0% found this document useful (0 votes)
69 views10 pages

14 Reference

The document contains 32 references to various academic papers related to Internet of Things (IoT) security and privacy. The references cover topics like authentication and access control in IoT systems, privacy-preserving techniques for IoT data, attacks on IoT networks like denial-of-service attacks, and frameworks for secure communication in IoT applications.

Uploaded by

Helal Ahmed Apon
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
69 views10 pages

14 Reference

The document contains 32 references to various academic papers related to Internet of Things (IoT) security and privacy. The references cover topics like authentication and access control in IoT systems, privacy-preserving techniques for IoT data, attacks on IoT networks like denial-of-service attacks, and frameworks for secure communication in IoT applications.

Uploaded by

Helal Ahmed Apon
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

76

REFERENCES

[1] M. W. Woo, J. Lee, K. Park, A reliable IoT system for personal healthcare
devices, Future Gener. Comput. Syst. 78 (2018) 626–640.

[2] Y. Yang, X. Zheng, W. Guo, X. Liu, V. Chang, Privacy-preserving smart


IoT-based healthcare big data storage and self-adaptive access control
system (2019).

[3] G. Sinnapolu, S. G. Alawneh, Integrating wearables with cloud-based


communication for health monitoring and emergency assistance, Internet
Things 1-2 (2018) 40–54.

[4] J. G´omez, B. Oviedo, E. Zhuma, Patient monitoring system based on


internet of things, Procedia Computer Science 83 (2016) 90–97.

[5] C. Li, X. Hu, L. Zhang, The IoT-based heart disease monitoring system
for pervasive healthcare service, Procedia Computer Science 112 (2017)
2328–2334.

[6] G. Sun, Y. Xie, D. Liao, Y. Hongfang, V. Chang, User-defined privacy


location-sharing system in mobile online social networks, Journal of Net-
work and Computer Applications 86 (2016).

[7] C. Maple, Security and privacy in the internet of things, Journal of Cyber
Policy 2 (2017) 155–184.

[8] K. Park, J. Park, J. Lee, An IOT system for remote monitoring of patients
at home, volume 7, 2017, pp. 260–268. doi: https://doi.org/10.3390/
app7030260.

[9] L. Zhang, Y. Zhang, S. Tang, H. Luo, Privacy protection for e-health sys-
teams by means of dynamic authentication and three-factor key
agreement, IEEE Transactions on Industrial Electronics PP (2017) 1–1.
77

[10] F. Wu, L. Xu, S. Kumari, X. Li, J. Shen, K.-K. R. Choo, M. Wazid, A. K.


Das, An efficient authentication and key agreement scheme for multi-
gateway wireless sensor networks in IoT deployment, J. Network.
Computing. Appl. 89 (2017) 72–85.

[11] D. D´ıaz-S´anchez, R. S. Sherratt, F. Almenarez, P. Arias, A. Mar´ın,


Secure store and forward proxy for dynamic IoT applications over m2m
networks, IEEE Transactions on Consumer Electronics 62 (2016) 389–
397.

[12] C. Wang, N. Cao, K. Ren, W. Lou, Enabling secure and efficient ranked
keyword search over outsourced cloud data, IEEE Transactions on
Parallel and Distributed Systems 23 (2012) 1467–1479.

[13] Y. Yang, X. Zheng, V. Chang, C. Tang, Semantic keyword searchable


proxy re-encryption for postquantum secure cloud storage, Concurrency
and Computation: Practice and Experience 29 (2017) e4211. E4211
cpe.4211.

[14] N. Cao, C. Wang, M. Li, K. Ren, W. Lou, Privacy-preserving multi-


keyword ranked search over encrypted cloud data, in: 2011 Proceedings
IEEE INFOCOM, 2011, pp. 829–837.

[15] H. Li, D. Liu, Y. Dai, T. H. Luan, Engineering searchable encryption of


mo- bile cloud networks: when QoE meets QoP, IEEE Wireless
Communications 22 (2015) 74–80.

[16] D. Cash, J. Jaeger, S. Jarecki, C. Jutla, H. Krawczyk, M.-C. Rosu, M.


Steiner, Dynamic searchable encryption in very-large databases: Data
structures and implementation, 2014. doi:10.14722/ndss.2014.23264.

[17] P. Xu, H. Jin, Q. Wu, W. Wang, Public-key encryption with fuzzy


keyword search: A provably secure scheme under keyword guessing
attack, IEEE Transactions on Computers 62 (2013) 2266–2277.
78

[18] Zahrah A.Almusaylim, AbdulazizAlhumam, N.Z.Jhanjhi, Proposing a


Secure RPL based Internet of Things Routing Protocol: A Review, in Ad
Hoc Networks, https://doi.org/10.1016/j.adhoc.2020.102096

[19] IoT-based intelligent fitness system, Journal of Parallel and Distributed


Computing 118 (2018) 14 – 21.

[20] Khan, Azeem, N. Z. Jhanjhi, Mamoona Humayun and Muneer Ahmad.


"The Role of IoT in Digital Governance." Employing Recent
Technologies for Improved Digital Governance. IGI Global, 2020. 128-
150. Web. 31 Jan. 2020. doi:10.4018/978-1-7998-1851-9.ch007

[21] Humayun, M., Niazi, M., Jhanjhi, N. et al. Cyber Security Threats and
Vulnerabilities: A Systematic Mapping Study. Arab J Sci Eng (2020).
https://doi.org/10.1007/s13369- 019-04319-2

[22] K. Hussain, S.J. Hussain, NZ. Jhanjhi and M. Humayun, “SYN Flood
Attack Detection based on Bayes Estimator (SFADBE) For MANET”,
International Conference on Computer and Information Sciences (ICCIS),
1-4, 2019

[23] M. Kim, “Game theoretic approach of eavesdropping attack in millimeter-


wavebased WPANs with directional antennas,” Wireless Networks, vol.
25, pp. 3205–3222, Aug 2019

[24] K. B. C, and V. Alagappan, “The Internet of Things Model Architectures


for Customized Applications: A Review,” International Journal of
Simulation: Systems, science, & technology, vol. 19, no. 6, Feb 2019

[25] A. A. Patwary, A. Fu, R. K. Naha, S. K. Battula, S. Garg, M. A. K.


Patwary, and E. Aghasian, “Authentication, Access Control, Privacy,
Threats and Trust Management Towards Securing Fog Computing
Environments: A Review,” Feb 2020
79

[26] J. Galeano-Brajones, J. Carmona-Murillo, J. F. Valenzuela- Valdés, and F.


Luna-Valero,” Detection and Mitigation of DoS and DDoS Attacks in
IoT-Based Stateful SDN: An Experimental Approach,” Sensors, vol. 20,
no. 3, Feb 2020

[27] Y. Wei, and S. Ulukus, “The Capacity of Private Information Retrieval


with Private Side Information Under Storage Constraints,” EEE
Transactions on Information Theory, vol. 66, no. 4, pp. 2023-2031, April
2020.

[28] A. Raza, K. Han, and S. Oun Hwang, “A Framework for Privacy


Preserving, Distributed Search Engine Using Topology of DLT and Onion
Routing,” IEEE Access, vol. 8, pp. 43001-43012, Mar 2020

[29] M. Müller, T. Chung, A. Mislove, and R. van Rijswijk- Deij, “Rolling


With Confidence: Managing the Complexity of DNSSEC Operations,”
IEEE Transactions on Network and Service Management, vol. 16, no. 3,
pp. 1199-1211, Sept 2019

[30] Attify: IoT Security Exploitation Training. 2019. https ://www.attif


y.com/iot-security-exploitation-training. Accessed 4 Sept 2019

[31] Banerjee U, Pathak A, Chandrakasan AP. 2.3 an energy-efficient


configurable lattice cryptography processor for the quantum secure
internet of things. In: 2019 IEEE international solid-state circuits
conference-(ISSCC). IEEE; 2019. p. 46–8.

[31] Bär S, Reinhold O, Alt R. The role of cross-domain use cases in IoT: a
case analysis. In: Proceedings of the 52nd Hawaii international conference
on system sciences; 2019.

[32] Borhani M, Liyanage M, Sodhro A, Kumar P, Jurcut A, Gurtov G. Secure


and resilient communications in the industrial internet. In: Rak J,
Hutchison D, editors. Guide to disaster-resilient communication networks.
Computer communications and networks. Basel: Springer; 2020.
80

[33] Calderoni L. Preserving context security in AWS IoT core. In:


Proceedings of the 14th international conference on availability, reliability
and security. ACM; 2019. p. 78.

[34] Calzavara S, Focardi R, Nemec M, Rabitti A, Squarcina M. Postcards


from the post-http world: amplification of https vulnerabilities in the web
ecosystem. In: Postcards from the post-HTTP world: amplification of
HTTPS vulnerabilities in the web ecosystem. IEEE; 2019. p. 0.

[35] Cao M, Wang L, Xu H, Chen D, Lou C, Zhang N, Zhu Y, Qin Z. Sec-d2d:


a secure and lightweight d2d communication system with multiple
sensors. IEEE Access. 2019; 7:33759–70.

[36] Chen J, Su C, Yeh KH, Yung M. Special issue on advanced persistent


threat. Elsevier. 2018. https ://doi.org/10.1016/j.future.2017.11.005.

[37] Cisco: The Internet of Things Reference Model. 2014. http://cdn. IoT wf
.com/resources/71/IoT Reference Model White Paper June4 2014.pdf.
Accessed 30 Aug 2019

[38] Devi RS, Balaguru RJB, Amirtharajan R, Praveen kumar P. A novel


quantum encryption and authentication framework integrated with IoT. In:
Mahmood Z, editor. Security, privacy and trust in the IoT environment.
Berlin: Springer; 2019. p. 123–50.

[39] Gomes RM, Baunach M. Code generation from formal models for
automatic RTOS portability. In: 2019 IEEE/ACM international
symposium on code generation and optimization (CGO). IEEE; 2019. p.
271–2.

[40] Gopal TS, Meerolla M, Jyostna G, Eswari PRL, Magesh E. Mitigating


mirai malware spreading in IoT environment. In: 2018 International
conference on advances in computing, communications and informatics
(ICACCI). IEEE; 2018. p. 2226–30.

[41] Chen J, Su C, Yeh KH, Yung M. Special issue on advanced persistent


threat. Elsevier. 2018. https://doi.org/10.1016/j.futur e.2017.11.005 [41]
81

Grooby S, Dargahi T, Dehghantanha A. Protecting IoT and ICS


platforms against advanced persistent threat actors: analysis of apt1, silent
chollima and molerats. In: Dehghantanha A, Choo KK, editors. Handbook
of big data and IoT security. Berlin: Springer; 2019. p. 225–55.

[42] Guth J, et al. A detailed analysis of IoT platform architectures: concepts,


similarities, and differences. In: Di Martino B, Li KC, Yang L, Esposito
A, editors. Internet of everything. Internet of Things (Technology,
Communications and Computing). Singapore: Springer; 2018.

[43] Guzman A, Gupta A. IoT penetration testing cookbook: identify


vulnerabilities and secure your smart devices. Birmingham: Packet
Publishing Ltd.; 2017.

[44] Haj-Yahya J, Wong MM, Pudi V, Bhasin S, Chattopadhyay A.


Lightweight secure-boot architecture for RISC-v system-on-chip. In: 20th
International symposium on quality electronic design (ISQED). IEEE;
2019. p. 216–23.

[45] Jin Y. Embedded system security in smart consumer electronics. In:


Proceedings of the 4th international workshop on trustworthy embedded
devices. ACM; 2014. p. 59 [46] Hussain MA, Jin H, Hussien ZA,
Abduljabbar ZA, Abbdal SH, Ibrahim A. Enc-DNS-HTTP: utilizing DNS
infrastructure to secure web browsing. Secure Communication Network.
2017; https ://doi.org/10.1155/2017/94794 76.

[47] IoT-Security-Foundation: IoT Security Training. 2019. https :// www.iot


security foundation.org/IoT-security-training/. Accessed 4 Sept 2019.

[48] Jang SE, Park ST, Lee SJ. A study on online fraud and abusing detection
technology using web-based device fingerprinting. J Korea Inst Inf
Security Cryptol. 2018;28(5):1179–95.
82

[49] Jones S, Tremlet C, Jackson M. The fundamentals of secure boot and


secure download: how to protect firmware and data within embedded
devices. 2019. https ://www.maxim integrated .com/en/app-notes /index
.mvp/id/6426. Accessed 4 Sept 2019.

[50] Jurcut A, Coffey T, Dojen R. Design requirements to counter parallel


session attacks in security protocols. In: 12th IEEE annual conference on
privacy, security and trust (PST–14). IEEE; 2014. p. 298–305.

[51] Jurcut AD, Ranaweera P, Xu L. Introduction to IoT security. In: Liyanage


M, Braeken A, Kumar P, Ylianttila M, editors. IoT security: advances in
authentication. New York: Wiley; 2020. p.27–64.

[52] Keybase: Secure groups, files, and chat for everyone. https ://keyba se.io/.
Accessed 9 Sept 2019.

[53] Klas GI. Edge cloud to cloud integration for IoT. 2016. https://yucia
nga.info/wp content/uploads/2016/02/16_02_04_Edge cloud to could
integration for IoT v1.pdf. Accessed 28 Aug 2019.

[54] Labrado C, Thapliyal H. Hardware security primitives for vehicles. IEEE


Consume Electron Mag. 2019;8(6):99–103.

[55] Leloglu E. A review of security concerns in internet of things. J Computer


Communication. 2016;5(1):121–36.

[56] LinkLabs: Symphony link-internet of things wireless LPWA. https


://www.link-labs.com/symphony. Accessed 9 Sept 2019.

[57] Mukhopadhyay SC, Islam T. Wearable sensors; applications, design and


implementation. IOP e-books. Bristol, UK: IOP Publishing;2017. ISBN:
978-0-7503-1505-0.

[58] Park HK, Lee K. A design of an AES-based security chip for IoT
applications using verilog HDL. Trans Korean Inst Electr Eng P.
2018;67(1):9–14.
83

[59] Preskill J. Quantum computing in the NISQ era and beyond. Quantum.
2018; 2:79.

[60] Ring T. Connected cars-the next target for hackers. Network Security.
2015;2015(11):11–6.

[61] Samarakoon S, Bennis M, Saad W, Debbah M: Federated learning for


ultra-reliable low-latency v2v communications. In: 2018 IEEE global
communications conference (GLOBECOM). IEEE; 2018. p. 1–7

[62] Viriyasitavat W, Da Xu L, Bi Z, Pungpapong V. Blockchain and internet


of things for modern business process in digital economy—the state of the
art. IEEE Trans Computer Soc Syst. 2019;6(6):1420–32.

[63] Souri A, Hussien A, Hoseyninezhad M, Norouzi M. A systematic review


of IoT communication strategies for an efficient smart environment. Trans
Emerging Telecommunication Technol. 2019. https
://doi.org/10.1002/ett.3736.

[64] Bevan, G., A. Evans A, and S. Nuti. (2019) “Reputations Count: Why
Benchmarking Performance is Improving Health Care Across the World.”
Health Economics, Policy and Law 14: 141-61

[65] Lu J, Wang J, Zheng X, Karmakar C, Rajasegarar S. Detection of


smoking events from confounding activities of daily living. Paper
presented at: Proceedings of the Australasian Computer Science Week
Multiconference; 2019

[67] A. Diro, H. Reda, N. Chilamkurti, A. Mahmood, N. Zaman and Y. Nam,


"Lightweight Authenticated-Encryption Scheme for Internet of Things
Based on Publish-Subscribe Communication," in IEEE Access, vol. 8, pp.
60539- 60551, 2020

[68] L.-Y. Yeh, P.-Y. Chiang, Y.-L. Tsai, J.-L. Huang, Cloud-based fine-
grained health information access control framework for lightweight IoT
devices with dynamic auditing and attribute revocation, IEEE
Transactions on Cloud Computing PP (2015) 1–1.
84

[69] Alyssa Anne Ubing, Syukrina Kamilia Binti Jasmi, Azween Abdullah, NZ
Jhanjhi and Mahadevan Supramaniam, “Phishing Website Detection: An
Improved Accuracy through Feature Selection and Ensemble Learning”
International Journal of Advanced Computer Science and Applications
(IJACSA),10(1), 2019.http://dx.doi.org/10.14569/IJACSA.2019.0100133

[70] S. R. Moosavi, E. Nigussie, M. Levorato, S. Virtanen, J. Isoaho,


Performance analysis of end-to-end security schemes in healthcare IoT,
Procedia Computer Science 130 (2018) 432 – 439. The 9th International
Conference on Ambient Systems, Networks and Technologies (ANT
2018) / The 8th International Conference on Sustainable Energy
Information Technology (SEIT-2018) / Affiliated Workshops.

[71] H. Li, D. Liu, K. Alharbi, S. Zhang, X. Lin, enabling fine-grained access


control with efficient attribute revocation and policy updating in smart
grid, KSII Transactions on Internet and Information Systems 9 (2015)
1404–1423.

[72] K. Yang, X. Jia, K. Ren, Secure and verifiable policy update outsourcing
for big data access control in the cloud, IEEE Transactions on Parallel and
Distributed Systems 26 (2015) 3461–3470.

[73] Z. Ying, H. Li, J. Ma, J. Zhang, J. Cui, adaptively secure ciphertext-policy


attribute-based encryption with dynamic policy updating, Science China
Information Sciences 59 (2016).

[74] J. Li, X. Lin, Y. Zhang, J. Han, Ksf-oabe: Outsourced attribute-based


encryption with keyword search function for cloud storage, IEEE
Transactions on Services Computing 10 (2017) 715–725.

[75] Y. Miao, J. Ma, X. Liu, X. Li, Q. Jiang, J. Zhang, Attribute-based


keyword search over hierarchical data in cloud computing, IEEE
Transactions on Services Computing (2017) 1–1.
85

[76] Sardeshmukh, H., & Ambawade, D. (2017, June). Internet of Things:


Existing protocols and technological challenges in security. In Intelligent
Computing and Control (I2C2), 2017 International Conference on (pp. 1-
7). IEEE.

[77] Ammar, M., Russello, G., & Crispo, B. (2018). Internet of Things: A
survey on the security of IoT frameworks. Journal of Information Security
and Applications, 38, 8-27

[78] Salman, O., Elhajj, I., Chehab, A., & Kayssi, A. (2017). Software Defined
IoT security framework. 2017 4th International Conference on Software
Defined Systems, SDS 2017, 75–80. https://doi.org/10.1109/SDS.2017.
7939144

[78] Abro A, Deng Z, Memon KA. A lightweight elliptic-elgamal based


authentication scheme for secure device-to-device communication. Future
Internet. 2019;11(5):108.

[79] Andrews SK, Rajavarman V, Ramamoorthy S. Implementing an IoT


vehicular diagnostics system under an Rtos environment over ethernet IP.
Medico Legal Update. 2018;18(1):548–54.

[80] J. Li, R. Chen, J. Su, X. Huang, and X. Wang, “ME-TLS: Middlebox-


Enhanced TLS for Internet-of-Things Devices,” IEEE Internet of Things
Journal, vol. 7, no. 2, pp. 1216-1229, Feb. 2020

[81] A. Walz, and A. Sikora, “Exploiting Dissent: Towards Fuzzing-Based


Differential Black-Box Testing of TLS Implementations,” IEEE
Transactions on Dependable and Secure Computing, vol. 17, no. 2, pp.
278-291, Mar-Apr 2020.

[82] M. Zain ul Abideen, S. Saleem, and M. Ejaz, “VPN Traffic Detection in


SSL-Protected Channel,” Security and Communication Networks, Oct
2019.

You might also like