{"id":"https://openalex.org/W4322740083","doi":"https://doi.org/10.3390/jcp3010006","title":"Water-Tight IoT\u2013Just Add Security","display_name":"Water-Tight IoT\u2013Just Add Security","publication_year":2023,"publication_date":"2023-03-01","ids":{"openalex":"https://openalex.org/W4322740083","doi":"https://doi.org/10.3390/jcp3010006"},"language":"en","primary_location":{"id":"doi:10.3390/jcp3010006","is_oa":true,"landing_page_url":"https://doi.org/10.3390/jcp3010006","pdf_url":"https://www.mdpi.com/2624-800X/3/1/6/pdf?version=1677652631","source":{"id":"https://openalex.org/S4210232532","display_name":"Journal of Cybersecurity and Privacy","issn_l":"2624-800X","issn":["2624-800X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity and Privacy","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2624-800X/3/1/6/pdf?version=1677652631","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5091790961","display_name":"Guillaume Bour","orcid":"https://orcid.org/0000-0003-4456-6279"},"institutions":[{"id":"https://openalex.org/I173888879","display_name":"SINTEF","ror":"https://ror.org/01f677e56","country_code":"NO","type":"facility","lineage":["https://openalex.org/I173888879"]},{"id":"https://openalex.org/I4387930215","display_name":"SINTEF Digital","ror":"https://ror.org/028m52w57","country_code":null,"type":"facility","lineage":["https://openalex.org/I173888879","https://openalex.org/I4387930215"]}],"countries":["NO"],"is_corresponding":true,"raw_author_name":"Guillaume Bour","raw_affiliation_strings":["SINTEF Digital, Strindvegen 4, 7034 Trondheim, Norway"],"affiliations":[{"raw_affiliation_string":"SINTEF Digital, Strindvegen 4, 7034 Trondheim, Norway","institution_ids":["https://openalex.org/I173888879","https://openalex.org/I4387930215"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069049609","display_name":"Camillo Bosco","orcid":"https://orcid.org/0000-0002-0710-5505"},"institutions":[{"id":"https://openalex.org/I173888879","display_name":"SINTEF","ror":"https://ror.org/01f677e56","country_code":"NO","type":"facility","lineage":["https://openalex.org/I173888879"]},{"id":"https://openalex.org/I4387930280","display_name":"SINTEF Community","ror":"https://ror.org/01zj15q98","country_code":null,"type":"facility","lineage":["https://openalex.org/I173888879","https://openalex.org/I4387930280"]}],"countries":["NO"],"is_corresponding":false,"raw_author_name":"Camillo Bosco","raw_affiliation_strings":["SINTEF Community, B\u00f8rrestuveien 3B, 0314 Oslo, Norway"],"affiliations":[{"raw_affiliation_string":"SINTEF Community, B\u00f8rrestuveien 3B, 0314 Oslo, Norway","institution_ids":["https://openalex.org/I173888879","https://openalex.org/I4387930280"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080496485","display_name":"Rita Ugarelli","orcid":"https://orcid.org/0000-0002-2096-8591"},"institutions":[{"id":"https://openalex.org/I173888879","display_name":"SINTEF","ror":"https://ror.org/01f677e56","country_code":"NO","type":"facility","lineage":["https://openalex.org/I173888879"]},{"id":"https://openalex.org/I4387930280","display_name":"SINTEF Community","ror":"https://ror.org/01zj15q98","country_code":null,"type":"facility","lineage":["https://openalex.org/I173888879","https://openalex.org/I4387930280"]}],"countries":["NO"],"is_corresponding":false,"raw_author_name":"Rita Ugarelli","raw_affiliation_strings":["SINTEF Community, B\u00f8rrestuveien 3B, 0314 Oslo, Norway"],"affiliations":[{"raw_affiliation_string":"SINTEF Community, B\u00f8rrestuveien 3B, 0314 Oslo, Norway","institution_ids":["https://openalex.org/I173888879","https://openalex.org/I4387930280"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5071836226","display_name":"Martin Gilje Jaatun","orcid":"https://orcid.org/0000-0001-7127-6694"},"institutions":[{"id":"https://openalex.org/I173888879","display_name":"SINTEF","ror":"https://ror.org/01f677e56","country_code":"NO","type":"facility","lineage":["https://openalex.org/I173888879"]},{"id":"https://openalex.org/I4387930215","display_name":"SINTEF Digital","ror":"https://ror.org/028m52w57","country_code":null,"type":"facility","lineage":["https://openalex.org/I173888879","https://openalex.org/I4387930215"]}],"countries":["NO"],"is_corresponding":false,"raw_author_name":"Martin Gilje Jaatun","raw_affiliation_strings":["SINTEF Digital, Strindvegen 4, 7034 Trondheim, Norway"],"affiliations":[{"raw_affiliation_string":"SINTEF Digital, Strindvegen 4, 7034 Trondheim, Norway","institution_ids":["https://openalex.org/I173888879","https://openalex.org/I4387930215"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5091790961"],"corresponding_institution_ids":["https://openalex.org/I173888879","https://openalex.org/I4387930215"],"apc_list":{"value":1000,"currency":"CHF","value_usd":1082},"apc_paid":{"value":1000,"currency":"CHF","value_usd":1082},"fwci":1.6629,"has_fulltext":true,"cited_by_count":9,"citation_normalized_percentile":{"value":0.83155585,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":"3","issue":"1","first_page":"76","last_page":"94"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9853000044822693,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9768999814987183,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7531235218048096},{"id":"https://openalex.org/keywords/interoperability","display_name":"Interoperability","score":0.6805187463760376},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6337733268737793},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5711303949356079},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.5457013845443726},{"id":"https://openalex.org/keywords/critical-infrastructure","display_name":"Critical infrastructure","score":0.5305395722389221},{"id":"https://openalex.org/keywords/compromise","display_name":"Compromise","score":0.5139850974082947},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.5032767653465271},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.46343404054641724},{"id":"https://openalex.org/keywords/critical-infrastructure-protection","display_name":"Critical infrastructure protection","score":0.45509713888168335},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.4545435905456543},{"id":"https://openalex.org/keywords/control-system-security","display_name":"Control system security","score":0.44229888916015625},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.42041438817977905},{"id":"https://openalex.org/keywords/security-through-obscurity","display_name":"Security through obscurity","score":0.415319561958313},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.31987136602401733},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.27741408348083496},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.256891131401062},{"id":"https://openalex.org/keywords/network-security-policy","display_name":"Network security policy","score":0.24640139937400818},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.1788945496082306}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7531235218048096},{"id":"https://openalex.org/C20136886","wikidata":"https://www.wikidata.org/wiki/Q749647","display_name":"Interoperability","level":2,"score":0.6805187463760376},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6337733268737793},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5711303949356079},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.5457013845443726},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.5305395722389221},{"id":"https://openalex.org/C46355384","wikidata":"https://www.wikidata.org/wiki/Q726686","display_name":"Compromise","level":2,"score":0.5139850974082947},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.5032767653465271},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.46343404054641724},{"id":"https://openalex.org/C2779033394","wikidata":"https://www.wikidata.org/wiki/Q5186733","display_name":"Critical infrastructure protection","level":3,"score":0.45509713888168335},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.4545435905456543},{"id":"https://openalex.org/C172862783","wikidata":"https://www.wikidata.org/wiki/Q5165888","display_name":"Control system security","level":5,"score":0.44229888916015625},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.42041438817977905},{"id":"https://openalex.org/C114869243","wikidata":"https://www.wikidata.org/wiki/Q133735","display_name":"Security through obscurity","level":5,"score":0.415319561958313},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.31987136602401733},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.27741408348083496},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.256891131401062},{"id":"https://openalex.org/C117110713","wikidata":"https://www.wikidata.org/wiki/Q3394676","display_name":"Network security policy","level":4,"score":0.24640139937400818},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.1788945496082306},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.3390/jcp3010006","is_oa":true,"landing_page_url":"https://doi.org/10.3390/jcp3010006","pdf_url":"https://www.mdpi.com/2624-800X/3/1/6/pdf?version=1677652631","source":{"id":"https://openalex.org/S4210232532","display_name":"Journal of Cybersecurity and Privacy","issn_l":"2624-800X","issn":["2624-800X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity and Privacy","raw_type":"journal-article"},{"id":"pmh:oai:zenodo.org:7696570","is_oa":true,"landing_page_url":"https://zenodo.org/record/7696570","pdf_url":"https://zenodo.org/record/7696570","source":{"id":"https://openalex.org/S4306400562","display_name":"Zenodo (CERN European Organization for Nuclear Research)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67311998","host_organization_name":"European Organization for Nuclear Research","host_organization_lineage":["https://openalex.org/I67311998"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Cybersecurity and Privacy 3(1)","raw_type":"info:eu-repo/semantics/article"},{"id":"pmh:oai:doaj.org/article:2690bf38e6f54665b22200e345ce93f4","is_oa":true,"landing_page_url":"https://doaj.org/article/2690bf38e6f54665b22200e345ce93f4","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Cybersecurity and Privacy, Vol 3, Iss 1, Pp 76-94 (2023)","raw_type":"article"},{"id":"pmh:oai:sintef.brage.unit.no:11250/3065909","is_oa":true,"landing_page_url":"https://hdl.handle.net/11250/3065909","pdf_url":null,"source":{"id":"https://openalex.org/S4306401716","display_name":"Duo Research Archive (University of Oslo)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I184942183","host_organization_name":"University of Oslo","host_organization_lineage":["https://openalex.org/I184942183"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"76-94","raw_type":"info:eu-repo/semantics/other"}],"best_oa_location":{"id":"doi:10.3390/jcp3010006","is_oa":true,"landing_page_url":"https://doi.org/10.3390/jcp3010006","pdf_url":"https://www.mdpi.com/2624-800X/3/1/6/pdf?version=1677652631","source":{"id":"https://openalex.org/S4210232532","display_name":"Journal of Cybersecurity and Privacy","issn_l":"2624-800X","issn":["2624-800X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity and Privacy","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.6600000262260437,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[{"id":"https://openalex.org/G1316770970","display_name":null,"funder_award_id":"820954","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G4637352294","display_name":null,"funder_award_id":"820954","funder_id":"https://openalex.org/F4320332999","funder_display_name":"Horizon 2020 Framework Programme"},{"id":"https://openalex.org/G7331901853","display_name":null,"funder_award_id":"EU H2020","funder_id":"https://openalex.org/F4320332999","funder_display_name":"Horizon 2020 Framework Programme"}],"funders":[{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"},{"id":"https://openalex.org/F4320332999","display_name":"Horizon 2020 Framework Programme","ror":"https://ror.org/00k4n6c32"}],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4322740083.pdf"},"referenced_works_count":16,"referenced_works":["https://openalex.org/W1488053584","https://openalex.org/W1774699283","https://openalex.org/W1845443293","https://openalex.org/W1964751383","https://openalex.org/W1988128728","https://openalex.org/W2015683507","https://openalex.org/W2075237887","https://openalex.org/W2094267878","https://openalex.org/W2170690812","https://openalex.org/W2774161712","https://openalex.org/W2914467995","https://openalex.org/W3022070409","https://openalex.org/W3049401034","https://openalex.org/W4247074552","https://openalex.org/W4311003964","https://openalex.org/W6759475690"],"related_works":["https://openalex.org/W2184280487","https://openalex.org/W2614996178","https://openalex.org/W2904429942","https://openalex.org/W4234110194","https://openalex.org/W2034117965","https://openalex.org/W3119634295","https://openalex.org/W1573213965","https://openalex.org/W2382638190","https://openalex.org/W4231479549","https://openalex.org/W4313388980"],"abstract_inverted_index":{"The":[0],"security":[1,40,64,82],"of":[2,13,27,50,101,125],"IoT-based":[3,86],"digital":[4,59,87,116],"solutions":[5,18,60,88,117],"is":[6,41],"a":[7,99,126],"critical":[8,28,90],"concern":[9],"in":[10,32,92],"the":[11,25,33,45,81,93,112,122],"adoption":[12],"Industry":[14],"4.0":[15],"technologies.":[16],"These":[17],"are":[19,67],"increasingly":[20],"being":[21],"used":[22],"to":[23,43,69,98,139],"support":[24],"interoperability":[26],"infrastructure,":[29],"such":[30],"as":[31,54],"water":[34,94,127],"and":[35,38,48,66,96],"energy":[36],"sectors,":[37],"their":[39,74,106],"essential":[42],"ensure":[44],"continued":[46],"reliability":[47],"integrity":[49],"these":[51],"systems.":[52],"However,":[53],"our":[55],"research":[56],"demonstrates,":[57],"many":[58],"still":[61,134],"lack":[62],"basic":[63],"mechanisms":[65],"vulnerable":[68],"attacks":[70],"that":[71,131],"can":[72,133],"compromise":[73],"functionality.":[75],"In":[76,108],"this":[77],"paper,":[78],"we":[79,110],"examine":[80],"risks":[83,113],"associated":[84,114],"with":[85,115,121],"for":[89,104],"infrastructure":[91],"sector,":[95],"refer":[97],"set":[100],"good":[102],"practices":[103],"ensuring":[105],"security.":[107],"particular,":[109],"analyze":[111],"not":[118],"directly":[119],"connected":[120],"IT":[123],"system":[124],"utility.":[128],"We":[129],"show":[130],"they":[132],"be":[135],"leveraged":[136],"by":[137],"attackers":[138],"trick":[140],"operators":[141],"into":[142],"making":[143],"wrong":[144],"operational":[145],"decisions.":[146]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":3}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2023-03-03T00:00:00"}
