{"id":"https://openalex.org/W2979942141","doi":"https://doi.org/10.1109/access.2019.2946081","title":"Threat Analysis for Wearable Health Devices and Environment Monitoring Internet of Things Integration System","display_name":"Threat Analysis for Wearable Health Devices and Environment Monitoring Internet of Things Integration System","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2979942141","doi":"https://doi.org/10.1109/access.2019.2946081","mag":"2979942141"},"language":"en","primary_location":{"id":"doi:10.1109/access.2019.2946081","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2946081","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2019.2946081","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5010472977","display_name":"Tzu-Wei Tseng","orcid":"https://orcid.org/0000-0003-3939-0424"},"institutions":[{"id":"https://openalex.org/I16733864","display_name":"National Taiwan University","ror":"https://ror.org/05bqach95","country_code":"TW","type":"education","lineage":["https://openalex.org/I16733864"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Tzu Wei Tseng","raw_affiliation_strings":["Department of Computer Science and Information Engineering, National Taiwan University, Taipei, Taiwan","ORCiD"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Information Engineering, National Taiwan University, Taipei, Taiwan","institution_ids":["https://openalex.org/I16733864"]},{"raw_affiliation_string":"ORCiD","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109211578","display_name":"Chia Tung Wu","orcid":null},"institutions":[{"id":"https://openalex.org/I16733864","display_name":"National Taiwan University","ror":"https://ror.org/05bqach95","country_code":"TW","type":"education","lineage":["https://openalex.org/I16733864"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Chia Tung Wu","raw_affiliation_strings":["Department of Computer Science and Information Engineering, National Taiwan University, Taipei, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Information Engineering, National Taiwan University, Taipei, Taiwan","institution_ids":["https://openalex.org/I16733864"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5017526842","display_name":"Feipei Lai","orcid":"https://orcid.org/0000-0001-7147-8122"},"institutions":[{"id":"https://openalex.org/I16733864","display_name":"National Taiwan University","ror":"https://ror.org/05bqach95","country_code":"TW","type":"education","lineage":["https://openalex.org/I16733864"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Feipei Lai","raw_affiliation_strings":["Department of Computer Science and Information Engineering, National Taiwan University, Taipei, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Information Engineering, National Taiwan University, Taipei, Taiwan","institution_ids":["https://openalex.org/I16733864"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5010472977"],"corresponding_institution_ids":["https://openalex.org/I16733864"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":3.1513,"has_fulltext":false,"cited_by_count":38,"citation_normalized_percentile":{"value":0.92801031,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":"7","issue":null,"first_page":"144983","last_page":"144994"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.804650068283081},{"id":"https://openalex.org/keywords/bluetooth","display_name":"Bluetooth","score":0.710213303565979},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6364142298698425},{"id":"https://openalex.org/keywords/personally-identifiable-information","display_name":"Personally identifiable information","score":0.5169464945793152},{"id":"https://openalex.org/keywords/wearable-computer","display_name":"Wearable computer","score":0.5060283541679382},{"id":"https://openalex.org/keywords/information-sensitivity","display_name":"Information sensitivity","score":0.4662111699581146},{"id":"https://openalex.org/keywords/wearable-technology","display_name":"Wearable technology","score":0.4420577883720398},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.43002766370773315},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.4162726104259491},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.33259379863739014},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.25474750995635986},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.24832671880722046},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.21085485816001892},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.1811307668685913},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.1304473578929901}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.804650068283081},{"id":"https://openalex.org/C546215728","wikidata":"https://www.wikidata.org/wiki/Q39531","display_name":"Bluetooth","level":3,"score":0.710213303565979},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6364142298698425},{"id":"https://openalex.org/C169093310","wikidata":"https://www.wikidata.org/wiki/Q3702971","display_name":"Personally identifiable information","level":2,"score":0.5169464945793152},{"id":"https://openalex.org/C150594956","wikidata":"https://www.wikidata.org/wiki/Q1334829","display_name":"Wearable computer","level":2,"score":0.5060283541679382},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.4662111699581146},{"id":"https://openalex.org/C54290928","wikidata":"https://www.wikidata.org/wiki/Q4845080","display_name":"Wearable technology","level":3,"score":0.4420577883720398},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.43002766370773315},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.4162726104259491},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.33259379863739014},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.25474750995635986},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.24832671880722046},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.21085485816001892},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.1811307668685913},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.1304473578929901},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2019.2946081","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2946081","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:c0397eda478d464b9510864f018788c8","is_oa":true,"landing_page_url":"https://doaj.org/article/c0397eda478d464b9510864f018788c8","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 7, Pp 144983-144994 (2019)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2019.2946081","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2946081","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1916464282","display_name":null,"funder_award_id":"MOST 107-2634-F-002-015","funder_id":"https://openalex.org/F4320322795","funder_display_name":"Ministry of Science and Technology, Taiwan"}],"funders":[{"id":"https://openalex.org/F4320322795","display_name":"Ministry of Science and Technology, Taiwan","ror":"https://ror.org/02kv4zf79"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W1943579973","https://openalex.org/W2102922206","https://openalex.org/W2151391096","https://openalex.org/W2200485565","https://openalex.org/W2212111137","https://openalex.org/W2293066912","https://openalex.org/W2547100905","https://openalex.org/W2562984869","https://openalex.org/W2574081570","https://openalex.org/W2694044524","https://openalex.org/W2733765803","https://openalex.org/W2740884108","https://openalex.org/W2745141831","https://openalex.org/W2765739766","https://openalex.org/W2768332178","https://openalex.org/W2794086975","https://openalex.org/W2794464606","https://openalex.org/W2798651468","https://openalex.org/W2799403227","https://openalex.org/W2808345099","https://openalex.org/W2809790149","https://openalex.org/W2851171840","https://openalex.org/W2889856241","https://openalex.org/W2901697803","https://openalex.org/W2903197054","https://openalex.org/W2903603888","https://openalex.org/W2911086948","https://openalex.org/W2911789037","https://openalex.org/W2912600288"],"related_works":["https://openalex.org/W317272953","https://openalex.org/W2108730513","https://openalex.org/W3148806143","https://openalex.org/W3157697804","https://openalex.org/W2582248604","https://openalex.org/W2371258175","https://openalex.org/W2571884159","https://openalex.org/W3116065443","https://openalex.org/W2789135102","https://openalex.org/W2066004246"],"abstract_inverted_index":{"With":[0],"the":[1,48,133],"rapid":[2],"development":[3],"of":[4,6,26,50,69,95,132],"Internet":[5],"Things":[7],"(IoT)":[8],"applications,":[9],"heterogeneous":[10],"device":[11],"management":[12,62],"issues":[13],"tend":[14],"to":[15,21,47,77,136],"arise":[16],"in":[17],"architecture":[18,135],"security":[19,61,80,124,142],"due":[20],"hardware":[22],"computing":[23],"power,":[24],"types":[25],"software,":[27],"data":[28,36],"transmission":[29],"interfaces,":[30],"and":[31,40,82,100,107,111,129],"networking":[32],"protocols.":[33],"Even":[34],"during":[35],"exchange":[37],"between":[38],"devices":[39,44],"systems,":[41],"traditional":[42],"IoT":[43,96],"are":[45],"prone":[46],"disclosure":[49],"personal":[51,88],"information,":[52],"which":[53],"compromises":[54],"privacy.":[55],"Thus,":[56],"planning":[57],"an":[58,66,86],"effective":[59],"information":[60,79,90,123,141],"strategy":[63,76],"has":[64],"become":[65],"essential":[67],"part":[68],"application":[70,120],"development.":[71],"This":[72],"paper":[73],"presents":[74],"a":[75,138],"achieve":[78,137],"verification":[81],"risk":[83],"assessment":[84],"for":[85,115,122],"IoT-based":[87],"health":[89],"system.":[91],"Using":[92],"several":[93],"interfaces":[94],"devices,":[97],"including":[98],"Wi-Fi":[99],"Bluetooth,":[101],"we":[102,126],"simulate":[103],"possible":[104],"attack":[105],"hypotheses":[106],"define":[108],"test":[109],"methods":[110,113],"evaluation":[112],"suitable":[114],"each":[116],"device.":[117],"In":[118],"our":[119],"systems":[121],"analysis,":[125],"also":[127],"consider":[128],"integrate":[130],"weaknesses":[131],"system":[134],"more":[139],"complete":[140],"threat":[143],"analysis.":[144]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":8},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":9},{"year":2020,"cited_by_count":6}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
