{"id":"https://openalex.org/W2748017128","doi":"https://doi.org/10.1145/3120459.3120471","title":"Security challenges in IoT development","display_name":"Security challenges in IoT development","publication_year":2017,"publication_date":"2017-05-22","ids":{"openalex":"https://openalex.org/W2748017128","doi":"https://doi.org/10.1145/3120459.3120471","mag":"2748017128"},"language":"en","primary_location":{"id":"doi:10.1145/3120459.3120471","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3120459.3120471","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the XP2017 Scientific Workshops","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Anh Nguyen Duc","orcid":null},"institutions":[{"id":"https://openalex.org/I4210165875","display_name":"NTNU Samfunnsforskning","ror":"https://ror.org/05pv30e80","country_code":"NO","type":"facility","lineage":["https://openalex.org/I4210165875"]}],"countries":["NO"],"is_corresponding":true,"raw_author_name":"Anh Nguyen Duc","raw_affiliation_strings":["NTNU., Trondheim, S\u00f8r-Tr\u00f8ndelag, Norway"],"affiliations":[{"raw_affiliation_string":"NTNU., Trondheim, S\u00f8r-Tr\u00f8ndelag, Norway","institution_ids":["https://openalex.org/I4210165875"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008019756","display_name":"Ronald Jabangwe","orcid":"https://orcid.org/0000-0002-2305-6352"},"institutions":[{"id":"https://openalex.org/I94876832","display_name":"Dundalk Institute of Technology","ror":"https://ror.org/01800zd49","country_code":"IE","type":"education","lineage":["https://openalex.org/I94876832"]}],"countries":["IE"],"is_corresponding":false,"raw_author_name":"Ronald Jabangwe","raw_affiliation_strings":["Dundalk Institute of Technology, Dundalk, Co.Louth, Ireland"],"affiliations":[{"raw_affiliation_string":"Dundalk Institute of Technology, Dundalk, Co.Louth, Ireland","institution_ids":["https://openalex.org/I94876832"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090285438","display_name":"Pangkaj Chandra Paul","orcid":"https://orcid.org/0000-0001-7077-5555"},"institutions":[{"id":"https://openalex.org/I94876832","display_name":"Dundalk Institute of Technology","ror":"https://ror.org/01800zd49","country_code":"IE","type":"education","lineage":["https://openalex.org/I94876832"]}],"countries":["IE"],"is_corresponding":false,"raw_author_name":"Pangkaj Paul","raw_affiliation_strings":["Dundalk Institute of Technology, Dundalk, Co.Louth, Ireland"],"affiliations":[{"raw_affiliation_string":"Dundalk Institute of Technology, Dundalk, Co.Louth, Ireland","institution_ids":["https://openalex.org/I94876832"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5058417486","display_name":"Pekka Abrahamsson","orcid":"https://orcid.org/0000-0002-4360-2226"},"institutions":[{"id":"https://openalex.org/I4210165875","display_name":"NTNU Samfunnsforskning","ror":"https://ror.org/05pv30e80","country_code":"NO","type":"facility","lineage":["https://openalex.org/I4210165875"]}],"countries":["NO"],"is_corresponding":false,"raw_author_name":"Pekka Abrahamsson","raw_affiliation_strings":["NTNU., Trondheim, S\u00f8r-Tr\u00f8ndelag, Norway"],"affiliations":[{"raw_affiliation_string":"NTNU., Trondheim, S\u00f8r-Tr\u00f8ndelag, Norway","institution_ids":["https://openalex.org/I4210165875"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I4210165875"],"apc_list":null,"apc_paid":null,"fwci":7.5878,"has_fulltext":false,"cited_by_count":39,"citation_normalized_percentile":{"value":0.97321739,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.8204234838485718},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7317423820495605},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.586051881313324},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4913090765476227},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4365108609199524},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.3555578589439392}],"concepts":[{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.8204234838485718},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7317423820495605},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.586051881313324},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4913090765476227},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4365108609199524},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3555578589439392},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3120459.3120471","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3120459.3120471","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the XP2017 Scientific Workshops","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5400000214576721,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320320847","display_name":"Science Foundation Ireland","ror":"https://ror.org/0271asj38"},{"id":"https://openalex.org/F4320335322","display_name":"European Regional Development Fund","ror":"https://ror.org/00k4n6c32"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W82878097","https://openalex.org/W86408811","https://openalex.org/W118785588","https://openalex.org/W562733722","https://openalex.org/W1530181845","https://openalex.org/W1533104574","https://openalex.org/W1948390895","https://openalex.org/W1967561194","https://openalex.org/W2029758586","https://openalex.org/W2113778324","https://openalex.org/W2529133275","https://openalex.org/W2572411793","https://openalex.org/W2610437899","https://openalex.org/W2744503278","https://openalex.org/W3210030168","https://openalex.org/W4252867363","https://openalex.org/W4281564584"],"related_works":["https://openalex.org/W4245926026","https://openalex.org/W4311097251","https://openalex.org/W2586548817","https://openalex.org/W2625093826","https://openalex.org/W2950174689","https://openalex.org/W4200598720","https://openalex.org/W2921026492","https://openalex.org/W4247463117","https://openalex.org/W4361251261","https://openalex.org/W3031181660"],"abstract_inverted_index":{"The":[0,76],"rapid":[1],"growth":[2],"of":[3,65,83],"Internet-of-things":[4],"(IoT)":[5],"software":[6],"applications":[7],"has":[8],"driven":[9],"both":[10],"practitioners":[11],"and":[12,40,71,92,106],"researchers'":[13],"attention":[14],"to":[15,89],"methodological":[16,49,93,105],"approaches":[17],"for":[18,24,51],"secure":[19,52],"IoT":[20,25,53,66],"development.":[21,67],"Security":[22],"issues":[23],"is":[26],"special":[27],"in":[28,62,80,110],"the":[29,44,63,101],"way":[30],"that":[31],"they":[32],"include":[33],"not":[34],"only":[35],"software,":[36],"but":[37],"also":[38],"hardware":[39],"network":[41],"concerns.":[42],"With":[43],"aim":[45],"at":[46],"proposing":[47],"a":[48,81],"approach":[50],"application":[54],"development,":[55],"we":[56],"investigated":[57,72],"what":[58],"are":[59],"security":[60,85,108],"challenges":[61,86],"context":[64],"We":[68],"reviewed":[69],"literature":[70],"two":[73],"industry":[74],"cases.":[75,112],"preliminary":[77],"finding":[78],"results":[79],"list":[82],"17":[84],"with":[87],"regards":[88],"technical,":[90],"organizational":[91,107],"perspectives.":[94],"Cross-case":[95],"comparison":[96],"provides":[97],"initial":[98],"explanation":[99],"about":[100],"less":[102],"emphasis":[103],"on":[104],"concerns":[109],"our":[111]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":13},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":6},{"year":2018,"cited_by_count":3}],"updated_date":"2026-04-16T08:26:57.006410","created_date":"2025-10-10T00:00:00"}
