Identification of Privacy and Security Risks of Internet of Things: An Empirical Investigation

Article History Received: 20 December 2018 Revised: 30 January 2019 Accepted: 4 March 2019 Published: 8 May 2019

[1]  Muhammad Azeem Akbar,et al.  Estimating software reliability in maintenance phase through ann and statistics , 2016, ArXiv.

[2]  Wade Trappe,et al.  Low-Energy Security: Limits and Opportunities in the Internet of Things , 2015, IEEE Security & Privacy.

[3]  Giancarlo Fortino,et al.  Evaluating Critical Security Issues of the IoT World: Present and Future Challenges , 2018, IEEE Internet of Things Journal.

[4]  Sherali Zeadally,et al.  IoT technologies for smart cities , 2018, IET Networks.

[5]  Ahmed Mateen,et al.  Comparative analysis of wireless sensor networks with wireless multimedia sensor networks , 2017, 2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI).

[6]  Muhammad Shafiq,et al.  AZ-Model of software requirements change management in global software development , 2018, 2018 International Conference on Computing, Electronic and Electrical Engineering (ICE Cube).

[7]  Arif Ali Khan,et al.  Improving the Quality of Software Development Process by Introducing a New Methodology–AZ-Model , 2018, IEEE Access.

[8]  Cristina Alcaraz,et al.  Key management systems for sensor networks in the context of the Internet of Things , 2011, Comput. Electr. Eng..

[9]  Al-Sakib Khan Pathan,et al.  Smart Grid Internet of Things , 2017, Journal on spesial topics in mobile networks and applications.

[10]  Sakir Sezer,et al.  Embedded Policing and Policy Enforcement Approach for Future Secure IoT Technologies , 2018, IoT 2018.

[11]  Carsten Maple,et al.  Security and privacy in the internet of things , 2017 .

[12]  Arif Ali Khan,et al.  Effect of Project Management in Requirements Engineering and Requirements Change Management Processes for Global Software Development , 2018, IEEE Access.

[13]  H. Hashim,et al.  A lightweight and secure TFTP protocol for smart environment , 2012, 2012 International Symposium on Computer Applications and Industrial Electronics (ISCAIE).

[14]  Yong Ho Hwang IoT Security & Privacy: Threats and Challenges , 2015, IoTPTS@AsiaCCS.

[15]  Hong Xiang,et al.  Reversible data hiding in compressed and encrypted images by using Kd-tree , 2018, Multimedia Tools and Applications.

[16]  Waheed Ur Rehman,et al.  The Deep Neural Network Based Classification of Fingers Pattern Using Electromyography , 2018, 2018 2nd IEEE Advanced Information Management,Communicates,Electronic and Automation Control Conference (IMCEC).

[17]  Nick Feamster,et al.  User Perceptions of Smart Home IoT Privacy , 2018, Proc. ACM Hum. Comput. Interact..

[18]  Azizol Abdullah,et al.  A Survey on Sybil Attack Detection in Vehicular ad hoc Networks (VANET) , 2018 .

[19]  Arif Ali Khan,et al.  Statistical Analysis of the Effects of Heavyweight and Lightweight Methodologies on the Six-Pointed Star Model , 2018, IEEE Access.

[20]  Jianqing Zhang,et al.  Performance evaluation of Attribute-Based Encryption: Toward data privacy in the IoT , 2014, 2014 IEEE International Conference on Communications (ICC).

[21]  Carlo Maria Medaglia,et al.  An Overview of Privacy and Security Issues in the Internet of Things , 2010 .

[22]  Ahmed Mateen,et al.  Robust approaches, techniques and tools for requirement engineering in agile development , 2017, 2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI).

[23]  Praveen Kumar,et al.  Health Monitoring & Management using IoT devices in a Cloud Based Framework , 2018, 2018 International Conference on Advances in Computing and Communication Engineering (ICACCE).

[24]  Mohammad Shameem,et al.  Investigation of Project Administration related challenging factors of Requirements Change Management in global software development: A systematic literature review , 2018, 2018 International Conference on Computing, Electronic and Electrical Engineering (ICE Cube).

[25]  Ilsun You,et al.  ePASS: An expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the Internet of Things , 2014, Future Gener. Comput. Syst..

[26]  Georg Carle,et al.  DTLS based security and two-way authentication for the Internet of Things , 2013, Ad Hoc Networks.

[27]  Junhao Wen,et al.  The Role of Hyperspectral Imaging: A Literature Review , 2018 .

[28]  Muhammad Azeem,et al.  AZ Model for Software Development , 2016, ArXiv.

[29]  Maurizio A. Spirito,et al.  The VIRTUS Middleware: An XMPP Based Architecture for Secure IoT Communications , 2012, 2012 21st International Conference on Computer Communications and Networks (ICCCN).

[30]  Longfei Wu,et al.  A Survey on Security and Privacy Issues in Internet-of-Things , 2017, IEEE Internet of Things Journal.