<?xml version="1.0" encoding="UTF-8"?>
<item xmlns="http://omeka.org/schemas/omeka-xml/v5" itemId="18030" public="1" featured="0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://omeka.org/schemas/omeka-xml/v5 http://omeka.org/schemas/omeka-xml/v5/omeka-xml-5-0.xsd" uri="https://archives.christuniversity.in/items/show/18030?output=omeka-xml" accessDate="2026-04-09T02:35:30+00:00">
  <collection collectionId="15">
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="44496">
                <text>Book Chapter</text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </collection>
  <itemType itemTypeId="27">
    <name>Book Chapter</name>
    <description>Faculty Publications- Book Chapter</description>
  </itemType>
  <elementSetContainer>
    <elementSet elementSetId="1">
      <name>Dublin Core</name>
      <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
      <elementContainer>
        <element elementId="50">
          <name>Title</name>
          <description>A name given to the resource</description>
          <elementTextContainer>
            <elementText elementTextId="148489">
              <text>A Gradational Approach for Auditing IoT Security Vulnerability: Case Study of Smart Home Devices</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="41">
          <name>Description</name>
          <description>An account of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="148490">
              <text>The world is experiencing a rapid convergence of physical and cyber systems, as objects used in day-to-day life are connected over the Internet. These Internet of Things (IoT) devices are mass produced, but ensure its usage in routine life. The impact of IoT in human life ranges from simple household equipment to life-critical devices. Owing to the diversity, both in application and nature, the security on these devices and their applications has become a major concern. In spite of having many security frameworks and compliance regulations, attacks on IoTs are exponentially growing. A handful of security frameworks are available for ensuring the security, there are very few frameworks proposed for auditing the security. Confidentiality, Integrity and Availability, which are the pillars of security in IoT, are found missing or found to have been implemented with flaws. An IoT security audit is one good solution that has proven a success in the literature but challenging as the high-level standards cannot be applied to low-level devices and applications. In addition, the challenges of audits include heterogeneity of IoT and lack of expert resources. IoT and related products reached market very quickly before it could be subjected to the complete audit procedures or, in other words, the time taken for a new IoT device or application to be developed is much less than the time taken for developing a security audit mechanism. Hence, to enable an efficient security auditing of IoT devices, a definite and dynamic framework is needed that can propose feasible policies, automatic collection and analysis of audit data and tailor-made procedures for risk assessment, risk control and risk mitigation. This chapter focuses on the auditing of security vulnerability in IoT devices. A gradational methodology is proposed for extracting the feasible security checks from leading standards and guidelines in the IoT domain. To exploit its efficiency, the proposed method is applied to a smart home with IoT enabled devices. Performance metrics such as efficiency, accuracy, and scalability are evaluated. The experiments were carried out in a simulated environment with IoT devices. The results were highly satisfying as the proposed method could do efficient and accurate auditing for seven hundred smart homes in a time of less than fifteen minutes.  2025 Taylor &amp;amp; Francis Group, LLC.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="39">
          <name>Creator</name>
          <description>An entity primarily responsible for making the resource</description>
          <elementTextContainer>
            <elementText elementTextId="148491">
              <text>Rajagopal M.; Ramkumar S.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="48">
          <name>Source</name>
          <description>A related resource from which the described resource is derived</description>
          <elementTextContainer>
            <elementText elementTextId="148492">
              <text>Internet of Things Vulnerabilities and Recovery Strategies, pp. 87-101.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="45">
          <name>Publisher</name>
          <description>An entity responsible for making the resource available</description>
          <elementTextContainer>
            <elementText elementTextId="148493">
              <text>CRC Press</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="40">
          <name>Date</name>
          <description>A point or period of time associated with an event in the lifecycle of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="148494">
              <text>2024-01-01</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="43">
          <name>Identifier</name>
          <description>An unambiguous reference to the resource within a given context</description>
          <elementTextContainer>
            <elementText elementTextId="148495">
              <text>&lt;a href="https://doi.org/10.1201/9781003474838-6" target="_blank" rel="noreferrer noopener"&gt;https://doi.org/10.1201/9781003474838-6&lt;/a&gt;
&lt;br /&gt;&lt;br /&gt;&lt;a href="https://www.scopus.com/inward/record.uri?eid=2-s2.0-85199159509&amp;amp;doi=10.1201%2F9781003474838-6&amp;amp;partnerID=40&amp;amp;md5=86524daad059099942887a08a6d7ee2b" target="_blank" rel="noreferrer noopener"&gt;https://www.scopus.com/inward/record.uri?eid=2-s2.0-85199159509&amp;amp;doi=10.1201%2f9781003474838-6&amp;amp;partnerID=40&amp;amp;md5=86524daad059099942887a08a6d7ee2b&lt;/a&gt;</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="47">
          <name>Rights</name>
          <description>Information about rights held in and over the resource</description>
          <elementTextContainer>
            <elementText elementTextId="148496">
              <text>Restricted Access</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="46">
          <name>Relation</name>
          <description>A related resource</description>
          <elementTextContainer>
            <elementText elementTextId="148497">
              <text>ISBN: 978-104002562-8; 978-103247331-4</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="42">
          <name>Format</name>
          <description>The file format, physical medium, or dimensions of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="148498">
              <text>Online</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="44">
          <name>Language</name>
          <description>A language of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="148499">
              <text>English</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="51">
          <name>Type</name>
          <description>The nature or genre of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="148500">
              <text>Book chapter</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="38">
          <name>Coverage</name>
          <description>The spatial or temporal topic of the resource, the spatial applicability of the resource, or the jurisdiction under which the resource is relevant</description>
          <elementTextContainer>
            <elementText elementTextId="148501">
              <text>Rajagopal M., Lean Operations and Systems, School of Business and Management, CHRIST (Deemed to be University), Karnataka, Bangalore, India; Ramkumar S., Department of Computer Science, School of Sciences, CHRIST (Deemed to be University), Karnataka, Bangalore, India</text>
            </elementText>
          </elementTextContainer>
        </element>
      </elementContainer>
    </elementSet>
  </elementSetContainer>
</item>
