{"id":"https://openalex.org/W2971223593","doi":"https://doi.org/10.1109/msec.2019.2925918","title":"The Internet of Things: Security Challenges","display_name":"The Internet of Things: Security Challenges","publication_year":2019,"publication_date":"2019-08-30","ids":{"openalex":"https://openalex.org/W2971223593","doi":"https://doi.org/10.1109/msec.2019.2925918","mag":"2971223593"},"language":"en","primary_location":{"id":"doi:10.1109/msec.2019.2925918","is_oa":true,"landing_page_url":"https://doi.org/10.1109/msec.2019.2925918","pdf_url":"https://ieeexplore.ieee.org/ielx7/8013/8821441/08821455.pdf","source":{"id":"https://openalex.org/S61906035","display_name":"IEEE Security & Privacy","issn_l":"1540-7993","issn":["1540-7993","1558-4046"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Security &amp; Privacy","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://ieeexplore.ieee.org/ielx7/8013/8821441/08821455.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011846293","display_name":"Paul C. van Oorschot","orcid":"https://orcid.org/0000-0002-5038-5370"},"institutions":[{"id":"https://openalex.org/I67031392","display_name":"Carleton University","ror":"https://ror.org/02qtvee93","country_code":"CA","type":"education","lineage":["https://openalex.org/I67031392"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Paul C. van Oorschot","raw_affiliation_strings":["Carleton University"],"affiliations":[{"raw_affiliation_string":"Carleton University","institution_ids":["https://openalex.org/I67031392"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102885109","display_name":"Sean W. Smith","orcid":"https://orcid.org/0000-0001-5995-574X"},"institutions":[{"id":"https://openalex.org/I107672454","display_name":"Dartmouth College","ror":"https://ror.org/049s0rh22","country_code":"US","type":"education","lineage":["https://openalex.org/I107672454"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sean W. Smith","raw_affiliation_strings":["Computer Science, Dartmouth College"],"affiliations":[{"raw_affiliation_string":"Computer Science, Dartmouth College","institution_ids":["https://openalex.org/I107672454"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5011846293"],"corresponding_institution_ids":["https://openalex.org/I67031392"],"apc_list":null,"apc_paid":null,"fwci":4.7747,"has_fulltext":false,"cited_by_count":38,"citation_normalized_percentile":{"value":0.95504604,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":"17","issue":"5","first_page":"7","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.5572999715805054,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.5572999715805054,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7286080121994019},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5983261466026306},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5895141959190369},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.5346046686172485},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5105848908424377},{"id":"https://openalex.org/keywords/physical-security","display_name":"Physical security","score":0.4632408022880554},{"id":"https://openalex.org/keywords/credit-card","display_name":"Credit card","score":0.460987389087677},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3486083447933197}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7286080121994019},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5983261466026306},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5895141959190369},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5346046686172485},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5105848908424377},{"id":"https://openalex.org/C2776157020","wikidata":"https://www.wikidata.org/wiki/Q851598","display_name":"Physical security","level":2,"score":0.4632408022880554},{"id":"https://openalex.org/C2983355114","wikidata":"https://www.wikidata.org/wiki/Q161380","display_name":"Credit card","level":3,"score":0.460987389087677},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3486083447933197},{"id":"https://openalex.org/C145097563","wikidata":"https://www.wikidata.org/wiki/Q1148747","display_name":"Payment","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/msec.2019.2925918","is_oa":true,"landing_page_url":"https://doi.org/10.1109/msec.2019.2925918","pdf_url":"https://ieeexplore.ieee.org/ielx7/8013/8821441/08821455.pdf","source":{"id":"https://openalex.org/S61906035","display_name":"IEEE Security & Privacy","issn_l":"1540-7993","issn":["1540-7993","1558-4046"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Security &amp; Privacy","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1109/msec.2019.2925918","is_oa":true,"landing_page_url":"https://doi.org/10.1109/msec.2019.2925918","pdf_url":"https://ieeexplore.ieee.org/ielx7/8013/8821441/08821455.pdf","source":{"id":"https://openalex.org/S61906035","display_name":"IEEE Security & Privacy","issn_l":"1540-7993","issn":["1540-7993","1558-4046"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Security &amp; Privacy","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.6200000047683716,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2971223593.pdf","grobid_xml":"https://content.openalex.org/works/W2971223593.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W3173845408","https://openalex.org/W2621146813","https://openalex.org/W2937393784","https://openalex.org/W2608118026","https://openalex.org/W4376486703","https://openalex.org/W3103518308","https://openalex.org/W2588870966","https://openalex.org/W3034682759","https://openalex.org/W2917397554","https://openalex.org/W2783999343"],"abstract_inverted_index":{"The":[0],"five":[1],"articles":[2],"in":[3,65,73,93,106,147,157,200],"this":[4,103,113,193],"special":[5],"section":[6],"focus":[7],"on":[8,208],"Internet":[9,41,99],"of":[10,47,85,100,110,130,179,187],"Things":[11],"(IoT)security":[12],"and":[13,27,69,128,211],"privacy":[14],"issues.":[15],"IoT":[16,67,149],"involves":[17],"embedding,":[18],"at":[19],"massive":[20],"scale,":[21],"processor-based":[22],"systems":[23],"into":[24],"physical":[25,79,118,155],"infrastructure":[26],"everyday":[28],"objects,":[29],"including":[30],"things":[31,90,144],"that":[32,50,71],"neither":[33],"look":[34],"like":[35],"computers":[36],"nor":[37],"communicate":[38],"using":[39],"the":[40,56,60,78,94,98,107,117,158,175,185,196,201],"Protocol.":[42],"Two":[43],"important":[44],"elements":[45],"are":[46],"note:":[48],"sensors":[49],"provide":[51],"an":[52,148,188],"input":[53],"mechanism":[54],"from":[55],"real":[57,159],"world":[58,62,80,109,203],"to":[59,77,138],"digital":[61,108,202],"(essentially":[63],"present":[64],"all":[66],"systems)":[68],"actuators":[70],"result":[72],"mechanically":[74],"induced":[75],"changes":[76],"(commonly":[81],"a":[82,164,180],"defining":[83],"characteristic":[84],"cyberphysical":[86],"systems).":[87],"Historically,":[88],"when":[89,143],"went":[91],"wrong":[92,146],"traditional":[95],"Internet,":[96],"or":[97,133,166,171,177],"Computers":[101],"(IoC),":[102],"caused":[104],"problems":[105,199],"computers-and":[111],"occasionally,":[112],"would":[114],"indirectly":[115],"impact":[116],"world.":[119],"For":[120],"example,":[121,162],"corrupted":[122],"databases":[123],"could":[124,136],"disrupt":[125],"air":[126],"travel,":[127],"theft":[129],"credit":[131],"card":[132],"banking":[134],"information":[135],"lead":[137],"financial":[139],"losses.":[140],"In":[141,192],"contrast,":[142],"go":[145],"world,":[150],"there":[151],"can":[152],"be":[153],"direct":[154,206],"consequences":[156,207],"world:":[160],"for":[161],"unlocking":[163],"gate":[165],"building":[167],"door,":[168],"altering":[169],"heating":[170],"cooling":[172],"systems,":[173],"affecting":[174],"steering":[176],"braking":[178],"vehicle,":[181],"even,":[182],"perhaps,":[183],"killing":[184],"host":[186],"implanted":[189],"medical":[190],"device.":[191],"sense,":[194],"with":[195],"IoT,":[197],"security-related":[198],"have":[204],"greater":[205],"physical-world":[209],"safety":[210],"security.":[212]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":11},{"year":2021,"cited_by_count":11},{"year":2020,"cited_by_count":5}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
