{"id":"https://openalex.org/W2898545807","doi":"https://doi.org/10.1109/jiot.2018.2877749","title":"Playing With Danger: A Taxonomy and Evaluation of Threats to Smart Toys","display_name":"Playing With Danger: A Taxonomy and Evaluation of Threats to Smart Toys","publication_year":2018,"publication_date":"2018-10-24","ids":{"openalex":"https://openalex.org/W2898545807","doi":"https://doi.org/10.1109/jiot.2018.2877749","mag":"2898545807"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2018.2877749","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2018.2877749","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/1809.05556","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Sharon Shasha","orcid":"https://orcid.org/0000-0001-6289-4087"},"institutions":[{"id":"https://openalex.org/I60158472","display_name":"Concordia University","ror":"https://ror.org/0420zvk78","country_code":"CA","type":"education","lineage":["https://openalex.org/I60158472"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Sharon Shasha","raw_affiliation_strings":["Concordia Institute for Information Systems Engineering, Concordia University, Montreal, QC, Canada"],"raw_orcid":"https://orcid.org/0000-0001-6289-4087","affiliations":[{"raw_affiliation_string":"Concordia Institute for Information Systems Engineering, Concordia University, Montreal, QC, Canada","institution_ids":["https://openalex.org/I60158472"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Moustafa Mahmoud","orcid":null},"institutions":[{"id":"https://openalex.org/I60158472","display_name":"Concordia University","ror":"https://ror.org/0420zvk78","country_code":"CA","type":"education","lineage":["https://openalex.org/I60158472"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Moustafa Mahmoud","raw_affiliation_strings":["Concordia Institute for Information Systems Engineering, Concordia University, Montreal, QC, Canada"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Concordia Institute for Information Systems Engineering, Concordia University, Montreal, QC, Canada","institution_ids":["https://openalex.org/I60158472"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Mohammad Mannan","orcid":"https://orcid.org/0000-0002-9630-5858"},"institutions":[{"id":"https://openalex.org/I60158472","display_name":"Concordia University","ror":"https://ror.org/0420zvk78","country_code":"CA","type":"education","lineage":["https://openalex.org/I60158472"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Mohammad Mannan","raw_affiliation_strings":["Concordia Institute for Information Systems Engineering, Concordia University, Montreal, QC, Canada"],"raw_orcid":"https://orcid.org/0000-0002-9630-5858","affiliations":[{"raw_affiliation_string":"Concordia Institute for Information Systems Engineering, Concordia University, Montreal, QC, Canada","institution_ids":["https://openalex.org/I60158472"]}]},{"author_position":"last","author":{"id":null,"display_name":"Amr Youssef","orcid":"https://orcid.org/0000-0002-4284-8646"},"institutions":[{"id":"https://openalex.org/I60158472","display_name":"Concordia University","ror":"https://ror.org/0420zvk78","country_code":"CA","type":"education","lineage":["https://openalex.org/I60158472"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Amr Youssef","raw_affiliation_strings":["Concordia Institute for Information Systems Engineering, Concordia University, Montreal, QC, Canada"],"raw_orcid":"https://orcid.org/0000-0002-4284-8646","affiliations":[{"raw_affiliation_string":"Concordia Institute for Information Systems Engineering, Concordia University, Montreal, QC, Canada","institution_ids":["https://openalex.org/I60158472"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I60158472"],"apc_list":null,"apc_paid":null,"fwci":2.3187,"has_fulltext":false,"cited_by_count":31,"citation_normalized_percentile":{"value":0.89686829,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"6","issue":"2","first_page":"2986","last_page":"3002"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.6657999753952026,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.6657999753952026,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.14059999585151672,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.029100000858306885,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.6347000002861023},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5031999945640564},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.49790000915527344},{"id":"https://openalex.org/keywords/taxonomy","display_name":"Taxonomy (biology)","score":0.4498000144958496},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.41589999198913574},{"id":"https://openalex.org/keywords/smart-objects","display_name":"Smart objects","score":0.4124999940395355},{"id":"https://openalex.org/keywords/home-automation","display_name":"Home automation","score":0.3882000148296356},{"id":"https://openalex.org/keywords/private-information-retrieval","display_name":"Private information retrieval","score":0.36880001425743103},{"id":"https://openalex.org/keywords/order","display_name":"Order (exchange)","score":0.3562000095844269}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.758400022983551},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7120000123977661},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.6347000002861023},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.621399998664856},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5031999945640564},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.49790000915527344},{"id":"https://openalex.org/C58642233","wikidata":"https://www.wikidata.org/wiki/Q8269924","display_name":"Taxonomy (biology)","level":2,"score":0.4498000144958496},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.41589999198913574},{"id":"https://openalex.org/C2780202397","wikidata":"https://www.wikidata.org/wiki/Q2294986","display_name":"Smart objects","level":3,"score":0.4124999940395355},{"id":"https://openalex.org/C507571656","wikidata":"https://www.wikidata.org/wiki/Q848436","display_name":"Home automation","level":2,"score":0.3882000148296356},{"id":"https://openalex.org/C99221444","wikidata":"https://www.wikidata.org/wiki/Q1532069","display_name":"Private information retrieval","level":2,"score":0.36880001425743103},{"id":"https://openalex.org/C182306322","wikidata":"https://www.wikidata.org/wiki/Q1779371","display_name":"Order (exchange)","level":2,"score":0.3562000095844269},{"id":"https://openalex.org/C152223200","wikidata":"https://www.wikidata.org/wiki/Q3055471","display_name":"Smart environment","level":3,"score":0.32420000433921814},{"id":"https://openalex.org/C172195944","wikidata":"https://www.wikidata.org/wiki/Q541265","display_name":"Ubiquitous computing","level":2,"score":0.32019999623298645},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2847999930381775},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.28439998626708984},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.27900001406669617},{"id":"https://openalex.org/C2776576444","wikidata":"https://www.wikidata.org/wiki/Q303569","display_name":"Attack surface","level":2,"score":0.27480000257492065},{"id":"https://openalex.org/C169093310","wikidata":"https://www.wikidata.org/wiki/Q3702971","display_name":"Personally identifiable information","level":2,"score":0.2718000113964081},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.2700999975204468},{"id":"https://openalex.org/C3018725008","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber threats","level":2,"score":0.2689000070095062},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.26330000162124634},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.26010000705718994},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.2567000091075897},{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.2515000104904175},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.25110000371932983}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/jiot.2018.2877749","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2018.2877749","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},{"id":"pmh:oai:arXiv.org:1809.05556","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1809.05556","pdf_url":"https://arxiv.org/pdf/1809.05556","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:1809.05556","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1809.05556","pdf_url":"https://arxiv.org/pdf/1809.05556","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W1986263117","https://openalex.org/W1988037376","https://openalex.org/W2003544295","https://openalex.org/W2087804676","https://openalex.org/W2102460407","https://openalex.org/W2253962881","https://openalex.org/W2254062603","https://openalex.org/W2293726002","https://openalex.org/W2490867469","https://openalex.org/W2536707834","https://openalex.org/W2541736046","https://openalex.org/W2561342496","https://openalex.org/W2611292243","https://openalex.org/W2742412825","https://openalex.org/W2743396744","https://openalex.org/W2766049877","https://openalex.org/W2796498984","https://openalex.org/W2807882351","https://openalex.org/W2808494254","https://openalex.org/W2808512042","https://openalex.org/W2886664698","https://openalex.org/W3124279086","https://openalex.org/W4230299126","https://openalex.org/W6638891140","https://openalex.org/W6639371725","https://openalex.org/W6693426909","https://openalex.org/W6719600236","https://openalex.org/W6738548020","https://openalex.org/W6738677250","https://openalex.org/W6758532123","https://openalex.org/W6789213376"],"related_works":[],"abstract_inverted_index":{"Smart":[0,19],"toys":[1,20,65,106,131,143,206,219],"have":[2,39,58,67,86],"captured":[3],"an":[4,181],"increasing":[5],"share":[6],"of":[7,24,26,83,97,111,130,138,157,176,203],"the":[8,92,165,185,235],"toy":[9,186],"market,":[10],"and":[11,48,54,117,126,148,153,168,207],"are":[12,21],"growing":[13],"ubiquitous":[14],"in":[15,62,144],"households":[16],"with":[17,228],"children.":[18],"a":[22,76,128,136,192,199],"subset":[23,129],"Internet":[25,40],"Things":[27],"(IoT)":[28],"devices,":[29,104],"containing":[30],"sensors,":[31],"actuators,":[32],"and/or":[33],"artificial":[34],"intelligence":[35],"capabilities.":[36],"They":[37],"frequently":[38],"connectivity,":[41],"directly":[42],"or":[43,73,179,190,231],"indirectly":[44],"through":[45],"companion":[46,209],"apps,":[47],"collect":[49],"information":[50,178],"about":[51],"their":[52,112,208],"users":[53],"environments.":[55],"Recent":[56],"studies":[57],"found":[59],"security":[60,167],"flaws":[61,170],"many":[63],"smart":[64,105,142,159,205],"that":[66,171,216],"led":[68],"to":[69,94,101,122,141,146,174,183,187,223,234],"serious":[70],"privacy":[71,169],"leaks,":[72],"allowed":[74],"tracking":[75],"child's":[77],"physical":[78],"location.":[79],"Some":[80],"well-publicized":[81],"discoveries":[82],"this":[84,118,195],"nature":[85],"prompted":[87],"actions":[88],"from":[89],"governments":[90],"around":[91],"world":[93],"ban":[95],"some":[96],"these":[98,124],"toys.":[99,160],"Compared":[100],"other":[102,158],"IoT":[103],"pose":[107],"unique":[108],"risks":[109,125],"because":[110],"easily":[113],"vulnerable":[114],"user":[115],"base,":[116],"paper":[119],"is":[120],"intended":[121],"define":[123],"assess":[127],"against":[132],"them.":[133],"We":[134],"provide":[135],"classification":[137],"threats":[139,225],"specific":[140],"order":[145],"unite":[147],"complement":[149],"existing":[150],"adhoc":[151],"analyses,":[152],"help":[154],"comprehensive":[155],"evaluation":[156],"Our":[161,211],"vulnerability":[162],"taxonomy":[163],"addresses":[164],"potential":[166],"can":[172],"lead":[173],"leakage":[175],"private":[177],"allow":[180],"adversary":[182],"control":[184],"lure,":[188],"harm,":[189],"distress":[191],"child.":[193],"Using":[194],"taxonomy,":[196],"we":[197],"perform":[198],"thorough":[200],"experimental":[201],"analysis":[202,213],"eleven":[204],"apps.":[210],"systematic":[212],"has":[214],"uncovered":[215],"several":[217],"current":[218],"still":[220],"expose":[221],"children":[222],"multiple":[224],"for":[226],"attackers":[227],"physical,":[229],"nearby,":[230],"remote":[232],"access":[233],"toy.":[236]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":8},{"year":2021,"cited_by_count":7},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2018-11-02T00:00:00"}
