Towards a Safer Internet of Things—A Survey of IoT Vulnerability Data Sources

The security of the Internet of Things (IoT) is an important yet often overlooked subject. Specifically, the publicly available information sources about vulnerabilities affecting the connected devices are unsatisfactory. Our research shows that, while the information is available on the Internet, t...

Full description

Saved in:
Bibliographic Details
Published inSensors (Basel, Switzerland) Vol. 20; no. 21; p. 5969
Main Authors Rytel, Marcin, Felkner, Anna, Janiszewski, Marek
Format Journal Article
LanguageEnglish
Published Basel MDPI AG 22.10.2020
MDPI
Subjects
Online AccessGet full text

Cover

Loading…
Abstract The security of the Internet of Things (IoT) is an important yet often overlooked subject. Specifically, the publicly available information sources about vulnerabilities affecting the connected devices are unsatisfactory. Our research shows that, while the information is available on the Internet, there is no single service offering data focused on the IoT in existence. The national vulnerability databases contain some IoT related entries, but they lack mechanisms to distinguish them from the remaining vulnerabilities. Moreover, information about many vulnerabilities affecting the IoT world never reaches these databases but can still be found scattered over the Internet. This review summarizes our effort at identifying and evaluating publicly available sources of information about vulnerabilities, focusing on their usefulness in the scope of IoT. The results of our search show that there is not yet a single satisfactory source covering vulnerabilities affecting IoT devices and software available.
AbstractList The security of the Internet of Things (IoT) is an important yet often overlooked subject. Specifically, the publicly available information sources about vulnerabilities affecting the connected devices are unsatisfactory. Our research shows that, while the information is available on the Internet, there is no single service offering data focused on the IoT in existence. The national vulnerability databases contain some IoT related entries, but they lack mechanisms to distinguish them from the remaining vulnerabilities. Moreover, information about many vulnerabilities affecting the IoT world never reaches these databases but can still be found scattered over the Internet. This review summarizes our effort at identifying and evaluating publicly available sources of information about vulnerabilities, focusing on their usefulness in the scope of IoT. The results of our search show that there is not yet a single satisfactory source covering vulnerabilities affecting IoT devices and software available.
The security of the Internet of Things (IoT) is an important yet often overlooked subject. Specifically, the publicly available information sources about vulnerabilities affecting the connected devices are unsatisfactory. Our research shows that, while the information is available on the Internet, there is no single service offering data focused on the IoT in existence. The national vulnerability databases contain some IoT related entries, but they lack mechanisms to distinguish them from the remaining vulnerabilities. Moreover, information about many vulnerabilities affecting the IoT world never reaches these databases but can still be found scattered over the Internet. This review summarizes our effort at identifying and evaluating publicly available sources of information about vulnerabilities, focusing on their usefulness in the scope of IoT. The results of our search show that there is not yet a single satisfactory source covering vulnerabilities affecting IoT devices and software available.The security of the Internet of Things (IoT) is an important yet often overlooked subject. Specifically, the publicly available information sources about vulnerabilities affecting the connected devices are unsatisfactory. Our research shows that, while the information is available on the Internet, there is no single service offering data focused on the IoT in existence. The national vulnerability databases contain some IoT related entries, but they lack mechanisms to distinguish them from the remaining vulnerabilities. Moreover, information about many vulnerabilities affecting the IoT world never reaches these databases but can still be found scattered over the Internet. This review summarizes our effort at identifying and evaluating publicly available sources of information about vulnerabilities, focusing on their usefulness in the scope of IoT. The results of our search show that there is not yet a single satisfactory source covering vulnerabilities affecting IoT devices and software available.
Author Felkner, Anna
Janiszewski, Marek
Rytel, Marcin
AuthorAffiliation Research and Academic Computer Network (NASK), Kolska 12, 01-045 Warsaw, Poland; afelkner@nask.pl (A.F.); marekj@nask.pl (M.J.)
AuthorAffiliation_xml – name: Research and Academic Computer Network (NASK), Kolska 12, 01-045 Warsaw, Poland; afelkner@nask.pl (A.F.); marekj@nask.pl (M.J.)
Author_xml – sequence: 1
  givenname: Marcin
  orcidid: 0000-0002-8590-8565
  surname: Rytel
  fullname: Rytel, Marcin
– sequence: 2
  givenname: Anna
  orcidid: 0000-0003-3813-4840
  surname: Felkner
  fullname: Felkner, Anna
– sequence: 3
  givenname: Marek
  orcidid: 0000-0001-8965-6302
  surname: Janiszewski
  fullname: Janiszewski, Marek
BookMark eNplkU1uFDEQhS0URJKBBTdoiQ0shvh_ujdIUfgbKVIWGdhaZXd54lGPHWx3ouw4BCfkJPQwAZGwqlLVe5-tesfkIKaIhLxk9K0QHT0pnHKmOt09IUdMcjlvOacH__SH5LiUDaVcCNE-I4dCMKqUlkfkYpVuIfelgeYSPOZmGSvmiLVJvlldhbguP7__OG0ux3yDd7vhMq2ar-MQMYMNQ6h3zXuokzuN2WF5Tp56GAq-uK8z8uXjh9XZ5_n5xafl2en53Emp69wvNHALynWMqQV1Gpm2zHPfaqAASEFZydFb5lTXS2-Fblnf96LVVjB0YkaWe26fYGOuc9hCvjMJgvk9SHltINfgBjTaOqaclgCCScc6UFSC7ZhG7l3L6MR6t2ddj3aLvcNYMwwPoA83MVyZdboxC606uZAT4PU9IKdvI5ZqtqE4HAaImMZiuFRSK86VmqSvHkk30-HidCozralUjE8hzcjJXuVyKiWjNy5UqCHt3g-DYdTsgjd_g58cbx45_nz_f-0vE_auIQ
CitedBy_id crossref_primary_10_3390_s21134359
crossref_primary_10_35467_cal_169306
crossref_primary_10_3390_app11125571
crossref_primary_10_32604_cmc_2024_056476
crossref_primary_10_1016_j_cose_2024_104143
crossref_primary_10_15407_emodel_44_04_079
crossref_primary_10_1109_JIOT_2023_3292319
crossref_primary_10_3390_s21041309
crossref_primary_10_3390_s21010001
crossref_primary_10_3390_electronics12051176
crossref_primary_10_3390_app142210513
crossref_primary_10_3390_electronics10192377
crossref_primary_10_1109_ACCESS_2021_3130714
Cites_doi 10.1109/ISI.2017.8004904
10.1109/MC.2017.4451203
10.1109/ICDCS.2017.283
10.3390/fi12020027
10.1109/GLOCOM.2017.8254011
10.1109/SERVICES.2019.00028
10.3390/s18092796
10.1109/TrustCom/BigDataSE.2018.00034
10.1109/NGMAST.2015.71
10.1109/COMST.2019.2910750
10.1109/IT-DREPS.2017.8277814
ContentType Journal Article
Copyright 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
2020 by the authors. 2020
Copyright_xml – notice: 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
– notice: 2020 by the authors. 2020
DBID AAYXX
CITATION
3V.
7X7
7XB
88E
8FI
8FJ
8FK
ABUWG
AFKRA
AZQEC
BENPR
CCPQU
DWQXO
FYUFA
GHDGH
K9.
M0S
M1P
PHGZM
PHGZT
PIMPY
PJZUB
PKEHL
PPXIY
PQEST
PQQKQ
PQUKI
PRINS
7X8
5PM
DOA
DOI 10.3390/s20215969
DatabaseName CrossRef
ProQuest Central (Corporate)
Health & Medical Collection
ProQuest Central (purchase pre-March 2016)
Medical Database (Alumni Edition)
Hospital Premium Collection
Hospital Premium Collection (Alumni Edition)
ProQuest Central (Alumni) (purchase pre-March 2016)
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
ProQuest Central Essentials - QC
ProQuest Central
ProQuest One Community College
ProQuest Central
Health Research Premium Collection
Health Research Premium Collection (Alumni)
ProQuest Health & Medical Complete (Alumni)
Health & Medical Collection (Alumni)
Medical Database
ProQuest Central Premium
ProQuest One Academic (New)
Publicly Available Content Database
ProQuest Health & Medical Research Collection
ProQuest One Academic Middle East (New)
ProQuest One Health & Nursing
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central China
MEDLINE - Academic
PubMed Central (Full Participant titles)
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
Publicly Available Content Database
ProQuest One Academic Middle East (New)
ProQuest Central Essentials
ProQuest Health & Medical Complete (Alumni)
ProQuest Central (Alumni Edition)
ProQuest One Community College
ProQuest One Health & Nursing
ProQuest Central China
ProQuest Central
ProQuest Health & Medical Research Collection
Health Research Premium Collection
Health and Medicine Complete (Alumni Edition)
ProQuest Central Korea
Health & Medical Research Collection
ProQuest Central (New)
ProQuest Medical Library (Alumni)
ProQuest One Academic Eastern Edition
ProQuest Hospital Collection
Health Research Premium Collection (Alumni)
ProQuest Hospital Collection (Alumni)
ProQuest Health & Medical Complete
ProQuest Medical Library
ProQuest One Academic UKI Edition
ProQuest One Academic
ProQuest One Academic (New)
ProQuest Central (Alumni)
MEDLINE - Academic
DatabaseTitleList

Publicly Available Content Database
MEDLINE - Academic
CrossRef
Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: BENPR
  name: ProQuest Central
  url: https://www.proquest.com/central
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1424-8220
ExternalDocumentID oai_doaj_org_article_6bc15c64aa314c19a504ab916e2fc810
PMC7659474
10_3390_s20215969
GroupedDBID ---
123
2WC
53G
5VS
7X7
88E
8FE
8FG
8FI
8FJ
AADQD
AAHBH
AAYXX
ABDBF
ABUWG
ACUHS
ADBBV
ADMLS
AENEX
AFKRA
AFZYC
ALIPV
ALMA_UNASSIGNED_HOLDINGS
BENPR
BPHCQ
BVXVI
CCPQU
CITATION
CS3
D1I
DU5
E3Z
EBD
ESX
F5P
FYUFA
GROUPED_DOAJ
GX1
HH5
HMCUK
HYE
KQ8
L6V
M1P
M48
MODMG
M~E
OK1
OVT
P2P
P62
PHGZM
PHGZT
PIMPY
PQQKQ
PROAC
PSQYO
RNS
RPM
TUS
UKHRP
XSB
~8M
3V.
7XB
8FK
AZQEC
DWQXO
K9.
PJZUB
PKEHL
PPXIY
PQEST
PQUKI
PRINS
7X8
5PM
PUEGO
ID FETCH-LOGICAL-c446t-f76a2ba5c911570c6e16b1f2f86a0aae0a5b42efb1c59d4fb3681ddd386b31ec3
IEDL.DBID M48
ISSN 1424-8220
IngestDate Wed Aug 27 01:31:24 EDT 2025
Thu Aug 21 13:53:48 EDT 2025
Fri Jul 11 08:03:22 EDT 2025
Fri Jul 25 20:18:50 EDT 2025
Tue Jul 01 03:55:53 EDT 2025
Thu Apr 24 23:11:31 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 21
Language English
License https://creativecommons.org/licenses/by/4.0
Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c446t-f76a2ba5c911570c6e16b1f2f86a0aae0a5b42efb1c59d4fb3681ddd386b31ec3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
content type line 23
ORCID 0000-0002-8590-8565
0000-0003-3813-4840
0000-0001-8965-6302
OpenAccessLink http://journals.scholarsportal.info/openUrl.xqy?doi=10.3390/s20215969
PMID 33105564
PQID 2550451223
PQPubID 2032333
ParticipantIDs doaj_primary_oai_doaj_org_article_6bc15c64aa314c19a504ab916e2fc810
pubmedcentral_primary_oai_pubmedcentral_nih_gov_7659474
proquest_miscellaneous_2454652255
proquest_journals_2550451223
crossref_citationtrail_10_3390_s20215969
crossref_primary_10_3390_s20215969
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 20201022
PublicationDateYYYYMMDD 2020-10-22
PublicationDate_xml – month: 10
  year: 2020
  text: 20201022
  day: 22
PublicationDecade 2020
PublicationPlace Basel
PublicationPlace_xml – name: Basel
PublicationTitle Sensors (Basel, Switzerland)
PublicationYear 2020
Publisher MDPI AG
MDPI
Publisher_xml – name: MDPI AG
– name: MDPI
References ref_50
ref_14
ref_58
ref_13
ref_57
ref_12
ref_56
ref_11
ref_55
ref_54
ref_53
ref_52
ref_51
ref_19
ref_18
ref_17
ref_16
ref_15
ref_59
ref_61
ref_60
Neshenko (ref_1) 2019; 21
ref_25
ref_69
ref_24
ref_68
ref_23
ref_67
ref_22
ref_66
ref_21
ref_65
ref_20
ref_64
ref_63
ref_62
ref_29
ref_28
ref_27
ref_26
ref_72
ref_71
ref_70
ref_36
ref_35
ref_34
ref_33
ref_32
ref_31
ref_30
ref_73
ref_39
ref_38
ref_37
Kshetri (ref_10) 2017; 50
ref_47
ref_46
ref_45
ref_44
ref_43
ref_42
ref_41
ref_40
ref_3
ref_2
ref_49
ref_48
ref_9
ref_8
ref_5
ref_4
ref_7
ref_6
References_xml – ident: ref_9
– ident: ref_49
– ident: ref_5
– ident: ref_32
– ident: ref_55
– ident: ref_26
– ident: ref_51
– ident: ref_68
– ident: ref_65
– ident: ref_39
– ident: ref_42
– ident: ref_61
– ident: ref_35
– ident: ref_23
– ident: ref_71
– ident: ref_58
– ident: ref_8
– ident: ref_16
  doi: 10.1109/ISI.2017.8004904
– ident: ref_4
– ident: ref_31
– ident: ref_56
– volume: 50
  start-page: 91
  year: 2017
  ident: ref_10
  article-title: Hacking Power Grids: A Current Problem
  publication-title: Computer
  doi: 10.1109/MC.2017.4451203
– ident: ref_27
– ident: ref_52
– ident: ref_17
  doi: 10.1109/ICDCS.2017.283
– ident: ref_48
– ident: ref_69
– ident: ref_41
– ident: ref_66
– ident: ref_18
  doi: 10.3390/fi12020027
– ident: ref_62
– ident: ref_38
– ident: ref_45
– ident: ref_72
– ident: ref_20
– ident: ref_59
– ident: ref_14
  doi: 10.1109/GLOCOM.2017.8254011
– ident: ref_7
– ident: ref_28
– ident: ref_53
– ident: ref_12
  doi: 10.1109/SERVICES.2019.00028
– ident: ref_30
– ident: ref_3
  doi: 10.3390/s18092796
– ident: ref_24
– ident: ref_34
– ident: ref_47
– ident: ref_11
– ident: ref_40
– ident: ref_67
– ident: ref_37
– ident: ref_63
– ident: ref_44
– ident: ref_13
  doi: 10.1109/TrustCom/BigDataSE.2018.00034
– ident: ref_21
– ident: ref_73
– ident: ref_6
– ident: ref_25
– ident: ref_50
– ident: ref_29
– ident: ref_33
– ident: ref_54
– ident: ref_46
– ident: ref_2
  doi: 10.1109/NGMAST.2015.71
– ident: ref_64
– ident: ref_36
– ident: ref_70
– ident: ref_19
– ident: ref_43
– ident: ref_60
– volume: 21
  start-page: 2702
  year: 2019
  ident: ref_1
  article-title: Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities and a First Empirical Look on Internet-Scale IoT Exploitations
  publication-title: IEEE Commun. Surv. Tutor.
  doi: 10.1109/COMST.2019.2910750
– ident: ref_22
– ident: ref_57
– ident: ref_15
  doi: 10.1109/IT-DREPS.2017.8277814
SSID ssj0023338
Score 2.406856
Snippet The security of the Internet of Things (IoT) is an important yet often overlooked subject. Specifically, the publicly available information sources about...
SourceID doaj
pubmedcentral
proquest
crossref
SourceType Open Website
Open Access Repository
Aggregation Database
Enrichment Source
Index Database
StartPage 5969
SubjectTerms computer security
data security
Internet of Things
network security
OEM
Personal computers
Smartphones
Software
Taxonomy
SummonAdditionalLinks – databaseName: DOAJ Directory of Open Access Journals
  dbid: DOA
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1NT9wwELUQJzhULVA1LSCDOHCJSBzbSY58CjjAgQVxi8YTW62Esmg3W4lbfwS_kF_C2MmuNhJSL1ztieTMxJn3nMkbxg5qzKUuICgfm9hLusUgShWjk5kwtUZlQrXFjb68l9eP6nGp1ZevCevkgTvHHWmDqUItAbJUYlqCSiQYAjVWOCy6n6so583JVE-1MmJenY5QRqT-aCp8ait9VfNS9gki_QNkOayLXEo0F1_Zlx4h8uNuZd_Yim022PqSbuAmux2FYtcpB34Hzk54d65nWz52vOvE-fbv9ZjfzSZ_7YsfvBqP-MPsyUtMh2rYF34GLV0dju6nW-z-4nx0ehn3nRFiJPrWxi7XIAwoLL1WToLaptqkTrhCQwJgE1BGCutMiqqspTOZJlxa11mhTZZazL6z1Wbc2B-MW4VIKcmkdYmyAAEFgTynCrTCJIWRETuce6zCXjbcd694qog-eOdWC-dGbH9h-txpZXxkdOLdvjDw8tZhgIJe9UGv_hf0iG3Pg1b1e25aETnyYjmEdyK2t5im3eI_gUBjxzOykb75O73DVMTyQbAHCxrONH9-B93tXKtS5vLnZ9zBL7YmPHOnLCjENlttJzO7Q_CmNbvhSX4HvRv66w
  priority: 102
  providerName: Directory of Open Access Journals
– databaseName: ProQuest Technology Collection
  dbid: 8FG
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV3LbtUwELWgbGCBKA8RWiqDWLCJGju246xQeVwKC1j0FnUX2Y4Nlaqkvcmt1B0fwRfyJcw4ueFGQmzjiRKNH2dmfHSGkFe1K4TSJiof2xQl3VLDS5m6IHJua-WkjWyLL-r4VHw-k2djwa0baZWbMzEe1HXrsEZ-CKEvSqEAmr25vEqxaxTero4tNG6TOwyQBildevFxSrhyyL8GNaEcUvvDjiPAlcht3sKgKNU_iy_n7MgtuFk8IPfHOJEeDRO7S2755iG5t6Ue-Ih8XUbKa0cNPTHBr-hQ3fM9bQMd-nH-_vnriJ6sV9f-Bh9-apf02_oChaYjJ_aGvjc9vB0L-N1jcrr4sHx3nI79EVIHSVyfhkIZbo10JSrmZE55piwLPGhlMmN8ZqQV3AfLnCxrEWyuIDqt61wrmzPv8idkp2kb_5RQL50DYLKsLp3QhhsNzg5SO89tpq1IyOuNxyo3iodjD4uLCpIIdG41OTchLyfTy0Ex419Gb9HtkwGKXMcH7ep7Ne6ZSlnHpFPCmJwJx0oDK8BYiGc9D06zLCH7m0mrxp3XVX_XSUJeTMOwZ_AixDS-XYONwBbwcJLJhBSzyZ790HykOf8R1bcLJUtRiGf___geucsxMweU43yf7PSrtX8O4UtvD-Ia_QO57vJn
  priority: 102
  providerName: ProQuest
Title Towards a Safer Internet of Things—A Survey of IoT Vulnerability Data Sources
URI https://www.proquest.com/docview/2550451223
https://www.proquest.com/docview/2454652255
https://pubmed.ncbi.nlm.nih.gov/PMC7659474
https://doaj.org/article/6bc15c64aa314c19a504ab916e2fc810
Volume 20
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9QwEB71IaFyQDzVQFkZxIFLIHFsJzkg1EKXgkRBdBftLbIdG5BWCWSziL3xI_iF_BLGTjZqpJ645GCPpWj8mPns0fcBPCl1ykQmPfOxCh2lWyhpzkNtWUJVKTRXvtriXJzN2bsFX-zAVmOzd-DqSmjn9KTmzfLZrx-bl7jhXzjEiZD9-Yq6wJWLfBf2MSClTsjgPRseE2iCMKwjFRqbH8C1JPECkWwUlTx5_yjjHNdLXgpA05two88cyXE31bdgx1S34folPsE78GHmi2BXRJILaU1Duvs-05Lakk6h8-_vP8fkYt38NBvX-Laekc_rpaOe9lWyG_JatjjaX-mv7sJ8ejp7dRb2igmhRljXhjYVkirJde44dCItTCxUbKnNhIykNJHkilFjVax5XjKrEoH5alkmmVBJbHRyD_aqujKHQAzXGkOVistcs0xSmWHyZ3mmDVVRplgAT7ceK3RPJ-5ULZYFwgrn52LwcwCPB9PvHYfGVUYnzu2DgaO99g1186Xod1EhlI65FkzKJGY6ziWPmFSY4RpqdRZHARxtJ63YLqUCQZMj0cE8KIBHQzfuIvc0IitTr9GGOVF4PNt4AOloskc_NO6pvn31fNyp4DlL2f3_HvkADqiD8RgSKT2CvbZZm4eY67RqArvpIsVvNn0zgf2T0_OPnyb-3mDi1_g_FKsFsg
linkProvider Scholars Portal
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwEB6VcgAOiKcIFDAIJC5RE8d2kgNChbLs0lIO3aLegu3YtFKVlE0WtDd-BL-DH8UvYZwXGwlx69WePDQPz4w9_gbgWa5jJhLZIB8r30G6-ZKm3NeWRVTlQnPVVFsciOkRe3_MjzfgV38XxpVV9mtis1DnpXZ75NsY-jooFPRmr86_-q5rlDtd7VtotGqxZ1bfMWWrXs52Ub7PKZ28nb-Z-l1XAV9j6lP7NhaSKsl16nBmAi1MKFRoqU2EDKQ0geSKUWNVqHmaM6sigTFdnkeJUFFodITvvQSXWYSe3N1Mn7wbErwI870WvQgng-2KOoeaulrqNZ_XtAYYxbPjasw19za5Ade7uJTstIp0EzZMcQuuraEV3oaP86bEtiKSHEprFqTdTTQ1KS1p-3_-_vFzhxwuF9_Myg3Oyjn5tDxzwNZNDe6K7Moan24ODKo7cHQhnLsLm0VZmHtADNcaHaEK81SzRFKZoHAtT7ShKkgU8-BFz7FMd2DlrmfGWYZJi2NuNjDXg6cD6XmL0PEvoteO7QOBA9VuBsrFl6yz0UwoHXItmJRRyHSYStQ4qTB-NtTqJAw82OqFlnWWXmV_9dKDJ8M02qg7eJGFKZdIw1zLeVw5uQfxSNijHxrPFKcnDdp3LHjKYnb__x9_DFem8w_72f7sYO8BXKVuVwA9LKVbsFkvluYhhk61etToK4HPF20gfwC0eDDY
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwEB6VrYTggHiKQAGDQOISbeLYTnJAqGW76lK0VHSLekttxwakalM2WdDe-BH8Gn4Ov4RxXuxKiFuv9uSheXhm7PE3AM9zHTORyBr5WPkO0s2XNOW-tiyiKheaq7raYioOTtjbU366Bb-6uzCurLJbE-uFOi-02yMfYujroFDQmw1tWxZxNBq_vvjquw5S7qS1a6fRqMihWX3H9K18NRmhrF9QOt6fvTnw2w4DvsY0qPJtLCRVkuvUYc4EWphQqNBSmwgZSGkCyRWjxqpQ8zRnVkUC47s8jxKhotDoCN97BbZjlxUNYHtvf3r0oU_3Isz-GiyjKEqDYUmde01dZfWaB6wbBWxEt5u1mWvObnwTbrRRKtlt1OoWbJn5bbi-hl14B97P6oLbkkhyLK1ZkGZv0VSksKTpBvr7x89dcrxcfDMrNzgpZuTj8tzBXNcVuSsykhU-XR8flHfh5FJ4dw8G82Ju7gMxXGt0iyrMU80SSWWCorY80YaqIFHMg5cdxzLdQpe7DhrnGaYwjrlZz1wPnvWkFw1ex7-I9hzbewIHsV0PFItPWWuxmVA65FowKaOQ6TCVqH9SYTRtqNVJGHiw0wkta-2-zP5qqQdP-2m0WHcMI-emWCINcw3ocR3lHsQbwt74oc2Z-ZfPNfZ3LHjKYvbg_x9_AlfROLJ3k-nhQ7hG3RYBultKd2BQLZbmEcZRlXrcKiyBs8u2kT-TlzZq
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Towards+a+Safer+Internet+of+Things%E2%80%94A+Survey+of+IoT+Vulnerability+Data+Sources&rft.jtitle=Sensors+%28Basel%2C+Switzerland%29&rft.au=Rytel%2C+Marcin&rft.au=Felkner%2C+Anna&rft.au=Janiszewski%2C+Marek&rft.date=2020-10-22&rft.pub=MDPI&rft.eissn=1424-8220&rft.volume=20&rft.issue=21&rft_id=info:doi/10.3390%2Fs20215969&rft_id=info%3Apmid%2F33105564&rft.externalDocID=PMC7659474
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1424-8220&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1424-8220&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1424-8220&client=summon