<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Security Assessment in IoT Ecosystems</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Sotirios</forename><surname>Evangelou</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">Dept. of Electrical and Computer Engineering</orgName>
								<orgName type="institution">University of Thessaly</orgName>
								<address>
									<country key="GR">Greece</country>
								</address>
							</affiliation>
							<affiliation key="aff1">
								<orgName type="institution">Charilaos Akasiadis</orgName>
							</affiliation>
							<affiliation key="aff2">
								<orgName type="institution">Institute of Informatics and Telecommunications N.C.S.R. &apos;Demokritos&apos;</orgName>
								<address>
									<country key="GR">Greece</country>
								</address>
							</affiliation>
							<affiliation key="aff3">
								<orgName type="department" key="dep1">Internet of Things</orgName>
								<orgName type="department" key="dep2">IoT Ecosystems</orgName>
								<orgName type="department" key="dep3">Artificial Intelligence</orgName>
							</affiliation>
							<affiliation key="aff4">
								<orgName type="department">Asset Taxonomy AIT-CPS2020</orgName>
								<address>
									<addrLine>September 02-04</addrLine>
									<postCode>2020</postCode>
									<settlement>Athens</settlement>
									<country key="GR">Greece</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Security Assessment in IoT Ecosystems</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">F1AFDA33BE458403376ED63505BC3250</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-25T00:02+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>The Internet of Things (IoT) and "Smart Everything" trend is a reality that is becoming part of our daily lives. Consequently, there is a gradual increase in the deployment of real world IoT systems that attempt to make use of the various possibilities and benefits the IoT offers. However, the connection of billions of-usually inherently insecure-devices in a network, paired with the lack of a clear security framework for the development of IoT systems and platforms has widened the attack surface of these systems leading to them being targeted by malicious actors. In this paper, we explore the problem and related research, devise an assets taxonomy and focus on the security requirements for each asset category. Then, we discuss countermeasures and good practices as well as new approaches based on AI that improve security and intrusion detection capabilities. We also introduce a metric that can be incorporated by automated security auditing methods. The relevance of this metric is evaluated with respect to correlation across findings from a real-world study.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">INTRODUCTION</head><p>The Internet of Things (IoT) is a complex network that interconnects "things", i.e. uniquely identifiable programmable devices with physical sensing and/or actuation capabilities that form cyber-physical systems. Such devices mainly sense data from the physical world and take actions, with the possibility to also inter-operate with processing services <ref type="bibr" target="#b14">[15]</ref>. The benefits offered are quite a few and they are currently being used in a wide range of use-cases, including healthcare <ref type="bibr" target="#b19">[20,</ref><ref type="bibr" target="#b25">26]</ref>, fitness <ref type="bibr" target="#b40">[41]</ref>, manufacturing <ref type="bibr" target="#b56">[57,</ref><ref type="bibr" target="#b57">58]</ref>, and agriculture industry <ref type="bibr" target="#b31">[32,</ref><ref type="bibr" target="#b48">49]</ref> among others. Ideas that would be previously deemed far-fetched and futuristic, such as self driving cars <ref type="bibr" target="#b16">[17]</ref> and smart cities <ref type="bibr" target="#b33">[34]</ref>, are now realized.</p><p>The statistics related to the IoT are so far remarkable, and more or less depict the impact they induce in the modern life. According to IoT Analytics <ref type="bibr" target="#b29">[30]</ref>, in the end of 2019 the number of active IoT devices was estimated to be 9.5B, without counting mobile devices, or inactive ones; this number is continuously increasing. During the period of 2017-2025 the Compound Annual Growth Rate (CAGR) for the IoT connections is estimated to be 17% reaching 25 billion in 2025 and a 1.1 Trillion USD global market revenue according to FICCI/EY <ref type="bibr" target="#b47">[48]</ref>. The total data volume by 2025 is projected to be 79.4 ZettaBytes (ZB) <ref type="bibr" target="#b37">[38]</ref>, and the number of IoT products is also rising, with publicly known IoT platforms in particular counting to 620 in 2019 <ref type="bibr" target="#b28">[29]</ref>. Such information illustrate the size of the IoT potential. Adoption and usage rates are continuously rising and such solutions are used to reinforce important aspects of the production processes, including automation, monitoring and data analytics, towards sustainable and cost-effective processes. Now, as with every disruptive technology, there are some challenges regarding IoT adoption as well. An important issue, that mainly comes up due to efforts in reducing investment costs, is increased security risks. Throughout the years, multiple vulnerabilities and security incidents have affected IoT ecosystems. Thus, focus is put into mitigating existing weaknesses and improving the security posture of such products. Research on IoT Cybersecurity covers a wide range of aspects, including the incorporation of security in the SDLC, auditing methodologies, surveys on attacks and common vulnerabilities, studies on good practices, as well as physical, hardware, software, and network security <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b35">36]</ref>.</p><p>In this work, we examine past research in the domain of security for IoT, and present a high-level taxonomy of the assets that compose a typical IoT ecosystem. Then, we briefly describe methods for evaluating the security posture by focusing in each of the identified assets, exploring insecure factors to assess desired requirements and highlight the aspects that could be reinforced. We cover a variety of ecosystem entities, since each of the assets performs differently in the ecosystem, and provides diverse security propositions due to the different nature of the various technology stacks incorporated. We establish a security baseline for each asset and collectively for the ecosystem itself. Additionally, we devise an index that combines aggregate real-world vulnerability data and their respective standardized scores (CVSS) into a single numerical value. Such an index can be incorporated in automated security assessment processes to compare security awareness and preparedness capacity of large IoT ecosystems. To illustrate applicability and effectiveness, we perform a correlation analysis with data from a real-world study providing cybersecurity statistics from many countries.</p><p>This paper is further structured as follows: In Section 2 we explore the previous related research. Section 3 provides a typical Internet of Things ecosystem asset taxonomy, and highlights the security requirements that need to be put in place, proposing controls, countermeasures, and best practices that can be applied to make each asset more secure. Section 4 presents a metric for cybersecurity awareness comparison between large device groups based on cumulative vulnerabilities to known attacks as well as the results from an analysis on real-world data that validates the metric's applicability Finally, in Section 5 we conclude and discuss our future intentions.</p><p>Given the widespread adoption of IoT in business processes and the every-day lives of individuals, an IoT product should not be deemed ready to enter the market unless it fulfils some baseline security requirements. Here, we provide an overview of related work describing such sets of requirements and recommendations.</p><p>To begin, ENISA, the European Union Agency for Cybersecurity, offers two significant reports providing baseline recommendations, good practices, and guidelines for IoT product development, maintenance, and end-of-life management. In both of the reports, a detailed asset and threat taxonomy is presented, with a special emphasis in the most critical parts, along with the impact and the stakeholders that they affect. The first report <ref type="bibr" target="#b0">[1]</ref> also performs a gap analysis, and offers good practices and recommendations. However, the recommendations mostly focus on non-technical aspects and serve a development, maintenance, and management strategy purpose. The good practices report <ref type="bibr" target="#b1">[2]</ref> of 2019 emphasises on the incorporation of security in the software development life cycle of IoT products, analysing each cycle phase, and presenting good practices. Three types are recognized, the "People" which affect all stakeholders and phases, the "Processes" that affect the mechanisms surrounding the software project's environment , and "Technologies" that consist of countermeasures and development good practices.</p><p>In another approach, the Infocomm Media Development Authority presents an IoT Cybersecurity Guide that offers suggestions for the implementation and operational phase of the product and two checklists, a threat modelling checklist and a vendor disclosure checklist <ref type="bibr" target="#b2">[3]</ref>. By using such checklists, potential vendors and developers can perform a self-assessment on the security posture of a product in development, evaluating if it is secure and market-ready. Here, we provide links to a thorough checklist, categorized by the taxonomy of the IoT ecosystem.</p><p>These works offer to vendors a defined set of requirements and guidelines that should be applied to a newly developed IoT product, so that it operates securely, adhering to privacy and safety needs. This paper combines the identification of assets, the security requirement assessment, and insecurity exploration, as well as a proposition of measures to address such insecurities. We approach the IoT ecosystem from a higher-level cyberphysical system's viewpoint and address all the types of co-existing stakeholders, including developers, system administrators, deployment infrastructure and end-users. We also focus on AI-related tools and programming techniques that can be applied by the responsible teams to improve the 'marginal' security of each asset.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1">The Attack Surface of IoT</head><p>An important aspect in the cybersecurity domain, is the "attack surface", i.e. the sum of insecure entry points that a malicious actor could utilize in order to enter or attack an IoT system.</p><p>In <ref type="bibr" target="#b45">[46]</ref>, there is a focus on the network aspect of IoT deployments. They decompose a network into trust zones, and categorize existing devices into IoT domains (Finance, Home, Wellness etc.). Then, 14 common vulnerabilities are mapped to common attacks like Denial of Service, Ransomware, and SCADA Trojan horses. Finally, security controls to mitigate these weak spots are presented, and a detailed map of IoT domains with the vulnerabilities, attacks and security controls associated with these domains is also given.</p><p>In <ref type="bibr" target="#b15">[16]</ref>, the Internet of Things security challenges is analysed and security requirements are presented such as the CIA triad -Confidentiality, Integrity, Availability. Then, a decomposition of the IoT architecture into three basic domains is performed, the cloud domain containing the IoT applications and services, the sensing domain containing the devices and their communication means, and the fog domain including everything that stands between the sensing and cloud domains. Authors delve into security vulnerabilities and common attacks regarding these three domains, and propose countermeasures for each of the cases explored.</p><p>Security is examined in different IoT layers in <ref type="bibr" target="#b50">[51]</ref>. They assess security based on systems software and hardware controls, as well as anti-tampering physical security techniques. Emphasis is given on the network layer, and in particular on encryption, authentication, secure routing, and key management for the encryption mechanisms. Denial of service (DoS) and distributed denial of service (DDoS) techniques are also referenced as a "popular" attack against IoT devices. The application layer security is also examined, and methods for security-by-design and run-time monitoring of the new Internet of Things products are proposed.</p><p>Finally, <ref type="bibr" target="#b35">[36]</ref>, performs an in-depth survey on IoT vulnerability research. The paper sums up a variety of research focused into the attack surface of IoT architectures, and presents a taxonomy of the collected results depending on different aspects-i.e., Layers, Impact, Attacks, etc.-and maps the corresponding research to these classifications. An empirical overview of the vulnerabilities is also presented, and the survey concludes with a presentation of the most important security challenges, paired with possible future initiatives to fight against each one.</p><p>These threat analyses cover a wide range of the possible threats concerning IoT infrastructures and products. Taking them into consideration, in Section 3 we create a picture of the baseline security requirements, and consequently the security measures that need to be in place in order to protect IoT deployments from such threats.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2">Artificial Intelligence-based Approaches</head><p>Artificial Intelligence (AI) and Machine Learning (ML) techniques are employed in a variety of methods for IoT security. Although manual labour and configuration are not yet fully replaceable in this domain, there is a number of aspects where AI techniques can provide great results towards a secure IoT ecosystem. In <ref type="bibr" target="#b4">[5]</ref>, the use of artificial neural networks (ANNs) as an intrusion detection system to combat DDoS attacks is evaluated. A multilayer perceptron neural network (MLP) is used to create an anomaly-based intrusion detection system. Experiments in a custom IoT deployment shows a great detection rate of 99%, while also providing a low false positive rate, which is one of the most significant goals of an intrusion detection system. Other than neural networks, techniques that perform well into network intrusion detection are 𝑘-NN, Random Forest, and Support Vector Machines <ref type="bibr" target="#b34">[35,</ref><ref type="bibr" target="#b60">61]</ref>.</p><p>Local malware scanning is also an aspect where artificial intelligence techniques can be a great supplement to existing signaturebased techniques. While signature-based approaches can protect against known malware, monitoring behaviour with AI techniques can often protect against new or unknown malware. In <ref type="bibr" target="#b55">[56]</ref> there is a proposition for the use of 𝑘-NN and Random Forest classification algorithms on collected traffic data to identify malware with a high accuracy on standard datasets. The lack of resources in constrained devices is also addressed, where the solution is to collect application traces locally, and appoint the model training and predictions to a capable and trusted external server.</p><p>In <ref type="bibr" target="#b55">[56]</ref>, two unique use-cases are also reported, where ML can play a significant role in IoT devices. The first is for secure IoT off-loading as a method to combat jamming and Man In The Middle (MITM) attacks. Using reinforcement learning, and specifically the Q-learning technique, the model takes into consideration the task priority, channel bandwidth, gain, and jamming power in order to decide on off-loading policies according to a Q-value that indicates the long term reward from choosing this policy. Using this approach, the device can choose optimal offloading channels and subbands in order to avoid interference and jamming as well as spoofing attacks. Convolutional neural networks can also be used for the same purpose but they require more computational resources than Q-learning. The second case of <ref type="bibr" target="#b55">[56]</ref> regards authentication using ML methods in order to avoid spoofing attacks. By using physical layer indicators, such as the received signal strength or the channel state information, learning techniques are able to exploit the indicators' connection to spatial characteristics in order to lure out connections that are initiated from outside a threshold proximity, reducing this way spoofing rates. Other than Q-learning, both supervised (distributed Frank Wolfe and incremental aggregated gradient) and unsupervised algorithms (Infinite Gaussian Mixture Model -IGMM) are used. For more resourceful devices, deep neural networks can also be applied to further improve the accuracy rates. IGMM is also reported as a useful algorithm for authentication by fingerprinting <ref type="bibr" target="#b23">[24]</ref>, where it is used to validate the credibility of the device by comparing the IGMM result with an expected value depending on the device's nature and shape. With respect to environmental changes, the model is able to distinguish a normal from a malicious one.</p><p>ML and essentially supervised learning methods usually require significant volumes of information termed as "Big Data" populating datasets used in security AI <ref type="bibr" target="#b59">[60]</ref>. Information, apart from being the input that affects a model's decision, also plays a significant role in training, improving prediction accuracy and validating its efficiency. In order to leverage the advantages AI has to offer, we need to establish a way to collect, clean, and format corresponding data. An infrastructure for collecting, storing and analysing big data in IoT systems is presented in <ref type="bibr" target="#b46">[47]</ref>. A data collection and actuation layer is introduced, with the collection aspect comprised of system-and application-level probes, a probe registry listing all the used probes, and a data routing middleware to route the data to the respective recipients. The actuation aspect includes Security Policy Enforcement where the data collected can be used to drive security decisions (e.g. disabling a service or closing a port) and visualizations where collected data and analyses are being displayed. The infrastructure also offers management agents and configuration tools.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.3">Security Evaluation on Existing IoT Solutions</head><p>As IoT continuously evolves, it is useful to frequently perform security evaluations of widely used IoT platforms, frameworks, devices, products, and protocols. By reviewing the security controls in products that are currently in use or available for sale across the world, we can both see the common trends in security and their impact, as well as highlight the needs for more robust solutions.</p><p>In <ref type="bibr" target="#b8">[9]</ref> a survey is presented on the architecture, hardware and software specifications, and security features regarding authentication, authorization, and secure communications in multiple IoT frameworks developed by popular vendors. These products are AWS IoT (Amazon), ARMbed (ARM), AzureIoT (Microsoft), Brillo/Weave (Google), Calvin (Ericsson), Homekit (Apple), Kura (Eclipse) and Smart Things (Samsung). Considering the conclusions, authors compare the chosen security controls and discover trends, such as the universal use of TLS/SSL and the popularity of AES cryptography and X.509 certificates.</p><p>The security of IoT products created for the Smart Home domain is examined in <ref type="bibr" target="#b6">[7]</ref>, including televisions, bulbs, etc. After decomposing deployments into 4 parts, namely the device, the mobile application, the cloud endpoint, and the communications, they proceed to explore existing research to identify the attack vectors of each part. These are cross-referenced to a wide variety of home IoT products. Next, by using the CVSS (Common Vulnerability Scoring System) standard <ref type="bibr" target="#b32">[33]</ref> and associating every product with known CVEs (Common Vulnerabilities and Exposures) that are publicly known, they evaluate each product's security posture.</p><p>Meanwhile, there is research focusing in other domains as well, such as the Healthcare domain, e.g. in <ref type="bibr" target="#b41">[42]</ref>, where an evaluation of medical devices' resiliency is performed to a plethora of attacks with an emphasis on the significance of cryptography. In the case of Industrial IoT domain the work of <ref type="bibr" target="#b3">[4]</ref> focuses on the security of such deployments to explore a method of continuous risk assessment.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">SECURITY AUDITING METHODOLOGY FOR IOT ECOSYSTEMS</head><p>The Internet of Things is a complex ecosystem that consists of multiple significant components that one should be aware of. Moreover, as far as cyber-security is concerned, each of these components introduces its own security concerns resulting to a wider attack surface. In this section we present a coordinated methodology for decomposing complex Internet of Things ecosystems into simpler categories, and identify essential security controls and practices that should be applied in these components in order to improve the security of the overall ecosystem.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1">Asset taxonomy on a typical IoT Ecosystem</head><p>Despite the heterogeneity of IoT ecosystems that are currently deployed in the real-world, there are some components that are essentially the same in whichever ecosystem one decides to examine, and by identifying these components we can create an image of a typical IoT ecosystem, and this way generalise on its various assets and functionality. Figure <ref type="figure" target="#fig_0">1</ref> presents a typical IoT ecosystem and enumerates its basic assets, providing an asset taxonomy; we identify nine different basic assets, each with a separate role in the ecosystem, associated with different stakeholders, and introducing its own security risks. The asset taxonomy approach is definitely not new <ref type="bibr" target="#b0">[1]</ref>. Our taxonomy, however, takes into consideration the human factor, as well as further decomposes the platform aspect for more structured assessment of its parts, distinguishing the following asset categories:</p><p>Users. The entities that constitute the end-users of the ecosystem, and who benefit from its use. Users can be individual persons, organizations, companies, or even whole countries. Apart from profit makers, this category also includes participants beyond development or marketing professions.</p><p>Devices. Smart watches and smart home equipment, sensors, surveillance cameras, and generally low-resource internet connected devices, all fall under this asset category. The devices can have both sensing and actuating capabilities.</p><p>Communication Channels. Communication channels are intangible entities and present the mechanisms that allow the interconnection and communication of users and devices to remote storage and computation spaces called the cloud.</p><p>Message Brokers. The message brokers are entities that reside in the platform part of the ecosystem and are the main entrypoints for data coming from IoT devices. The message brokers typically support many application protocols in order to promote interoperability and allow communication with other IoT devices.</p><p>Web Applications. The web applications are the IoT platform's entry points for Users, i.e. typical web interfaces that allow logging in and performing the various actions that each platform provides. Examples include adding/removing devices, handling data and incorporating logic, or exporting respective data from the platform.</p><p>Database Systems. The database systems are responsible for storing data. They can be relational or non-relational, depending on the platform, and they are key components for various mechanisms, such as authentication and authorization, data management, and the provisioning of data to IoT applications.</p><p>Internet of Things services/applications. This asset refers to applications that perform logical operations on data provided by IoT devices, or databases and output results that benefit the Users. Most platforms provide a set of predefined services, and some of them also allow the creation of custom applications which are usually executed into virtualized environments.</p><p>Back-end Servers. The back-end orchestrates the functionality of IoT platforms. It handles the interconnection and logical operation of the different assets, specifically the databases, the message brokers, the web applications, and other IoT services.</p><p>Deployment Infrastructure. This layer constitutes the basis of IoT platforms, either on edge, or cloud level. It refers to the physical servers where the platforms run, and the network deployment ( routing, DNS etc.) that allows the communication between users and devices, with the remote platform services. It also provides connectivity capabilities to the platforms as well as bandwidth management.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2">Asset security requirements and countermeasures</head><p>The assets of this taxonomy can be found in the majority of IoT ecosystems and can be used to decompose a specific ecosystem respectively, regardless of the different implementation and technical specifications. Such an approach makes the security assessment simpler, as it focuses on the sub-surface that a researcher has to audit each time. Now, each asset should be assessed sequentially and the methodology should inform the researcher of requirements that need to be satisfied. Next, recommendations and best practices can be provided that will make each individual asset, and collectively the whole ecosystem, more secure. The propositions should provide a secure and trusted baseline that the stakeholders of each asset can build upon. Overall, there are some security measures and practices that are applicable to almost any asset category, and for that reason we discuss them first, in order to avoid repetition.</p><p>(1) Keep everything up to date. Commercial systems and programs are constantly updating with new versions and patches, often addressing one or more CVEs. Thus, it is important to update the software versions regularly, since an internet search is enough for a malicious actor to inspect and possibly harm a vulnerable system. (2) Backups. Frequent backups is an essential good practice that needs to be followed. Source code, database information, configurations and other data that might be deleted by mistake or malice should be kept in separate storage medium, as backups with controlled access. This allows for quick recovery of production and even identification of a vulnerability in the event of a security incident. (3) Monitoring and Logging. Keeping information about change in states of assets is important. Logging significant events is useful for debugging, or, in our case, for inspecting security incidents. Monitoring is similar to logging, nevertheless presenting results in more intuitive ways (e.g. real-time graphs), and raising alerts when behaviour deviates. Often, ML techniques build models based on such values to predict and avoid unwanted situations, such as DoS attacks.</p><p>Based on the security control propositions that follow, we have compiled thorough checklists that summarize these measures. <ref type="foot" target="#foot_0">1</ref></p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3">Users</head><p>In the ICT domain, the human factor is widely assumed to be the most weak and exploitable one. The occasions in which the human factor becomes the reason for a security breach, mainly fall under three categories: insider threats, careless and unaware personnel or users, and lack of business security culture/strategy. One measure that is applied at scale for this type of asset, is the signing of NDAs (Non Disclosure Agreements), legal contracts signed by the employees, that forbid them from disclosing information regarding the company to third parties, protecting this way the intellectual property of the organization. Another measure is the strict access control over the company's assets; this can be achieved by monitoring access, logging, and analysis. Companywide policies for least privilege and segregation of duties can also be applied, so that access is given to only the assets that are absolutely necessary for the completion of each employee's function. In this regard, AI technology can also contribute through User and Entity Behavioral Analytics (UEBA), that monitor user behaviour to identify anomalies and potentially prevent malicious actions. Tools like IBM QRadar UBA are able to monitor human factor behaviour, assign roles and identify role behaviour deviations to alert on occasions like tool misconfigurations, sharing of credentials, or admins changing user attributes <ref type="bibr" target="#b38">[39]</ref>.</p><p>Security awareness training is used to cultivate the personnel's security culture, awareness of good practices and sense of responsibility. Occasional briefing on security and simulation of attacks such as phishing from the security teams of companies to the rest of the teams, can help create good practice habits on the employees that can collectively improve the security posture of the company. The power of machine learning can also be leveraged here, as algorithms such as kNN, SVM, Random Forest, Neural Networks as well as unsupervised and similarity learning techniques perform well into detecting social engineering attacks such as phishing <ref type="bibr" target="#b5">[6,</ref><ref type="bibr" target="#b42">43]</ref> and malicious URL links <ref type="bibr" target="#b49">[50,</ref><ref type="bibr" target="#b51">52]</ref>.</p><p>Regarding management strategies, which are not purely technical but could improve the security of the company significantly, responsible vulnerability disclosure programs can be incorporated. Here, external researchers or regular users that manage to find a bug in a product can disclose it to the engineering teams of the product so that it is quickly patched before it is exploited. In such cases, the individual can be rewarded financially, or in another way, depending on the severity of the found bug. This gives an incentive for researchers to disclose the bugs responsibly and not personally profit from them with malicious activities. Another significant measure is periodic company-wide risk and threat assessment, by either the company's internal security team or employment of external "red" teams and penetration testers. Finally, security incident scenario strategies should be in place in order to define the actions that will take place in the worst case of a security breach so that the company can identify a potential security hole, patch it and recover from the breach as soon as possible.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.4">Devices</head><p>The Devices asset consists of every IoT device in the ecosystem. From a security perspective, the aspects of hardware, software architecture and physical security of the device should be examined.</p><p>Physical security is defined by the controls that exist in place to protect against malicious activities from actors with physical access. There are a lot of techniques that users and device vendors can apply in order to improve the physical security of their product, e.g. make sure that the device is not accessible, or not leave physical ports exposed. AI biometric access control to the IoT devices is encouraged when combined with rule-based access such as passwords, as AI substantially improves the accuracy of fingerprint, facial or iris scans <ref type="bibr" target="#b58">[59]</ref>. Additionally, tampering prevention mechanisms <ref type="bibr" target="#b18">[19]</ref> should be considered, that make it difficult for someone to physically tamper the device, e.g. boards encapsulated, or coated with specific materials such as epoxy or silicone. Security fuses are also widely used, and they are mechanisms of access control to the on-chip memory. These mechanisms are usually built in a way that they destroy stored data in the case that someone attempts to erase or reprogram them, as can happen for example with UV lights in semi-invasive attacks. In many cases, tampering detectors are also installed into the device. This way many types of physical attacks can be detected and be handled accordingly. Side channel attacks <ref type="bibr" target="#b7">[8]</ref> are also a major threat for embedded devices. Passive Side channel attacks resort to analysing times, power consumption and temperature during cryptographic operations in order to identify properties, algorithms used or even keys. Countermeasures insert randomness in order to render the analysis useless, by time skewing, random heating, cache flushing, disabling or bypassing and many more methods.</p><p>Internet of Things devices can also be severely susceptible to Denial of Service attacks. Vampire attacks <ref type="bibr" target="#b54">[55]</ref> attempt to drain the battery of ad-hoc wireless devices to induce DoS, where the nodes shut down and do not communicate with the rest of the deployment. Mitigation controls include the ability to reroute at each node if a shorter route is known or introducing a no-backtracking metric that ensures the gradual progress network packets and avoids loops. DoS can also be avoided through frequency hopping, using directional antennas, or by spectrum spreading <ref type="bibr" target="#b15">[16]</ref>.</p><p>Trusted computing <ref type="bibr" target="#b53">[54]</ref> is another aspect of the embedded IoT devices' security. Trusted Execution Environments (TEEs) are processing units that ensure the protection of included code and data. Usually this is achieved by dedicated co-processors where security tasks are being offloaded from the main processor, and secure memory (dedicated on-chip RAM). Also, since outside the TEE data are not secure, there should be integrity checks for detecting modifications while outside. Secure booting is a significant feature of a TEE, as it verifies an image before it is executed, and in order to be successful secure storage of signatures and secure code for verification must be ensured. Therefore, the keys and signatures are written into protected read-only memory called hardware root of trust, that usually is on-SoC (System on chip) OTP (one-time-programmable) hardware that acts as anchor for the chain of trust.</p><p>Firmware updates is another issue that should be addressed. It is suggested that firmware updates should be encrypted and authenticated as well as be installed over the air (OTA) via secure protocol channels. Finally, application whitelisting is a popular method for avoiding malware installed inside the device. In <ref type="bibr" target="#b20">[21]</ref>, a store of binary checksums collected at a clean device state is used to block untrusted software execution and prevent its spreading. Malware detection in IoT devices can also be performed by static analysis of high level features using multiple classifiers like RIPPER, SVM, neural networks and more <ref type="bibr" target="#b36">[37]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.5">Communication Channels</head><p>Inside an IoT ecosystem, devices need to communicate. The data exchanged within the communication channels can be sensitive and private, thus eavesdropping and tampering must be avoided. Cryptography is the method that is widely used in order to avoid typical MITM attacks, and Transport Layer Security (TLS) is the standardized solution for secure encrypted communication. Specifically, TLSv1.2 and TLSv1.3 are the standardized (defined in RFC5246 <ref type="bibr" target="#b43">[44]</ref> and RFC8446 <ref type="bibr" target="#b44">[45]</ref> respectively) non-deprecated protocol versions used at the moment. The use of TLS assures confidentiality, authentication, and integrity. TLSv1.3 provides faster and more secure communication than 1.2, with more features such as Forward Secrecy. Lastly, TLS provides the capability for two-way authentication. Servers carry X.509 certificates to be trustworthy but clients can also carry certificates signed by a trusted CA. This can be useful in the ecosystem of IoT in order to authenticate devices that send data to the cloud applications. When TLS client certificates are not preferred, the devices can be authenticated through the use of AI algorithms for proximity-based or fingerprint-based authentication, where IGMM, Q-learning and neural networks are found to produce highly accurate results <ref type="bibr" target="#b23">[24,</ref><ref type="bibr" target="#b55">56]</ref>.</p><p>The use of cryptography, however, presents the engineers with a significant tradeoff in the case of Internet of Things devices. Overheads in time and processing power happen during the calculations for encrypting, decrypting and key generating and exchanging. Consequently, there is a need to use lightweight algorithms for these security tasks that will not compromise the security posture of a potential IoT device, neither will it compromise the device's performance and latency in performing its functionalities.</p><p>Starting off with assymetric cryptography, between the two options in Diffie-Hellman (DH) and RSA, the first is preferred, and mostly its version leveraging elliptic curves (ECC) and featuring forward secrecy -Elliptic Curves Diffie Hellman Ephemeral (ECDHE). On symmetric cryptography, AEAD algorithms that encrypt and authenticate in one pass are gaining popularity, with AES-GCM and the ChaCha20-Poly1305 combination being the most secure, fast and least resource intensive options. ChaCha20-Poly1305 is proposed in <ref type="bibr" target="#b9">[10]</ref> as the favorable option for smart devices in TLSv1.3, but in TLSv1.2 AES-GCM is proposed, especially with the performance spike in devices with specific instructions for hardware acceleration in specific cryptographic steps.</p><p>Regarding hashing algorithms, the performance evaluation generally seems to have minimal significance compared to e.g. the latency and energy consumption of asymmetric algorithms. Nevertheless, in <ref type="bibr" target="#b39">[40]</ref> there is a study on hashing algorithms in IoT platforms and embedded devices, where Blake2 <ref type="bibr" target="#b11">[12]</ref> is found to be more lightweight, energy efficient and fast. Other lightweight hashing families of algorithms are Photon <ref type="bibr" target="#b22">[23]</ref> and Quark <ref type="bibr" target="#b10">[11]</ref>.</p><p>So far, we have assumed that the devices have the capabilities of establishing a TLS connection with a remote server. In some lowresourced devices though this is not the case, and the minimum threshold for TLS-based solutions is 10KBs of RAM and 100KBs of ROM. In these situations a middleware is needed to provide the TLS-based communication for the constrained IoT devices <ref type="bibr" target="#b26">[27]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.6">Message Brokers</head><p>Message brokers are the entry points of IoT device data to the IoT platform, and they usually work with multiple application layer protocols such as HTTP (REST), MQTT and CoAP. TLS and X.509 certificates are the way to secure communication between devices and message brokers, as already discussed. If mutual authentication is configured, this is the asset to perform device authentication and determine access rights. Otherwise, authentication with passwords or tokens can also be implemented, where the broker can rely on the back-end for authentication purposes.</p><p>Another security measure that can be typically implemented here, is authorization and access control, so that IoT devices can publish to a particular topic, with their data are used by the intended subscribers alone, and vice versa so that subscribers ensure that the data originate from specific trusted publishers. Each Message Queue/Broker server usually provides a certain way of defining access control and authorization policies, but the two most common approaches are Access Control Lists (ACL) which are lists that associate users with permissions and Role-Based Access Control (RBAC) where roles are associated with permissions and users can have one or multiple roles, inheriting their permissions. Genetic Algorithms can be used for role-mining in order to automatically create roles and define RBAC policies <ref type="bibr" target="#b17">[18]</ref>. <ref type="bibr" target="#b27">[28]</ref> also presents some other authorization trends such as UCON (Usage control) which is used for continuously mutating authorization factors such as pay-per-view or metered payment situations and CapBAC which uses tokens to associate users with specific capabilities.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.7">Web Application Interfaces</head><p>Web applications usually are the asset that offer the largest attack surface since they provide a wide range of functionalities triggered by user actions, and they are fully visible to the public. There are numerous ways to "harm" a web application, and there are also various tools available to help to this end. Here as well, encryption between users and the front-end is essential.</p><p>A well known category is the injection attacks. This refers to commands being passed to an interpreter or another program, where part of the commands is derived from user input. SQL, NoSQL, LDAP, and OS injections belong to this category. User input validation and sanitation is needed to constrain the choices the user has in the data entered. Moreover, access control should be implemented correctly and carefully so that users only have access to authorized content. The authorization is mostly implemented with middleware software between function calls that acknowledges whether the user is authorised to access the functionality after the middleware. General web application attacks are also relevant here, such as crosssite scripting, external XML entities (XXEs), information-exposing error reporting, unprotected assets and more.</p><p>The identification of such vulnerabilities is based into detecting the entrypoints of user input and applying validation and escaping when this input is going to be used into HTML, CSS, Javascript and generally any interpretable content, or using modern frontend frameworks that tend to provide automatic sanitization e.g. Angular. The use of security tools for web applications testing is applicable here as well, such as Arachni, OWASP ZAP, W3af and Wfuzz. Finally, web application firewalls can help mitigate lots of attacks through a mixture of the traditional signature-based approach and supervised or unsupervised Machine Learning techniques to handle unknown injection attacks <ref type="bibr" target="#b21">[22,</ref><ref type="bibr" target="#b30">31]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.8">Database Systems</head><p>Databases are the assets that hold the majority of the data of the IoT ecosystem, as well as the functionality to access it. The information stored should be protected in terms of confidentiality and integrity. Starting with the SQL injection vulnerability mentioned previously, stored procedures was proposed as a way to limit outer effect to internal queries. Access control in query capabilities is also essential. The user that makes the queries should not be 'root', but should only have restricted authorization. Furthermore, the databases should not be directly exposed to the internet where remote malicious actors could potentially gather information, as well as send payloads for penetration testing.</p><p>Data, and essentially sensitive data should be protected, e.g. in the incident of an information leakage; credential information such as passwords should be hashed, and the authentication should be performed by comparing the hash of the password given by the login form with the password hash located in the database, so that even if the case that this hash is leaked, the malicious actor cannot discover the original password without bruteforcing. Additionally, the whole database could be encrypted though that does come with a trade-off in the latency (and potential insecurity) that the middleware application that encrypts and decrypts the data introduces.</p><p>Cryptographic key management is also an issue that should be tackled in the database asset level. Private, Symmetric and Hash keys that are used to encrypt, decrypt or digitally sign data need to be kept on a secure storage where they are accessed only by authenticated users, mostly developers. First and foremost, these keys should not be kept in the database with the data they protect, and if possible not even in the same server. In the case they are placed in the same server, they should be given appropriate readwrite-execute permissions. A solution heavily proposed, although expensive, are Hardware Security Modules (HSMs) which are hardware solutions for keeping keys and performing cryptographic tasks for the server.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.9">Processing Services</head><p>The driving force of IoT are applications and services that process incoming data from the devices and forward results to users, or other devices and applications. A range of preset applications is usually provided by the platform to the users, but most of the commercial platforms also allow users to create their own applications, deploy, and share them with the community. As with any user input and especially executable content in this case, several security risks are posed for the platform and should be carefully handled.</p><p>Whenever the execution of a process needs to be controlled, there is a need for isolated environments, and the solution is usually through virtualization. These types of environments are capable of running non-trusted programs or opening non-trusted files that could potentially be malicious inside a controlled environment without directly affecting the server in which they reside. Containers are heavily preferred for application deployment as they are fast to deploy and kill, and easier to control. Containers have some inherent security characteristics but there is a number of measures that can be taken to protect the system whenever containers run non-trusted user code. <ref type="bibr" target="#b52">[53]</ref> propose to run containers inside a VM in order to add the virtual kernel layer of security in the case of a container escape. Other measures to increase security are running the programs created by the user as non-root and with least privileges, and in secure minimal container images containing just the necessary binaries that each program functionality requires. Also, restricted versions of programming languages are usually employed, in order to avoid language-specific capabilities such as execution of shell commands. Lastly, in some cases the spawned services might attempt to starve the host of resources for prolonged timeframes. Thus, there should be a time and resource (CPU, Memory, Storage) quota on the spawned containers in order to avoid this kind of DoS incidents. Also, the network accessibility of the containers should be controlled and constrained to the extent possible.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.10">Backend Servers</head><p>Backend is the asset where the functionality of the different parts of the IoT platform is orchestrated. Data is received there and stored into databases, or sent to processing services. Also, communications with the Frontend Web Applications are facilitated to address user requests. The backend also provides functionality over the Internet, mostly through Application Programming Interfaces (APIs). Web application and Database Security have already been discussed in their respective sub chapters, so here the focus is to the APIs used either by other assets or external users.</p><p>First, the publicly exposed APIs should be protected with encryption in order to avoid eavesdropping. Also, authentication should be enforced in order to use the API, usually through API tokens. Authorization should also be kept in mind since, the APIs must ensure that the user only accesses and uses the content he is authorized for. The rate of the requests is another factor that needs to be accounted for in order to avoid DoS situations and make the API scalable. Rate limiting can be implemented in many ways, with the most popular being putting the request in message queues and process each one in a specific rate, or throttling of the user's connection (bandwidth limiting) upon detection of surpassing the request rate. Input parameter validation should be made in the API requests as with any entry point, using rules to enforce consistency with the API's expectations. The validation could be implemented as a middleware receiving the requests at an API gateway which could be used for other reasons as well, such as monitoring API traffic and applying machine learning and AI to find deviations from normal behaviour and flag possible attack attempts.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.11">Deployment Infrastructure</head><p>A substantial part of the IoT ecosystem is hosted on cloud or edge infrastructure. Starting from physical security, the infrastructure is expected to have strict access control with multi-factor authentication to the machines and other assets, camera surveillance and a great resiliency to physical disasters. Device and network monitoring is also imperative, with alerts triggered in case of strange behaviour. Strict control should also exist in the application level, with secure, authenticated, and authorised management software on the provider's side. On deployment, CSPs should ensure VM quotas are met, and VMs are isolated when the deployment is not on a dedicated machine.</p><p>Cyberthreat detection is also required in order to provide appropriate protection. Multi-technology systems are deployed in strategic network locations for this purpose, such as Network Intrusion Detection systems (NIDS) and Network Intrusion Prevention Systems (NIPS) that essentially combine the NIDS real-time threat detection with linkage to firewall rules in order to block those threats. These systems are based on anomaly detection techniques to detect deviations from normal behaviour and block untrusted data packets before they reach the hosts. This approach allows not only protection against known attacks, which could very well be avoided by the firewall rules, but also against unknown attacks in some cases. Many machine learning techniques perform well in intrusion detection including Neural Networks (CNNs, MLPs), SVMs, Naive Bayes, Decision Trees and Logistic Regression <ref type="bibr" target="#b13">[14]</ref>.</p><p>Having defined the security controls for each asset in the taxonomy, in what follows, we present a metric that can be used to collectively assess the security awareness in large pools of IoT-enabled devices, in order to highlight the vulnerabilities to be addressed.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">LACK OF SECURITY AWARENESS RATIO</head><p>We hereby define a metric that can be incorporated to show how well protected an IoT ecosystem is, by examining a number of indicators that can be retrieved without authorized access to assets.</p><p>The data used to compute our metric are collected using Shodan, a global crawler for Internet-connected devices. It scans global IPs, collects information such as the organization name, location, domain name, open ports, services, and attempts to grab the banner of the audited services to learn more specific information, e.g. version, and then map it with specific CVE vulnerabilities. Using Shodan API, we initially collect information about the number of internet connected devices globally categorised by country, for the top 200 results, excluding those with population of less than 300,000.</p><p>First, we determine the number of devices found vulnerable with specific vulnerabilities with CVE identification numbers. Next, the weighted sum of them was computed for each country using as weights their CVSS score, and their exploitability score. From the calculated vulnerabilities with less than 6.0 CVSS score or Local/-Physical attack vector were excluded in order to keep only severe and relatively easily remotely exploitable vulnerabilities. In that regard, it was assumed that devices with vulnerabilities in that category would most likely become a cyber-attack target because of the ease of exploit and impact that a malicious actor can deliver.</p><p>Dividing the weighted sum of vulnerabilities per country with the number of internet connected devices in each, results to a metric that can indicate how updated and secure against harmful remote cyberattacks a country's systems are, and, consequently, assess each country's security awareness. This measure is termed as LSAR, for Lack of Security Awareness Ratio. In theory, high values of LSAR indicate greater density of vulnerable and exploitable devices in a group of devices, deeming that group as a more possible target of malicious actors than one with a smaller LSAR.</p><formula xml:id="formula_0">𝐿𝑆𝐴𝑅 = 𝑖 (#𝑂𝑐𝑐𝑢𝑟𝑒𝑛𝑐𝑒𝑠 𝑖 × 𝐶𝑉 𝑆𝑆𝑠𝑐𝑜𝑟𝑒 𝑖 × 𝐸𝑥𝑝𝑙𝑜𝑖𝑡𝑎𝑏𝑖𝑙𝑖𝑡𝑦𝑠𝑐𝑜𝑟𝑒 𝑖 ) #𝐷𝑒𝑣𝑖𝑐𝑒𝑠 where 𝑖 ∈ {CVE-X|𝐶𝑉 𝑆𝑆𝑠𝑐𝑜𝑟𝑒 𝑖 &gt; 6.0 ∩ 𝑉 𝑒𝑐𝑡𝑜𝑟 𝑖 ∉ 𝐿𝑜𝑐𝑎𝑙, 𝑃ℎ𝑦𝑠𝑖𝑐𝑎𝑙 }</formula><p>The resulting LSAR values are shown in Table <ref type="table" target="#tab_0">1</ref>: Results include the countries with the biggest LSAR metrics, meaning the countries with the least security preparedness against known exploits and remote cyberattacks, hence least security awareness. To validate LSAR, we compare it with results from a survey <ref type="bibr" target="#b12">[13]</ref> for the best and worst security in countries. The survey includes data up to March 2020, which is adequately close to data collection from Shodan for the LSAR computation (late April, 2020). In this survey, countries are ranked for the percentage of mobile devices and computers infected with malware, the number of financial malware attacks, the percentage of all telnet attacks by originating country, of users attacked by cryptominers, and the best-prepared countries for cyber attacks.</p><p>Combining this survey's results with LSAR, 65 countries belong in both of the datasets and thus can be compared. We explore the correlation between the LSAR feature and the features introduced by the Comparitech survey. Results are shown in Fig. <ref type="figure">2</ref> and Fig. <ref type="figure">3</ref>, for the Pearson and Spearman correlation coefficients, respectively.</p><p>LSAR has a moderate uphill relationship with cryptomining attacks (+0.52,+0.54 correlation coefficients). This means that a high LSAR is correlated with a high percentage of cryptomining attacks. These, being one of the most popular uses of botnets, tend to target remotely exploitable devices, in order to amass computing power for mining operations in blockchain cryptocurrencies.</p><p>LSAR has a moderate uphill relationship with financial malware attacks, malware targeting bank accounts to steal money from victims (+0.58,+0.46 correlation coefficients). While this correlation validates the relationship of high LSAR with high percentage of malware targeting the victim, we require additional data which are hard to acquire to explore whether this assumption is valid. LSAR and the best-prepared metric of the Comparitech survey have a moderate downhill relationship (-0.28,-0.30 correlation coefficients), which is expected. This further validates our findings rendering LSAR as a metric to check the security posture of a sum of devices, in this case a country. The coefficients are not very high, which could be explained from the specificity of the use case of the Shodan findings (external attacks) compared to the bestprepared feature which is derived from the Global Cybersecurity Index scores <ref type="bibr" target="#b24">[25]</ref>. The GCI score performs a general security evaluation on a country's cybersecurity including factors such as cyber crime legislations and information extracted from questionnaires, hence the index is not fully consistent with our case.</p><p>LSAR has a weak uphill relationship with mobiles infected with malware. Additionally, there is a non-significant relationship of LSAR with computer malware which could be explained from the fact that most of it deviates from attacks like phishing, downloaded malware disguised as a useful program or infected drives. The case of the Shodan findings is the vulnerability to external cyberattacks so a huge proportion of the variability that could be explained is missed, thus the insignificant correlation with mobile and computer malware. Telnet attacks and LSAR also have insignificant correlation which is explained from the fact that they are bruteforcing attacks, not CVE-specific exploits.</p><p>Summarizing, we can see that even the omission of a simple activity such as consistent updating of software to secure versions can compromise the security of a device, and collectively widen the attack surface of the device's environment. The LSAR is a metric that can be used to assess the security posture of a large group of internet connected devices, owned and handled by different individuals or organizations by checking the exposure to potential common vulnerabilities (CVEs). Apart from countries, large groups of machines/devices could also be considered to be Wide Area Networks (WAN), geographical regions such as cities, or even large data centers were the VM could take the place of devices, and in those cases LSAR can provide a general view of the awareness of security as well as the density of vulnerable points inside the group.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">CONCLUSIONS</head><p>In this paper, we established a structured methodology towards assessing the security posture of an Internet of Things ecosystem and reinforcing it. This is achieved through a divide and conquer approach where we decompose the ecosystem into the assets that compile it, inspecting each asset's attack surface, defining security requirements, and proposing mitigations or good practices. This work aspires to become a handy guide for developers, researchers, engineers or managers working on the IoT domain, and contribute to the vast research towards secure IoT deployments and products. Potential future work includes a practical application of the defined methodology into a real IoT ecosystem focused on a specific usecase, such as a power-grid or a vehicular Ad-hoc network. Such an approach could validate the methodology's applicability and usability as well as yield potential insecure factors that this work has not yet taken consideration of.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Asset Taxonomy of a typical IoT ecosystem</figDesc><graphic coords="4,58.52,83.68,230.80,162.00" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 2 :Figure 3 :</head><label>23</label><figDesc>Figure 2: Pearson correlation coefficient</figDesc><graphic coords="9,65.81,83.68,216.22,191.56" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1 :</head><label>1</label><figDesc>Top 20 countries by LSAR</figDesc><table><row><cell>0 HTI</cell><cell cols="2">1.422832 10 MYS 0.404316</cell></row><row><cell cols="3">1 UZB 1.164537 11 TWN 0.398422</cell></row><row><cell cols="2">2 ZWE 0.782047 12 PER</cell><cell>0.397818</cell></row><row><cell cols="2">3 HKG 0.721822 13 TJK</cell><cell>0.392794</cell></row><row><cell cols="2">4 ETH 0.636363 14 ZAF</cell><cell>0.379868</cell></row><row><cell>5 JOR</cell><cell>0.522041 15 SEN</cell><cell>0.372707</cell></row><row><cell cols="3">6 PNG 0.455162 16 GTM 0.348438</cell></row><row><cell cols="3">7 LBN 0.451086 17 CHN 0.331362</cell></row><row><cell cols="2">8 MRT 0.441238 18 SLE</cell><cell>0.323695</cell></row><row><cell cols="3">9 KGZ 0.405626 19 BTN 0.321850</cell></row></table></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="1" xml:id="foot_0">https://github.com/EvangelouSotiris/Security-Assessment-in-IoT-Ecosystems_Summary-tables/raw/master/Summary_tables.pdf</note>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>ACKNOWLEDGMENTS</head><p>Charilaos Akasiadis acknowledges partial support of this work by the project SYNTELESIS "Innovative Technologies and Applications based on the Internet of Things (IoT) and the Cloud Computing" (MIS 5002521), which is implemented under the "Action for the Strategic Development on the Research and Technological Sector", funded by the Operational Programme "Competitiveness, Entrepreneurship and Innovation" (NSRF 2014-2020), and co-financed by Greece and the European Union (European Regional Development Fund).</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<title level="m">Baseline Security Recommendations for IoT: in the context of critical infrastructures</title>
				<imprint>
			<publisher>European Union Agency for Cybersecurity</publisher>
			<date type="published" when="2017">2017</date>
		</imprint>
		<respStmt>
			<orgName>ENISA</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">Technical Report</note>
</biblStruct>

<biblStruct xml:id="b1">
	<monogr>
		<title level="m">Good Practices for Security of IoT: Secure Software Development Lifecycle</title>
				<imprint>
			<publisher>European Union Agency for Cybersecurity</publisher>
			<date type="published" when="2019">2019</date>
		</imprint>
		<respStmt>
			<orgName>ENISA</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">Technical Report</note>
</biblStruct>

<biblStruct xml:id="b2">
	<monogr>
		<title level="m">Guidelines: Internet of Things (IoT) Cybersecurity Guide</title>
				<imprint>
			<publisher>Infocomm Media Development Authority</publisher>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
	<note type="report_type">Technical Report</note>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Cyber-Risks in the Industrial Internet of Things (IIoT): Towards a Method for Continuous Assessment</title>
		<author>
			<persName><forename type="first">C</forename><surname>Boye</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Kearney</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Josephs</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Information Security</title>
				<imprint>
			<publisher>Springer Int. Publishing</publisher>
			<date type="published" when="2018">2018</date>
			<biblScope unit="page" from="502" to="519" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Defense Scheme to Protect IoT from Cyber Attacks using AI Principles</title>
		<author>
			<persName><forename type="first">T</forename><surname>Ahanger</surname></persName>
		</author>
		<idno type="DOI">10.15837/ijccc.2018.6.3356</idno>
		<ptr target="https://doi.org/10.15837/ijccc.2018.6.3356" />
	</analytic>
	<monogr>
		<title level="j">Int. Journal of Computers Communications &amp; Control</title>
		<imprint>
			<biblScope unit="volume">13</biblScope>
			<biblScope unit="issue">11</biblScope>
			<biblScope unit="page" from="915" to="926" />
			<date type="published" when="2018">2018. 2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Classification of Phishing Email Using Random Forest Machine Learning Technique</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">A</forename><surname>Akinyelu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">O</forename><surname>Adewumi</surname></persName>
		</author>
		<idno type="DOI">10.1155/2014/425731</idno>
		<ptr target="https://doi.org/10.1155/2014/425731" />
	</analytic>
	<monogr>
		<title level="j">Journal of Applied Mathematics</title>
		<imprint>
			<biblScope unit="volume">2014</biblScope>
			<biblScope unit="issue">03</biblScope>
			<biblScope unit="page">425731</biblScope>
			<date type="published" when="2014-04">2014. Apr 2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">SoK: Security Evaluation of Home-Based IoT Deployments</title>
		<author>
			<persName><forename type="first">O</forename><surname>Alrawi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Lever</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Antonakakis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Monrose</surname></persName>
		</author>
		<idno type="DOI">10.1109/SP.2019.00013</idno>
		<ptr target="https://doi.org/10.1109/SP.2019.00013" />
	</analytic>
	<monogr>
		<title level="m">IEEE Symposium on Security and Privacy (SP)</title>
				<meeting><address><addrLine>Los Alamitos, CA, USA</addrLine></address></meeting>
		<imprint>
			<publisher>IEEE Computer Society</publisher>
			<date type="published" when="2019">2019. 2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<title level="m" type="main">Side channel attacks in embedded systems: A tale of hostilities and deterrence</title>
		<author>
			<persName><forename type="first">J</forename><surname>Ambrose</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Ragel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Jayasinghe</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Parameswaran</surname></persName>
		</author>
		<idno type="DOI">10.1109/ISQED.2015.7085468</idno>
		<ptr target="https://doi.org/10.1109/ISQED.2015.7085468" />
		<imprint>
			<date type="published" when="2015">2015. 2015. 2015</date>
			<biblScope unit="page" from="452" to="459" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Internet of Things: A survey on the security of IoT frameworks</title>
		<author>
			<persName><forename type="first">M</forename><surname>Ammar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Russello</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Crispo</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.jisa.2017.11.002</idno>
		<ptr target="https://doi.org/10.1016/j.jisa.2017.11.002citedBy144" />
	</analytic>
	<monogr>
		<title level="j">Journal of Information Security and Applications</title>
		<imprint>
			<biblScope unit="volume">38</biblScope>
			<biblScope unit="page" from="8" to="27" />
			<date type="published" when="2018">2018. 2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<monogr>
		<title level="m" type="main">Analysis of AES-GCM Cipher Suites in TLS</title>
		<author>
			<persName><forename type="first">B</forename><surname>Arunkumar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Govardhanan</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-319-68385-0_9</idno>
		<ptr target="https://doi.org/10.1007/978-3-319-68385-0_9" />
		<imprint>
			<date type="published" when="2018">2018</date>
			<biblScope unit="page" from="102" to="111" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Quark: A Lightweight Hash</title>
		<author>
			<persName><forename type="first">J.-P</forename><surname>Aumasson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Henzen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Meier</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Naya-Plasencia</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-642-15031-9_1</idno>
		<ptr target="https://doi.org/10.1007/978-3-642-15031-9_1" />
	</analytic>
	<monogr>
		<title level="j">Journal of Cryptology</title>
		<imprint>
			<biblScope unit="volume">26</biblScope>
			<biblScope unit="page" from="1" to="15" />
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">BLAKE2: Simpler, Smaller, Fast as MD5</title>
		<author>
			<persName><forename type="first">J.-P</forename><surname>Aumasson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Neves</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Wilcox-O'hearn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Winnerlein</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Applied Cryptography and Network Security</title>
				<meeting><address><addrLine>Berlin Heidelberg; Berlin, Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2013">2013</date>
			<biblScope unit="page" from="119" to="135" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<monogr>
		<author>
			<persName><forename type="first">Paul</forename><surname>Bischoff</surname></persName>
		</author>
		<ptr target="https://www.comparitech.com/blog/vpn-privacy/cybersecurity-by-country/" />
		<title level="m">Which countries have the worst (and best) cybersecurity</title>
				<imprint>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Network Intrusion Detection for IoT Security Based on Learning Techniques</title>
		<author>
			<persName><forename type="first">N</forename><surname>Chaabouni</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Mosbah</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Zemmari</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Sauvignac</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Faruki</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Communications Surveys Tutorials</title>
		<imprint>
			<biblScope unit="volume">21</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="2671" to="2701" />
			<date type="published" when="2019">2019. 2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">B</forename><surname>Chebudie</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Minerva</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Rotondi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Towards a definition of the Internet of Things</title>
				<imprint>
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
	<note type="report_type">Ph.D. Dissertation</note>
</biblStruct>

<biblStruct xml:id="b15">
	<monogr>
		<title level="m" type="main">Internet of Things Security and Privacy</title>
		<author>
			<persName><forename type="first">M</forename><surname>Dabbagh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Rayes</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-319-44860-2_8</idno>
		<ptr target="https://doi.org/10.1007/978-3-319-44860-2_8" />
		<imprint>
			<date type="published" when="2017">2017</date>
			<biblScope unit="page" from="195" to="223" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Trust in autonomous vehicles: The case of Tesla Autopilot and Summon</title>
		<author>
			<persName><forename type="first">M</forename><surname>Dikmen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Burns</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE International Conference on Systems, Man, and Cybernetics</title>
				<meeting><address><addrLine>SMC</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2017">2017. 2017</date>
			<biblScope unit="page" from="1093" to="1098" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Performance of AI algorithms for mining meaningful roles</title>
		<author>
			<persName><forename type="first">X</forename><surname>Du</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Chang</surname></persName>
		</author>
		<idno type="DOI">10.1109/CEC.2014.6900321</idno>
		<ptr target="https://doi.org/10.1109/CEC.2014.6900321" />
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2014 IEEE Congress on Evolutionary Computation</title>
				<meeting>the 2014 IEEE Congress on Evolutionary Computation<address><addrLine>CEC</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2014">2014</date>
			<biblScope unit="volume">2014</biblScope>
			<biblScope unit="page" from="2070" to="2076" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<monogr>
		<title level="m" type="main">Anti-tamper techniques</title>
		<author>
			<persName><forename type="first">E</forename><surname>Dubrova</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2018">2018</date>
		</imprint>
		<respStmt>
			<orgName>KTH Royal Institute of Technology, Sweden</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">Technical Report</note>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title/>
		<author>
			<persName><forename type="first">B</forename><surname>Farahani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Firouzi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Chakrabarty</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-030-30367-9_11</idno>
		<ptr target="https://doi.org/10.1007/978-3-030-30367-9_11" />
	</analytic>
	<monogr>
		<title level="j">Healthcare IoT</title>
		<imprint>
			<biblScope unit="page" from="515" to="545" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<monogr>
		<title level="m" type="main">Mitigating Mirai Malware Spreading in IoT Environment</title>
		<author>
			<persName><forename type="first">T</forename><surname>Gopal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Meerolla</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Jyostna</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Eswari</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Magesh</surname></persName>
		</author>
		<idno type="DOI">10.1109/ICACCI.2018.8554643</idno>
		<idno>2226-2230</idno>
		<ptr target="https://doi.org/10.1109/ICACCI.2018.8554643" />
		<imprint>
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">An unsupervised method for detection of XSS attack</title>
		<author>
			<persName><forename type="first">S</forename><surname>Goswami</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Hoque</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Dhruba</forename><forename type="middle">K</forename><surname>Bhattacharyya</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Jugal</forename><surname>Kalita</surname></persName>
		</author>
		<idno type="DOI">10.6633/IJNS.201709.19(5).14</idno>
		<ptr target="https://doi.org/10.6633/IJNS.201709.19" />
	</analytic>
	<monogr>
		<title level="j">International Journal of Network Security</title>
		<imprint>
			<biblScope unit="volume">19</biblScope>
			<biblScope unit="issue">09</biblScope>
			<biblScope unit="page">14</biblScope>
			<date type="published" when="2017">2017. 2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">The PHOTON Family of Lightweight Hash Functions</title>
		<author>
			<persName><forename type="first">J</forename><surname>Guo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Peyrin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Poschmann</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Advances in Cryptology -CRYPTO 2011</title>
				<imprint>
			<publisher>Springer BH</publisher>
			<date type="published" when="2011">2011</date>
			<biblScope unit="page" from="222" to="239" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<monogr>
		<author>
			<persName><forename type="first">A</forename><surname>Hameed</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Alomary</surname></persName>
		</author>
		<idno type="DOI">10.1109/3ICT.2019.8910320</idno>
		<idno>-5</idno>
		<ptr target="https://doi.org/10.1109/3ICT.2019.8910320" />
		<title level="m">Security Issues in IoT: A Survey</title>
				<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="volume">1</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<monogr>
		<ptr target="https://www.comparitech.com/blog/vpn-privacy/cybersecurity-by-country/" />
		<title level="m">Global Cybersecurity</title>
				<imprint>
			<publisher>International</publisher>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<analytic>
		<title level="a" type="main">IOT Survey: The Phase Changer in Healthcare Industry</title>
		<author>
			<persName><forename type="first">G</forename><surname>Kaur</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Sohal</surname></persName>
		</author>
		<idno type="DOI">10.26438/ijsrnsc/v6i2.3439</idno>
		<ptr target="https://doi.org/10.26438/ijsrnsc/v6i2.3439" />
	</analytic>
	<monogr>
		<title level="j">Int. Journal of Scientific Research in Network Security and Communication</title>
		<imprint>
			<biblScope unit="volume">6</biblScope>
			<biblScope unit="issue">04</biblScope>
			<biblScope unit="page" from="34" to="39" />
			<date type="published" when="2018">2018. 2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<monogr>
		<title level="m" type="main">A distributed security mechanism for Resource-Constrained IoT Devices</title>
		<author>
			<persName><forename type="first">J</forename><surname>King</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">I</forename><surname>Awad</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2016">2016. 2016</date>
			<biblScope unit="volume">40</biblScope>
			<biblScope unit="page" from="133" to="143" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<monogr>
		<title level="m" type="main">Technology trends of access control in IoT and requirements analysis</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Lee</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Lim</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Jeon</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Kim</surname></persName>
		</author>
		<idno type="DOI">10.1109/ICTC.2015.7354730</idno>
		<ptr target="https://doi.org/10.1109/ICTC.2015.7354730" />
		<imprint>
			<date type="published" when="2015">2015</date>
			<biblScope unit="page" from="1031" to="1033" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b28">
	<monogr>
		<author>
			<persName><forename type="first">S</forename><surname>Liu</surname></persName>
		</author>
		<ptr target="https://www.statista.com/topics/2637/internet-of-things/" />
		<title level="m">Internet of Things -Statistics &amp; Facts</title>
				<imprint>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b29">
	<monogr>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">L</forename><surname>Lueth</surname></persName>
		</author>
		<ptr target="https://iot-analytics.com/iot-2019-in-review/" />
		<title level="m">IoT 2019 in Review: The 10 Most Relevant IoT Developments of the Year</title>
				<imprint>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b30">
	<analytic>
		<title level="a" type="main">Improving Web Application Firewalls to detect advanced SQL injection attacks</title>
		<author>
			<persName><forename type="first">A</forename><surname>Makiou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Begriche</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Serhrouchni</surname></persName>
		</author>
		<idno type="DOI">10.1109/ISIAS.2014.7064617</idno>
		<ptr target="https://doi.org/10.1109/ISIAS.2014.7064617" />
	</analytic>
	<monogr>
		<title level="m">10th Int. Conf. on Inf. Assurance and Security</title>
				<imprint>
			<date type="published" when="2014-11">2014. 2014. 11 2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b31">
	<monogr>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">S</forename><surname>Mekala</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename></persName>
		</author>
		<idno type="DOI">10.1109/ICMDCS.2017.8211551</idno>
		<idno>1-7</idno>
		<ptr target="https://doi.org/10.1109/ICMDCS.2017.8211551" />
		<title level="m">A Survey: Smart agriculture IoT with cloud computing</title>
				<imprint>
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b32">
	<monogr>
		<author>
			<persName><forename type="first">S</forename><surname>Romanosky</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Mell</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Scarfone</surname></persName>
		</author>
		<title level="m">CVSS: a complete guide to the common vulnerability scoring system version 2</title>
				<imprint>
			<date type="published" when="2007">2007</date>
			<biblScope unit="page">0</biblScope>
		</imprint>
	</monogr>
	<note type="report_type">Technical Report</note>
	<note>FIRST: forum of incident response and security teams</note>
</biblStruct>

<biblStruct xml:id="b33">
	<analytic>
		<title level="a" type="main">Everything You Wanted to Know About Smart Cities</title>
		<author>
			<persName><forename type="first">S</forename><surname>Mohanty</surname></persName>
		</author>
		<idno type="DOI">10.1109/MCE.2016.2556879</idno>
		<ptr target="https://doi.org/10.1109/MCE.2016.2556879" />
	</analytic>
	<monogr>
		<title level="j">IEEE Cons. Electronics Mag</title>
		<imprint>
			<biblScope unit="volume">5</biblScope>
			<biblScope unit="page" from="60" to="70" />
			<date type="published" when="2016">2016. 2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b34">
	<analytic>
		<title level="a" type="main">Intrusion detection using neural networks and support vector machines</title>
		<author>
			<persName><forename type="first">S</forename><surname>Mukkamala</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Janoski</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Sung</surname></persName>
		</author>
		<idno type="DOI">10.1109/IJCNN.2002.1007774</idno>
		<ptr target="https://doi.org/10.1109/IJCNN.2002.1007774" />
	</analytic>
	<monogr>
		<title level="m">Proc. of the Int. Joint Conf. on Neural Networks</title>
				<meeting>of the Int. Joint Conf. on Neural Networks</meeting>
		<imprint>
			<date type="published" when="2002">2002</date>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="page" from="1702" to="1707" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b35">
	<analytic>
		<title level="a" type="main">Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities and a First Empirical Look on Internet-Scale IoT Exploitations</title>
		<author>
			<persName><forename type="first">N</forename><surname>Neshenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Bou-Harb</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Crichigno</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Kaddoum</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Ghani</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Communications Surveys Tutorials</title>
		<imprint>
			<biblScope unit="volume">21</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="2702" to="2733" />
			<date type="published" when="2019">2019. 2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b36">
	<analytic>
		<title level="a" type="main">A survey of IoT malware and detection methods based on static features</title>
		<author>
			<persName><forename type="first">Q.-D</forename><surname>Ngo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H.-T</forename><surname>Nguyen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V.-H</forename><surname>Le</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D.-H</forename><surname>Nguyen</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.icte.2020.04.005</idno>
		<ptr target="https://doi.org/10.1016/j.icte.2020.04.005" />
	</analytic>
	<monogr>
		<title level="j">ICT Express</title>
		<imprint>
			<date type="published" when="2020">2020. 2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b37">
	<monogr>
		<title level="m" type="main">Data volume of IoT connected devices worldwide</title>
		<author>
			<persName><forename type="first">S</forename><surname>O'dea</surname></persName>
		</author>
		<ptr target="https://www.statista.com/statistics/1017863/worldwide-iot-connected-devices-data-size/" />
		<imprint>
			<date type="published" when="2018">2020. 2018. 2025</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b38">
	<monogr>
		<title level="m" type="main">QRadar UBA App Adds Machine Learning and Peer Group Analyses to Detect Anomalies in Users&apos; Activities</title>
		<author>
			<persName><forename type="first">M</forename><surname>Patel</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
	<note type="report_type">SecurityIntelligence</note>
</biblStruct>

<biblStruct xml:id="b39">
	<analytic>
		<title level="a" type="main">Performance Evaluation of Cryptographic Algorithms over IoT Platforms and Operating Systems</title>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">C C F</forename><surname>Pereira</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">C A</forename><surname>Alves</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">L</forename><surname>Da Silva</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">M</forename><surname>Azevedo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">C</forename><surname>Albertini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">B</forename><surname>Margi</surname></persName>
		</author>
		<idno type="DOI">10.1155/2017/2046735</idno>
		<ptr target="https://doi.org/10.1155/2017/2046735" />
	</analytic>
	<monogr>
		<title level="j">Security and Communication Networks</title>
		<imprint>
			<biblScope unit="page" from="1" to="16" />
			<date type="published" when="2017">2017. 2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b40">
	<monogr>
		<title level="m" type="main">A Survey on Smart Wearables in the Application of Fitness</title>
		<author>
			<persName><forename type="first">H</forename><surname>Qiu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Xie</surname></persName>
		</author>
		<idno type="DOI">10.1109/DASC-PICom-DataCom-CyberSciTec.2017.64</idno>
		<ptr target="https://doi.org/10.1109/DASC-PICom-DataCom-CyberSciTec.2017.64" />
		<imprint>
			<date type="published" when="2017">2017</date>
			<biblScope unit="page" from="303" to="307" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b41">
	<analytic>
		<title/>
		<author>
			<persName><forename type="first">S</forename><surname>Ragupathy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Thirugnanam</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Review on Communication Security Issues in IoT Medical Devices</title>
		<imprint>
			<biblScope unit="page">189</biblScope>
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b42">
	<analytic>
		<title level="a" type="main">Phishing Detection in E-mails using Machine Learning</title>
		<author>
			<persName><forename type="first">S</forename><surname>Rawal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Rawal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Shaheen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Malik</surname></persName>
		</author>
		<idno type="DOI">10.5120/ijais2017451713</idno>
		<ptr target="https://doi.org/10.5120/ijais2017451713" />
	</analytic>
	<monogr>
		<title level="j">Int. Journal of Applied Information Systems</title>
		<imprint>
			<biblScope unit="volume">12</biblScope>
			<biblScope unit="issue">10</biblScope>
			<biblScope unit="page" from="21" to="24" />
			<date type="published" when="2017">2017. 2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b43">
	<monogr>
		<author>
			<persName><forename type="first">E</forename><surname>Rescorla</surname></persName>
		</author>
		<idno>RFC 5246</idno>
		<ptr target="https://www.rfc-editor.org/rfc/rfc5246.txt" />
		<title level="m">The Transport Layer Security (TLS) Protocol Version 1.2</title>
				<imprint>
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
	<note>RFC Editor</note>
</biblStruct>

<biblStruct xml:id="b44">
	<monogr>
		<author>
			<persName><forename type="first">E</forename><surname>Rescorla</surname></persName>
		</author>
		<idno>RFC 8446</idno>
		<ptr target="https://www.rfc-editor.org/rfc/rfc8446.txt" />
		<title level="m">The Transport Layer Security (TLS) Protocol Version 1.3</title>
				<imprint>
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
	<note>RFC Editor</note>
</biblStruct>

<biblStruct xml:id="b45">
	<analytic>
		<title level="a" type="main">Identifying the attack surface for IoT network</title>
		<author>
			<persName><forename type="first">S</forename><surname>Rizvi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Orr</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Cox</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">R</forename><surname>Ashokkumar</surname></persName>
		</author>
		<author>
			<persName><surname>Rizvi</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.iot.2020.100162</idno>
		<ptr target="https://doi.org/10.1016/j.iot.2020.100162" />
	</analytic>
	<monogr>
		<title level="j">Internet of Things</title>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="page">100162</biblScope>
			<date type="published" when="2020">2020. 2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b46">
	<monogr>
		<title level="m" type="main">Scalable and Configurable End-to-End Collection and Analysis of IoT Security Data : Towards End-to-End Security in IoT Systems</title>
		<author>
			<persName><forename type="first">A</forename><surname>Roukounaki</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Efremidis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Soldatos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Neises</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Walloschke</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Kefalakis</surname></persName>
		</author>
		<idno type="DOI">10.1109/GIOTS.2019.8766407</idno>
		<idno>1-6</idno>
		<ptr target="https://doi.org/10.1109/GIOTS.2019.8766407" />
		<imprint>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b47">
	<monogr>
		<author>
			<persName><forename type="first">R</forename><surname>Rishi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Saluja</surname></persName>
		</author>
		<ptr target="http://ficci.in/spdocument/23092/Future-of-IoT.pdf" />
		<title level="m">Future of IoT</title>
				<imprint>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b48">
	<analytic>
		<title level="a" type="main">Agriculture IoT: Emerging Trends, Cooperation Networks, and Outlook</title>
		<author>
			<persName><forename type="first">J</forename><surname>Ruan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Jiang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Zhu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Hu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Shi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Rao</surname></persName>
		</author>
		<author>
			<persName><surname>Chan</surname></persName>
		</author>
		<idno type="DOI">10.1109/MWC.001.1900096</idno>
		<ptr target="https://doi.org/10.1109/MWC.001.1900096" />
	</analytic>
	<monogr>
		<title level="j">IEEE Wireless Communications</title>
		<imprint>
			<biblScope unit="volume">26</biblScope>
			<biblScope unit="issue">12</biblScope>
			<biblScope unit="page" from="56" to="63" />
			<date type="published" when="2019">2019. 2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b49">
	<analytic>
		<title level="a" type="main">Malicious URL Detection using Machine Learning</title>
		<author>
			<persName><forename type="first">D</forename><surname>Sahoo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Hoi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">A Survey</title>
		<imprint>
			<date type="published" when="2017-01">2017. 01. 2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b50">
	<analytic>
		<title level="a" type="main">Security and Safety</title>
		<author>
			<persName><forename type="first">D</forename><surname>Serpanos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Wolf</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-319-69715-4_6</idno>
		<ptr target="https://doi.org/10.1007/978-3-319-69715-4_6" />
	</analytic>
	<monogr>
		<title level="m">Internet-of-Things (IoT) Systems. Springer Int. Pub</title>
				<imprint>
			<date type="published" when="2017">2017</date>
			<biblScope unit="page" from="55" to="76" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b51">
	<analytic>
		<title level="a" type="main">Malicious URL Classification Using Machine Learning Algorithms and Comparative Analysis</title>
		<author>
			<persName><forename type="first">A</forename><surname>Sharma</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of the 3rd Int. Conf. on Computational Intelligence and Informatics</title>
				<editor>
			<persName><forename type="first">K</forename><forename type="middle">S</forename><surname>Raju</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">A</forename><surname>Govardhan</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">B</forename><forename type="middle">P</forename><surname>Rani</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">R</forename><surname>Sridevi</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><forename type="middle">R</forename><surname>Murty</surname></persName>
		</editor>
		<meeting>of the 3rd Int. Conf. on Computational Intelligence and Informatics<address><addrLine>Singapore, Singapore</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2020">2020</date>
			<biblScope unit="page" from="791" to="799" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b52">
	<analytic>
		<title level="a" type="main">A State-of-Art Review of Docker Container Security Issues and Solutions</title>
		<author>
			<persName><forename type="first">J</forename><surname>Shetty</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">American International Journal of Research in Science, Technology, Engineering &amp; Mathematics</title>
		<imprint>
			<date type="published" when="2017-01">2017. 01 2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b53">
	<monogr>
		<author>
			<persName><forename type="first">A</forename><surname>Ukil</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Sen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Koilakonda</surname></persName>
		</author>
		<idno type="DOI">10.1109/NCETACS.2011.5751382</idno>
		<idno>1 -6</idno>
		<ptr target="https://doi.org/10.1109/NCETACS.2011.5751382" />
		<title level="m">Embedded Security for Internet of Things</title>
				<imprint>
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b54">
	<analytic>
		<title level="a" type="main">Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks</title>
		<author>
			<persName><forename type="first">E</forename><surname>Vasserman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Hopper</surname></persName>
		</author>
		<idno type="DOI">10.1109/TMC.2011.274</idno>
		<ptr target="https://doi.org/10.1109/TMC.2011.274" />
	</analytic>
	<monogr>
		<title level="j">Mobile Computing</title>
		<imprint>
			<biblScope unit="volume">12</biblScope>
			<biblScope unit="issue">02</biblScope>
			<biblScope unit="page" from="318" to="332" />
			<date type="published" when="2013">2013. 2013</date>
		</imprint>
	</monogr>
	<note>IEEE Trans. on</note>
</biblStruct>

<biblStruct xml:id="b55">
	<monogr>
		<title level="m" type="main">IoT Security Techniques Based on Machine Learning</title>
		<author>
			<persName><forename type="first">L</forename><surname>Xiao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Wan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Lu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Wu</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2018-01">2018. 01. 2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b56">
	<analytic>
		<title level="a" type="main">A Survey on Industrial Internet of Things: A Cyber-Physical Systems Perspective</title>
		<author>
			<persName><forename type="first">H</forename><surname>Xu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Yu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Griffith</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Golmie</surname></persName>
		</author>
		<idno type="DOI">10.1109/ACCESS.2018.2884906</idno>
		<ptr target="https://doi.org/10.1109/ACCESS.2018.2884906" />
	</analytic>
	<monogr>
		<title level="j">IEEE Access</title>
		<imprint>
			<biblScope unit="volume">6</biblScope>
			<biblScope unit="page" from="78238" to="78259" />
			<date type="published" when="2018">2018. 2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b57">
	<analytic>
		<title level="a" type="main">Internet of Things in Industries: A Survey</title>
		<author>
			<persName><forename type="first">L</forename><surname>Xu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>He</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Li</surname></persName>
		</author>
		<idno type="DOI">10.1109/TII.2014.2300753</idno>
		<ptr target="https://doi.org/10.1109/TII.2014.2300753" />
	</analytic>
	<monogr>
		<title level="j">IEEE Trans. on Industrial Informatics</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="issue">11</biblScope>
			<biblScope unit="page" from="2233" to="2243" />
			<date type="published" when="2014">2014. 2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b58">
	<analytic>
		<title level="a" type="main">Security and Accuracy of Fingerprint-Based Biometrics: A Review</title>
		<author>
			<persName><forename type="first">W</forename><surname>Yang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Hu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Guanglou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Valli</surname></persName>
		</author>
		<idno type="DOI">10.3390/sym11020141</idno>
		<ptr target="https://doi.org/10.3390/sym11020141" />
	</analytic>
	<monogr>
		<title level="j">Symmetry</title>
		<imprint>
			<biblScope unit="volume">11</biblScope>
			<biblScope unit="issue">01</biblScope>
			<biblScope unit="page">141</biblScope>
			<date type="published" when="2019">2019. 2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b59">
	<monogr>
		<title level="m" type="main">A Review on Cyber Security Datasets for Machine Learning Algorithms</title>
		<author>
			<persName><forename type="first">O</forename><surname>Yavanoglu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Aydos</surname></persName>
		</author>
		<idno type="DOI">10.1109/BigData.2017.8258167</idno>
		<ptr target="https://doi.org/10.1109/BigData.2017.8258167" />
		<imprint>
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b60">
	<monogr>
		<title level="m" type="main">Machine learning techniques for intrusion detection</title>
		<author>
			<persName><forename type="first">M</forename><surname>Zamani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Movahedi</surname></persName>
		</author>
		<idno type="arXiv">arXiv:1312.2177</idno>
		<imprint>
			<date type="published" when="2013">2013. 2013</date>
		</imprint>
	</monogr>
	<note type="report_type">arXiv preprint</note>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
