R. (2012). RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks, Internet Engineering Task Force (IETF). RFC 6550."},{"key":"ref_163","doi-asserted-by":"crossref","unstructured":"Tsao, T., Alexander, R., and Dohler, M. (2014). A Security Threat Analysis for Routing Protocol for Low-Power and Lossy Networks (RPL), Internet Engineering Task Force (IETF). RFC7416.","DOI":"10.17487\/rfc7416"},{"key":"ref_164","doi-asserted-by":"crossref","first-page":"3685","DOI":"10.1109\/JSEN.2013.2266399","article-title":"The impact of rank attack on network topology of routing protocol for low-power and lossy networks","volume":"13","author":"Le","year":"2013","journal-title":"IEEE Sens. J."},{"key":"ref_165","doi-asserted-by":"crossref","unstructured":"Dvir, A., Holczer, T., and Buttyan, L. (2011, January 17\u201321). VeRA\u2014Version number and rank authentication in RPL. Proceedings of the 8th IEEE International Conference on Mobile Ad-hoc and Sensor Systems, MASS, Valencia, Spain.","DOI":"10.1109\/MASS.2011.76"},{"key":"ref_166","unstructured":"Weekly, K., and Pister, K. (November, January 30). Evaluating sinkhole defense techniques in RPL networks. Proceedings of the International Conference on Network Protocols, ICNP, Austin, TX, USA."},{"key":"ref_167","doi-asserted-by":"crossref","first-page":"2502","DOI":"10.1109\/COMST.2017.2751617","article-title":"Challenging the IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL): A Survey","volume":"19","author":"Kim","year":"2017","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_168","unstructured":"Hartke, K. (2014). Practical Issues with Datagram Transport Layer Security in Constrained Environments, DICE Working Group."},{"key":"ref_169","unstructured":"Keoh, S., Kumar, S., and Shelby, Z. (2013). Profiling of DTLS for CoAP-Based IoT Applications, IETF. Technical Report for Internet Engineering Task Force."},{"key":"ref_170","doi-asserted-by":"crossref","unstructured":"Kothmayr, T., Schmitt, C., Hu, W., Brunig, M., and Carle, G. (2012, January 22\u201325). A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication. Proceedings of the Conference on Local Computer Networks, LCN, Clearwater, FL, USA.","DOI":"10.1109\/LCNW.2012.6424088"},{"key":"ref_171","doi-asserted-by":"crossref","unstructured":"Granjal, J., Monteiro, E., and Silva, J.S. (2013, January 5\u20137). Application-layer security for the WoT: Extending CoAP to support end-to-end message security for internet-integrated sensing applications. Proceedings of the 11th Wired\/Wireless Internet Communication, St. Petersburg, Russia.","DOI":"10.1007\/978-3-642-38401-1_11"},{"key":"ref_172","doi-asserted-by":"crossref","unstructured":"Ramsdell, B. (2004). Secure\/Multipurpose Internet Mail Extensions (S\/MIME) Version 3.1 Message Specification, IETF.","DOI":"10.17487\/rfc3851"},{"key":"ref_173","doi-asserted-by":"crossref","first-page":"1223","DOI":"10.1109\/SURV.2012.121912.00006","article-title":"On the vital areas of intrusion detection systems in wireless sensor networks","volume":"15","author":"Abduvaliyev","year":"2013","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_174","doi-asserted-by":"crossref","unstructured":"da Silva, A.P.R., Martins, M.H.T., Rocha, B.P.S., Loureiro, A.A.F., Ruiz, L.B., and Wong, H.C. (2005, January 13). Decentralized intrusion detection in wireless sensor networks. Proceedings of the 1st ACM International Workshop on Quality of service & Security in Wireless and Mobile Networks\u2014Q2SWinet \u201905, Patras, Greece.","DOI":"10.1145\/1089761.1089765"},{"key":"ref_175","doi-asserted-by":"crossref","first-page":"2661","DOI":"10.1016\/j.adhoc.2013.04.014","article-title":"SVELTE: Real-time intrusion detection in the Internet of Things","volume":"11","author":"Raza","year":"2013","journal-title":"Ad Hoc Netw."},{"key":"ref_176","doi-asserted-by":"crossref","unstructured":"Liu, C., Yang, J., Chen, R., Zhang, Y., and Zeng, J. (2011, January 26\u201328). Research on immunity-based intrusion detection technology for the Internet of Things. Proceedings of the 2011 7th International Conference on Natural Computation, ICNC, Shanghai, China.","DOI":"10.1109\/ICNC.2011.6022060"},{"key":"ref_177","unstructured":"Gaurav, K., and Goya, P.V.A. (2015, January 26\u201328). IoT transaction security. Proceedings of the 5th International Conference on the Internet of Things (IoT), Seoul, Korea."},{"key":"ref_178","doi-asserted-by":"crossref","unstructured":"Biswas, K., and Muthukkumarasamy, V. (2016, January 12\u201314). Securing smart cities using blockchain technology. Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications, 14th IEEE International Conference on Smart City and 2nd IEEE International Conference on Data Science and Systems, HPCC\/SmartCity\/DSS, Sydney, Australia.","DOI":"10.1109\/HPCC-SmartCity-DSS.2016.0198"},{"key":"ref_179","unstructured":"Kokoris-Kogias, L., Gasser, L., Khoffi, I., Jovanovic, P., Gailly, N., and Ford, B. (2016, January 19\u201322). Managing Identities Using Blockchains and CoSi. Proceedings of the 9th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs), Darmstadt, Germany."},{"key":"ref_180","doi-asserted-by":"crossref","first-page":"533","DOI":"10.4236\/jsea.2016.910036","article-title":"Blockchain Platform for Industrial Internet of Things","volume":"9","author":"Bahga","year":"2016","journal-title":"J. Softw. Eng. Appl."},{"key":"ref_181","unstructured":"Otte, P., de Vos, M., and Pouwelse, J. (2017). TrustChain: A Sybil-resistant scalable blockchain. Future Gener. Comput. Syst."},{"key":"ref_182","doi-asserted-by":"crossref","unstructured":"Hashemi, S.H., Faghri, F., Rausch, P., and Campbell, R.H. (2016, January 4\u20138). World of empowered IoT users. Proceedings of the 2016 IEEE 1st International Conference on Internet-of-Things Design and Implementation, IoTDI, Berlin, Germany.","DOI":"10.1109\/IoTDI.2015.39"},{"key":"ref_183","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1007\/s10916-016-0574-6","article-title":"Healthcare Data Gateways: Found Healthcare Intelligence on Blockchain with Novel Privacy Risk Control","volume":"40","author":"Yue","year":"2016","journal-title":"J. Med. Syst."},{"key":"ref_184","unstructured":"Conoscenti, M., and Carlos De Martin, J. (December, January 29). IOT_Blockchain for the Internet of Things: a Systematic Literature Review. Proceedings of the Third International Symposium on Internet of Things: Systems, Management and Security, Agadir, Morocco."},{"key":"ref_185","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1016\/j.future.2017.11.022","article-title":"IoT security: Review, blockchain solutions, and open challenges","volume":"82","author":"Khan","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_186","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1016\/j.future.2018.05.046","article-title":"On blockchain and its integration with IoT. Challenges and opportunities","volume":"88","author":"Reyna","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_187","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1016\/j.comnet.2018.03.012","article-title":"Internet of things security: A top-down survey","volume":"141","author":"Kouicem","year":"2018","journal-title":"Comput. Netw."},{"key":"ref_188","doi-asserted-by":"crossref","unstructured":"Hu, P. (2015, January 4\u20137). A System Architecture for Software-Defined Industrial Internet of Things. Proceedings of the 2015 IEEE International Conference on Ubiquitous Wireless Broadband, ICUWB, Montreal, QC, Canada.","DOI":"10.1109\/ICUWB.2015.7324414"},{"key":"ref_189","doi-asserted-by":"crossref","unstructured":"Flauzac, O., Gonzalez, C., Hachani, A., and Nolot, F. (2015, January 25\u201327). SDN Based Architecture for IoT and Improvement of the Security. Proceedings of the IEEE 29th International Conference on Advanced Information Networking and Applications Workshops, WAINA, Gwangju, Korea.","DOI":"10.1109\/WAINA.2015.110"},{"key":"ref_190","first-page":"2327","article-title":"Security improvement in IoT based on Software Defined Networking (SDN)","volume":"5","author":"Vandana","year":"2016","journal-title":"Int. J. Sci. Eng. Technol. Res. (IJSETR)"},{"key":"ref_191","doi-asserted-by":"crossref","unstructured":"Gonzalez, C., Charfadine, S.M., Flauzac, O., and Nolot, F. (2016, January 13\u201315). SDN-based security framework for the IoT in distributed grid. Proceedings of the International Multidisciplinary Conference on Computer and Energy Science, SpliTech, Split, Croatia.","DOI":"10.1109\/SpliTech.2016.7555946"},{"key":"ref_192","doi-asserted-by":"crossref","unstructured":"Aragon, S., Tiloca, M., Maass, M., Hollick, M., and Raza, S. (June, January 30). ACE of spades in the iot security game: A flexible ipsec security profile for access control. Proceedings of the 2018 IEEE Conference on Communications and Network Security, CNS, Beijing, China.","DOI":"10.1109\/CNS.2018.8433209"},{"key":"ref_193","unstructured":"Bergmann, O., Bormann, C., Tzi, U.B., Ab, E., and Seitz, L. (2019, April 08). Datagram Transport Layer Security (DTLS) Profile for Authentication and Authorization for Constrained Environments (ACE). Available online: https:\/\/tools.ietf.org\/html\/draft-ietf-ace-dtls-authorize-03."},{"key":"ref_194","unstructured":"Selander, G., Ab, S., and Tschofenig, H. (2019, April 08). Authentication and Authorization for Constrained Environments (ACE). Available online: https:\/\/tools.ietf.org\/html\/draft-ietf-ace-oauth-authz-07."},{"key":"ref_195","unstructured":"Ab, E., and Seitz, L. (2019, April 08). Object Security for Constrained RESTful Environments (OSCORE). Available online: https:\/\/tools.ietf.org\/html\/draft-ietf-core-object-security-16."},{"key":"ref_196","doi-asserted-by":"crossref","first-page":"726","DOI":"10.1109\/JPROC.2015.2418457","article-title":"Digital rights management: The cost to consumers","volume":"103","author":"Kubesch","year":"2015","journal-title":"Proc. IEEE"},{"key":"ref_197","unstructured":"Microsoft Corporation (2017). Digital Transformation with IoT: How OEMs and ISVs Can Lead the Way, Microsoft Corporation."},{"key":"ref_198","first-page":"262","article-title":"A biometric-based authentication and anonymity scheme for digital rights management system","volume":"47","author":"Lee","year":"2018","journal-title":"Inf. Technol. Control"},{"key":"ref_199","doi-asserted-by":"crossref","first-page":"878","DOI":"10.1016\/j.eswa.2007.07.029","article-title":"A secure and traceable E-DRM system based on mobile device","volume":"35","author":"Chen","year":"2008","journal-title":"Expert Syst. Appl."},{"key":"ref_200","doi-asserted-by":"crossref","first-page":"6176","DOI":"10.1016\/j.eswa.2010.02.110","article-title":"An efficient and reliable E-DRM scheme for mobile environments","volume":"37","author":"Chang","year":"2010","journal-title":"Expert Syst. Appl."},{"key":"ref_201","doi-asserted-by":"crossref","first-page":"3383","DOI":"10.1002\/sec.1266","article-title":"An anonymous and secure biometric-based enterprise digital rights management system for mobile environment","volume":"8","author":"Mishra","year":"2015","journal-title":"Secur. Commun. Netw."},{"key":"ref_202","doi-asserted-by":"crossref","unstructured":"Newman, R., Doody, P., Trebar, M., and Okoke, U. (,  2016). Rights management to enable a true Internet of Things. Proceedings of the IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI, Tucson, AZ, USA.","DOI":"10.1109\/ISI.2016.7745434"},{"key":"ref_203","doi-asserted-by":"crossref","first-page":"2751","DOI":"10.1109\/ACCESS.2016.2577036","article-title":"Big Privacy: Challenges and Opportunities of Privacy Study in the Age of Big Data","volume":"4","author":"Yu","year":"2016","journal-title":"IEEE Access"},{"key":"ref_204","doi-asserted-by":"crossref","unstructured":"Doddapaneni, K., Lakkundi, R., Rao, S., Kulkarni, S.G., and Bhat, B. (2017, January 9). Secure FoTA Object for IoT. Proceedings of the 2017 IEEE 42nd Conference on Local Computer Networks Workshops, LCN Workshops 2017, Singapore.","DOI":"10.1109\/LCN.Workshops.2017.78"},{"key":"ref_205","doi-asserted-by":"crossref","unstructured":"Blake, I.F., Seroussi, G.G., Smart, N.P.N.P., and Cassels, J.W.S. (2005). Advances in Elliptic Curve Cryptography, Cambridge University Press.","DOI":"10.1017\/CBO9780511546570"},{"key":"ref_206","doi-asserted-by":"crossref","unstructured":"Ka\u017amierski, T.J., and Beeby, S. (2011). Energy Arvesting Systems: Principles, Modeling and Applications, Springer.","DOI":"10.1007\/978-1-4419-7566-9"},{"key":"ref_207","doi-asserted-by":"crossref","unstructured":"Saleem, J., Hammoudeh, M., Raza, U., Adebisi, B., and Ande, R. (2018, January 26\u201327). IoT standardisation: Challenges, perspectives and solution. Proceedings of the 2nd International Conference on Future Networks and Distributed Systems\u2014ICFNDS \u201918, Amman, Jordan.","DOI":"10.1145\/3231053.3231103"},{"key":"ref_208","unstructured":"DDCMS (2018). Code of Practice for Consumer IoT Security, DDCMS. Technical Report."}],"container-title":["Journal of Sensor and Actuator Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2224-2708\/8\/2\/22\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T12:46:13Z","timestamp":1760186773000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2224-2708\/8\/2\/22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,22]]},"references-count":208,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2019,6]]}},"alternative-id":["jsan8020022"],"URL":"https:\/\/doi.org\/10.3390\/jsan8020022","relation":{},"ISSN":["2224-2708"],"issn-type":[{"value":"2224-2708","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,4,22]]}}}