Towards a Safer Internet of Things—A Survey of IoT Vulnerability Data Sources
The security of the Internet of Things (IoT) is an important yet often overlooked subject. Specifically, the publicly available information sources about vulnerabilities affecting the connected devices are unsatisfactory. Our research shows that, while the information is available on the Internet, t...
Saved in:
Published in | Sensors (Basel, Switzerland) Vol. 20; no. 21; p. 5969 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
Basel
MDPI AG
22.10.2020
MDPI |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | The security of the Internet of Things (IoT) is an important yet often overlooked subject. Specifically, the publicly available information sources about vulnerabilities affecting the connected devices are unsatisfactory. Our research shows that, while the information is available on the Internet, there is no single service offering data focused on the IoT in existence. The national vulnerability databases contain some IoT related entries, but they lack mechanisms to distinguish them from the remaining vulnerabilities. Moreover, information about many vulnerabilities affecting the IoT world never reaches these databases but can still be found scattered over the Internet. This review summarizes our effort at identifying and evaluating publicly available sources of information about vulnerabilities, focusing on their usefulness in the scope of IoT. The results of our search show that there is not yet a single satisfactory source covering vulnerabilities affecting IoT devices and software available. |
---|---|
AbstractList | The security of the Internet of Things (IoT) is an important yet often overlooked subject. Specifically, the publicly available information sources about vulnerabilities affecting the connected devices are unsatisfactory. Our research shows that, while the information is available on the Internet, there is no single service offering data focused on the IoT in existence. The national vulnerability databases contain some IoT related entries, but they lack mechanisms to distinguish them from the remaining vulnerabilities. Moreover, information about many vulnerabilities affecting the IoT world never reaches these databases but can still be found scattered over the Internet. This review summarizes our effort at identifying and evaluating publicly available sources of information about vulnerabilities, focusing on their usefulness in the scope of IoT. The results of our search show that there is not yet a single satisfactory source covering vulnerabilities affecting IoT devices and software available. The security of the Internet of Things (IoT) is an important yet often overlooked subject. Specifically, the publicly available information sources about vulnerabilities affecting the connected devices are unsatisfactory. Our research shows that, while the information is available on the Internet, there is no single service offering data focused on the IoT in existence. The national vulnerability databases contain some IoT related entries, but they lack mechanisms to distinguish them from the remaining vulnerabilities. Moreover, information about many vulnerabilities affecting the IoT world never reaches these databases but can still be found scattered over the Internet. This review summarizes our effort at identifying and evaluating publicly available sources of information about vulnerabilities, focusing on their usefulness in the scope of IoT. The results of our search show that there is not yet a single satisfactory source covering vulnerabilities affecting IoT devices and software available.The security of the Internet of Things (IoT) is an important yet often overlooked subject. Specifically, the publicly available information sources about vulnerabilities affecting the connected devices are unsatisfactory. Our research shows that, while the information is available on the Internet, there is no single service offering data focused on the IoT in existence. The national vulnerability databases contain some IoT related entries, but they lack mechanisms to distinguish them from the remaining vulnerabilities. Moreover, information about many vulnerabilities affecting the IoT world never reaches these databases but can still be found scattered over the Internet. This review summarizes our effort at identifying and evaluating publicly available sources of information about vulnerabilities, focusing on their usefulness in the scope of IoT. The results of our search show that there is not yet a single satisfactory source covering vulnerabilities affecting IoT devices and software available. |
Author | Felkner, Anna Janiszewski, Marek Rytel, Marcin |
AuthorAffiliation | Research and Academic Computer Network (NASK), Kolska 12, 01-045 Warsaw, Poland; afelkner@nask.pl (A.F.); marekj@nask.pl (M.J.) |
AuthorAffiliation_xml | – name: Research and Academic Computer Network (NASK), Kolska 12, 01-045 Warsaw, Poland; afelkner@nask.pl (A.F.); marekj@nask.pl (M.J.) |
Author_xml | – sequence: 1 givenname: Marcin orcidid: 0000-0002-8590-8565 surname: Rytel fullname: Rytel, Marcin – sequence: 2 givenname: Anna orcidid: 0000-0003-3813-4840 surname: Felkner fullname: Felkner, Anna – sequence: 3 givenname: Marek orcidid: 0000-0001-8965-6302 surname: Janiszewski fullname: Janiszewski, Marek |
BookMark | eNplkU1uFDEQhS0URJKBBTdoiQ0shvh_ujdIUfgbKVIWGdhaZXd54lGPHWx3ouw4BCfkJPQwAZGwqlLVe5-tesfkIKaIhLxk9K0QHT0pnHKmOt09IUdMcjlvOacH__SH5LiUDaVcCNE-I4dCMKqUlkfkYpVuIfelgeYSPOZmGSvmiLVJvlldhbguP7__OG0ux3yDd7vhMq2ar-MQMYMNQ6h3zXuokzuN2WF5Tp56GAq-uK8z8uXjh9XZ5_n5xafl2en53Emp69wvNHALynWMqQV1Gpm2zHPfaqAASEFZydFb5lTXS2-Fblnf96LVVjB0YkaWe26fYGOuc9hCvjMJgvk9SHltINfgBjTaOqaclgCCScc6UFSC7ZhG7l3L6MR6t2ddj3aLvcNYMwwPoA83MVyZdboxC606uZAT4PU9IKdvI5ZqtqE4HAaImMZiuFRSK86VmqSvHkk30-HidCozralUjE8hzcjJXuVyKiWjNy5UqCHt3g-DYdTsgjd_g58cbx45_nz_f-0vE_auIQ |
CitedBy_id | crossref_primary_10_3390_s21134359 crossref_primary_10_35467_cal_169306 crossref_primary_10_3390_app11125571 crossref_primary_10_32604_cmc_2024_056476 crossref_primary_10_1016_j_cose_2024_104143 crossref_primary_10_15407_emodel_44_04_079 crossref_primary_10_1109_JIOT_2023_3292319 crossref_primary_10_3390_s21041309 crossref_primary_10_3390_s21010001 crossref_primary_10_3390_electronics12051176 crossref_primary_10_3390_app142210513 crossref_primary_10_3390_electronics10192377 crossref_primary_10_1109_ACCESS_2021_3130714 |
Cites_doi | 10.1109/ISI.2017.8004904 10.1109/MC.2017.4451203 10.1109/ICDCS.2017.283 10.3390/fi12020027 10.1109/GLOCOM.2017.8254011 10.1109/SERVICES.2019.00028 10.3390/s18092796 10.1109/TrustCom/BigDataSE.2018.00034 10.1109/NGMAST.2015.71 10.1109/COMST.2019.2910750 10.1109/IT-DREPS.2017.8277814 |
ContentType | Journal Article |
Copyright | 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. 2020 by the authors. 2020 |
Copyright_xml | – notice: 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. – notice: 2020 by the authors. 2020 |
DBID | AAYXX CITATION 3V. 7X7 7XB 88E 8FI 8FJ 8FK ABUWG AFKRA AZQEC BENPR CCPQU DWQXO FYUFA GHDGH K9. M0S M1P PHGZM PHGZT PIMPY PJZUB PKEHL PPXIY PQEST PQQKQ PQUKI PRINS 7X8 5PM DOA |
DOI | 10.3390/s20215969 |
DatabaseName | CrossRef ProQuest Central (Corporate) Health & Medical Collection ProQuest Central (purchase pre-March 2016) Medical Database (Alumni Edition) Hospital Premium Collection Hospital Premium Collection (Alumni Edition) ProQuest Central (Alumni) (purchase pre-March 2016) ProQuest Central (Alumni) ProQuest Central UK/Ireland ProQuest Central Essentials - QC ProQuest Central ProQuest One Community College ProQuest Central Health Research Premium Collection Health Research Premium Collection (Alumni) ProQuest Health & Medical Complete (Alumni) Health & Medical Collection (Alumni) Medical Database ProQuest Central Premium ProQuest One Academic (New) Publicly Available Content Database ProQuest Health & Medical Research Collection ProQuest One Academic Middle East (New) ProQuest One Health & Nursing ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China MEDLINE - Academic PubMed Central (Full Participant titles) DOAJ Directory of Open Access Journals |
DatabaseTitle | CrossRef Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest Central Essentials ProQuest Health & Medical Complete (Alumni) ProQuest Central (Alumni Edition) ProQuest One Community College ProQuest One Health & Nursing ProQuest Central China ProQuest Central ProQuest Health & Medical Research Collection Health Research Premium Collection Health and Medicine Complete (Alumni Edition) ProQuest Central Korea Health & Medical Research Collection ProQuest Central (New) ProQuest Medical Library (Alumni) ProQuest One Academic Eastern Edition ProQuest Hospital Collection Health Research Premium Collection (Alumni) ProQuest Hospital Collection (Alumni) ProQuest Health & Medical Complete ProQuest Medical Library ProQuest One Academic UKI Edition ProQuest One Academic ProQuest One Academic (New) ProQuest Central (Alumni) MEDLINE - Academic |
DatabaseTitleList | Publicly Available Content Database MEDLINE - Academic CrossRef |
Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: BENPR name: ProQuest Central url: https://www.proquest.com/central sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 1424-8220 |
ExternalDocumentID | oai_doaj_org_article_6bc15c64aa314c19a504ab916e2fc810 PMC7659474 10_3390_s20215969 |
GroupedDBID | --- 123 2WC 53G 5VS 7X7 88E 8FE 8FG 8FI 8FJ AADQD AAHBH AAYXX ABDBF ABUWG ACUHS ADBBV ADMLS AENEX AFKRA AFZYC ALIPV ALMA_UNASSIGNED_HOLDINGS BENPR BPHCQ BVXVI CCPQU CITATION CS3 D1I DU5 E3Z EBD ESX F5P FYUFA GROUPED_DOAJ GX1 HH5 HMCUK HYE KQ8 L6V M1P M48 MODMG M~E OK1 OVT P2P P62 PHGZM PHGZT PIMPY PQQKQ PROAC PSQYO RNS RPM TUS UKHRP XSB ~8M 3V. 7XB 8FK AZQEC DWQXO K9. PJZUB PKEHL PPXIY PQEST PQUKI PRINS 7X8 5PM PUEGO |
ID | FETCH-LOGICAL-c446t-f76a2ba5c911570c6e16b1f2f86a0aae0a5b42efb1c59d4fb3681ddd386b31ec3 |
IEDL.DBID | M48 |
ISSN | 1424-8220 |
IngestDate | Wed Aug 27 01:31:24 EDT 2025 Thu Aug 21 13:53:48 EDT 2025 Fri Jul 11 08:03:22 EDT 2025 Fri Jul 25 20:18:50 EDT 2025 Tue Jul 01 03:55:53 EDT 2025 Thu Apr 24 23:11:31 EDT 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 21 |
Language | English |
License | https://creativecommons.org/licenses/by/4.0 Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c446t-f76a2ba5c911570c6e16b1f2f86a0aae0a5b42efb1c59d4fb3681ddd386b31ec3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 content type line 23 |
ORCID | 0000-0002-8590-8565 0000-0003-3813-4840 0000-0001-8965-6302 |
OpenAccessLink | http://journals.scholarsportal.info/openUrl.xqy?doi=10.3390/s20215969 |
PMID | 33105564 |
PQID | 2550451223 |
PQPubID | 2032333 |
ParticipantIDs | doaj_primary_oai_doaj_org_article_6bc15c64aa314c19a504ab916e2fc810 pubmedcentral_primary_oai_pubmedcentral_nih_gov_7659474 proquest_miscellaneous_2454652255 proquest_journals_2550451223 crossref_citationtrail_10_3390_s20215969 crossref_primary_10_3390_s20215969 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 20201022 |
PublicationDateYYYYMMDD | 2020-10-22 |
PublicationDate_xml | – month: 10 year: 2020 text: 20201022 day: 22 |
PublicationDecade | 2020 |
PublicationPlace | Basel |
PublicationPlace_xml | – name: Basel |
PublicationTitle | Sensors (Basel, Switzerland) |
PublicationYear | 2020 |
Publisher | MDPI AG MDPI |
Publisher_xml | – name: MDPI AG – name: MDPI |
References | ref_50 ref_14 ref_58 ref_13 ref_57 ref_12 ref_56 ref_11 ref_55 ref_54 ref_53 ref_52 ref_51 ref_19 ref_18 ref_17 ref_16 ref_15 ref_59 ref_61 ref_60 Neshenko (ref_1) 2019; 21 ref_25 ref_69 ref_24 ref_68 ref_23 ref_67 ref_22 ref_66 ref_21 ref_65 ref_20 ref_64 ref_63 ref_62 ref_29 ref_28 ref_27 ref_26 ref_72 ref_71 ref_70 ref_36 ref_35 ref_34 ref_33 ref_32 ref_31 ref_30 ref_73 ref_39 ref_38 ref_37 Kshetri (ref_10) 2017; 50 ref_47 ref_46 ref_45 ref_44 ref_43 ref_42 ref_41 ref_40 ref_3 ref_2 ref_49 ref_48 ref_9 ref_8 ref_5 ref_4 ref_7 ref_6 |
References_xml | – ident: ref_9 – ident: ref_49 – ident: ref_5 – ident: ref_32 – ident: ref_55 – ident: ref_26 – ident: ref_51 – ident: ref_68 – ident: ref_65 – ident: ref_39 – ident: ref_42 – ident: ref_61 – ident: ref_35 – ident: ref_23 – ident: ref_71 – ident: ref_58 – ident: ref_8 – ident: ref_16 doi: 10.1109/ISI.2017.8004904 – ident: ref_4 – ident: ref_31 – ident: ref_56 – volume: 50 start-page: 91 year: 2017 ident: ref_10 article-title: Hacking Power Grids: A Current Problem publication-title: Computer doi: 10.1109/MC.2017.4451203 – ident: ref_27 – ident: ref_52 – ident: ref_17 doi: 10.1109/ICDCS.2017.283 – ident: ref_48 – ident: ref_69 – ident: ref_41 – ident: ref_66 – ident: ref_18 doi: 10.3390/fi12020027 – ident: ref_62 – ident: ref_38 – ident: ref_45 – ident: ref_72 – ident: ref_20 – ident: ref_59 – ident: ref_14 doi: 10.1109/GLOCOM.2017.8254011 – ident: ref_7 – ident: ref_28 – ident: ref_53 – ident: ref_12 doi: 10.1109/SERVICES.2019.00028 – ident: ref_30 – ident: ref_3 doi: 10.3390/s18092796 – ident: ref_24 – ident: ref_34 – ident: ref_47 – ident: ref_11 – ident: ref_40 – ident: ref_67 – ident: ref_37 – ident: ref_63 – ident: ref_44 – ident: ref_13 doi: 10.1109/TrustCom/BigDataSE.2018.00034 – ident: ref_21 – ident: ref_73 – ident: ref_6 – ident: ref_25 – ident: ref_50 – ident: ref_29 – ident: ref_33 – ident: ref_54 – ident: ref_46 – ident: ref_2 doi: 10.1109/NGMAST.2015.71 – ident: ref_64 – ident: ref_36 – ident: ref_70 – ident: ref_19 – ident: ref_43 – ident: ref_60 – volume: 21 start-page: 2702 year: 2019 ident: ref_1 article-title: Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities and a First Empirical Look on Internet-Scale IoT Exploitations publication-title: IEEE Commun. Surv. Tutor. doi: 10.1109/COMST.2019.2910750 – ident: ref_22 – ident: ref_57 – ident: ref_15 doi: 10.1109/IT-DREPS.2017.8277814 |
SSID | ssj0023338 |
Score | 2.406856 |
Snippet | The security of the Internet of Things (IoT) is an important yet often overlooked subject. Specifically, the publicly available information sources about... |
SourceID | doaj pubmedcentral proquest crossref |
SourceType | Open Website Open Access Repository Aggregation Database Enrichment Source Index Database |
StartPage | 5969 |
SubjectTerms | computer security data security Internet of Things network security OEM Personal computers Smartphones Software Taxonomy |
SummonAdditionalLinks | – databaseName: DOAJ Directory of Open Access Journals dbid: DOA link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1NT9wwELUQJzhULVA1LSCDOHCJSBzbSY58CjjAgQVxi8YTW62Esmg3W4lbfwS_kF_C2MmuNhJSL1ztieTMxJn3nMkbxg5qzKUuICgfm9hLusUgShWjk5kwtUZlQrXFjb68l9eP6nGp1ZevCevkgTvHHWmDqUItAbJUYlqCSiQYAjVWOCy6n6so583JVE-1MmJenY5QRqT-aCp8ait9VfNS9gki_QNkOayLXEo0F1_Zlx4h8uNuZd_Yim022PqSbuAmux2FYtcpB34Hzk54d65nWz52vOvE-fbv9ZjfzSZ_7YsfvBqP-MPsyUtMh2rYF34GLV0dju6nW-z-4nx0ehn3nRFiJPrWxi7XIAwoLL1WToLaptqkTrhCQwJgE1BGCutMiqqspTOZJlxa11mhTZZazL6z1Wbc2B-MW4VIKcmkdYmyAAEFgTynCrTCJIWRETuce6zCXjbcd694qog-eOdWC-dGbH9h-txpZXxkdOLdvjDw8tZhgIJe9UGv_hf0iG3Pg1b1e25aETnyYjmEdyK2t5im3eI_gUBjxzOykb75O73DVMTyQbAHCxrONH9-B93tXKtS5vLnZ9zBL7YmPHOnLCjENlttJzO7Q_CmNbvhSX4HvRv66w priority: 102 providerName: Directory of Open Access Journals – databaseName: ProQuest Technology Collection dbid: 8FG link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV3LbtUwELWgbGCBKA8RWiqDWLCJGju246xQeVwKC1j0FnUX2Y4Nlaqkvcmt1B0fwRfyJcw4ueFGQmzjiRKNH2dmfHSGkFe1K4TSJiof2xQl3VLDS5m6IHJua-WkjWyLL-r4VHw-k2djwa0baZWbMzEe1HXrsEZ-CKEvSqEAmr25vEqxaxTero4tNG6TOwyQBildevFxSrhyyL8GNaEcUvvDjiPAlcht3sKgKNU_iy_n7MgtuFk8IPfHOJEeDRO7S2755iG5t6Ue-Ih8XUbKa0cNPTHBr-hQ3fM9bQMd-nH-_vnriJ6sV9f-Bh9-apf02_oChaYjJ_aGvjc9vB0L-N1jcrr4sHx3nI79EVIHSVyfhkIZbo10JSrmZE55piwLPGhlMmN8ZqQV3AfLnCxrEWyuIDqt61wrmzPv8idkp2kb_5RQL50DYLKsLp3QhhsNzg5SO89tpq1IyOuNxyo3iodjD4uLCpIIdG41OTchLyfTy0Ex419Gb9HtkwGKXMcH7ep7Ne6ZSlnHpFPCmJwJx0oDK8BYiGc9D06zLCH7m0mrxp3XVX_XSUJeTMOwZ_AixDS-XYONwBbwcJLJhBSzyZ790HykOf8R1bcLJUtRiGf___geucsxMweU43yf7PSrtX8O4UtvD-Ia_QO57vJn priority: 102 providerName: ProQuest |
Title | Towards a Safer Internet of Things—A Survey of IoT Vulnerability Data Sources |
URI | https://www.proquest.com/docview/2550451223 https://www.proquest.com/docview/2454652255 https://pubmed.ncbi.nlm.nih.gov/PMC7659474 https://doaj.org/article/6bc15c64aa314c19a504ab916e2fc810 |
Volume | 20 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9QwEB71IaFyQDzVQFkZxIFLIHFsJzkg1EKXgkRBdBftLbIdG5BWCWSziL3xI_iF_BLGTjZqpJ645GCPpWj8mPns0fcBPCl1ykQmPfOxCh2lWyhpzkNtWUJVKTRXvtriXJzN2bsFX-zAVmOzd-DqSmjn9KTmzfLZrx-bl7jhXzjEiZD9-Yq6wJWLfBf2MSClTsjgPRseE2iCMKwjFRqbH8C1JPECkWwUlTx5_yjjHNdLXgpA05two88cyXE31bdgx1S34folPsE78GHmi2BXRJILaU1Duvs-05Lakk6h8-_vP8fkYt38NBvX-Laekc_rpaOe9lWyG_JatjjaX-mv7sJ8ejp7dRb2igmhRljXhjYVkirJde44dCItTCxUbKnNhIykNJHkilFjVax5XjKrEoH5alkmmVBJbHRyD_aqujKHQAzXGkOVistcs0xSmWHyZ3mmDVVRplgAT7ceK3RPJ-5ULZYFwgrn52LwcwCPB9PvHYfGVUYnzu2DgaO99g1186Xod1EhlI65FkzKJGY6ziWPmFSY4RpqdRZHARxtJ63YLqUCQZMj0cE8KIBHQzfuIvc0IitTr9GGOVF4PNt4AOloskc_NO6pvn31fNyp4DlL2f3_HvkADqiD8RgSKT2CvbZZm4eY67RqArvpIsVvNn0zgf2T0_OPnyb-3mDi1_g_FKsFsg |
linkProvider | Scholars Portal |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwEB6VcgAOiKcIFDAIJC5RE8d2kgNChbLs0lIO3aLegu3YtFKVlE0WtDd-BL-DH8UvYZwXGwlx69WePDQPz4w9_gbgWa5jJhLZIB8r30G6-ZKm3NeWRVTlQnPVVFsciOkRe3_MjzfgV38XxpVV9mtis1DnpXZ75NsY-jooFPRmr86_-q5rlDtd7VtotGqxZ1bfMWWrXs52Ub7PKZ28nb-Z-l1XAV9j6lP7NhaSKsl16nBmAi1MKFRoqU2EDKQ0geSKUWNVqHmaM6sigTFdnkeJUFFodITvvQSXWYSe3N1Mn7wbErwI870WvQgng-2KOoeaulrqNZ_XtAYYxbPjasw19za5Ade7uJTstIp0EzZMcQuuraEV3oaP86bEtiKSHEprFqTdTTQ1KS1p-3_-_vFzhxwuF9_Myg3Oyjn5tDxzwNZNDe6K7Moan24ODKo7cHQhnLsLm0VZmHtADNcaHaEK81SzRFKZoHAtT7ShKkgU8-BFz7FMd2DlrmfGWYZJi2NuNjDXg6cD6XmL0PEvoteO7QOBA9VuBsrFl6yz0UwoHXItmJRRyHSYStQ4qTB-NtTqJAw82OqFlnWWXmV_9dKDJ8M02qg7eJGFKZdIw1zLeVw5uQfxSNijHxrPFKcnDdp3LHjKYnb__x9_DFem8w_72f7sYO8BXKVuVwA9LKVbsFkvluYhhk61etToK4HPF20gfwC0eDDY |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwEB6VrYTggHiKQAGDQOISbeLYTnJAqGW76lK0VHSLekttxwakalM2WdDe-BH8Gn4Ov4RxXuxKiFuv9uSheXhm7PE3AM9zHTORyBr5WPkO0s2XNOW-tiyiKheaq7raYioOTtjbU366Bb-6uzCurLJbE-uFOi-02yMfYujroFDQmw1tWxZxNBq_vvjquw5S7qS1a6fRqMihWX3H9K18NRmhrF9QOt6fvTnw2w4DvsY0qPJtLCRVkuvUYc4EWphQqNBSmwgZSGkCyRWjxqpQ8zRnVkUC47s8jxKhotDoCN97BbZjlxUNYHtvf3r0oU_3Isz-GiyjKEqDYUmde01dZfWaB6wbBWxEt5u1mWvObnwTbrRRKtlt1OoWbJn5bbi-hl14B97P6oLbkkhyLK1ZkGZv0VSksKTpBvr7x89dcrxcfDMrNzgpZuTj8tzBXNcVuSsykhU-XR8flHfh5FJ4dw8G82Ju7gMxXGt0iyrMU80SSWWCorY80YaqIFHMg5cdxzLdQpe7DhrnGaYwjrlZz1wPnvWkFw1ex7-I9hzbewIHsV0PFItPWWuxmVA65FowKaOQ6TCVqH9SYTRtqNVJGHiw0wkta-2-zP5qqQdP-2m0WHcMI-emWCINcw3ocR3lHsQbwt74oc2Z-ZfPNfZ3LHjKYvbg_x9_AlfROLJ3k-nhQ7hG3RYBultKd2BQLZbmEcZRlXrcKiyBs8u2kT-TlzZq |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Towards+a+Safer+Internet+of+Things%E2%80%94A+Survey+of+IoT+Vulnerability+Data+Sources&rft.jtitle=Sensors+%28Basel%2C+Switzerland%29&rft.au=Rytel%2C+Marcin&rft.au=Felkner%2C+Anna&rft.au=Janiszewski%2C+Marek&rft.date=2020-10-22&rft.pub=MDPI&rft.eissn=1424-8220&rft.volume=20&rft.issue=21&rft_id=info:doi/10.3390%2Fs20215969&rft_id=info%3Apmid%2F33105564&rft.externalDocID=PMC7659474 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1424-8220&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1424-8220&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1424-8220&client=summon |