{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:49:20Z","timestamp":1740149360646,"version":"3.37.3"},"reference-count":171,"publisher":"MDPI AG","issue":"20","license":[{"start":{"date-parts":[[2020,10,19]],"date-time":"2020-10-19T00:00:00Z","timestamp":1603065600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"There has been a tremendous growth in the number of smart devices and their applications (e.g., smart sensors, wearable devices, smart phones, smart cars, etc.) in use in our everyday lives. This is accompanied by a new form of interconnection between the physical and digital worlds, commonly known as the Internet of Things (IoT). This is a paradigm shift, where anything and everything can be interconnected via a communication medium. In such systems, security is a prime concern and protecting the resources (e.g., applications and services) from unauthorized access needs appropriately designed security and privacy solutions. Building secure systems for the IoT can only be achieved through a thorough understanding of the particular needs of such systems. The state of the art is lacking a systematic analysis of the security requirements for the IoT. Motivated by this, in this paper, we present a systematic approach to understand the security requirements for the IoT, which will help designing secure IoT systems for the future. In developing these requirements, we provide different scenarios and outline potential threats and attacks within the IoT. Based on the characteristics of the IoT, we group the possible threats and attacks into five areas, namely communications, device\/services, users, mobility and integration of resources. We then examine the existing security requirements for IoT presented in the literature and detail our approach for security requirements for the IoT. We argue that by adhering to the proposed requirements, an IoT system can be designed securely by achieving much of the promised benefits of scalability, usability, connectivity, and flexibility in a practical and comprehensive manner.<\/jats:p>","DOI":"10.3390\/s20205897","type":"journal-article","created":{"date-parts":[[2020,10,19]],"date-time":"2020-10-19T13:36:28Z","timestamp":1603114588000},"page":"5897","source":"Crossref","is-referenced-by-count":93,"title":["Security Requirements for the Internet of Things: A Systematic Approach"],"prefix":"10.3390","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8784-0154","authenticated-orcid":false,"given":"Shantanu","family":"Pal","sequence":"first","affiliation":[{"name":"Department of Computing, Faculty of Science and Engineering, Macquarie University, Sydney, NSW 2109, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6320-9184","authenticated-orcid":false,"given":"Michael","family":"Hitchens","sequence":"additional","affiliation":[{"name":"Department of Computing, Faculty of Science and Engineering, Macquarie University, Sydney, NSW 2109, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3630-4749","authenticated-orcid":false,"given":"Tahiry","family":"Rabehaja","sequence":"additional","affiliation":[{"name":"Macquarie University Cyber Security Hub, Faculty of Science and Engineering, Macquarie University, Sydney, NSW 2109, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8600-5907","authenticated-orcid":false,"given":"Subhas","family":"Mukhopadhyay","sequence":"additional","affiliation":[{"name":"School of Engineering, Faculty of Science and Engineering, Macquarie University, Sydney, NSW 2109, Australia"}]}],"member":"1968","published-online":{"date-parts":[[2020,10,19]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","article-title":"The Internet of Things: A survey","volume":"54","author":"Atzori","year":"2010","journal-title":"Comput. Netw."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1038\/scientificamerican1004-76","article-title":"The internet of things","volume":"291","author":"Gershenfeld","year":"2004","journal-title":"Sci. Am."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"885","DOI":"10.1109\/JIOT.2016.2600569","article-title":"Mobile Phone Computing and the Internet of Things: A Survey","volume":"3","author":"Kamilaris","year":"2016","journal-title":"IEEE Internet Things J."},{"key":"ref_4","unstructured":"CISCO (2019, November 15). The Zettabyte Era: Trends and Analysis. Available online: https:\/\/www.cisco.com."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"6900","DOI":"10.1109\/ACCESS.2017.2778504","article-title":"A Survey on the Edge Computing for the Internet of Things","volume":"6","author":"Yu","year":"2018","journal-title":"IEEE Access"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"544","DOI":"10.1016\/j.future.2017.07.060","article-title":"Internet of Things security and forensics: Challenges and opportunities","volume":"78","author":"Conti","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"796","DOI":"10.1007\/s11036-018-1089-9","article-title":"Interoperability in Internet of Things: Taxonomies and Open Challenges","volume":"24","author":"Noura","year":"2019","journal-title":"Mob. Netw. Appl."},{"key":"ref_8","first-page":"97","article-title":"That \u2018Internet of Things\u2019 Thing","volume":"22","author":"Ashton","year":"2009","journal-title":"RFID"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Dhamdhere, A., and Dovrolis, C. (2008, January 20\u201322). Ten Years in the Evolution of the Internet Ecosystem. Proceedings of the 8th ACM SIGCOMM Conference on Internet Measurement, IMC \u201908, Vouliagmeni, Greece.","DOI":"10.1145\/1452520.1452543"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1007\/s10796-014-9492-7","article-title":"The internet of things: A survey","volume":"17","author":"Li","year":"2015","journal-title":"Inf. Syst. Front."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1109\/MWC.2010.5675777","article-title":"From today\u2019s INTRAnet of things to a future INTERnet of things: A wireless- and mobility-related view","volume":"17","author":"Zorzi","year":"2010","journal-title":"IEEE Wirel. Commun."},{"key":"ref_12","first-page":"6122","article-title":"Internet of things-IOT: Definition, characteristics, architecture, enabling technologies, application & future challenges","volume":"6","author":"Patel","year":"2016","journal-title":"Int. J. Eng. Sci. Comput."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Hosenkhan, M.R., and Pattanayak, B.K. (2020). Security Issues in Internet of Things (IoT): A Comprehensive Review. New Paradigm in Decision Science and Management, Springer.","DOI":"10.1007\/978-981-13-9330-3_36"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Alam, S., Siddiqui, S.T., Ahmad, A., Ahmad, R., and Shuaib, M. (2020). Internet of Things (IoT) Enabling Technologies, Requirements, and Security Challenges. Advances in Data and Information Sciences, Springer.","DOI":"10.1007\/978-981-15-0694-9_12"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"102072","DOI":"10.1016\/j.adhoc.2020.102072","article-title":"Design of and research on industrial measuring devices based on Internet of Things technology","volume":"102","author":"Li","year":"2020","journal-title":"Ad. Hoc. Netw."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s42400-020-00052-8","article-title":"Cyber risk at the edge: Current and future trends on cyber risk analytics and artificial intelligence in the industrial internet of things and industry 4.0 supply chains","volume":"3","author":"Radanliev","year":"2020","journal-title":"Cybersecurity"},{"key":"ref_17","unstructured":"Sharma, V., Kim, J., Kwon, S., You, I., Lee, K., and Yim, K. (2018). A framework for mitigating zero-day attacks in IoT. arXiv."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Xiao, Y., Shen, X., and Du, D. (2007). A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks. Wireless Network Security, Springer. Chapter 5.","DOI":"10.1007\/978-0-387-33112-6"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Thing, V.L.L., and Wu, J. (2016, January 15\u201318). Autonomous Vehicle Security: A Taxonomy of Attacks and Defences. Proceedings of the 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Chengdu, China.","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData.2016.52"},{"key":"ref_20","unstructured":"WiredMagazine (2017, November 01). How the Internet of Things Got Hacked. Available online: https:\/\/www.wired.com."},{"key":"ref_21","unstructured":"(2018, October 10). Mirai Botnet DDoS Attack Type. Available online: https:\/\/www.corero.com\/resources\/ddos-attack-types."},{"key":"ref_22","unstructured":"Kumar, M. (2020, January 25). DDoS Attack Takes Down Central Heating System Amidst Winter In Finland. Available online: https:\/\/thehackernews.com\/2016\/11\/heating-system-hacked.html."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1016\/j.future.2018.06.027","article-title":"Taxonomy and analysis of security protocols for Internet of Things","volume":"89","author":"Das","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"2103","DOI":"10.1109\/JIOT.2018.2869847","article-title":"Internet of Things (IoT) Cybersecurity Research: A Review of Current Research Topics","volume":"6","author":"Lu","year":"2018","journal-title":"IEEE Internet Things J."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/MCOM.2018.1701204","article-title":"Security and Privacy in the Age of the Smart Internet of Things: An Overview from a Networking Perspective","volume":"56","author":"Yu","year":"2018","journal-title":"IEEE Commun. Mag."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"616","DOI":"10.1109\/COMST.2019.2953364","article-title":"Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures","volume":"22","author":"Butun","year":"2020","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Yu, M., Zhuge, J., Cao, M., Shi, Z., and Jiang, L. (2020). A Survey of Security Vulnerability Analysis, Discovery, Detection, and Mitigation on IoT Devices. Future Internet, 12.","DOI":"10.3390\/fi12020027"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10776-020-00483-7","article-title":"IoT Ecosystem: A Survey on Devices, Gateways, Operating Systems, Middleware and Communication","volume":"27","author":"Bansal","year":"2020","journal-title":"Int. J. Wirel. Inf. Netw."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1016\/j.future.2018.09.058","article-title":"Internet of things forensics: Recent advances, taxonomy, requirements, and open challenges","volume":"92","author":"Yaqoob","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1016\/j.comnet.2014.11.008","article-title":"Security, privacy and trust in Internet of Things: The road ahead","volume":"76","author":"Sicari","year":"2015","journal-title":"Comput. Netw."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"1294","DOI":"10.1109\/COMST.2015.2388550","article-title":"Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues","volume":"17","author":"Granjal","year":"2015","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Deep, S., Zheng, X., and Hamey, L. (2019). A survey of security and privacy issues in the Internet of Things from the layered context. arXiv.","DOI":"10.1002\/ett.3935"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"1125","DOI":"10.1109\/JIOT.2017.2683200","article-title":"A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications","volume":"4","author":"Lin","year":"2017","journal-title":"IEEE Internet Things J."},{"key":"ref_34","first-page":"586","article-title":"A Comprehensive Study of Security of Internet-of-Things","volume":"5","author":"Jha","year":"2016","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"619","DOI":"10.1109\/JIOT.2017.2664072","article-title":"Structural Health Monitoring Framework Based on Internet of Things: A Survey","volume":"4","author":"Gao","year":"2017","journal-title":"IEEE Internet Things J."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1109\/MCOM.2017.1600682CM","article-title":"Smart Home: Cognitive Interactive People-Centric Internet of Things","volume":"55","author":"Feng","year":"2017","journal-title":"IEEE Commun. Mag."},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Liu, X., Zhao, M., Li, S., Zhang, F., and Trappe, W. (2017). A Security Framework for the Internet of Things in the Future Internet Architecture. Future Internet, 9.","DOI":"10.3390\/fi9030027"},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Lv, W., Meng, F., Zhang, C., Lv, Y., Cao, N., and Jiang, J. (2017, January 21\u201324). Research on Unified Architecture of IoT System. Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), Guangzhou, China.","DOI":"10.1109\/CSE-EUC.2017.249"},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Riahi, A., Challal, Y., Natalizio, E., Chtourou, Z., and Bouabdallah, A. (2013, January 20\u201323). A Systemic Approach for IoT Security. Proceedings of the 2013 IEEE International Conference on Distributed Computing in Sensor Systems, Cambridge, MA, USA.","DOI":"10.1109\/DCOSS.2013.78"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1109\/JIOT.2016.2619369","article-title":"IoT-based Big Data Storage Systems in Cloud Computing: Perspectives and Challenges","volume":"4","author":"Cai","year":"2016","journal-title":"IEEE Internet Things J."},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Dabbagh, M., and Rayes, A. (2017). Internet of Things Security and Privacy. Internet of Things From Hype to Reality, Springer International Publishing.","DOI":"10.1007\/978-3-319-44860-2_8"},{"key":"ref_42","first-page":"9629381","article-title":"Understanding Security Requirements and Challenges in Internet of Things (IoT): A Review","volume":"2019","author":"Hameed","year":"2019","journal-title":"J. Comput. Netw. Commun."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"11020","DOI":"10.1109\/ACCESS.2018.2876939","article-title":"Internet of Things: A Comprehensive Study of Security Issues and Defense Mechanisms","volume":"7","author":"Ahanger","year":"2019","journal-title":"IEEE Access"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1108\/IntR-07-2014-0173","article-title":"The Internet of Things: A security point of view","volume":"26","author":"Li","year":"2016","journal-title":"Internet Res."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"2266","DOI":"10.1016\/j.comnet.2012.12.018","article-title":"On the features and challenges of security and privacy in distributed internet of things","volume":"57","author":"Roman","year":"2013","journal-title":"Comput. Netw."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1016\/j.adhoc.2016.12.004","article-title":"Understanding the Internet of Things: Definition, potentials, and societal role of a fast evolving paradigm","volume":"56","author":"Atzori","year":"2017","journal-title":"Ad. Hoc. Netw."},{"key":"ref_47","unstructured":"(2019, October 09). Internet of Things in 2020: Roadmap for the Future, Version 1.1. Available online: https:\/\/docbox.etsi.org\/erm\/Open\/CERP%2020080609-10\/Internet-of-Things_in_2020_EC-EPoSS_Workshop_Report_2008_v1-1.pdf."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"1645","DOI":"10.1016\/j.future.2013.01.010","article-title":"Internet of Things (IoT): A vision, architectural elements, and future directions","volume":"29","author":"Gubbi","year":"2013","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_49","unstructured":"Tan, L., and Wang, N. (2010, January 5\u20137). Future internet: The Internet of Things. Proceedings of the 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE), Karachi, Pakistan."},{"key":"ref_50","first-page":"14","article-title":"The Internet of Things in an Enterprise Context","volume":"Volume 5468","author":"Domingue","year":"2009","journal-title":"Future Internet"},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Kabalci, E., and Kabalci, Y. (2019). Internet of Things on Power Line Communications: An Experimental Performance Analysis. Smart Grids and Their Communication Systems, Springer.","DOI":"10.1007\/978-981-13-1768-2"},{"key":"ref_52","unstructured":"Dhumane, A., Prasad, R., and Prasad, J. (2016, January 16\u201318). Routing issues in internet of things: A survey. Proceedings of the International Multiconference of Engineers and Computer Scientists, Hong Kong."},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Pal, S., Hitchens, M., and Varadharajan, V. (2018, January 3\u20136). Modeling Identity for the Internet of Things: Survey, Classification and Trends. Proceedings of the 2018 12th International Conference on Sensing Technology (ICST), Limerick, Ireland.","DOI":"10.1109\/ICSensT.2018.8603595"},{"key":"ref_54","doi-asserted-by":"crossref","unstructured":"Aswale, P., Shukla, A., Bharati, P., Bharambe, S., and Palve, S. (2019). An Overview of Internet of Things: Architecture, Protocols and Challenges. Information and Communication Technology for Intelligent Systems, Springer.","DOI":"10.1007\/978-981-13-1742-2_29"},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"2702","DOI":"10.1109\/COMST.2019.2910750","article-title":"Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities and a First Empirical Look on Internet-scale IoT Exploitations","volume":"21","author":"Neshenko","year":"2019","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"2347","DOI":"10.1109\/COMST.2015.2444095","article-title":"Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications","volume":"17","author":"Guizani","year":"2015","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_57","first-page":"291","article-title":"A survey on Internet of Things architectures","volume":"30","author":"Ray","year":"2016","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"375","DOI":"10.1016\/j.future.2017.10.045","article-title":"A new architecture of Internet of Things and big data ecosystem for secured smart healthcare monitoring and alerting system","volume":"82","author":"Manogaran","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_59","doi-asserted-by":"crossref","unstructured":"Khan, R., Khan, S.U., Zaheer, R., and Khan, S. (2012, January 17\u201319). Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges. Proceedings of the 10th International Conference on Frontiers of Information Technology, Islamabad, India.","DOI":"10.1109\/FIT.2012.53"},{"key":"ref_60","unstructured":"Wu, M., Lu, T.J., Ling, F.Y., Sun, J., and Du, H.Y. (2010, January 20\u201322). Research on the architecture of Internet of Things. Proceedings of the 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE), Chengdu, China."},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"2391","DOI":"10.1109\/TITS.2017.2749459","article-title":"A Survey of the Connected Vehicle Landscape\u2014Architectures, Enabling Technologies, Applications, and Development Areas","volume":"19","author":"Siegel","year":"2018","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_62","doi-asserted-by":"crossref","unstructured":"Radanliev, P., De Roure, D.C., Nurse, J.R., Burnap, P., Anthi, E., Uchenna, A., Santos, O., and Montalvo, R.M. (2019). Cyber Risk Management for the Internet of Things. Preprints, 2019040133.","DOI":"10.20944\/preprints201904.0133.v1"},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"414","DOI":"10.1109\/SURV.2013.042313.00197","article-title":"Context Aware Computing for The Internet of Things: A Survey","volume":"16","author":"Perera","year":"2014","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1080\/02564602.2016.1155419","article-title":"Recent Advances in the Internet of Things: Multiple Perspectives","volume":"34","author":"Wang","year":"2016","journal-title":"IETE Tech. Rev."},{"key":"ref_65","doi-asserted-by":"crossref","first-page":"2062","DOI":"10.1109\/COMST.2018.2817685","article-title":"Internet of Things (IoT) Operating Systems Support, Networking Technologies, Applications, and Challenges: A Comparative Review","volume":"20","author":"Javed","year":"2018","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_66","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1016\/j.adhoc.2015.01.006","article-title":"Survey on secure communication protocols for the Internet of Things","volume":"32","author":"Nguyen","year":"2015","journal-title":"Ad. Hoc. Netw."},{"key":"ref_67","doi-asserted-by":"crossref","first-page":"2233","DOI":"10.1109\/TII.2014.2300753","article-title":"Internet of Things in Industries: A Survey","volume":"10","author":"Xu","year":"2014","journal-title":"IEEE Trans. Ind. Inf."},{"key":"ref_68","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1007\/s10462-018-9648-9","article-title":"A review on intelligent process for smart home applications based on IoT: Coherent taxonomy, motivation, open challenges, and recommendations","volume":"53","author":"Zaidan","year":"2018","journal-title":"Art. Intell. Rev."},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"1454","DOI":"10.1016\/j.jclepro.2016.10.006","article-title":"A review of Internet of Things for smart home: Challenges and solutions","volume":"140","author":"Stojkoska","year":"2017","journal-title":"J. Clean. Prod."},{"key":"ref_70","doi-asserted-by":"crossref","unstructured":"Yassein, M.B., Shatnawi, M.Q., and Al-zoubi, D. (2016, January 22\u201324). Application layer protocols for the Internet of Things: A survey. Proceedings of the 2016 International Conference on Engineering MIS (ICEMIS), Agadir, Morocco.","DOI":"10.1109\/ICEMIS.2016.7745303"},{"key":"ref_71","doi-asserted-by":"crossref","unstructured":"Swamy, S.N., Jadhav, D., and Kulkarni, N. (2017, January 10\u201311). Security threats in the application layer in IOT applications. Proceedings of the 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, India.","DOI":"10.1109\/I-SMAC.2017.8058395"},{"key":"ref_72","first-page":"11","article-title":"A survey on application layer protocols for the internet of things","volume":"3","author":"Karagiannis","year":"2015","journal-title":"Trans. IoT Cloud Comput."},{"key":"ref_73","doi-asserted-by":"crossref","unstructured":"Ejaz, W., and Anpalagan, A. (2019). Internet of Things for Smart Cities: Overview and Key Challenges. Internet of Things for Smart Cities: Technologies, Big Data and Security, Springer International Publishing.","DOI":"10.1007\/978-3-319-95037-2"},{"key":"ref_74","doi-asserted-by":"crossref","unstructured":"Al-Emran, M., Malik, S.I., and Al-Kabi, M.N. (2020). A Survey of Internet of Things (IoT) in Education: Opportunities and Challenges. Toward Social Internet of Things (SIoT): Enabling Technologies, Architectures and Applications, Springer.","DOI":"10.1007\/978-3-030-24513-9_12"},{"key":"ref_75","unstructured":"(2019, October 09). Fitbit. Available online: https:\/\/www.fitbit.com\/au\/home."},{"key":"ref_76","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1016\/j.comnet.2019.03.006","article-title":"Internet of Things: A survey of enabling technologies in healthcare and its applications","volume":"153","author":"Dhanvijay","year":"2019","journal-title":"Comput. Netw."},{"key":"ref_77","doi-asserted-by":"crossref","first-page":"26521","DOI":"10.1109\/ACCESS.2017.2775180","article-title":"Internet of Things for Smart Healthcare: Technologies, Challenges, and Opportunities","volume":"5","author":"Baker","year":"2017","journal-title":"IEEE Access"},{"key":"ref_78","doi-asserted-by":"crossref","first-page":"583","DOI":"10.1016\/j.future.2017.09.016","article-title":"Internet-of-Things and big data for smarter healthcare: From device to architecture, applications and analytics","volume":"78","author":"Firouzi","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_79","doi-asserted-by":"crossref","first-page":"678","DOI":"10.1109\/ACCESS.2015.2437951","article-title":"The Internet of Things for Health Care: A Comprehensive Survey","volume":"3","author":"Islam","year":"2015","journal-title":"IEEE Access"},{"key":"ref_80","unstructured":"Turcu, C., and Turcu, C.E. (2019). Improving the quality of healthcare through Internet of Things. arXiv."},{"key":"ref_81","doi-asserted-by":"crossref","first-page":"515","DOI":"10.1109\/JIOT.2015.2417684","article-title":"An IoT-Aware Architecture for Smart Healthcare Systems","volume":"2","author":"Catarinucci","year":"2015","journal-title":"IEEE Internet Things J."},{"key":"ref_82","unstructured":"(2019, October 09). Biostrap. Available online: https:\/\/biostrap.com."},{"key":"ref_83","doi-asserted-by":"crossref","unstructured":"Gaikwad, P.P., Gabhane, J.P., and Golait, S.S. (2015, January 22\u201323). A survey based on Smart Homes system using Internet-of-Things. Proceedings of the 2015 International Conference on Computation of Power, Energy, Information and Communication (ICCPEIC), Melmaruvathur, India.","DOI":"10.1109\/ICCPEIC.2015.7259486"},{"key":"ref_84","unstructured":"(2018, October 10). CURB. Available online: http:\/\/energycurb.com."},{"key":"ref_85","unstructured":"(2019, September 15). Philips-Hue. Available online: http:\/\/www2.meethue.com\/en-us."},{"key":"ref_86","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1109\/JIOT.2013.2296516","article-title":"An Information Framework for Creating a Smart City Through Internet of Things","volume":"1","author":"Jin","year":"2014","journal-title":"IEEE Internet Things J."},{"key":"ref_87","first-page":"1207","article-title":"Internet of things based smart transportation systems","volume":"2","author":"Sherly","year":"2015","journal-title":"Int. Res. J. Eng. Technol."},{"key":"ref_88","doi-asserted-by":"crossref","unstructured":"Saarika, P.S., Sandhya, K., and Sudha, T. (2017, January 17\u201319). Smart transportation system using IoT. Proceedings of the 2017 International Conference On Smart Technologies For Smart Nation (SmartTechCon), Bengaluru, India.","DOI":"10.1109\/SmartTechCon.2017.8358540"},{"key":"ref_89","unstructured":"(2019, October 10). B-Scada. Available online: http:\/\/scada.com\/verticals\/transportation."},{"key":"ref_90","doi-asserted-by":"crossref","unstructured":"Gerla, M., Lee, E., Pau, G., and Lee, U. (2014, January 6\u20138). Internet of vehicles: From intelligent grid to autonomous cars and vehicular clouds. Proceedings of the 2014 IEEE World Forum on Internet of Things (WF-IoT), Seoul, Korea.","DOI":"10.1109\/WF-IoT.2014.6803166"},{"key":"ref_91","doi-asserted-by":"crossref","first-page":"944","DOI":"10.1109\/SURV.2011.101911.00087","article-title":"Smart Grid \u2014 The New and Improved Power Grid: A Survey","volume":"14","author":"Fang","year":"2012","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_92","unstructured":"European-Commission (2019, October 10). UROPE 2020\u2014A Strategy for Smart, Sustainable and Inclusive Growth, Available online: https:\/\/eur-lex.europa.eu\/legal-content\/en\/TXT\/?uri=CELEX%3A52010DC2020."},{"key":"ref_93","doi-asserted-by":"crossref","unstructured":"Yang, Q., Yang, T., and Li, W. (2019). 13\u2014Internet of things application in smart grid: A brief overview of challenges, opportunities, and future trends. Smart Power Distribution Systems, Academic Press.","DOI":"10.1016\/B978-0-12-812154-2.00013-4"},{"key":"ref_94","doi-asserted-by":"crossref","unstructured":"Hu, Y.C., Tiwari, S., Mishra, K.K., and Trivedi, M.C. (2018). The Role of Internet of Things and Smart Grid for the Development of a Smart City. Intelligent Communication and Computational Technologies, Springer.","DOI":"10.1007\/978-981-10-5523-2"},{"key":"ref_95","doi-asserted-by":"crossref","unstructured":"Dalipi, F., and Yayilgan, S.Y. (2016, January 22\u201324). Security and Privacy Considerations for IoT Application on Smart Grids: Survey and Research Challenges. Proceedings of the 2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW), Vienna, Austria.","DOI":"10.1109\/W-FiCloud.2016.28"},{"key":"ref_96","doi-asserted-by":"crossref","first-page":"447","DOI":"10.1007\/978-3-642-20898-0_32","article-title":"Smart Cities at the Forefront of the Future Internet","volume":"Volume 6656","author":"Domingue","year":"2011","journal-title":"The Future Internet"},{"key":"ref_97","doi-asserted-by":"crossref","unstructured":"Arasteh, H., Hosseinnezhad, V., Loia, V., Tommasetti, A., Troisi, O., Shafie-khah, M., and Siano, P. (2016, January 7\u201310). Iot-based smart cities: A survey. Proceedings of the 2016 IEEE 16th International Conference on Environment and Electrical Engineering (EEEIC), Florence, Italy.","DOI":"10.1109\/EEEIC.2016.7555867"},{"key":"ref_98","doi-asserted-by":"crossref","unstructured":"Talari, S., Shafie-khah, M., Siano, P., Loia, V., Tommasetti, A., and Catal\u00e3o, J.P.S. (2017). A Review of Smart Cities Based on the Internet of Things Concept. Energies, 10.","DOI":"10.3390\/en10040421"},{"key":"ref_99","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1109\/JIOT.2014.2306328","article-title":"Internet of Things for Smart Cities","volume":"1","author":"Zanella","year":"2014","journal-title":"IEEE Internet Things J."},{"key":"ref_100","doi-asserted-by":"crossref","unstructured":"Cicirelli, F., Guerrieri, A., Mastroianni, C., Spezzano, G., and Vinci, A. (2019). A Social and Pervasive IoT Platform for Developing Smart Environments. The Internet of Things for Smart Urban Ecosystems, Springer International Publishing.","DOI":"10.1007\/978-3-319-96550-5"},{"key":"ref_101","unstructured":"(2019, October 12). Smart Nation Singapore. Available online: https:\/\/www.smartnation.sg."},{"key":"ref_102","unstructured":"(2019, November 10). Amsterdam-Smart-City. Available online: https:\/\/amsterdamsmartcity.com."},{"key":"ref_103","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1007\/s13132-012-0084-9","article-title":"A Smart City Initiative: The Case of Barcelona","volume":"4","author":"Almirall","year":"2013","journal-title":"J. Knowl. Econ."},{"key":"ref_104","doi-asserted-by":"crossref","unstructured":"Ahmad, M., Younis, T., Habib, M.A., Ashraf, R., and Ahmed, S.H. (2019). A Review of Current Security Issues in Internet of Things. Recent Trends and Advances in Wireless and IoT-enabled Networks, Springer.","DOI":"10.1007\/978-3-319-99966-1_2"},{"key":"ref_105","unstructured":"Mendez, D.M., Papapanagiotou, I., and Yang, B. (2017). Internet of Things: Survey on Security and Privacy. arxiv."},{"key":"ref_106","doi-asserted-by":"crossref","unstructured":"Daimi, K. (2018). Differentiating Security from Privacy in Internet of Things: A Survey of Selected Threats and Controls. Computer and Network Security Essentials, Springer International Publishing.","DOI":"10.1007\/978-3-319-58424-9"},{"key":"ref_107","unstructured":"Kozlov, D., Veijalainen, J., and Ali, Y. Security and Privacy Threats in IoT Architectures. Proceedings of the 7th International Conference on Body Area Networks BodyNets \u201912."},{"key":"ref_108","doi-asserted-by":"crossref","first-page":"1250","DOI":"10.1109\/JIOT.2017.2694844","article-title":"A Survey on Security and Privacy Issues in Internet-of-Things","volume":"4","author":"Yang","year":"2017","journal-title":"IEEE Internet Things J."},{"key":"ref_109","doi-asserted-by":"crossref","first-page":"1167","DOI":"10.1007\/s12652-017-0581-6","article-title":"Management platform of threats information in IoT environment","volume":"9","author":"Ko","year":"2017","journal-title":"J. Ambient Intell. Human. Comput."},{"key":"ref_110","first-page":"65","article-title":"Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks","volume":"4","author":"Abomhara","year":"2015","journal-title":"J. Cyber Secur."},{"key":"ref_111","doi-asserted-by":"crossref","unstructured":"Ahemd, M.M., Shah, M.A., and Wahid, A. (2017, January 19\u201321). IoT security: A layered approach for attacks amp; defenses. Proceedings of the 2017 International Conference on Communication Technologies (ComTech), Rawalpindi, Pakistan.","DOI":"10.1109\/COMTECH.2017.8065757"},{"key":"ref_112","doi-asserted-by":"crossref","unstructured":"Chahid, Y., Benabdellah, M., and Azizi, A. (2017, January 19\u201320). Internet of things security. Proceedings of the 2017 International Conference on Wireless Technologies, Embedded and Intelligent Systems (WITS), Fez, Morocco.","DOI":"10.1109\/WITS.2017.7934655"},{"key":"ref_113","first-page":"1636","article-title":"Anatomy of Threats to The Internet of Things","volume":"2","author":"Makhdoom","year":"2018","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_114","doi-asserted-by":"crossref","unstructured":"Gamundani, A.M. (2015, January 17\u201320). An impact review on internet of things attacks. Proceedings of the The iternational Conference on Emerging Trends in Networks and Computer Communications (ETNCC), Windhoek, Namibia.","DOI":"10.1109\/ETNCC.2015.7184819"},{"key":"ref_115","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1016\/j.dcan.2017.04.003","article-title":"A roadmap for security challenges in the Internet of Things","volume":"4","author":"Sfar","year":"2017","journal-title":"Digital Commun. Netw."},{"key":"ref_116","doi-asserted-by":"crossref","unstructured":"Elkhodr, M., Shahrestani, S., and Cheung, H. (2013). The Internet of Things: Vision & Challenges. The Tencon\u2013Spring, IEEE.","DOI":"10.1109\/TENCONSpring.2013.6584443"},{"key":"ref_117","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1016\/j.jnca.2017.04.002","article-title":"Internet of Things security: A survey","volume":"88","author":"Alaba","year":"2017","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_118","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1016\/j.comnet.2018.11.025","article-title":"Current research on Internet of Things (IoT) security: A survey","volume":"148","author":"Hassan","year":"2019","journal-title":"Comput. Netw."},{"key":"ref_119","doi-asserted-by":"crossref","unstructured":"Suo, H., Wan, J., Zou, C., and Liu, J. (2012, January 23\u201325). Security in the Internet of Things: A Review. Proceedings of the International Conference on Computer Science and Electronics Engineering (ICCSEE), Hangzhou, China.","DOI":"10.1109\/ICCSEE.2012.373"},{"key":"ref_120","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1016\/j.comnet.2018.03.012","article-title":"Internet of things security: A top-down survey","volume":"141","author":"Kouicem","year":"2018","journal-title":"Comput. Netw."},{"key":"ref_121","doi-asserted-by":"crossref","unstructured":"Zhang, Z.K., Cho, M.C.Y., and Shieh, S. (2015, January 14\u201317). Emerging Security Threats and Countermeasures in IoT. Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS \u201915, Singapore.","DOI":"10.1145\/2714576.2737091"},{"key":"ref_122","doi-asserted-by":"crossref","unstructured":"Hwang, Y.H. (2015, January 14). IoT Security & Privacy: Threats and Challenges. Proceedings of the 1st ACM Workshop on IoT Privacy, Trust, and Security, IoTPTS \u201915, Singapore.","DOI":"10.1145\/2732209.2732216"},{"key":"ref_123","doi-asserted-by":"crossref","unstructured":"Pongle, P., and Chavan, G. (2015, January 8\u201310). A survey: Attacks on RPL and 6LoWPAN in IoT. Proceedings of the International Conference on Pervasive Computing (ICPC), Pune, India.","DOI":"10.1109\/PERVASIVE.2015.7087034"},{"key":"ref_124","doi-asserted-by":"crossref","unstructured":"Deogirikar, J., and Vidhate, A. (2017, January 10\u201311). Security attacks in IoT: A survey. Proceedings of the 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, India.","DOI":"10.1109\/I-SMAC.2017.8058363"},{"key":"ref_125","doi-asserted-by":"crossref","unstructured":"Coppolino, L., DAlessandro, V., DAntonio, S., Levy, L., and Romano, L. (2015, January 21\u201323). My Smart Home is Under Attack. Proceedings of the 18th International Conference on Computational Science and Engineering, Porto, Portugal.","DOI":"10.1109\/CSE.2015.28"},{"key":"ref_126","doi-asserted-by":"crossref","unstructured":"Ronen, E., and Shamir, A. (2016, January 21\u201324). Extended Functionality Attacks on IoT Devices: The Case of Smart Lights. Proceedings of the European Symposium on Security and Privacy (EuroS&P), Saarbrucken, Germany.","DOI":"10.1109\/EuroSP.2016.13"},{"key":"ref_127","doi-asserted-by":"crossref","first-page":"489","DOI":"10.1145\/1042031.1042032","article-title":"The Predecessor Attack: An Analysis of a Threat to Anonymous Communications Systems","volume":"7","author":"Wright","year":"2004","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"ref_128","doi-asserted-by":"crossref","unstructured":"Sharma, V., You, I., Andersson, K., Palmieri, F., and Rehmani, M.H. (2019). Security, Privacy and Trust for Smart Mobile-Internet of Things (M-IoT): A Survey. arXiv.","DOI":"10.1109\/ACCESS.2020.3022661"},{"key":"ref_129","doi-asserted-by":"crossref","first-page":"2028","DOI":"10.1109\/COMST.2018.2798591","article-title":"Location of Things (LoT): A Review and Taxonomy of Sensors Localization in IoT Infrastructure","volume":"20","author":"Shit","year":"2018","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_130","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/MCC.2016.28","article-title":"The Quest for Privacy in the Internet of Things","volume":"3","author":"Porambage","year":"2016","journal-title":"IEEE Cloud Comput."},{"key":"ref_131","first-page":"702","article-title":"Location-Based Services for Mobile Telephony: A Study of Users\u2019 Privacy Concerns","volume":"3","author":"Barkhuus","year":"2003","journal-title":"Interact. Citeseer"},{"key":"ref_132","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1109\/TSC.2010.3","article-title":"Interacting with the SOA-Based Internet of Things: Discovery, Query, Selection, and On-Demand Provisioning of Web Services","volume":"3","author":"Guinard","year":"2010","journal-title":"IEEE Trans. Serv. Comput."},{"key":"ref_133","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1016\/j.clsr.2009.11.008","article-title":"Internet of Things \u2013 New security and privacy challenges","volume":"26","author":"Weber","year":"2010","journal-title":"Comput. Law Secur. Rev."},{"key":"ref_134","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3292674","article-title":"Survey of Communication Protocols for Internet-of-Things and Related Challenges of Fog and Cloud Computing Integration","volume":"51","author":"Dizdarevic","year":"2019","journal-title":"ACM Comput. Surv."},{"key":"ref_135","doi-asserted-by":"crossref","first-page":"2011","DOI":"10.1109\/COMST.2018.2803740","article-title":"How Can Heterogeneous Internet of Things Build Our Future: A Survey","volume":"20","author":"Qiu","year":"2018","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_136","doi-asserted-by":"crossref","first-page":"637","DOI":"10.1109\/JIOT.2016.2579198","article-title":"Edge Computing: Vision and Challenges","volume":"3","author":"Shi","year":"2016","journal-title":"IEEE Internet Things J."},{"key":"ref_137","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/MPRV.2015.32","article-title":"Edge Analytics in the Internet of Things","volume":"14","author":"Satyanarayanan","year":"2015","journal-title":"IEEE Pervasive Comput."},{"key":"ref_138","doi-asserted-by":"crossref","unstructured":"Yannuzzi, M., Milito, R., Serral-Graci\u00e0, R., Montero, D., and Nemirovsky, M. (2014, January 1\u20133). Key ingredients in an IoT recipe: Fog Computing, Cloud computing, and more Fog Computing. Proceedings of the 2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Athens, Greece.","DOI":"10.1109\/CAMAD.2014.7033259"},{"key":"ref_139","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-016-0597-z","article-title":"Security Attacks and Solutions in Electronic Health (E-health) Systems","volume":"40","author":"Zeadally","year":"2016","journal-title":"J. Med. Syst."},{"key":"ref_140","doi-asserted-by":"crossref","unstructured":"Alqassem, I. (2014). Privacy and Security Requirements Framework for the Internet of Things (IoT), Association for Computing Machinery.","DOI":"10.1145\/2591062.2591201"},{"key":"ref_141","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1016\/S1005-8885(10)60159-8","article-title":"Security model and key technologies for the Internet of things","volume":"18","author":"Yang","year":"2011","journal-title":"J. China Univ. Posts Telecommun."},{"key":"ref_142","doi-asserted-by":"crossref","unstructured":"Alfaqih, T.M., and Al-Muhtadi, J. (2016). Internet of Things Security based on Devices Architecture. Int. J. Comput. Appl., 133.","DOI":"10.5120\/ijca2016908191"},{"key":"ref_143","doi-asserted-by":"crossref","unstructured":"Sain, M., Kang, Y.J., and Lee, H.J. (2017, January 19\u201322). Survey on security in Internet of Things: State of the art and challenges. Proceedings of the 2017 19th International Conference on Advanced Communication Technology (ICACT), Bongpyeong, Korea.","DOI":"10.23919\/ICACT.2017.7890183"},{"key":"ref_144","doi-asserted-by":"crossref","unstructured":"Isa, M., Mohamed, N., Hashim, H., Adnan, S., Manan, J., and Mahmod, R. (2012, January 3\u20134). A lightweight and secure TFTP protocol for smart environment. Proceedings of the International Symposium on Computer Applications and Industrial Electronics (ISCAIE), Kota Kinabalu, Malaysia.","DOI":"10.1109\/ISCAIE.2012.6482117"},{"key":"ref_145","doi-asserted-by":"crossref","first-page":"527","DOI":"10.1007\/s11277-011-0385-5","article-title":"Security Challenges in the IP-based Internet of Things","volume":"61","author":"Heer","year":"2011","journal-title":"Wirel. Pers. Commun."},{"key":"ref_146","unstructured":"Misra, P., Simmhan, Y., and Warrior, J. (2016). Towards a Practical Architecture for the Next Generation Internet of Things. arXiv."},{"key":"ref_147","doi-asserted-by":"crossref","unstructured":"Abomhara, M., and K\u00f8ien, G.M. (2014, January 11\u201314). Security and privacy in the Internet of Things: Current status and open issues. Proceedings of the International Conference on Privacy and Security in Mobile Systems, (PRISMS), Aalborg, Denmark.","DOI":"10.1109\/PRISMS.2014.6970594"},{"key":"ref_148","first-page":"201","article-title":"Requirement of Security for IoT Application based on Gateway System","volume":"9","year":"2015","journal-title":"Int. J. Secur. Appl."},{"key":"ref_149","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1109\/JIOT.2015.2460333","article-title":"Twenty Security Considerations for Cloud-Supported Internet of Things","volume":"3","author":"Singh","year":"2016","journal-title":"IEEE Internet Things J."},{"key":"ref_150","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/MCOM.2017.1600363CM","article-title":"Security and Privacy for Cloud-Based IoT: Challenges Countermeasures, and Future Directions","volume":"55","author":"Zhou","year":"2017","journal-title":"IEEE Commun. Mag."},{"key":"ref_151","doi-asserted-by":"crossref","first-page":"420","DOI":"10.1007\/978-3-642-14478-3_42","article-title":"Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT)","volume":"Volume 89","author":"Meghanathan","year":"2010","journal-title":"Recent Trends in Network Security and Applications"},{"key":"ref_152","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1109\/MCOM.2011.6069710","article-title":"A survey on facilities for experimental internet of things research","volume":"49","author":"Gluhak","year":"2011","journal-title":"IEEE Commun. Mag."},{"key":"ref_153","doi-asserted-by":"crossref","first-page":"3083","DOI":"10.1002\/sec.1259","article-title":"SecIoT: A security framework for the Internet of Things","volume":"9","author":"Huang","year":"2016","journal-title":"Secur. Comm. Netw."},{"key":"ref_154","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1109\/MWC.2017.1600421","article-title":"Internet of Things Architecture: Recent Advances, Taxonomy, Requirements, and Open Challenges","volume":"24","author":"Yaqoob","year":"2017","journal-title":"IEEE Wirel. Commun."},{"key":"ref_155","doi-asserted-by":"crossref","first-page":"567","DOI":"10.1007\/s11277-011-0384-6","article-title":"Interoperability of Security-Enabled Internet of Things","volume":"61","author":"Alam","year":"2011","journal-title":"Wirel. Pers. Commun."},{"key":"ref_156","doi-asserted-by":"crossref","first-page":"197","DOI":"10.3390\/a6020197","article-title":"Enforcing Security Mechanisms in the IP-Based Internet of Things: An Algorithmic Overview","volume":"6","author":"Cirani","year":"2013","journal-title":"Algorithms"},{"key":"ref_157","doi-asserted-by":"crossref","unstructured":"Hossain, M., Hasan, R., and Skjellum, A. (2017, January 5\u20138). Securing the Internet of Things: A Meta-Study of Challenges, Approaches, and Open Problems. Proceedings of the 2017 IEEE 37th International Conference on Distributed Computing Systems Workshops (ICDCSW), Atlanta, GA, USA.","DOI":"10.1109\/ICDCSW.2017.78"},{"key":"ref_158","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1007\/s11235-016-0168-0","article-title":"Security assessment framework for IoT service","volume":"64","author":"Park","year":"2017","journal-title":"Telecommun. Syst."},{"key":"ref_159","doi-asserted-by":"crossref","unstructured":"Schaumont, P. (2017, January 27\u201331). Security in the Internet of Things: A challenge of scale. Proceedings of the Design, Automation & Test in Europe Conference & Exhibition (DATE), Lausanne, Switzerland.","DOI":"10.23919\/DATE.2017.7927075"},{"key":"ref_160","doi-asserted-by":"crossref","first-page":"419","DOI":"10.1007\/978-981-10-2750-5_44","article-title":"Security Requirements for Internet of Things (IoT)","volume":"Volume 508","author":"Modi","year":"2017","journal-title":"Proceedings of International Conference on Communication and Networks"},{"key":"ref_161","doi-asserted-by":"crossref","first-page":"566","DOI":"10.1109\/COMST.2017.2749508","article-title":"Security, Privacy, and Access Control in Information-Centric Networking: A Survey","volume":"20","author":"Tourani","year":"2017","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_162","doi-asserted-by":"crossref","unstructured":"Zhou, W., Zhang, Y., and Liu, P. (2018). The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved. IEEE Internet Things J., 6.","DOI":"10.1109\/JIOT.2018.2847733"},{"key":"ref_163","first-page":"8","article-title":"Internet of Things: A survey on the security of IoT frameworks","volume":"38","author":"Ammar","year":"2018","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_164","unstructured":"Asiri, S. (2018). A Blockchain-Based IoT Trsust Model. [Master\u2019s Thesis, Ryerson University]."},{"key":"ref_165","unstructured":"Jerald, A.V., Rabara, S.A., and Bai, D.P. (2016, January 16-18). Secure IoT architecture for integrated smart services environment. Proceedings of the 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), Palladam, India."},{"key":"ref_166","doi-asserted-by":"crossref","unstructured":"Lee, Y., Lim, J., Jeon, Y., and Kim, J. (2015, January 28\u201330). Technology trends of access control in IoT and requirements analysis. Proceedings of the International Conference on Information and Communication Technology Convergence (ICTC), Jeju, Korea.","DOI":"10.1109\/ICTC.2015.7354730"},{"key":"ref_167","doi-asserted-by":"crossref","unstructured":"Sedrati, A., and Mezrioui, A. (2017, January 28\u201330). Internet of Things challenges: A focus on security aspects. Proceedings of the 8th International Conference on Information and Communication Systems (ICICS), Jeju, Korea.","DOI":"10.1109\/IACS.2017.7921973"},{"key":"ref_168","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/MC.2013.74","article-title":"Cyberentity Security in the Internet of Things","volume":"46","author":"Ning","year":"2013","journal-title":"Computer"},{"key":"ref_169","unstructured":"IoT-A (2012). 4.2 concepts and solutions for privacy and security in the resolution infrastructure. FP7 Integrated Project Internet of Things Architecture, European Union."},{"key":"ref_170","doi-asserted-by":"crossref","unstructured":"Oracevic, A., Dilek, S., and Ozdemir, S. (2017, January 16\u201318). Security in internet of things: A survey. Proceedings of the 2017 International Symposium on Networks, Computers and Communications (ISNCC), Marrakech, Morocco.","DOI":"10.1109\/ISNCC.2017.8072001"},{"key":"ref_171","doi-asserted-by":"crossref","unstructured":"Khan, M.A., Algarni, F., and Quasim, M.T. (2020). Decentralised Internet of Things. Decentralised Internet of Things, Springer.","DOI":"10.1007\/978-3-030-38677-1"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/20\/5897\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,4]],"date-time":"2024-07-04T09:21:55Z","timestamp":1720084915000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/20\/5897"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,19]]},"references-count":171,"journal-issue":{"issue":"20","published-online":{"date-parts":[[2020,10]]}},"alternative-id":["s20205897"],"URL":"https:\/\/doi.org\/10.3390\/s20205897","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2020,10,19]]}}}