{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:21:05Z","timestamp":1761402065322,"version":"build-2065373602"},"reference-count":76,"publisher":"MDPI AG","issue":"11","license":[{"start":{"date-parts":[[2020,5,27]],"date-time":"2020-05-27T00:00:00Z","timestamp":1590537600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Agencia  Estatal  de Investigaci\u00f3n of Spain and ERDF funds of the EU (AEI\/FEDER, UE)","award":["TEC2016-75067-C4-1-R, RED2018-102668-T, PID2019-104958RB-C42"],"award-info":[{"award-number":["TEC2016-75067-C4-1-R, RED2018-102668-T, PID2019-104958RB-C42"]}]},{"name":"Xunta  de  Galicia","award":["ED431G2019\/01"],"award-info":[{"award-number":["ED431G2019\/01"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Shodan is a search engine for exploring the Internet and thus finding connected devices. Its main use is to provide a tool for cybersecurity researchers and developers to detect vulnerable Internet-connected devices without scanning them directly. Due to its features, Shodan can be used for performing cybersecurity audits on Internet of Things (IoT) systems and devices used in applications that require to be connected to the Internet. The tool allows for detecting IoT device vulnerabilities that are related to two common cybersecurity problems in IoT: the implementation of weak security mechanisms and the lack of a proper security configuration. To tackle these issues, this article describes how Shodan can be used to perform audits and thus detect potential IoT-device vulnerabilities. For such a purpose, a use case-based methodology is proposed to teach students and users to carry out such audits and then make more secure the detected exploitable IoT devices. Moreover, this work details how to automate IoT-device vulnerability assessments through Shodan scripts. Thus, this article provides an introductory practical guide to IoT cybersecurity assessment and exploitation with Shodan.<\/jats:p>","DOI":"10.3390\/s20113048","type":"journal-article","created":{"date-parts":[[2020,5,28]],"date-time":"2020-05-28T12:36:58Z","timestamp":1590669418000},"page":"3048","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":37,"title":["Teaching and Learning IoT Cybersecurity and Vulnerability Assessment with Shodan through Practical Use Cases"],"prefix":"10.3390","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2179-5917","authenticated-orcid":false,"given":"Tiago M.","family":"Fern\u00e1ndez-Caram\u00e9s","sequence":"first","affiliation":[{"name":"Department of Computer Engineering, Faculty of Computer Science, Universidade da Coru\u00f1a, 15071 A Coru\u00f1a, Spain"},{"name":"Centro de investigaci\u00f3n CITIC, Universidade da Coru\u00f1a, 15071 A Coru\u00f1a, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4991-6808","authenticated-orcid":false,"given":"Paula","family":"Fraga-Lamas","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Faculty of Computer Science, Universidade da Coru\u00f1a, 15071 A Coru\u00f1a, Spain"},{"name":"Centro de investigaci\u00f3n CITIC, Universidade da Coru\u00f1a, 15071 A Coru\u00f1a, Spain"}]}],"member":"1968","published-online":{"date-parts":[[2020,5,27]]},"reference":[{"key":"ref_1","unstructured":"(2020, April 09). HIS, Internet of Things (IoT) Connected Devices Installed Base Worldwide from 2015 to 2025 (In Billions). Available online: https:\/\/www.statista.com\/statistics\/471264\/iot-number-of-connected-devices-worldwide\/."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Blanco-Novoa, O., Fern\u00e1ndez-Caram\u00e9s, T.M., Fraga-Lamas, P., and Castedo, L. (2018). A Cost-Effective IoT System for Monitoring Indoor Radon Gas Concentration. Sensors, 18.","DOI":"10.3390\/s18072198"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"129551","DOI":"10.1109\/ACCESS.2019.2932609","article-title":"Internet-of-Things (IoT)-Based Smart Agriculture: Toward Making the Fields Talk","volume":"7","author":"Ayaz","year":"2019","journal-title":"IEEE Access"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Fern\u00e1ndez-Caram\u00e9s, T.M., Froiz-M\u00edguez, I., Blanco-Novoa, O., and Fraga-Lamas, P. (2019). Enabling the Internet of Mobile Crowdsourcing Health Things: A Mobile Fog Computing, Blockchain and IoT Based Continuous Glucose Monitoring System for Diabetes Mellitus Research and Care. Sensors, 19.","DOI":"10.3390\/s19153319"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"36611","DOI":"10.1109\/ACCESS.2018.2853148","article-title":"A Survey on the Roles of Communication Technologies in IoT-Based Personalized Healthcare Applications","volume":"6","author":"Alam","year":"2018","journal-title":"IEEE Access"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Fraga-Lamas, P., Celaya-Echarri, M., Lopez-Iturri, P., Castedo, L., Azpilicueta, L., Aguirre, E., Su\u00e1rez-Albela, M., Falcone, F., and Fern\u00e1ndez-Caram\u00e9s, T.M. (2019). Design and Experimental Validation of a LoRaWAN Fog Computing Based Architecture for IoT Enabled Smart Campus Applications. Sensors, 19.","DOI":"10.3390\/s19153287"},{"key":"ref_7","first-page":"2103","article-title":"Internet of Things (IoT) Cybersecurity Research: A Review of Current Research Topics","volume":"6","author":"Lu","year":"2019","journal-title":"IEEE Int. Things"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Augusto-Gonzalez, J., Collen, A., Evangelatos, S., Anagnostopoulos, M., Spathoulas, G., Giannoutakis, K.M., Votis, K., Tzovaras, D., Genge, B., and Gelenbe, E. (2019, January 11\u201313). From internet of threats to internet of things: A cyber security architecture for smart homes. Proceedings of the 2019 IEEE 24th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Limassol, Cyprus.","DOI":"10.1109\/CAMAD.2019.8858493"},{"key":"ref_9","unstructured":"(2020, April 09). IETF, RFC 8446: The Transport Layer Security (TLS) Protocol Version 1.3. Available online: https:\/\/tools.ietf.org\/html\/rfc8446."},{"key":"ref_10","unstructured":"(2020, April 09). IETF, RFC 3156: MIME security with OpenPGP. Available online: https:\/\/tools.ietf.org\/html\/rfc3156."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"1078","DOI":"10.1109\/TR.2015.2429271","article-title":"Hierarchical and Dynamic Elliptic Curve Cryptosystem Based Self-Certified Public Key Scheme for Medical Data Protection","volume":"64","author":"Tseng","year":"2015","journal-title":"IEEE Trans. Reliab."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","article-title":"A method for obtaining digital signatures and public-key cryptosystems","volume":"21","author":"Rivest","year":"1978","journal-title":"Commun. ACM"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","article-title":"Elliptic curve cryptosystems","volume":"48","author":"Koblitz","year":"1987","journal-title":"Math. Comput."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1109\/MC.2017.201","article-title":"DDoS in the IoT: Mirai and Other Botnets","volume":"50","author":"Kolias","year":"2017","journal-title":"Computer"},{"key":"ref_15","unstructured":"Ghavami, N., Volkamer, M., Haller, P., S\u00e1nchez, A., and Dimas, M. (2018). GHOST-Safe-Guarding Home IoT Environments with Personalised Real-Time Risk Control. Security in Computer and Information Sciences: First International ISCIS Security Workshop 2018, Springer. Euro-CYBERSEC."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"8182","DOI":"10.1109\/JIOT.2019.2935189","article-title":"IoT: Internet of Threats? A Survey of Practical Security Vulnerabilities in Real IoT Devices","volume":"6","author":"Meneghello","year":"2019","journal-title":"IEEE Int. Things J."},{"key":"ref_17","unstructured":"(2020, April 09). Shodan Official Web Page. Available online: https:\/\/www.shodan.io."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"H\u00f6lbl, M., and Welzer, T. (2017, January 7\u20139). Experience with Teaching Cybersecurity. Proceedings of the 27th EAEEIE Annual Conference, Grenoble, France.","DOI":"10.1109\/EAEEIE.2017.8768496"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1109\/TE.2017.2715174","article-title":"Identifying Core Concepts of Cybersecurity: Results of Two Delphi Processes","volume":"61","author":"Parekh","year":"2018","journal-title":"IEEE Trans. Educ."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1109\/TLT.2015.2424692","article-title":"Teaching Cybersecurity Using the Cloud","volume":"8","author":"Salah","year":"2015","journal-title":"IEEE Trans. Learn. Technol."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Tunc, C., Hariri, S., De La Pe\u00f1a Montero, F., Fargo, F., Satam, P., and Al-Nashif, Y. (2015, January 21\u201325). Teaching and Training Cybersecurity as a Cloud Service. Proceedings of the 2015 International Conference on Cloud and Autonomic Computing, Boston, MA, USA.","DOI":"10.1109\/ICCAC.2015.47"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"169066","DOI":"10.1109\/ACCESS.2019.2952585","article-title":"Crowdsourcing Approach for Developing Hands-On Experiments in Cybersecurity Education","volume":"7","author":"Wang","year":"2019","journal-title":"IEEE Access"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"34884","DOI":"10.1109\/ACCESS.2018.2850839","article-title":"A Flexible Laboratory Environment Supporting Honeypot Deployment for Teaching Real-World Cybersecurity Skills","volume":"6","author":"Eliot","year":"2018","journal-title":"IEEE Access"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"\u010celeda, P., Vykopal, J., \u0160v\u00e1bensk\u00fd, V., and Slav\u00ed\u010dek, K. (2020, January 11\u201314). KYPO4INDUSTRY: A Testbed for Teaching Cybersecurity of Industrial Control Systems. Proceedings of the 51st ACM Technical Symposium on Computer Science Education, Portland, OR, USA.","DOI":"10.1145\/3328778.3366908"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Sharevski, F., Trowbridge, A., and Westbrook, J. (2018, January 11). Novel approach for cybersecurity workforce development: A course in secure design. Proceedings of the IEEE Integrated STEM Education Conference (ISEC), Princeton, NJ, USA.","DOI":"10.1109\/ISECon.2018.8340471"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1109\/MCOM.001.1900223","article-title":"Experiential User-Centered Security in a Classroom: Secure Design for IoT","volume":"57","author":"Sharevski","year":"2019","journal-title":"IEEE Commun. Mag."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Ban, Y., Okamura, K., and Kaneko, K. (2017, January 9\u201313). Effectiveness of Experiential Learning for Keeping Knowledge Retention in IoT Security Education. Proceedings of the 6th IIAI International Congress on Advanced Applied Informatics, Hamamatsu, Japan.","DOI":"10.1109\/IIAI-AAI.2017.206"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Figueroa, S., Car\u00edas, J.F., A\u00f1orga, J., Arrizabalaga, S., and Hernantes, J. (2018, January 20\u201322). A RFID-based IoT Cybersecurity Lab in Telecommunications Engineering. Proceedings of the Technologies Applied to Electronics Teaching Conference, La Laguna, Spain.","DOI":"10.1109\/TAEE.2018.8475973"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Fern\u00e1ndez-Caram\u00e9s, T.M., Fraga-Lamas, P., Su\u00e1rez-Albela, M., Castedo, L., Albela, M., and Castedo, L. (2017). A methodology for evaluating security in commercial RFID systems. Radio Frequency Identification, IntechOpen.","DOI":"10.5772\/64844"},{"key":"ref_30","first-page":"51","article-title":"Cyber security teaching and learning laboratories: A survey","volume":"35","author":"Topham","year":"2016","journal-title":"Inf. Secur."},{"key":"ref_31","unstructured":"Bock, K., Hughey, G., and Levin, D. (2018, January 13). King of the Hill: A Novel Cybersecurity Competition for Teaching Penetration Testing. Proceedings of the 2018 USENIX Workshop on Advances in Security Education (ASE 18), Baltimore, MD, USA."},{"key":"ref_32","unstructured":"(2020, April 09). DEF CON 27 Capture the Flag. Available online: https:\/\/www.defcon.org\/html\/defcon-27\/dc-27-ctf.html."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Ford, V., Siraj, A., Haynes, A., and Brown, E. (2017, January 8\u201311). Capture the flag unplugged: An offline cyber competition. Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education, Seattle, WA, USA.","DOI":"10.1145\/3017680.3017783"},{"key":"ref_34","unstructured":"Chapman, P., Burket, J., and Brumley, D. (2014, January 18). PicoCTF: A Game- Based Computer Security Competition for High School Students. Proceedings of the 2014 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE 14), USENIX Association, San Diego, CA, USA."},{"key":"ref_35","unstructured":"Root Me (2020, April 09). The Fast, Easy, and Affordable Way to Train Your Hacking Skills. Challenge Your Hacking Skills. Available online: https:\/\/www.root-me.org\/?lang=en."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Vykopal, J., Vizvary, M., Oslejsek, R., Celeda, P., and Tovarnak, D. (2017, January 18\u201321). Lessons Learned From Complex Hands-on Defence Exercises in a Cyber Range. Proceedings of the 2017 IEEE Frontiers in Education Conference (FIE), Indianapolis, IN, USA.","DOI":"10.1109\/FIE.2017.8190713"},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Ruef, A., Hicks, M., Parker, J., Levin, D., Mazurek, M.L., and Mardziel, P. (2016, January 24\u201328). Build it, break it, fix it: Contesting secure development. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna Austria.","DOI":"10.1145\/2976749.2978382"},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"1","DOI":"10.17083\/ijsg.v3i1.107","article-title":"Game based cyber security training: Are serious games suitable for cyber security training?","volume":"3","author":"Hendrix","year":"2016","journal-title":"Int. J. Serious Games"},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Knowles, B., Finney, J., Beck, S., and Devine, J. (2018, January 28\u201329). What children\u2019s imagined uses of the BBC micro:bit tells us about designing for their IoT privacy, security and safety. Proceedings of the Living in the Internet of Things: Cybersecurity of the IoT, London, UK.","DOI":"10.1049\/cp.2018.0015"},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Liu, X., and Murphy, D. (2016, January 17). Engaging females in cybersecurity: K through Gray. Proceedings of the 2016 IEEE Conference on Intelligence and Security Informatics (ISI), Tucson, AZ, USA.","DOI":"10.1109\/ISI.2016.7745485"},{"key":"ref_41","unstructured":"(2020, April 09). Zmap Official Web Page. Available online: https:\/\/zmap.io."},{"key":"ref_42","unstructured":"(2020, April 09). Censys Official Web Page. Available online: https:\/\/censys.io."},{"key":"ref_43","unstructured":"(2020, April 09). Thingful Official Web Page. Available online: https:\/\/www.thingful.net."},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Albataineh, A., and Alsmadi, I. (2019, January 10\u201312). IoT and the Risk of Internet Exposure: Risk Assessment Using Shodan Queries. Proceedings of the 2019 IEEE 20th International Symposium on \u201cA World of Wireless, Mobile and Multimedia Networks\u201d (WoWMoM), Washington, DC, USA.","DOI":"10.1109\/WoWMoM.2019.8792986"},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Markowsky, L., and Markowsky, G. (2015, January 24\u201326). Scanning for vulnerable devices in the Internet of Things. Proceedings of the 2015 IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), Warsaw, Poland.","DOI":"10.1109\/IDAACS.2015.7340779"},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Bugeja, J., J\u00f6nsson, D., and Jacobsson, A. (2018, January 19). An Investigation of Vulnerabilities in Smart Connected Cameras. Proceedings of the 2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), Athens, Greece.","DOI":"10.1109\/PERCOMW.2018.8480184"},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/MC.2018.3011046","article-title":"IoT as a Land of Opportunity for DDoS Hackers","volume":"51","author":"Vlajic","year":"2018","journal-title":"Computer"},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"McMahon, E., Williams, R., El, M., Samtani, S., Patton, M., and Chen, H. (2017, January 22\u201324). Assessing medical device vulnerabilities on the Internet of Things. Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics (ISI), Beijing, China.","DOI":"10.1109\/ISI.2017.8004903"},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Rae, J.S., Chowdhury, M.M., and Jochen, M. (2019, January 20\u201322). Internet of Things Device Hardening Using Shodan.io and ShoVAT: A Survey. Proceedings of the 2019 IEEE International Conference on Electro Information Technology (EIT), Brookings, SD, USA.","DOI":"10.1109\/EIT.2019.8834072"},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"2696","DOI":"10.1002\/sec.1262","article-title":"ShoVAT: Shodan-based vulnerability assessment tool for Internet-facing services","volume":"9","author":"Genge","year":"2015","journal-title":"Secur. Commun. Netw."},{"key":"ref_51","unstructured":"(2020, April 09). Nessus Official Web Page. Available online: https:\/\/www.tenable.com\/products\/nessus\/nessus-professional."},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Williams, R., McMahon, E., Samtani, S., Patton, M., and Chen, H. (2017, January 22\u201324). Identifying vulnerabilities of consumer Internet of Things (IoT) devices: A scalable approach. Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics (ISI), Beijing, China.","DOI":"10.1109\/ISI.2017.8004904"},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Patton, M., Gross, E., Chinn, R., Forbis, S., Walker, L., and Chen, H. (2014, January 24\u201326). Uninvited Connections: A Study of Vulnerable Devices on the Internet of Things (IoT). Proceedings of the 2014 IEEE Joint Intelligence and Security Informatics Conference, The Hague, The Netherlands.","DOI":"10.1109\/JISIC.2014.43"},{"key":"ref_54","doi-asserted-by":"crossref","unstructured":"Al-Alami, H., Hadi, A., and Al-Bahadili, H. (2017, January 6\u20137). Vulnerability scanning of IoT devices in Jordan using Shodan. Proceedings of the 2017 2nd International Conference on the Applications of Information Technology in Developing Renewable Energy Processes & Systems (IT-DREPS), Amman, Jordan.","DOI":"10.1109\/IT-DREPS.2017.8277814"},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"430","DOI":"10.1109\/TE.2013.2249066","article-title":"Comparing the Effectiveness of an Inverted Classroom to a Traditional Classroom in an Upper-Division Engineering Course","volume":"56","author":"Mason","year":"2013","journal-title":"IEEE Trans. Educ."},{"key":"ref_56","unstructured":"(2020, April 09). DEF CON Conference Official Web Page. Available online: https:\/\/www.defcon.org."},{"key":"ref_57","unstructured":"(2020, April 09). Black Hat Conference Official Web Page. Available online: https:\/\/www.blackhat.com."},{"key":"ref_58","unstructured":"(2020, April 09). Chaos Computer Club Official Media Repository. Available online: https:\/\/media.ccc.de."},{"key":"ref_59","doi-asserted-by":"crossref","unstructured":"Su\u00e1rez-Albela, M., Fraga-Lamas, P., Castedo, L., and Fern\u00e1ndez-Caram\u00e9s, T.M. (2019). Clock frequency impact on the performance of high-security cryptographic cipher suites for energy-efficient resource-constrained IoT devices. Sensors, 19.","DOI":"10.3390\/s19010015"},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"45496","DOI":"10.1109\/ACCESS.2020.2978291","article-title":"Design and Empirical Validation of a Bluetooth 5 Fog Computing Based Industrial CPS Architecture for Intelligent Industry 4.0 Shipyard Workshops","volume":"8","author":"Azpilicueta","year":"2020","journal-title":"IEEE Access"},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3057266","article-title":"Fog computing for sustainable smart cities: A survey","volume":"50","author":"Perera","year":"2017","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"ref_62","unstructured":"Alturki, B., Reiff-Marganiec, S., Perera, C., and De, S. (2019). Exploring the Effectiveness of Service Decomposition in Fog Computing Architecture for the Internet of Things. IEEE Trans. Sustain. Comput."},{"key":"ref_63","doi-asserted-by":"crossref","unstructured":"Su\u00e1rez-Albela, M., Fraga-Lamas, P., and Fern\u00e1ndez-Caram\u00e9s, T.M. (2018). A Practical Evaluation on RSA and ECC-Based Cipher Suites for IoT High-Security Energy-Efficient Fog and Mist Computing Devices. Sensors, 18.","DOI":"10.3390\/s18113868"},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"45201","DOI":"10.1109\/ACCESS.2019.2908780","article-title":"A Review on the Application of Blockchain for the Next Generation of Cybersecure Industry 4.0 Smart Factories","volume":"7","year":"2019","journal-title":"IEEE Access"},{"key":"ref_65","doi-asserted-by":"crossref","first-page":"21091","DOI":"10.1109\/ACCESS.2020.2968985","article-title":"Towards post-quantum blockchain: A review on blockchain cryptography resistant to quantum computing attacks","volume":"8","year":"2020","journal-title":"IEEE Access"},{"key":"ref_66","doi-asserted-by":"crossref","unstructured":"Strielkina, A., Illiashenko, O., Zhydenko, M., and Uzun, D. (2018, January 24\u201327). Cybersecurity of healthcare IoT-based systems: Regulation and case-oriented assessment. Proceedings of the 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT), Kiev, Ukraine.","DOI":"10.1109\/DESSERT.2018.8409101"},{"key":"ref_67","doi-asserted-by":"crossref","unstructured":"Alrashdi, I., Alqazzaz, A., Aloufi, E., Alharthi, R., Zohdy, M., and Ming, H. (2019, January 7\u20139). AD-IoT: Anomaly Detection of IoT Cyberattacks in Smart City Using Machine Learning. Proceedings of the 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA.","DOI":"10.1109\/CCWC.2019.8666450"},{"key":"ref_68","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1109\/MPRV.2018.03367732","article-title":"IoT-Enabled Highway Maintenance: Understanding Emerging Cybersecurity Threats","volume":"17","author":"Trotter","year":"2018","journal-title":"IEEE Pervasive Comput."},{"key":"ref_69","doi-asserted-by":"crossref","unstructured":"Webb, J., and Hume, D. (2018, January 28\u201329). Campus IoT collaboration and governance using the NIST cybersecurity framework. Proceedings of the Living in the Internet of Things: Cybersecurity of the IoT, London, UK.","DOI":"10.1049\/cp.2018.0025"},{"key":"ref_70","doi-asserted-by":"crossref","unstructured":"Fr\u00f6tscher, F.A., Monschiebl, B., Drosou, A., Gelenbe, E., Reed, M.J., and Al-Naday, M. (2019, January 4\u20138). Improve cybersecurity of C-ITS Road Side Infrastructure Installations: The SerIoT\u2014Secure and Safe IoT approach. Proceedings of the 2019 IEEE International Conference on Connected Vehicles and Expo (ICCVE), Graz, Austria.","DOI":"10.1109\/ICCVE45908.2019.8965056"},{"key":"ref_71","unstructured":"Matherly, J. (2020, April 09). Complete Guide to Shodan. Collect. Analyze. Visualize. Make Internet Intelligence Work for You. Available online: https:\/\/www.amazon.com\/Complete-Guide-Shodan-Visualize-Intelligence-ebook\/dp\/B01CDIU880."},{"key":"ref_72","unstructured":"(2020, April 09). OpenWrt Official Web Page. Available online: https:\/\/openwrt.org."},{"key":"ref_73","unstructured":"(2020, April 09). Javier Olmedo GitHub Repository for Shodan Filters. Available online: https:\/\/github.com\/JavierOlmedo\/shodan-filters."},{"key":"ref_74","unstructured":"(2020, May 17). Vulnerabilities Collected by CVE Details for WebcamXP. Available online: https:\/\/www.cvedetails.com\/vulnerability-list\/vendor_id-2917\/Webcamxp.html."},{"key":"ref_75","unstructured":"(2020, April 09). Shodan Exploit API. Available online: https:\/\/developer.shodan.io\/api\/exploits\/rest."},{"key":"ref_76","unstructured":"(2020, April 09). List of Shodan Crawler IPs. Available online: https:\/\/wiki.ipfire.org\/configuration\/firewall\/blockshodan."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/11\/3048\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T09:33:12Z","timestamp":1760175192000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/11\/3048"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5,27]]},"references-count":76,"journal-issue":{"issue":"11","published-online":{"date-parts":[[2020,6]]}},"alternative-id":["s20113048"],"URL":"https:\/\/doi.org\/10.3390\/s20113048","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2020,5,27]]}}}