[1] B. Anggorojati, P. N. Mahalle, N. R. Prasad and R. Prasad,
Capability-based access control delegation model on the federated IoT
network, In: IEEE 15th International Symposium on Wireless Personal
Multimedia Communications (2012), 604-608.
[2] L. Atzori, A. Iera and G Morabito, The internet of things: A
survey, Computer Networks 54(15) (2010), 2787-2805.
DOI: https://doi.org/10.1016/j.comnet.2010.05.010
[3] M. Bellare, J. Kilian and P. Rogaway, The security of the cipher
block chaining message authentication code, Journal of Computer and
System Sciences 61(3) (2000), 362-399.
DOI: https://doi.org/10.1006/jcss.1999.1694
[4] S. Chakrabarty and D. W. Engels, A secure IoT architecture for
smart cities, IEEE Annual Consumer Communications & Networking
Conference, 2016.
DOI: https://doi.org/10.1109/CCNC.2016.7444889
[5] M. Tao, K. Ota, M. Dong and Z. Qian, AccessAuth: Capacity-aware
security access authentication in federated-IoT-enabled V2G networks,
Journal of Parallel and Distributed Computing 118(1) (2018),
107-117.
DOI: https://doi.org/10.1016/j.jpdc.2017.09.004
[6] Fadele A. Alaba, M. Othman, I. A. T. Hashem and F. Alotaibi,
Internet of things security: A survey, Journal of Network and Computer
Applications 88 (2017), 10-28.
DOI: https://doi.org/10.1016/j.jnca.2017.04.002
[7] Z. Gu, G. Han, H. Zeng and Q. Zhao, Security-aware mapping and
scheduling with hardware co-processors for flexray-based distributed
embedded systems, IEEE Transactions on Parallel and Distributed
Systems 27(10) (2016), 3044-3057.
DOI: https://doi.org/10.1109/TPDS.2016.2520949
[8] Z. Guan, Y. Zhang, L. Wu, J. Wu, J. Li, Y. Ma and J. Hu, APPA: An
anonymous and privacy preserving data aggregation scheme for
fog-enhanced IoT, Journal of Network and Computer Applications 125
(2019), 82-92.
DOI: https://doi.org/10.1016/j.jnca.2018.09.019
[9] B. Yigit, G. Gür, F. Alagöz and B. Tellenbach, Cost-aware
securing of IoT systems using attack graphs, Ad Hoc Networks 86
(2019), 23-35.
DOI: https://doi.org/10.1016/j.adhoc.2018.10.024
[10] G. Zhou, H. Michalik and L. Hinsenkamp, Efficient and
high-throughput implementations of AES-GCM on FPGAs, Proceedings of
International Conference on Field Programmable Technology (2007),
185-192.
DOI: https://doi.org/10.1109/FPT.2007.4439248
[11] Y. Hori, A. Satoh, H. Sakane and K. Toda, Bitstream encryption
and authentication using AES-GCM in dynamically reconfigurable
systems, National Institute of Advanced Industrial Science and
Technology (AIST), Advances in Information and Computer Security,
Proceeding 53(12) (2012), 261-278.
DOI: https://doi.org/10.1007/978-3-540-89598-5_18
[12] Y. Jararweh, M. Al-Ayyoub, A. Darabseh, E. Benkhelifa, M. Vouk
and A. Rindos, SDIoT: A software defined based internet of things
framework, Journal of Ambient Intelligence and Humanized Computing
6(4) (2015), 453-461.
DOI: https://doi.org/10.1007/s12652-015-0290-y
[13] D. Jayasinghe, R. Ragel, J. A. Ambrose, A. Ignjatovic and S.
Parameswaran, Advanced modes in AES: Are they safe from power analysis
based side channel attacks?, IEEE International Conference on Computer
Design, 2014.
DOI: https://doi.org/10.1109/ICCD.2014.6974678
[14] J. Kim, Secure and efficient management architecture for the
internet of things, SenSys ’15: Proceedings of the 13th ACM
Conference on Embedded Networked Sensor Systems (2015), 499-500.
DOI: https://doi.org/10.1145/2809695.2822522
[15] M. S. Kim, S. R. Kim, J. Kim and Y. Yoo, Design and
implementation of MAC protocol for SmartGrid HAN environment,
Proceedings - 11th IEEE International Conference on Computer and
Information Technology (2011), 212-217.
DOI: https://doi.org/10.1109/CIT.2011.78
[16] H. Jiang, F. Shen, S. Chen, K.-C. Li and Y.-S. Jeong, A secure
and scalable storage system for aggregate data in IoT, Future
Generation Computer Systems 49 (2014), 133-141.
DOI: https://doi.org/10.1016/j.future.2014.11.009
[17] T. Li, C. Gao, L. Jiang, W. Pedrycz and J. Shen, Publicly
verifiable privacy-preserving aggregation and its application in IoT,
Journal of Network and Computer Applications 126 (2019), 39-44.
DOI: https://doi.org/10.1016/j.jnca.2018.09.018
[18] O. Mavropoulos, H. Mouratidis, A. Fish and E. Panaousis,
Apparatus: A framework for security analysis in internet of things
systems, Ad Hoc Networks 92 (2019); Article 101743.
DOI: https://doi.org/10.1016/j.adhoc.2018.08.013
[19] S. R. Moosavi, T. N. Gia, A. M. Rahmani, E. Nigussie, S.
Virtanen, J. Isoaho and H. Tenhunen, SEA: A secure and efficient
authentication and authorization architecture for IoT-based healthcare
using smart gateways, Procedia Computer Science 52 (2015), 452-459.
DOI: https://doi.org/10.1016/j.procs.2015.05.013
[20] P. M. Pawar, R. H. Nielsen, N. R. Prasad, S. Ohmori and R.
Prasad, Behavioural modelling of WSN MAC Layer Security Attacks: A
sequential UML approach, Journal of Cyber Security and Mobility 1(1)
(2012), 65-82.
[21] C. Perera, A. Zaslavsky, P. Christen and D. Georgakopoulos,
Context aware computing for the internet of things: A survey, IEEE
Communications Surveys and Tutorials 16(1) (2014), 414-454.
DOI: https://doi.org/10.1109/SURV.2013.042313.00197
[22] R. H. Randhawa, A. Hameed and A. N. Mian, Energy efficient
cross-layer approach for object security of CoAP for IoT devices, Ad
Hoc Networks 92 (2019); Article 101761.
DOI: https://doi.org/10.1016/j.adhoc.2018.09.006
[23] S. Sankaran, Lightweight security framework for IoTs using
identity based cryptography, In 2016 International Conference on
Advances in Computing, Communications and Informatics, Sept. 21-24,
2016, Jaipur, India (pp. 880-886).
DOI: https://doi.org/10.1109/ICACCI.2016.7732156
[24] S. Sicari, A. Rizzardi, D. Miorandi, C. Cappiello and A.
Coen-Porisini, A secure and quality-aware prototypical architecture
for the internet of things, Information Systems 58 (2016), 43-55.
DOI: https://doi.org/10.1016/j.is.2016.02.003
[25] J. Srinivas, S. Mukhopadhyay and D. Mishra, Secure and efficient
user authentication scheme for multi-gateway wireless sensor networks,
Ad Hoc Networks 54 (2017), 147-169.
DOI: https://doi.org/10.1016/j.adhoc.2016.11.002
[26] A. L. V. Caraguay, A. B. Peral, L. I. B. López and L. J. G.
Villalba, SDN: Evolution and opportunities in the development IoT
applications, International Journal of Distributed Sensor Networks
10(5) (2014), 1-10.
https://doi.org/10.1155/2014/735142
[27] Yue Qiu and Maode Ma, A mutual authentication and key
establishment scheme for M2M communication in 6LoWPAN, IEEE
Transactions on Industrial Informatics 12(6) (2016), 2074-2085.
DOI: https://doi.org/10.1109/TII.2016.2604681