References
- Pradeep Kumar, Andrei Gurtov et al., Lightweight and Secure-Key Establishment Scheme in Smart Home Environments, IEEE Sensors Journal Vol.16, 2016
- C. Gomez and J. Paradells, “Wireless home automation networks: A survey of architectures and technologies,” IEEE Communication. Magazines, vol. 48, no. 6, pp. 92-101, Jun. 2010. doi: https://doi.org/10.1109/MCOM.2010.5473869
- J. E. Kim, G. Boulos, J. Yackovich, T. Barth, C. Beckel, and D. Mosse, “Seamless integration of heterogeneous devices and access control in smart homes,” in Proc. 8th International Conference Intell. Environ. (IE), Jun. 2012, pp. 206-213.
- G. Mantas, D. Lymberopoulos, and N. Komninos, “Security in the smart home environment,” in Wireless Technologies for Ambient Assisted Living and Healthcare: Systems and Applications. Hershey, PA, USA: IGI Global, 2006.
- SMALL-Smart Homes For All.[Online]. Available: http://www.sm4all-project.eu/, accessed Jul. 16, 2015.
- HOPE-Smart Home for Elderly People. [Online]. Available: http://www.hope-project.eu/, accessed Jul.15, 2015
- GENIO-Next Generation Home. [Online]. Available: http://projects.celtic-initiative.org/genio/, accessed Jul. 15, 2015.
- S. Bhardwaj, T. Ozcelebi, J. lukkien, and C. Uysal, “Resource and service management architecture of a low capacity network for smart spaces,” IEEE Trans. Consum. Electron., vol. 58, no. 2, pp.389-396, May 2012. doi: https://doi.org/10.1109/TCE.2012.6227438
- H. Tschofenig, J. Arkko, and D. McPherson, “Architectural considerations in smart object networking,” Internet Engineering Task Force, Fremont, CA, USA, Tech. Rep. RFC-7452, Jul. 2014.
- D. G. Korzun, S. I. Balandin, and A. V. Gurtov, Deployment of Smart Spaces in an Internet of Things: Overview of the Design Challenges (Lecture Notes in Computer Science), vol. 8121. New York, NY, USA: Springer, 2013.
- M. Burrough and J. Gill. Smart Thermostat Security: Turning up the Heat. [Online]. Available: http://www.burrough.org/Documents/Thermostat-final-paper.pdf, accessed Apr. 10, 2015.
- Y. Chen and B. Luo, “S2A: Secure smart household appliances,” in Proc. 2nd ACM Conf. Data Appl. Secur. Privacy (CODASPY), 2012, pp. 217-228.
- Kumar, Vishal, Gayatri Sakya, and Chandra Shankar. “WSN and IoT based smart city model using the MQTT protocol.” Journal of Discrete Mathematical Sciences and Cryptography 22.8 (2019): 1423-1434. doi: https://doi.org/10.1080/09720529.2019.1692449
- Malik, Vinita, and Sukhdip Singh. “Security risk management in IoT environment.” Journal of Discrete Mathematical Sciences and Cryptography 22.4 (2019): 697-709. doi: https://doi.org/10.1080/09720529.2019.1642628
- Jangir, Mahendra Kumar, and Karan Singh. “HARGRURNN: Human activity recognition using inertial body sensor gated recurrent units recurrent neural network.” Journal of Discrete Mathematical Sciences and Cryptography 22.8 (2019): 1577-1587. doi: https://doi.org/10.1080/09720529.2019.1696552