A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications

Fog/edge computing has been proposed to be integrated with Internet of Things (IoT) to enable computing services devices deployed at network edge, aiming to improve the user’s experience and resilience of the services in case of failures. With the advantage of distributed architecture and close to end-users, fog/edge computing can provide faster response and greater quality of service for IoT applications. Thus, fog/edge computing-based IoT becomes future infrastructure on IoT development. To develop fog/edge computing-based IoT infrastructure, the architecture, enabling techniques, and issues related to IoT should be investigated first, and then the integration of fog/edge computing and IoT should be explored. To this end, this paper conducts a comprehensive overview of IoT with respect to system architecture, enabling technologies, security and privacy issues, and present the integration of fog/edge computing and IoT, and applications. Particularly, this paper first explores the relationship between cyber-physical systems and IoT, both of which play important roles in realizing an intelligent cyber-physical world. Then, existing architectures, enabling technologies, and security and privacy issues in IoT are presented to enhance the understanding of the state of the art IoT development. To investigate the fog/edge computing-based IoT, this paper also investigate the relationship between IoT and fog/edge computing, and discuss issues in fog/edge computing-based IoT. Finally, several applications, including the smart grid, smart transportation, and smart cities, are presented to demonstrate how fog/edge computing-based IoT to be implemented in real-world applications.

[1]  Gang Gan,et al.  Internet of Things Security Analysis , 2011, 2011 International Conference on Internet Technology and Applications.

[2]  Shuang-Hua Yang,et al.  RFID Sensor Network Network Architectures to Integrate RFID, Sensor and WSN , 2007 .

[3]  A. Perrig,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[4]  Weisong Shi,et al.  Security in Internet of Things: Opportunities and Challenges , 2016, 2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI).

[5]  Ayman I. Kayssi,et al.  IP Spoofing Detection Using Modified Hop Count , 2014, 2014 IEEE 28th International Conference on Advanced Information Networking and Applications.

[6]  Mohsen Guizani,et al.  Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.

[7]  Miao Wu,et al.  Research on the architecture of Internet of Things , 2010, 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE).

[8]  Srdjan Capkun,et al.  Self-Organized Public-Key Management for Mobile Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..

[9]  Lida Xu,et al.  Enterprise Systems: State-of-the-Art and Future Trends , 2011, IEEE Transactions on Industrial Informatics.

[10]  Paramvir Bahl,et al.  Low Latency Geo-distributed Data Analytics , 2015, SIGCOMM.

[11]  Jayashree Agarkhed,et al.  QoS based multipath routing for intrusion detection of sinkhole attack in wireless sensor networks , 2016, 2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT).

[12]  Mohsen Guizani,et al.  An effective key management scheme for heterogeneous sensor networks , 2007, Ad Hoc Networks.

[13]  Jan Markendahl,et al.  WHO IS INVESTING IN MACHINE-TO-MACHINE COMMUNICATIONS? , 2013 .

[14]  Hang Liu,et al.  Cooperative spectrum sharing of multiple primary users and multiple secondary users , 2016 .

[15]  Junichi Nakamura,et al.  Image Sensors and Signal Processing for Digital Still Cameras , 2005 .

[16]  E. A. Mary Anita,et al.  A novel robust routing protocol RAEED to avoid DoS attacks in WSN , 2016, 2016 International Conference on Information Communication and Embedded Systems (ICICES).

[17]  T. Luckenbach,et al.  TinyREST – a Protocol for Integrating Sensor Networks into the Internet , 2005 .

[18]  C. Richard G. Helps,et al.  Cyber-physical system concepts for IT students , 2013, SIGITE Conference.

[19]  Guihai Chen,et al.  Privacy and Quality Preserving Multimedia Data Aggregation for Participatory Sensing Systems , 2015, IEEE Transactions on Mobile Computing.

[20]  Dong Seong Kim,et al.  Access Control and Authorization for Security of RFID Multi-Domain Using SAML and XACML , 2006, 2006 International Conference on Computational Intelligence and Security.

[21]  L. Roselli,et al.  Review of the present technologies concurrently contributing to the implementation of the Internet of Things (IoT) paradigm: RFID, Green Electronics, WPT and Energy Harvesting , 2015, 2015 IEEE Topical Conference on Wireless Sensors and Sensor Networks (WiSNet).

[22]  Anna N. Kim,et al.  When HART goes wireless: Understanding and implementing the WirelessHART standard , 2008, 2008 IEEE International Conference on Emerging Technologies and Factory Automation.

[23]  S. Shankar Sastry,et al.  Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.

[24]  Xinwen Fu,et al.  DSSS-Based Flow Marking Technique for Invisible Traceback , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[25]  Frank Eliassen,et al.  RESTful integration of heterogeneous devices in pervasive environments , 2010, DAIS'10.

[26]  Gennaro Boggia,et al.  On Optimal Scheduling in Duty-Cycled Industrial IoT Applications Using IEEE802.15.4e TSCH , 2013, IEEE Sensors Journal.

[27]  Amardeep Das,et al.  Firewall engine based on Graphics Processing Unit , 2014, 2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies.

[28]  Manas Ranjan Patra,et al.  Cloud Computing: Security Issues and Research Challenges , 2011 .

[29]  Dong Xuan,et al.  Query aggregation for providing efficient data services in sensor networks , 2004, 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE Cat. No.04EX975).

[30]  Diego López-de-Ipiña,et al.  A Triple Space-Based Semantic Distributed Middleware for Internet of Things , 2010, ICWE Workshops.

[31]  Xinyu Yang,et al.  Toward a Gaussian-Mixture Model-Based Detection Scheme Against Data Integrity Attacks in the Smart Grid , 2017, IEEE Internet Things J..

[32]  Xinyu Yang,et al.  Towards Effective En-Route Filtering against Injected False Data in Wireless Sensor Networks , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[33]  Lida Xu,et al.  The internet of things: a survey , 2014, Information Systems Frontiers.

[34]  Nader Mohamed,et al.  Challenges in middleware solutions for the internet of things , 2012, 2012 International Conference on Collaboration Technologies and Systems (CTS).

[35]  John A. Stankovic,et al.  Research Directions for the Internet of Things , 2014, IEEE Internet of Things Journal.

[36]  Ivan Stojmenovic,et al.  The Fog computing paradigm: Scenarios and security issues , 2014, 2014 Federated Conference on Computer Science and Information Systems.

[37]  Xinwen Fu,et al.  CAP: A Context-Aware Privacy Protection System for Location-Based Services , 2009, 2009 29th IEEE International Conference on Distributed Computing Systems.

[38]  R. Bettati,et al.  An Integrated Middleware-Based Solution for Supporting Secured Dynamic-Coalition Applications in Heterogeneous Environments , .

[39]  Wei Yu,et al.  Assessing Performance of Constrained Application Protocol (CoAP) in MANET Using Emulation , 2016, RACS.

[40]  Ieee Standards Board IEEE standards for local and metropolitan area networks : overview and architecture , 1990 .

[41]  Jianzhong Li,et al.  Location-privacy-aware review publication mechanism for local business service systems , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.

[42]  Patrick Tague,et al.  Network self-organization in the Internet of Things , 2013, 2013 IEEE International Conference on Sensing, Communications and Networking (SECON).

[43]  Antonio F. Gómez-Skarmeta,et al.  Survey of Internet of Things Technologies for Clinical Environments , 2013, 2013 27th International Conference on Advanced Information Networking and Applications Workshops.

[44]  Nada Golmie,et al.  An integrated detection system against false data injection attacks in the Smart Grid , 2015, Secur. Commun. Networks.

[45]  Carsten Bormann,et al.  CoAP: An Application Protocol for Billions of Tiny Internet Nodes , 2012, IEEE Internet Computing.

[46]  Gennaro Boggia,et al.  Standardized Protocol Stack for the Internet of (Important) Things , 2013, IEEE Communications Surveys & Tutorials.

[47]  Imran A. Zualkernan,et al.  Internet of things (IoT) security: Current status, challenges and prospective measures , 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST).

[48]  Tao Xiang,et al.  User Differentiated Verifiable File Search on the Cloud , 2018, IEEE Transactions on Services Computing.

[49]  Zvonimir Sipus,et al.  Active wireless sensor with radio frequency identification chip , 2012, 2012 Proceedings of the 35th International Convention MIPRO.

[50]  Klaus Finkenzeller,et al.  Rfid Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification , 2003 .

[51]  Zhipeng Cai,et al.  FakeMask: A Novel Privacy Preserving Approach for Smartphones , 2016, IEEE Transactions on Network and Service Management.

[52]  Xinyu Yang,et al.  On Data Integrity Attacks Against Real-Time Pricing in Energy-Based Cyber-Physical Systems , 2017, IEEE Transactions on Parallel and Distributed Systems.

[53]  Martin Gilje Jaatun,et al.  Cyber security challenges in Smart Grids , 2011, 2011 2nd IEEE PES International Conference and Exhibition on Innovative Smart Grid Technologies.

[54]  Yves Deswarte,et al.  Survey on security threats and protection mechanisms in embedded automotive networks , 2013, 2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W).

[55]  Xinyu Yang,et al.  A Novel En-route Filtering Scheme against False Data Injection Attacks in Cyber-Physical Networked Systems , 2012, 2012 IEEE 32nd International Conference on Distributed Computing Systems.

[56]  Guobin Xu,et al.  A Cloud Computing Based Network Monitoring and Threat Detection System for Critical Infrastructures , 2016, Big Data Res..

[57]  Xinyu Yang,et al.  A Novel Dynamic En-Route Decision Real-Time Route Guidance Scheme in Intelligent Transportation Systems , 2015, 2015 IEEE 35th International Conference on Distributed Computing Systems.

[58]  Weisong Shi,et al.  Edge Computing: Vision and Challenges , 2016, IEEE Internet of Things Journal.

[59]  Xinyu Yang,et al.  On binary decomposition based privacy-preserving aggregation schemes in real-time monitoring systems , 2015, 2015 IEEE International Conference on Communications (ICC).

[60]  Laurence T. Yang,et al.  Data Mining for Internet of Things: A Survey , 2014, IEEE Communications Surveys & Tutorials.

[61]  Weijia Jia,et al.  A new cell counter based attack against tor , 2009, CCS.

[62]  Dong Xuan,et al.  A dynamic geographic hash table for data-centric storage in sensor networks , 2006, IEEE Wireless Communications and Networking Conference, 2006. WCNC 2006..

[63]  Michele Zorzi,et al.  The “Wireless Sensor Networks for City-Wide Ambient Intelligence (WISE-WAI)” Project , 2009, Sensors.

[64]  Ramesh Karri,et al.  Scan based side channel attack on dedicated hardware implementations of Data Encryption Standard , 2004 .

[65]  Xinyu Yang,et al.  On Scaling Perturbation Based Privacy-Preserving Schemes in Smart Metering Systems , 2013, 2013 22nd International Conference on Computer Communication and Networks (ICCCN).

[66]  Vlad Trifa,et al.  SOA-Based Integration of the Internet of Things in Enterprise Services , 2009, 2009 IEEE International Conference on Web Services.

[67]  Vlad Trifa,et al.  Interacting with the SOA-Based Internet of Things: Discovery, Query, Selection, and On-Demand Provisioning of Web Services , 2010, IEEE Transactions on Services Computing.

[68]  Wei Yu,et al.  On false data injection attacks against Kalman filtering in power system dynamic state estimation , 2016, Secur. Commun. Networks.

[69]  Antonio F. Gómez-Skarmeta,et al.  Light-Weight Multicast DNS and DNS-SD (lmDNS-SD): IPv6-Based Resource and Service Discovery for the Web of Things , 2012, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.

[70]  Lionel Touseau,et al.  Combining heterogeneous service technologies for building an Internet of Things middleware , 2012, Comput. Commun..

[71]  Xinyu Yang,et al.  On False Data Injection Attacks against Distributed Energy Routing in Smart Grid , 2012, 2012 IEEE/ACM Third International Conference on Cyber-Physical Systems.

[72]  Xuechen He The Two-Dimensional Bar Code Application in Book Management , 2010, 2010 International Conference on Web Information Systems and Mining.

[73]  Ramesh Karri,et al.  Scan based side channel attack on dedicated hardware implementations of Data Encryption Standard , 2004, 2004 International Conferce on Test.

[74]  Jiafu Wan,et al.  Security in the Internet of Things: A Review , 2012, 2012 International Conference on Computer Science and Electronics Engineering.

[75]  Felix Wortmann,et al.  Internet of Things , 2015, Business & Information Systems Engineering.

[76]  Syed Hassan Ahmed,et al.  Cyber Physical System: Architecture, applications and research challenges , 2013, 2013 IFIP Wireless Days (WD).

[77]  Charalampos Doukas,et al.  COMPOSE: Building smart & context-aware mobile applications utilizing IoT technologies , 2013, Global Information Infrastructure Symposium - GIIS 2013.

[78]  Dirk Westhoff,et al.  CDA: concealed data aggregation for reverse multicast traffic in wireless sensor networks , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.

[79]  Jae-Woo Kim,et al.  Design of RFID Mutual Authentication Protocol Using Time Stamp , 2009, 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology.

[80]  Yuxi Liu,et al.  Key Technologies and Applications of Internet of Things , 2012, 2012 Fifth International Conference on Intelligent Computation Technology and Automation.

[81]  Mahdi H. Miraz,et al.  A review on Internet of Things (IoT), Internet of Everything (IoE) and Internet of Nano Things (IoNT) , 2015, 2015 Internet Technologies and Applications (ITA).

[82]  Vinay Soni,et al.  Detecting Sinkhole Attack in Wireless Sensor Network , 2013 .

[83]  Xinyu Yang,et al.  Towards Multistep Electricity Prices in Smart Grid Electricity Markets , 2016, IEEE Transactions on Parallel and Distributed Systems.

[84]  Emil Angelov Google Self-driving car , 2016 .

[85]  Nader Mohamed,et al.  Middleware: middleware challenges and approaches for wireless sensor networks , 2006, IEEE Distributed Systems Online.

[86]  Emiliano Miluzzo,et al.  A survey of mobile phone sensing , 2010, IEEE Communications Magazine.

[87]  Zhen Ling,et al.  Cyber Crime Scene Investigations (C²SI) through Cloud Computing , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems Workshops.

[88]  Xiaojiang Du,et al.  A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..

[89]  Ana Roxin,et al.  TransportML: A Middleware for Location-Based Services Collaboration , 2009, 2009 3rd International Conference on New Technologies, Mobility and Security.

[90]  Ck Cheng,et al.  The Age of Big Data , 2015 .

[91]  Varsha Singh,et al.  MAODV: Modified wormhole detection AODV protocol , 2013, 2013 Sixth International Conference on Contemporary Computing (IC3).

[92]  Jia Guo,et al.  Trust management for service composition in SOA-based IoT systems , 2014, 2014 IEEE Wireless Communications and Networking Conference (WCNC).

[93]  Xinwen Fu,et al.  Self-Disciplinary Worms and Countermeasures: Modeling and Analysis , 2010, IEEE Transactions on Parallel and Distributed Systems.

[94]  Xun Wang,et al.  Detecting worms via mining dynamic program execution , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.

[95]  Xinyu Yang,et al.  Towards Efficient and Secured Real-Time Pricing in the Smart Grid , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).

[96]  Xinwen Fu,et al.  A context-aware scheme for privacy-preserving location-based services , 2012, Comput. Networks.

[97]  R. Muniz,et al.  A robust software barcode reader using the Hough transform , 1999, Proceedings 1999 International Conference on Information Intelligence and Systems (Cat. No.PR00446).

[98]  Matthew R. McKay,et al.  On the Equivalence Between Interference and Eavesdropping in Wireless Communications , 2014, IEEE Transactions on Vehicular Technology.

[99]  Qun Li,et al.  A Survey of Fog Computing: Concepts, Applications and Issues , 2015, Mobidata@MobiHoc.

[100]  Evangelos N. Gazis,et al.  A survey of technologies for the internet of things , 2015, 2015 International Wireless Communications and Mobile Computing Conference (IWCMC).

[101]  Antonio Pescapè,et al.  On the Integration of Cloud Computing and Internet of Things , 2014, 2014 International Conference on Future Internet of Things and Cloud.

[102]  Chiara Petrioli,et al.  Pro-Energy: A novel energy prediction model for solar and wind energy-harvesting wireless sensor networks , 2012, 2012 IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS 2012).

[103]  Yingshu Li,et al.  Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks , 2018, IEEE Transactions on Dependable and Secure Computing.

[104]  Shaowei Wang,et al.  Joint optimization of spectrum and energy efficiency in cognitive radio networks , 2015, Digit. Commun. Networks.

[105]  Jeng-Farn Lee,et al.  TEAM: Trust-Extended Authentication Mechanism for Vehicular Ad Hoc Networks , 2011, IEEE Systems Journal.

[106]  Daniel S. Yeung,et al.  RFID access authorization by face recognition , 2009, 2009 International Conference on Machine Learning and Cybernetics.

[107]  Raja Lavanya,et al.  Fog Computing and Its Role in the Internet of Things , 2019, Advances in Computer and Electrical Engineering.

[108]  Weijia Jia,et al.  A New Cell-Counting-Based Attack Against Tor , 2012, IEEE/ACM Transactions on Networking.

[109]  George C. Hadjichristofi,et al.  Internet of Things: Security vulnerabilities and challenges , 2015, 2015 IEEE Symposium on Computers and Communication (ISCC).

[110]  W. Kluge,et al.  A Fully Integrated 2.4-GHz IEEE 802.15.4-Compliant Transceiver for ZigBee™ Applications , 2006, IEEE Journal of Solid-State Circuits.

[111]  Rui Li,et al.  Towards a Low-Cost Remote Memory Attestation for the Smart Grid , 2015, Sensors.

[112]  D. Saha,et al.  Present Scenarios and Future Challenges in Pervasive Middleware , 2006, 2006 1st International Conference on Communication Systems Software & Middleware.

[113]  Hyuk Lim,et al.  Prefetching-Based Data Dissemination in Vehicular Cloud Systems , 2016, IEEE Transactions on Vehicular Technology.

[114]  Bruno Sinopoli,et al.  Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[115]  Wu He,et al.  Internet of Things in Industries: A Survey , 2014, IEEE Transactions on Industrial Informatics.

[116]  Wei Yu,et al.  On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures , 2014, IEEE Transactions on Parallel and Distributed Systems.

[117]  Luming Tan,et al.  Future internet: The Internet of Things , 2010, 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE).

[118]  Lauro T. Kubota,et al.  Review of the use of biosensors as analytical tools in the food and drink industries , 2002 .

[119]  Hui Liu,et al.  Novel Anti-forensics Approaches for Smart Phones , 2012, 2012 45th Hawaii International Conference on System Sciences.

[120]  Radu Prodan,et al.  A survey and taxonomy of infrastructure as a service and web hosting cloud providers , 2009, 2009 10th IEEE/ACM International Conference on Grid Computing.

[121]  Radha Poovendran,et al.  A Passivity Framework for Modeling and Mitigating Wormhole Attacks on Networked Control Systems , 2013, IEEE Transactions on Automatic Control.

[122]  Ranjita Bhagwan,et al.  Anonygator: Privacy and Integrity Preserving Data Aggregation , 2010, Middleware.

[123]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[124]  Jafar Ramadhan Mohammed A New Simple Adaptive Noise Cancellation Scheme Based On ALE and NLMS Filter , 2007, Fifth Annual Conference on Communication Networks and Services Research (CNSR '07).

[125]  Imrich Chlamtac,et al.  Internet of things: Vision, applications and research challenges , 2012, Ad Hoc Networks.

[126]  Chunxiao Jiang,et al.  Information Security in Big Data: Privacy and Data Mining , 2014, IEEE Access.

[127]  Sneha A. Dalvi,et al.  Internet of Things for Smart Cities , 2017 .

[128]  Xinyu Yang,et al.  On Distributed Energy Routing Protocols in the Smart Grid , 2013 .

[129]  Antonio Iera,et al.  The Social Internet of Things (SIoT) - When social networks meet the Internet of Things: Concept, architecture and network characterization , 2012, Comput. Networks.

[130]  Aikaterini Mitrokotsa,et al.  Classifying RFID attacks and defenses , 2010, Inf. Syst. Frontiers.

[131]  Ian F. Akyildiz,et al.  A cross-layer communication module for the Internet of Things , 2013, Comput. Networks.

[132]  Zheng Guo,et al.  Differential power cryptanalysis attacks against PRESENT implementation , 2010, 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE).

[133]  Victor C. M. Leung,et al.  Anti-Eavesdropping Schemes for Interference Alignment (IA)-Based Wireless Networks , 2016, IEEE Transactions on Wireless Communications.

[134]  Stuart Cheshire,et al.  DNS-Based Service Discovery , 2013, RFC.

[135]  Sandip Lahiri,et al.  RFID Sourcebook , 2005 .

[136]  Wei Yu,et al.  Smart city: The state of the art, datasets, and evaluation platforms , 2017, 2017 IEEE/ACIS 16th International Conference on Computer and Information Science (ICIS).

[137]  Kai Zhao,et al.  A Survey on the Internet of Things Security , 2013, 2013 Ninth International Conference on Computational Intelligence and Security.

[138]  Yada Zhu,et al.  Social Phishing , 2018, Encyclopedia of Social Network Analysis and Mining. 2nd Ed..

[139]  László Monostori,et al.  A survey of applications and requirements of unique identification systems and RFID techniques , 2011, Comput. Ind..

[140]  Xue Liu,et al.  PDA: Privacy-Preserving Data Aggregation in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[141]  Arkady B. Zaslavsky,et al.  Sensing as a Service and Big Data , 2013, ArXiv.

[142]  Philip Levis,et al.  RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks , 2012, RFC.

[143]  Alessandro Neri,et al.  A federated architecture approach for Internet of Things security , 2014, 2014 Euro Med Telco Conference (EMTC).

[144]  Xinyu Yang,et al.  Data integrity attacks against the distributed real-time pricing in the smart grid , 2016, 2016 IEEE 35th International Performance Computing and Communications Conference (IPCCC).

[145]  Seyyed Mohsen Hashemi,et al.  Route guidance systems: Review and classification , 2012, 2012 6th Euro American Conference on Telematics and Information Systems (EATIS).

[146]  Xinyu Yang,et al.  On data integrity attacks against optimal power flow in power grid systems , 2017, 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[147]  Peter Saint-Andre Extensible Messaging and Presence Protocol (XMPP): Core , 2011, RFC.

[148]  Carles Gomez,et al.  Wireless home automation networks: A survey of architectures and technologies , 2010, IEEE Communications Magazine.

[149]  Xiaohui Liang,et al.  Sybil Attacks and Their Defenses in the Internet of Things , 2014, IEEE Internet of Things Journal.

[150]  Wei Xiang,et al.  Radio resource allocation in LTE-advanced cellular networks with M2M communications , 2012, IEEE Communications Magazine.

[151]  Stefano Chessa,et al.  Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards , 2007, Comput. Commun..

[152]  Debdutta Barman Roy,et al.  Prevention of sleep deprivation attacks using clustering , 2011, 2011 3rd International Conference on Electronics Computer Technology.

[153]  Pradeep K. Khosla,et al.  SWATT: softWare-based attestation for embedded devices , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[154]  Michele Zorzi,et al.  The Deployment of a Smart Monitoring System Using Wireless Sensor and Actuator Networks , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[155]  C. Jayakumar,et al.  Node capture attack in Wireless Sensor Network: A survey , 2012, 2012 IEEE International Conference on Computational Intelligence and Computing Research.

[156]  Dapeng Wu,et al.  Scalable privacy-preserving big data aggregation mechanism , 2016 .