IoT Security

[1]  Athanasios V. Vasilakos,et al.  Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.

[2]  Michael Rash Single packet authorization , 2007 .

[3]  Ali Ismail Awad,et al.  Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes , 2018, Sensors.

[4]  G. Edward Suh,et al.  Physical Unclonable Functions for Device Authentication and Secret Key Generation , 2007, 2007 44th ACM/IEEE Design Automation Conference.

[5]  Martin Thomson,et al.  Using TLS to Secure QUIC , 2020, RFC.

[6]  Atul Prakash,et al.  Tyche: A Risk-Based Permission Model for Smart Homes , 2018, 2018 IEEE Cybersecurity Development (SecDev).

[7]  Ryan Hamilton,et al.  QUIC: A UDP-Based Secure and Reliable Transport for HTTP/2 , 2016 .

[8]  Hongxin Hu,et al.  On the Safety of IoT Device Physical Interaction Control , 2018, CCS.

[9]  Praveen Gauravaram,et al.  Blockchain for IoT security and privacy: The case study of a smart home , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).

[10]  Okwori Anthony Okpe INTRUSION DETECTION IN INTERNET OF THINGS (IOT) , 2018 .

[11]  Amit P. Sheth,et al.  Machine learning for Internet of Things data analysis: A survey , 2017, Digit. Commun. Networks.

[12]  Nz Jhanjhi,et al.  Comprehensive Review: Privacy Protection of User in Location-Aware Services of Mobile Cloud Computing , 2019, Wirel. Pers. Commun..

[13]  Prasad Calyam,et al.  Flexible IoT security middleware for end-to-end cloud-fog communication , 2018, Future Gener. Comput. Syst..

[14]  Renata Teixeira,et al.  SIOTOME: An Edge-ISP Collaborative Architecture for IoT Security , 2018 .

[15]  Jiwon Choi,et al.  FACT: Functionality-centric Access Control System for IoT Programming Frameworks , 2017, SACMAT.

[16]  Máire O'Neill,et al.  XOR-Based Low-Cost Reconfigurable PUFs for IoT Security , 2019, ACM Trans. Embed. Comput. Syst..

[17]  Rodrigo Roman,et al.  On the features and challenges of security and privacy in distributed internet of things , 2013, Comput. Networks.

[18]  Patrick D. McDaniel,et al.  Soteria: Automated IoT Safety and Security Analysis , 2018, USENIX Annual Technical Conference.

[19]  Peng Liu,et al.  The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved , 2018, IEEE Internet of Things Journal.

[20]  Mumbai,et al.  Internet of Things (IoT): A Literature Review , 2015 .

[21]  Srikanth V. Krishnamurthy,et al.  IotSan: fortifying the safety of IoT systems , 2018, CoNEXT.

[22]  Mahmoud Elkhodr,et al.  The Internet of Things: New Interoperability, Management and Security Challenges , 2016, ArXiv.

[23]  Xing Li,et al.  Security Challenges and Concerns of Internet of Things (IoT) , 2019 .

[24]  M. S. Mukhtar,et al.  TCP three-way handshake: linking developmental processes with plant immunity. , 2015, Trends in plant science.

[25]  Mahmoud Ammar,et al.  Journal of Information Security and Applications , 2022 .