References
- Statista - The Statistics Portal for Market Data, Market Research and Market Studies. Web. 2017. <http://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/>
- Hong, I. J, J. A. Landey. “An Architecture for Privacy Sensitive Ubiquitous Computing MobiSys’04”, Boston, Massachusetts. 2004: 177–189
- Bradley, J and J Barbier. “Embracing the Internet of Everything To Capture Your Share of $14. 4 Trillion: More Relevant, Valuable Connections Will Improve Innovation, Productivity, and Efficiency & Customer Experience”. CISCO Whitepaper. (2013)
- Capgemini Consulting and Sogeti High TechInterview. Web. <http://www.capgeminiconsulting.com>.
- Roman, R and P Nareja. “Securing the internet of things.” Computer. 44. 9 (2011): 51-58 doi: 10.1109/MC.2011.291
- Abomhara, M. “Security and Privacy in Internet of Things: Current Status and Open Issues.” International Conference on Privacy and Security in Mobile Systems (PRISMS). (2014)
- “Internet of Things Strategic Research Road map.” IERC-European Research Cluster on the Internet of Things. Web. 2009. <http://www.internet-of-things-research.eu/pdf/IoT_Cluster_Strategic_Research_Agenda_2009.pdf>.
- Zhou, Wei and Yan Jia. “The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved.” IEEE Internet of Things Journal. 6. 2 (2019): 1606-1616 doi: 10.1109/JIOT.2018.2847733
- Krishna, Addepalli V. N. “A big–data security mechanism based on fully homomorphic encryption using cubic spline curve public key cryptography.” Journal of Information and Optimization Sciences. (2018): 1387-1399. doi: 10.1080/02522667.2018.1507762
- Zhang, Yi, “Optimized detection algorithm of complex intrusion interference signal in mobile wireless network.” Journal of Discrete Mathematical Sciences and Cryptography 21. 3 (2018): 771-779. doi: 10.1080/09720529.2018.1449301
- Dadheech, Pankaj. “An enhanced 4-way technique uses cookies for robust authentication process in wireless network.” Journal of Statistics and Management Systems. 22. 4 (2019): 773-782 doi: 10.1080/09720510.2019.1609557
- Shirdel, G. H and M Abdolhosseinzadeh. “A simulated annealing heuristic for the online symmetric traveling salesman problem.” Journal of Information and Optimization Sciences. 39. 6 (2018): 1283-1296. doi: 10.1080/02522667.2017.1367494
- Tianlong, Y. “Handling a trillion (unfixable) flaws on a billion devices: Rethinking network security for the Internet-of-Things.” ACM Workshop on Hot Topics in Networks. 5. (2015)
- Raja, Linesh, and Sonali Vyas. “The Study of Technological Development in the Field of Smart Farming.” Smart Farming Technologies for Sustainable Agricultural Development. IGI Global, 2019. 1-24.
- Atzoril, A. “The internet of things: A survey.” Computer Networks. 54. 15 (2010): 2787–2805, Web. doi: 10.1016/j.comnet.2010.05.010
- Sundmaeker, H and P Guillemin. “Vision and challenges for realizing the internet of things.” Cluster of European Research Projects on the Internet of Things 2010 Web.
- Riad, A. M. “A survey of internet of things.” (2013): Web.
- Tan, L and N Wang. “Future internet: The internet of things, in Advanced Computer Theory and Engineering.” 3rd International Conference in Advanced Computer Theory and Engineering. (2010): Web
- Mattern, F and F Floerkemeier. “From the internet of computers to the internet of things.” Active data management to event-based systems. (2010): 242–259. Web. doi: 10.1007/978-3-642-17226-7_15
- Mahalle, P. N and B Anggorojati. “Identity authentication and capability based access control (iacac) for the internet of things.” Journal of Cyber Security and Mobility. 1. 4 (2013): 309–348. Web.
- Bandyopadhyay, D and J Sen. “Internet of things: Applications and challenges in technology and standardization.” Wireless Personal Communications. 58. (2011): 49–69. Web. doi: 10.1007/s11277-011-0288-5
- Vermesan, O, P Friess and P Guillemin. “Internet of things strategic research road map.” Internet of Things: Global Technological and Societal Trends. (2011): 9-52. Web.
- Yan, Z, P Zhang and A Vasilakos. “A survey on trust management for Internet of Things”, Journal of Network and Computer Applications, 42. (2014):120-134. Web. doi: 10.1016/j.jnca.2014.01.014
- Iqbal, A, R Saleem, and M Suryani. “Internet of Things (IOT): ongoing Security Challenges and Risks”, International Journal of Computer Science and Information Security, 14. (2016). Web.
- Zhao, K, L Ge. “A survey on the Internet of Things security”, Proc. 9th Int. Conf. Comput. Intell. Secur. (CIS), (2013):663-667. Web.
- Yang, Y and L Wu. “A Survey on Security and Privacy Issues in Internet-of-Things”, IEEE Internet of Things Journal, (2017): 1250-1258. Web. doi: 10.1109/JIOT.2017.2694844
- Sethi, P, S R Sarangi. “Internet of Things: Architecture, Protocols and Applications”, Journal of Electrical and computer engineering, (2017). Web.
- Malik, V and S Singh. “Internet of Things: Risk Management”, SSIC, (2019). Print.
- Sorebo, G. “Managing the unmanageable : A risk model for the Internet of Things”, RSA Conference, (2015): 1-20. Web
- Andreas, I. “Internet of Things: Security Vulnerabilities and Challenges”, The 3rd IEEE ISCC 2015 International Workshop on Smart City and Ubiquitous Computing Applications, (2015). Web.
- Vignesh, R. “Security on Internet of things (IoT) with Challenges and Countermeasures securing the internet of things”, International Journal of Engineering Development and Research, 5. 1(2017):417-423. Web.
- Langheinrich, M. “Privacy by design principles of privacy-aware ubiquitous systems,” in Ubiquitous Computing, (2001):273–291. Web.
- Mahalle, P, S Babar and N R Prasad. “Identity management framework towards internet of things (IoT): Roadmap and key challenges”, Recent Trends in Network Security and Applications, (2010): 430–439. Web. doi: 10.1007/978-3-642-14478-3_43
- Riahi, A, Y Challal, E Natalizio and Z Chtourou. “A systematic approach for IOT security”, Distributed Computing in Sensor Systems (DCOSS), (2013):351–355. Web.
- Romana, R, J Zhoua, J Lopezb, “On the features and challenges of security & privacy in distributed internet of things”, Computer Networks, (2013). Web.
- Josang, A. “Conditional reasoning with subjective logic”, Journal of Multiple-Valued Logic and Soft Computing, 15 (2008): 5–38. Web.
- “Internet of Things (IoT) and Cyber Risk Insurance | Mindtree.” Mindtree | IT Consulting & Technology Consulting. Web. 2018. <http://www.mindtree.com/blog/internet-things-iot-and-cyber-risk-insurance>.
- Jinan, S and K Pan. “Security Patterns from intelligent data: A Map of Security Vulnerability Analysis”, IEEE 3rd International Conference on Big Data Security on Cloud, (2017):18–25. Web.
- “CAST Highlight - Application Portfolio Analysis.” Software Intelligence for Digital Leaders | CAST. Web. 2018. <http://www.castsoftware.com/products/highlight>.
- The world’s leading software development platform. GitHub. Web. 2018. <http://codeload.github.com/devicehive/devicehive-java-server/zip/master>.