{"id":"https://openalex.org/W2139587494","doi":"https://doi.org/10.1145/2714576.2737091","title":"Emerging Security Threats and Countermeasures in IoT","display_name":"Emerging Security Threats and Countermeasures in IoT","publication_year":2015,"publication_date":"2015-04-03","ids":{"openalex":"https://openalex.org/W2139587494","doi":"https://doi.org/10.1145/2714576.2737091","mag":"2139587494"},"language":"en","primary_location":{"id":"doi:10.1145/2714576.2737091","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2714576.2737091","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088260595","display_name":"Zhikai Zhang","orcid":"https://orcid.org/0000-0002-1532-4409"},"institutions":[{"id":"https://openalex.org/I148366613","display_name":"National Yang Ming Chiao Tung University","ror":"https://ror.org/00se2k293","country_code":"TW","type":"education","lineage":["https://openalex.org/I148366613"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Zhi-Kai Zhang","raw_affiliation_strings":["National Chiao Tung University, Hsinchu, Taiwan Roc","National Chiao Tung University , Hsinchu, Taiwan, ROC"],"affiliations":[{"raw_affiliation_string":"National Chiao Tung University, Hsinchu, Taiwan Roc","institution_ids":["https://openalex.org/I148366613"]},{"raw_affiliation_string":"National Chiao Tung University , Hsinchu, Taiwan, ROC","institution_ids":["https://openalex.org/I148366613"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027187010","display_name":"Michael Cheng Yi Cho","orcid":null},"institutions":[{"id":"https://openalex.org/I148366613","display_name":"National Yang Ming Chiao Tung University","ror":"https://ror.org/00se2k293","country_code":"TW","type":"education","lineage":["https://openalex.org/I148366613"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Michael Cheng Yi Cho","raw_affiliation_strings":["National Chiao Tung University, Hsinchu, Taiwan Roc","National Chiao Tung University , Hsinchu, Taiwan, ROC"],"affiliations":[{"raw_affiliation_string":"National Chiao Tung University, Hsinchu, Taiwan Roc","institution_ids":["https://openalex.org/I148366613"]},{"raw_affiliation_string":"National Chiao Tung University , Hsinchu, Taiwan, ROC","institution_ids":["https://openalex.org/I148366613"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5045359994","display_name":"Shiuh\u2010Pyng Shieh","orcid":"https://orcid.org/0000-0003-4077-2358"},"institutions":[{"id":"https://openalex.org/I148366613","display_name":"National Yang Ming Chiao Tung University","ror":"https://ror.org/00se2k293","country_code":"TW","type":"education","lineage":["https://openalex.org/I148366613"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Shiuhpyng Shieh","raw_affiliation_strings":["National Chiao Tung University, Hsinchu, Taiwan Roc","National Chiao Tung University , Hsinchu, Taiwan, ROC"],"affiliations":[{"raw_affiliation_string":"National Chiao Tung University, Hsinchu, Taiwan Roc","institution_ids":["https://openalex.org/I148366613"]},{"raw_affiliation_string":"National Chiao Tung University , Hsinchu, Taiwan, ROC","institution_ids":["https://openalex.org/I148366613"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5088260595"],"corresponding_institution_ids":["https://openalex.org/I148366613"],"apc_list":null,"apc_paid":null,"fwci":13.3129,"has_fulltext":false,"cited_by_count":88,"citation_normalized_percentile":{"value":0.98893941,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7955571413040161},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7503445148468018},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6507456302642822},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.6302449703216553},{"id":"https://openalex.org/keywords/transparency","display_name":"Transparency (behavior)","score":0.5825258493423462},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5685192346572876},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5404542088508606},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.5156089663505554},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.5125045776367188},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.4823191165924072},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.16458383202552795}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7955571413040161},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7503445148468018},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6507456302642822},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.6302449703216553},{"id":"https://openalex.org/C2780233690","wikidata":"https://www.wikidata.org/wiki/Q535347","display_name":"Transparency (behavior)","level":2,"score":0.5825258493423462},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5685192346572876},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5404542088508606},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.5156089663505554},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5125045776367188},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.4823191165924072},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.16458383202552795},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2714576.2737091","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2714576.2737091","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W335661284","https://openalex.org/W1927311981","https://openalex.org/W1933497346","https://openalex.org/W1967561194","https://openalex.org/W2009033060","https://openalex.org/W2019682598","https://openalex.org/W2034931560","https://openalex.org/W2076604688","https://openalex.org/W2117560972","https://openalex.org/W2155903900","https://openalex.org/W2187957596","https://openalex.org/W2234639732","https://openalex.org/W2263365646","https://openalex.org/W6638204905","https://openalex.org/W6640229219","https://openalex.org/W6669481387","https://openalex.org/W6683004694","https://openalex.org/W6693241876"],"related_works":["https://openalex.org/W4387497383","https://openalex.org/W3183948672","https://openalex.org/W3173606202","https://openalex.org/W3110381201","https://openalex.org/W2948807893","https://openalex.org/W2935909890","https://openalex.org/W2778153218","https://openalex.org/W2758277628","https://openalex.org/W1531601525","https://openalex.org/W2091483479"],"abstract_inverted_index":{"IoT":[0,63,74],"(Internet":[1],"of":[2,27,115],"Things)":[3,19],"diversifies":[4],"the":[5,22,24,65,73,79,82,94,111,116],"future":[6],"Internet,":[7,23],"and":[8,15,37,54,77,113],"has":[9,30],"drawn":[10],"much":[11],"attention.":[12],"As":[13,35],"more":[14,16],"gadgets":[17],"(i.e.":[18],"connected":[20],"to":[21,81,109],"huge":[25],"amount":[26],"data":[28],"exchanged":[29,40,117],"reached":[31],"an":[32],"unprecedented":[33],"level.":[34],"sensitive":[36],"private":[38],"information":[39],"between":[41],"things,":[42],"privacy":[43],"becomes":[44],"a":[45],"major":[46],"concern.":[47],"Among":[48],"many":[49],"important":[50],"issues,":[51],"scalability,":[52],"transparency,":[53],"reliability":[55],"are":[56],"considered":[57],"as":[58],"new":[59,92],"challenges":[60],"that":[61],"differentiate":[62],"from":[64],"conventional":[66,95],"Internet.":[67],"In":[68,101],"this":[69],"paper,":[70],"we":[71],"enumerate":[72],"communication":[75],"scenarios":[76],"investigate":[78],"threats":[80],"large-scale,":[83],"unreliable,":[84],"pervasive":[85],"computing":[86],"environment.":[87],"To":[88],"cope":[89],"with":[90],"these":[91],"challenges,":[93],"security":[96],"architecture":[97],"will":[98,106],"be":[99,107],"revisited.":[100],"particular,":[102],"various":[103],"authentication":[104],"schemes":[105],"evaluated":[108],"ensure":[110],"confidentiality":[112],"integrity":[114],"data.":[118]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":12},{"year":2020,"cited_by_count":14},{"year":2019,"cited_by_count":10},{"year":2018,"cited_by_count":16},{"year":2017,"cited_by_count":12},{"year":2016,"cited_by_count":9},{"year":2015,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
