{"id":"https://openalex.org/W4312784883","doi":"https://doi.org/10.1109/access.2022.3225973","title":"EU Cybersecurity Act and IoT Certification: Landscape, Perspective and a Proposed Template Scheme","display_name":"EU Cybersecurity Act and IoT Certification: Landscape, Perspective and a Proposed Template Scheme","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4312784883","doi":"https://doi.org/10.1109/access.2022.3225973"},"language":"en","primary_location":{"id":"doi:10.1109/access.2022.3225973","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2022.3225973","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09967990.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09967990.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5091512658","display_name":"Anum Khurshid","orcid":"https://orcid.org/0000-0002-5788-069X"},"institutions":[{"id":"https://openalex.org/I2800664555","display_name":"RISE Research Institutes of Sweden","ror":"https://ror.org/03nnxqz81","country_code":"SE","type":"other","lineage":["https://openalex.org/I2800664555"]}],"countries":["SE"],"is_corresponding":true,"raw_author_name":"Anum Khurshid","raw_affiliation_strings":["RISE Research Institutes of Sweden, Stockholm, Sweden"],"affiliations":[{"raw_affiliation_string":"RISE Research Institutes of Sweden, Stockholm, Sweden","institution_ids":["https://openalex.org/I2800664555"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033479277","display_name":"Reem Alsaaidi","orcid":null},"institutions":[{"id":"https://openalex.org/I1306339040","display_name":"Ericsson (Sweden)","ror":"https://ror.org/05a7rhx54","country_code":"SE","type":"company","lineage":["https://openalex.org/I1306339040"]},{"id":"https://openalex.org/I2800664555","display_name":"RISE Research Institutes of Sweden","ror":"https://ror.org/03nnxqz81","country_code":"SE","type":"other","lineage":["https://openalex.org/I2800664555"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Reem Alsaaidi","raw_affiliation_strings":["RISE Research Institutes of Sweden, Stockholm, Sweden","BCSS Security Engineering, Ericsson, Stockholm, Sweden"],"affiliations":[{"raw_affiliation_string":"RISE Research Institutes of Sweden, Stockholm, Sweden","institution_ids":["https://openalex.org/I2800664555"]},{"raw_affiliation_string":"BCSS Security Engineering, Ericsson, Stockholm, Sweden","institution_ids":["https://openalex.org/I1306339040"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013416173","display_name":"Mudassar Aslam","orcid":"https://orcid.org/0000-0003-3223-4234"},"institutions":[{"id":"https://openalex.org/I201384688","display_name":"National University of Computer and Emerging Sciences","ror":"https://ror.org/003eyb898","country_code":"PK","type":"education","lineage":["https://openalex.org/I201384688"]},{"id":"https://openalex.org/I2800664555","display_name":"RISE Research Institutes of Sweden","ror":"https://ror.org/03nnxqz81","country_code":"SE","type":"other","lineage":["https://openalex.org/I2800664555"]}],"countries":["PK","SE"],"is_corresponding":false,"raw_author_name":"Mudassar Aslam","raw_affiliation_strings":["RISE Research Institutes of Sweden, Stockholm, Sweden","National University of Computer and Emerging Sciences (NUCES-FAST), Islamabad, Pakistan"],"affiliations":[{"raw_affiliation_string":"RISE Research Institutes of Sweden, Stockholm, Sweden","institution_ids":["https://openalex.org/I2800664555"]},{"raw_affiliation_string":"National University of Computer and Emerging Sciences (NUCES-FAST), Islamabad, Pakistan","institution_ids":["https://openalex.org/I201384688"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001344842","display_name":"Shahid Raza","orcid":"https://orcid.org/0000-0001-8192-0893"},"institutions":[{"id":"https://openalex.org/I2800664555","display_name":"RISE Research Institutes of Sweden","ror":"https://ror.org/03nnxqz81","country_code":"SE","type":"other","lineage":["https://openalex.org/I2800664555"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Shahid Raza","raw_affiliation_strings":["RISE Research Institutes of Sweden, Stockholm, Sweden"],"affiliations":[{"raw_affiliation_string":"RISE Research Institutes of Sweden, Stockholm, Sweden","institution_ids":["https://openalex.org/I2800664555"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5091512658"],"corresponding_institution_ids":["https://openalex.org/I2800664555"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":9.2223,"has_fulltext":true,"cited_by_count":32,"citation_normalized_percentile":{"value":0.97959396,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":"10","issue":null,"first_page":"129932","last_page":"129948"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9782999753952026,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/certification","display_name":"Certification","score":0.7725053429603577},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.714647650718689},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.6984567642211914},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6903249025344849},{"id":"https://openalex.org/keywords/perspective","display_name":"Perspective (graphical)","score":0.6833680868148804},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.6282949447631836},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.11522889137268066},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.07925263047218323}],"concepts":[{"id":"https://openalex.org/C46304622","wikidata":"https://www.wikidata.org/wiki/Q374814","display_name":"Certification","level":2,"score":0.7725053429603577},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.714647650718689},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.6984567642211914},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6903249025344849},{"id":"https://openalex.org/C12713177","wikidata":"https://www.wikidata.org/wiki/Q1900281","display_name":"Perspective (graphical)","level":2,"score":0.6833680868148804},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.6282949447631836},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.11522889137268066},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.07925263047218323},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/access.2022.3225973","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2022.3225973","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09967990.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:DiVA.org:uu-487065","is_oa":true,"landing_page_url":"http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-487065","pdf_url":null,"source":{"id":"https://openalex.org/S4306401559","display_name":"KTH Publication Database DiVA (KTH Royal Institute of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Article in journal"},{"id":"pmh:oai:doaj.org/article:41572b739e56493cb5b9ad4f94fd994c","is_oa":true,"landing_page_url":"https://doaj.org/article/41572b739e56493cb5b9ad4f94fd994c","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 10, Pp 129932-129948 (2022)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2022.3225973","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2022.3225973","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09967990.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.47999998927116394,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[{"id":"https://openalex.org/G3418842755","display_name":null,"funder_award_id":"830927","funder_id":"https://openalex.org/F4320332999","funder_display_name":"Horizon 2020 Framework Programme"},{"id":"https://openalex.org/G7838410298","display_name":null,"funder_award_id":"830927","funder_id":"https://openalex.org/F4320320940","funder_display_name":"Stiftelsen f\u00f6r\u00a0Strategisk Forskning"}],"funders":[{"id":"https://openalex.org/F4320320940","display_name":"Stiftelsen f\u00f6r\u00a0Strategisk Forskning","ror":"https://ror.org/044wr7g58"},{"id":"https://openalex.org/F4320332999","display_name":"Horizon 2020 Framework Programme","ror":"https://ror.org/00k4n6c32"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4312784883.pdf","grobid_xml":"https://content.openalex.org/works/W4312784883.grobid-xml"},"referenced_works_count":18,"referenced_works":["https://openalex.org/W1966709388","https://openalex.org/W2733765803","https://openalex.org/W2748868501","https://openalex.org/W2885541569","https://openalex.org/W2889557246","https://openalex.org/W2902801737","https://openalex.org/W2944136255","https://openalex.org/W2951906956","https://openalex.org/W3029172965","https://openalex.org/W3032137791","https://openalex.org/W3111292493","https://openalex.org/W3196833029","https://openalex.org/W4213455721","https://openalex.org/W4234540472","https://openalex.org/W4297094574","https://openalex.org/W6743493502","https://openalex.org/W6754230774","https://openalex.org/W6778133116"],"related_works":["https://openalex.org/W2899084033","https://openalex.org/W2066052364","https://openalex.org/W4243365217","https://openalex.org/W2224296908","https://openalex.org/W2023743128","https://openalex.org/W3109981693","https://openalex.org/W2381980429","https://openalex.org/W2384206113","https://openalex.org/W4245926026","https://openalex.org/W645983410"],"abstract_inverted_index":{"The":[0,92],"vulnerabilities":[1],"in":[2,77,112,146],"deployed":[3],"IoT":[4,45,58,96,110,134,157,170,195],"devices":[5,24,99,111,135],"are":[6,26,31],"a":[7,53,118,152,168,185],"threat":[8],"to":[9,22,103,108,160,187],"critical":[10],"infrastructure":[11],"and":[12,20,47,64,88,136,164,228],"user":[13],"privacy.":[14],"There":[15],"is":[16],"ample":[17],"ongoing":[18],"research":[19],"efforts":[21,30,43],"produce":[23],"that":[25,180],"secure-by-design.":[27],"However,":[28],"these":[29],"still":[32],"far":[33],"from":[34,101,205],"translation":[35],"into":[36],"actual":[37],"deployments.":[38],"To":[39],"address":[40],"this,":[41],"worldwide":[42],"towards":[44],"device":[46,171],"software":[48],"certification":[49,84,114,121,131,158,173,192,226],"have":[50],"accelerated":[51],"as":[52,184],"potential":[54,162],"solution,":[55],"including":[56],"UK\u2019s":[57],"assurance":[59],"program,":[60],"EU":[61,143,190],"Cybersecurity":[62,73,144,211],"Act":[63,74,145],"the":[65,72,81,95,113,129,142,198,206,210,216,220],"US":[66],"executive":[67],"order":[68],"14028.":[69],"In":[70,197],"EU,":[71],"was":[75],"launched":[76],"2019":[78],"which":[79],"initiated":[80],"European":[82,119],"cybersecurity":[83,120,130,191,225],"framework":[85,115],"for":[86,124,133,194,224],"Internet":[87],"Communications":[89],"Technology":[90],"(ICT).":[91],"heterogeneity":[93],"of":[94,141,155,167,209],"landscape":[97],"with":[98],"ranging":[100],"industrial":[102],"consumer,":[104],"makes":[105],"it":[106],"challenging":[107],"incorporate":[109],"or":[116],"introduce":[117],"scheme":[122,193],"solely":[123],"IoT.":[125],"This":[126],"paper":[127],"analyses":[128],"prospects":[132],"also":[137,176,214],"places":[138],"article":[139,207],"54":[140,208],"an":[147,178,189],"international":[148],"perspective.":[149],"We":[150,175,213],"conducted":[151],"comparative":[153],"study":[154],"existing":[156],"schemes":[159,227],"identify":[161,202],"gaps":[163],"extract":[165],"requirements":[166],"candidate":[169],"security":[172],"scheme.":[174],"propose":[177],"approach":[179],"can":[181],"be":[182],"used":[183],"template":[186,218],"instantiate":[188],"devices.":[196],"proposed":[199,217],"template,":[200],"we":[201],"IoT-critical":[203],"elements":[204],"Act.":[212],"evaluate":[215],"using":[219],"ENISA":[221],"qualification":[222,231],"system":[223],"show":[229],"its":[230],"on":[232],"all":[233],"criteria.":[234]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":10},{"year":2024,"cited_by_count":12},{"year":2023,"cited_by_count":7}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
