References
- https://www.dbs.com/aics/templatedata/article/generic/data/en/GR/062018/180625_insights_internet_of_things_the_pillar_of_artificial_intelligence.xml#
- FDA confirms that St. Jude’s cardiac devices can be hacked, https://money.cnn.com/2017/01/09/technology/fda-st-jude-cardiac-hack/
- DDoS attack that disrupted internet was largest of its kind in history, https://www.theguardian.com/technology/2016/oct/26/ddos-attack-dyn-mirai-botnet
- Wi-Fi baby heart monitor may have the worst IoT security of 2016, https://www.theregister.co.uk/2016/10/13/possibly_worst_iot_security_failure_yet/?mt=1476453928163
- E. Bertino, “Data privacy for IoT systems,” in Concepts, Approaches, and Research Directions, 2016 IEEE International Conference on Big Data (Big Data), pp. 3645–7.
- R. Amine, S. Sendra, J. Lloret, and A. Oumnad, “Internet of things for measuring human activities in ambient assisted living and e-health,” Netw. Protoc. Algorithms, Vol. 8, no. 15, 2016. DOI:10.5296/npa.v8i3.10146.
- D. Dragomir, L. Gheorghe, S. Costea, and A. Radovici, “A survey on secure communication protocols for IoT systems,” in 2016 International Workshop on Secure Internet of Things (SIoT), Heraklion, 2016, pp. 47–62.
- A. Reziouk, E. Laurent, and J. Demay, “Practical security overview of IEEE 802.15.4,” in 2016 International Conference on Engineering & MIS (ICEMIS), Agadir, 2016, pp. 1–9.
- M. Dworkin. Recommendation for block cipher modes of operation: The CCM mode for authentication and confidentiality, NIST Std. Special Publication 800-38C, 2004. [Online]. Available: http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38c.pdf.
- “ISO/IEC 14443: Cards and security devices for personal identification—contactless proximity objects—Part 3: Initialization and anticollision” Tech. Rep. [Online].
- “ISO/IEC 18092: Information technology—telecommunications and information exchange between systems Near Field Communication—Interface and Protocol (NFCIP-1)”, Tech. Rep.
- R. Jin, and K. Zeng, “Secure inductive-coupled near field communication at physical layer,” IEEE Trans. Inf. Forensic. Secur., Vol. 13, no. 12, pp. 3078–93, Dec. 2018. DOI:10.1109/TIFS.2018.2832983.
- M. Al-Tamimi, and A. Al-Haj, “Online security protocol for NFC mobile payment applications,” in 2017 8th International Conference on Information Technology (ICIT), Amman, 2017, pp. 827–32. DOI:10.1109/ICITECH.2017.8079954.
- X. Ma, and W. Luo, “The analysis of 6LowPAN technology,” in 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application, Wuhan, 2008, pp. 963–6. DOI:10.1109/PACIIA.2008.72.
- P. Pongle, and G. Chavan, “A survey: Attacks on RPL and 6LoWPAN in IoT,” in 2015 international Conference on Pervasive Computing (ICPC), Pune, 2015, pp. 1–6.
- P. Kasinathan, G. Costamagna, H. Khaleel, C. Pastrone, and M. A. Spirito, “DEMO: An IDS framework for internet of things empowered by 6LoWPAN,” in Proceedings of the 2013 ACM SIGSAC conference on Computer & Communications Security (CCS ‘13), ACM, New York, NY, USA, pp. 1337–40, 2013.
- E. Rescorla, and N. Modadugu. “Datagram transport layer security version 1.2,” RFC 6347, DOI:https://doi.org/10.17487/RFC6347, January 2012.
- T. Dierks, and E. Rescorla. “The Transport Layer Security (TLS) protocol version 1.2,” RFC 5246, August 2008.
- J. Granjal, E. Monteiro, and J. S. Silva, “Security for the internet of things: A survey of existing protocols and open research issues,” IEEE Commun. Surv. Tutorials, Vol. 17, no. 3, pp. 1294–312, 2015. doi: https://doi.org/10.1109/COMST.2015.2388550
- https://datatracker.ietf.org/wg/core/charter/ “Constrained restful environments (core).”
- S. Raza, H. Shafagh, K. Hewage, R. Hummen, and T. Voigt, “Lithe: Lightweight secure CoAP for the internet of things,” IEEE Sensors J., Vol. 13, no. 10, pp. 3711–20, 2013. doi: https://doi.org/10.1109/JSEN.2013.2277656
- S. L. Keoh, S. S. Kumar, and H. Tschofenig, “Securing the internet of things: A standardization perspective,” IEEE Internet Things J., Vol. 1, no. 3, pp. 265–75, 2014. doi: https://doi.org/10.1109/JIOT.2014.2323395
- C. Bormann, K. Hartke, and Z. Shelby. “The constrained application protocol (CoAP),” RFC 7252, Oct. 2015.
- S. S. Basu, and S. Tripathy, “Securing multicast group communication in IoT-enabled systems,” IETE Tech. Rev., Vol. 36, no. 1, pp. 83–93, 2019. DOI:10.1080/02564602.2017.1407681.
- A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and M. Ayyash, “Internet of things: A survey on enabling technologies, protocols, and applications,” IEEE Communications Surveys and Tutorials, Vol. 17, no. 4, pp. 2347–76, 2015. doi: https://doi.org/10.1109/COMST.2015.2444095
- U. Hunkeler, H. L. Truong, and A. Stanford-Clark, “MQTT-S A publish/subscribe protocol for wireless sensor networks,” in 3rd International Conference on Communication Systems Software and Middleware and Workshops, 2008, p. 791.
- A. Keranen, and C. Bormann. “Internet of Things: Standards and Guidance from the IETF”.
- R. Hummen, J. Hiller, H. Wirtz, M. Henze, H. Shafagh, and K. Wehrle, “6LoWPAN fragmentation attacks and mitigation mechanisms,” in Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, ACM, 2013.
- D. Luciano, and G. Prichett, “Cryptology: From caesar ciphers to public-key cryptosystems,” The College Mathematics Journal, Vol. 18, no. 1, pp. 2–17, 1987. DOI:10.2307/2686311. doi: https://doi.org/10.1080/07468342.1987.11973000
- G. C. Kessler. “An overview of cryptography.” The Handbook on Local Area Networks, Auerbach (1998).
- V. Odelu, A. K. Das, and A. Goswami, “A secure biometrics-based multi-server authentication protocol using smart cards,” IEEE Trans. Inf. Forensics Secur., Vol. 10, no. 9, pp. 1953–66, Sept. 2015. doi: https://doi.org/10.1109/TIFS.2015.2439964
- D. He, and D. Wang, “Robust biometrics-based authentication scheme for multiserver environment,” IEEE Syst. J., Vol. 9, no. 3, pp. 816–23, Sept. 2015. DOI:10.1109/JSYST.2014.2301517.
- S. Pirbhulal, H. Zhang, W. Wu, S. C. Mukhopadhyay, and Y. Zhang, “Heartbeats based biometric random binary sequences generation to secure wireless body sensor networks,” IEEE Trans. Biomed. Eng., Vol. 65, no. 12, pp. 2751–9, Dec. 2018. DOI:10.1109/TBME.2018.2815155.
- M. Wazid, A. K. Das, V. Odelu, N. Kumar, M. Conti, and M. Jo, “Design of secure user authenticated key management protocol for generic IoT networks,” IEEE Internet Things J., Vol. 5, no. 1, pp. 269–82, Feb. 2018. doi: https://doi.org/10.1109/JIOT.2017.2780232
- K. Yang, D. Blaauw, and D. Sylvester, “Hardware designs for security in ultra-low-power IoT systems: An overview and survey,” IEEE Micro, Vol. 37, no. 6, pp. 72–89, Nov./Dec. 2017. DOI:10.1109/MM.2017.4241357.
- M. Bhargava, and K. Mai, “An efficient reliable PUF-based cryptographic key generator in 65nm CMOS,” in 2014 Design, Automation & Test in Europe Conference & Exhibition (DATE), Dresden, 2014, pp. 1–6. DOI:10.7873/DATE.2014.083.
- Q. Tang, B. Kim, Y. Lao, K. K. Parhi, and C. H. Kim, “True random number generator circuits based on single- and multi-phase beat frequency detection,” in Proceedings of the IEEE 2014 Custom Integrated Circuits Conference, San Jose, CA, 2014, pp. 1–4.
- K. Yang, D. Fick, M. B. Henry, Y. Lee, D. Blaauw, and D. Sylvester, “A 23Mb/s 23pJ/b fully synthesized true-random-number generator in 28nm and 65nm CMOS,” in 2014 IEEE International Solid-State Circuits Conference Digest of Technical Papers (ISSCC), San Francisco, CA, 2014, pp. 280–1.
- K. Yang, D. Blaauw, and D. Sylvester, “An all-digital edge racing true random number generator robust against PVT variations,” IEEE J. Solid-State Circuits, Vol. 51, no. 4, pp. 1022–31, 2016. doi: https://doi.org/10.1109/JSSC.2016.2519383
- E. Kim, M. Lee, and J. Kim, “8Mb/s 28mb/mJ robust true-random-number generator in 65nm CMOS based on differential ring oscillator with feedback resistors,” in 2017 IEEE international Solid-State Circuits Conference (ISSCC), San Francisco, CA, 2017, pp. 144–5.
- Y. Wen, and Y. Lao, “Efficient fuzzy extractor implementations for PUF based authentication,” in 2017 12th International Conference on Malicious and Unwanted Software (MALWARE), Fajardo, 2017, pp. 119–25.
- R. Korenda, F. Afghah, and B. Cambou, “A secret key generation scheme for internet of things using ternary-states ReRAM-based physical unclonable functions,” in 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC), Limassol, 2018, pp. 1261–6.
- M. Barbareschi, A. De Benedictis, and N. Mazzocca, “A PUF-based hardware mutual authentication protocol,” J. Parallel. Distrib. Comput., Vol. 119, pp. 107–20, 2018. ISSN 0743-7315. doi: https://doi.org/10.1016/j.jpdc.2018.04.007
- S. Buchovecká, R. Lórencz, F. Kodýtek, and J. Buček, “True random number generator based on ring oscillator PUF circuit,” Microprocess. Microsyst., Vol. 53, pp. 33–41, 2017. ISSN 0141-9331. doi: https://doi.org/10.1016/j.micpro.2017.06.021