References
References
References
Gerodimos, Apostolos, et al. “IoT: Communication Protocols and Security Threats.” Internet
https://doi.org/10.1016/j.iotcps.2022.12.003.
[2]
Panchiwala, Shivani, and Manan Shah. “A Comprehensive Study on Critical Security Issues
and Challenges of the IoT World.” Journal of Data, Information and Management,
[3]
Naghib, Arezou, et al. “A Comprehensive and Systematic Literature Review on the Big Data
2022,
[4]
Ramson, S.R. Jino, et al. “Applications of Internet of Things (IoT) – an Overview.” IEEE
[5]
Security: challenges and solutions,” Applied Sciences, vol. 10, no. 12, p.
Sobin, C.C. A Survey on Architecture, Protocols and Challenges in IoT. Wireless Pers
[5]
Protocols and Applications.” Information, vol. 12, no. 2, 19 Feb. 2021, p. 87,
https://doi.org/10.3390/info12020087.
[7]
A. Hameed and A. Alomary, "Security Issues in IoT: A Survey," 2019 International Conference on
Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT), Sakhier,
[8]
R. Mahmoud, T. Yousuf, F. Aloul, and I. Zualkernan, “Internet of things (iot) security: Current status,
challenges and prospective measures,” in 2015 10th International Conference for Internet Technology and
Secured Transactions (ICITST). IEEE, 2015, pp. 336–341.
[9]
Sanislav, Teodora, et al. “Energy Harvesting Techniques for Internet of Things (IoT).” IEEE
[10]
[11]
Velmurugan, P., et al. “An Advanced and Effective Encryption Methodology Used for
Network and Computer Applications, vol. 144, Oct. 2019, pp. 79–101,
www.sciencedirect.com/science/article/pii/S108480451930222X,
https://doi.org/10.1016/j.jnca.2019.06.017.
[13]
Anand, Pooja, et al. “Internet of Things (IoT): Vulnerabilities and Remediation Strategies.”
https://doi.org/10.1007/978-981-15-8297-4_22.
[14]
Yu, Dan, et al. “Large-Scale IoT Devices Firmware Identification Based on Weak Password.”
ieeexplore.ieee.org/abstract/document/8951016,
[15]
8220/24/2/708, https://doi.org/10.3390/s24020708.
[16]
Karale, Ashwin. “The Challenges of IoT Addressing Security, Ethics, Privacy and Laws.”
https://doi.org/10.1016/j.iot.2021.100420.
[17]
Soumyalatha, Shruti G. Hegde. "Study of IoT: understanding IoT architecture, applications, issues
478. 2016.
[18]
Zeadally, Sherali, et al. “Design Architectures for Energy Harvesting in the Internet of
Things.” Renewable and Sustainable Energy Reviews, vol. 128, Aug. 2020, p.
[19]
[20]
Oh, Se-Ra, and Young-Gab Kim. “Security Requirements Analysis for the IoT.” IEEE
[21]
[22]
11 May 2024.
[23]
Lan Li, "Study on security architecture in the Internet of Things," Proceedings of 2012 International
Conference on Measurement, Information and Control, Harbin, China, 2012, pp. 374-377,
[24]
[25]
[27]
[28]
Vangala, A., Das, A.K., Chamola, V. et al. Security in IoT-enabled smart agriculture: architecture,
security solutions and challenges. Cluster Comput 26, 879–902 (2023)
[29]
[31]
E. Schiller, A. Aidoo, J. Fuhrer, J. Stahl, M. Ziörjen, and B. Stiller, “Landscape of
IoT security,” Computer Science Review, vol. 44, p. 100467, May 2022
[32]
[33]
H. F. Atlam and G. B. Wills, “IoT Security, Privacy, Safety and Ethics,” in Internet
of things, 2019
[34]
[35]
[39]
[40]
[44]
T. Rajmohan, P. H. Nguyen, and N. Ferry, “A decade of research on patterns and
architectures for IoT security,” Cybersecurity, vol. 5, no. 1, Jan. 2022
[45]
[47]
[50]