1. Neshenko, N., E. Bou-Harb, J. Crichigno, G. Kaddoum, N. Ghani. Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities and a First Empirical Look on Internet-Scale IoT Exploitations. – IEEE Communications Surveys & Tutorials, Vol. 21, Third Quarter 2019, No 3, pp. 2702-2733.10.1109/COMST.2019.2910750
2. Shin, D., K. Yun, J. Kim, P. V. Astillo, J. Kim, I. You. A Security Protocol for Route Optimization in DMM-Based Smart Home IoT Networks. – IEEE Access, Vol. 7, 2019, pp. 142531-142550.10.1109/ACCESS.2019.2943929
3. Meneghello, F., M. Calore, D. Zucchetto, M. Polese, A. Zanella. IoT: Internet of Threats? A Survey of Practical Security Vulnerabilities in Real IoT Devices. – IEEE Internet of Things Journal, Vol. 6, October 2019, No 5, pp. 8182-8201.10.1109/JIOT.2019.2935189
4. Hassija, V., V. Chamola, V. Saxena, D. Jain, P. Goyal, B. Sikdar. A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures. – IEEE Access, Vol. 7, 2019, pp. 82721-82743.10.1109/ACCESS.2019.2924045
6. Samaila, M. G., J. B. F. Sequeiros, T. Simões, M. M. Freire, P. R. M. Inácio. IoT-HarPSecA: A Framework and Roadmap for Secure Design and Development of Devices and Applications in the IoT Space. – IEEE Access, Vol. 8, 2020, pp. 16462-16494.10.1109/ACCESS.2020.2965925
7. Frustaci, M., P. Pace, G. Aloi, G. Fortino. Evaluating Critical Security Issues of the IoT World: Present and Future Challenges. – IEEE Internet of Things Journal, Vol. 5, August 2018, No 4, pp. 2483-2495.10.1109/JIOT.2017.2767291
8. Ingham, M., J. Marchang, D. Bhowmik. IoT Security Vulnerabilities and Predictive Signal Jamming Attack Analysis in LoRaWAN. – IET Information Security, Vol. 14, 2020, No 4, pp. 368-379.10.1049/iet-ifs.2019.0447
9. Wang, D., B. Bai, K. Lei, W. Zhao, Y. Yang, Z. Han. Enhancing Information Security via Physical Layer Approaches in Heterogeneous IoT with Multiple Access Mobile Edge Computing in Smart City. – IEEE Access, Vol. 7, 2019, pp. 54508-54521.10.1109/ACCESS.2019.2913438
10. Lounis, K., M. Zulkernine. Attacks and Defenses in Short-Range Wireless Technologies for IoT. – IEEE Access, Vol. 8, 2020, pp. 88892-88932.10.1109/ACCESS.2020.2993553
11. Malani, S., J. Srinivas, A. K. Das, K. Srinathan, M. Jo. Certificate-Based Anonymous Device Access Control Scheme for IoT Environment. – IEEE Internet of Things Journal, Vol. 6, December 2019, No 6, pp. 9762-9773.10.1109/JIOT.2019.2931372
13. Asplund, M., S. Nadjm-Tehrani. Attitudes and Perceptions of IoT Security in Critical Societal Services. – IEEE Access, Vol. 4, 2016, pp. 2130-2138.10.1109/ACCESS.2016.2560919
14. Wazid, M., A. K. Das, V. Odelu, N. Kumar, M. Conti, M. Jo. Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks. – IEEE Internet of Things Journal, Vol. 5, February 2018, No 1, pp. 269-282.10.1109/JIOT.2017.2780232
15. Farris, T. T., Y. Khettab, J. Song. A Survey on Emerging SDN and NFV Security Mechanisms for IoT Systems. – IEEE Communications Surveys & Tutorials, Vol. 21, First Quarter 2019, No 1, pp. 812-837.10.1109/COMST.2018.2862350
16. Zarca, M., J. B. Bernabe, A. Skarmeta, J. M. Alcaraz Calero. Virtual IoT HoneyNets to Mitigate Cyberattacks in SDN/NFV-Enabled IoT Networks. – IEEE Journal on Selected Areas in Communications, Vol. 38, June 2020, No 6, pp. 1262-1277.10.1109/JSAC.2020.2986621
17. Yi, M., X. Xu, L. Xu. An Intelligent Communication Warning Vulnerability Detection Algorithm Based on IoT Technology. – IEEE Access, Vol. 7, 2019, pp. 164803-164814.10.1109/ACCESS.2019.2953075
18. Zhou, W., Y. Jia, A. Peng, Y. Zhang, P. Liu. The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved. – IEEE Internet of Things Journal, Vol. 6, April 2019, No 2, pp. 1606-1616.10.1109/JIOT.2018.2847733
19. Shin, D., V. Sharma, J. Kim, S. Kwon, I. You. Secure and Efficient Protocol for Route Optimization in PMIPv6-Based Smart Home IoT Networks. – IEEE Access, Vol. 5, 2017, pp. 11100-11117.10.1109/ACCESS.2017.2710379
20. Sathyadevan, S., K. Achuthan, R. Doss, L. Pan. Protean Authentication Scheme – A Time-Bound Dynamic KeyGen Authentication Technique for IoT Edge Nodes in Outdoor Deployments. – IEEE Access, Vol. 7, 2019, pp. 92419-92435.10.1109/ACCESS.2019.2927818
21. Mukherjee. Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints. – Proceedings of the IEEE, Vol. 103, October 2015, No 10, pp. 1747-1761.10.1109/JPROC.2015.2466548
22. Amato, F., V. Casola, G. Cozzolino, A. De Benedictis, F. Moscato. Exploiting Workflow Languages and Semantics for Validation of Security Policies in IoT Composite Services. – IEEE Internet of Things Journal, Vol. 7, May 2020, No 5, pp. 4655-4665.10.1109/JIOT.2019.2960316
23. Oh, M., S. Lee, Y. Kang, D. Choi. Wireless Transceiver Aided Run-Time Secret Key Extraction for IoT Device Security. – IEEE Transactions on Consumer Electronics, Vol. 66, February 2020, No 1, pp. 11-21.10.1109/TCE.2019.2959593
24. Mandal, S., B. Bera, A. K. Sutrala, A. K. Das, K. R. Choo, Y. Park. Certificateless-Signcryption-Based Three-Factor User Access Control Scheme for IoT Environment. – IEEE Internet of Things Journal, Vol. 7, April 2020, No 4, pp. 3184-3197.10.1109/JIOT.2020.2966242
25. Tedeschi, P., S. Sciancalepore, A. Eliyan, R. Di Pietro. LiKe: Lightweight Certificateless Key Agreement for Secure IoT Communications. – IEEE Internet of Things Journal, Vol. 7, January 2020, No 1, pp. 621-638.10.1109/JIOT.2019.2953549
26. Ahanger, T. A., A. Aljumah. Internet of Things: A Comprehensive Study of Security Issues and Defense Mechanisms. – IEEE Access, Vol. 7, 2019, pp. 11020-11028.10.1109/ACCESS.2018.2876939
27. Li, C., Z. Qin, E. Novak, Q. Li. Securing SDN Infrastructure of IoT-Fog Networks from MitM Attacks. – IEEE Internet of Things Journal, Vol. 4, October 2017, No 5, pp. 1156-1164.10.1109/JIOT.2017.2685596
28. Thangavelu, V., D. M. Divakaran, R. Sairam, S. S. Bhunia, M. Gurusamy. DEFT: A Distributed IoT Fingerprinting Technique. – IEEE Internet of Things Journal, Vol. 6, February 2019, No 1, pp. 940-952.10.1109/JIOT.2018.2865604
29. Zhao, B., P. Zhao, P. Fan. ePUF: A Lightweight Double Identity Verification in IoT. – Tsinghua Science and Technology, Vol. 25, October 2020, No 5, pp. 625-635.10.26599/TST.2019.9010072
31. Alshahrani, M., I. Traore, I. Woungang. Anonymous Mutual IoT Interdevice Authentication and Key Agreement Scheme Based on the ZigBee Technique. – Internet of Things, Vol. 7, 2019, No 2, 100061.10.1016/j.iot.2019.100061
32. Fakroon, M., M. Alshahrani, F. Gebali, I. Traore. Secure Remote Anonymous User Authentication Scheme for Smart Home Environment. – Internet of Things, Vol. 9, 2020, No 1, 100158.10.1016/j.iot.2020.100158
33. Rizvi, S., R. Orr, A. Cox, P. Ashokkumar, M. R. Rizvi. Identifying the Attack Surface for IoT Network. – Internet of Things, Vol. 9, 2020, No 1, 100162.10.1016/j.iot.2020.100162
34. Enokido, T., M. Takizawa. The Redundant Energy Consumption Laxity Based Algorithm to Perform Computation Processes for IoT Services. – Internet of Things, Vol. 9, 2020, No 1, 100165.10.1016/j.iot.2020.100165
35. Ghosh, A., A. Raha, A. Mukherjee. Energy-Efficient IoT-Health Monitoring System Using Approximate Computing. – Internet of Things, Vol. 9, 2020, No 2, 100166.10.1016/j.iot.2020.100166
36. Fallis, E., P. Spachos, S. Gregori. A Power-Efficient Audio Acquisition System for Smart City Applications. – Internet of Things, Vol. 9, 2020, No 1, 100155.10.1016/j.iot.2019.100155
37. Karanja, E. M., S. Masupe, M. G. Jeffrey. Analysis of Internet of Things Malware Using Image Texture Features and Machine Learning Techniques. – Internet of Things, Vol. 9, 2020, No 2, 100153.10.1016/j.iot.2019.100153
38. Shukla, R. M., S. Sengupta. COP: An Integrated Communication, Optimization, and Prediction Unit for Smart Plug-in Electric Vehicle Charging. – Internet of Things, Vol. 9, 2020, 100148.10.1016/j.iot.2019.100148
39. Aftab, N., S. A. Zaidi, D. McLernon. Scalability Analysis of Multiple Lora Gateways Using Stochastic Geometry. – Internet of Things, Vol. 9, 2020, No 1, 100132.10.1016/j.iot.2019.100132
40. Nizzi, F., T. Pecorella, F. Esposito, L. Pierucci, R. Fantacci. IoT Security via Address Shuffling: The Easy Way. – IEEE Internet of Things Journal, Vol. 6, April 2019, No 2, pp. 3764-3774.10.1109/JIOT.2019.2892003
41. Liu, Y., Y. Kuang, Y. Xiao, G. Xu. SDN-Based Data Transfer Security for Internet of Things. – IEEE Internet of Things Journal, Vol. 5, February 2018, No 1, pp. 257-268.10.1109/JIOT.2017.2779180
42. Das, K., M. Wazid, A. R. Yannam, J. J. P. C. Rodrigues, Y. Park. Provably Secure ECC-Based Device Access Control and Key Agreement Protocol for IoT Environment. – IEEE Access, Vol. 7, 2019, pp. 55382-55397.10.1109/ACCESS.2019.2912998
44. Badii, C., P. Bellini, A. Difino, P. Nesi. Smart City IoT Platform Respecting GDPR Privacy and Security Aspects. – IEEE Access, Vol. 8, 2020, pp. 23601-23623.10.1109/ACCESS.2020.2968741
45. Chaabouni, N., M. Mosbah, A. Zemmari, C. Sauvignac, P. Faruki. Network Intrusion Detection for IoT Security Based on Learning Techniques. – IEEE Communications Surveys & Tutorials, Vol. 21, Third Quarter 2019, No 3, pp. 2671-2701.10.1109/COMST.2019.2896380
46. Hwang, J., A. Aziz, N. Sung, A. Ahmad, F. Le Gall, J. Song. AUTOCON-IoT: Automated and Scalable Online Conformance Testing for IoT Applications. – IEEE Access, Vol. 8, 2020, pp. 43111-43121.10.1109/ACCESS.2020.2976718
47. Hafeez, M. Antikainen, A. Y. Ding, S. Tarkoma. IoT-KEEPER: Detecting Malicious IoT Network Activity Using Online Traffic Analysis at the Edge. – IEEE Transactions on Network and Service Management, Vol. 17, March 2020, No 1, pp. 45-59.10.1109/TNSM.2020.2966951
48. Xu, Q., P. Ren, H. Song, Q. Du. Security Enhancement for IoT Communications Exposed to Eavesdroppers with Uncertain Locations. – IEEE Access, Vol. 4, 2016, pp. 2840-2853.10.1109/ACCESS.2016.2575863
49. De Hoz Diego, J. D., J. Saldana, J. Fernández-Navajas, J. Ruiz-Mas. IoTsafe, Decoupling Security from Applications for a Safer IoT. – IEEE Access, Vol. 7, 2019, pp. 29942-29962.10.1109/ACCESS.2019.2900939
50. Mohsenian-Rad, A. Leon-Garcia. Distributed Internet-Based Load Altering Attacks Against Smart Power Grids. – IEEE Transactions on Smart Grid, Vol. 2, December 2011, No 4, pp. 667-674.10.1109/TSG.2011.2160297
51. Samarah, S., M. G. Al Zamil, A. F. Aleroud, M. Rawashdeh, M. F. Alhamid, A. Alamri. An Efficient Activity Recognition Framework: Toward Privacy-Sensitive Health Data Sensing. – IEEE Access, Vol. 5, 2017, pp. 3848-3859.10.1109/ACCESS.2017.2685531
52. Mosenia, S. Sur-Kolay, A. Raghunathan, N. K. Jha. DISASTER: Dedicated Intelligent Security Attacks on Sensor-Triggered Emergency Responses. – IEEE Transactions on Multi-Scale Computing Systems, Vol. 3, 1 October-December 2017, No 4, pp. 255-268.10.1109/TMSCS.2017.2720660
53. Saxena, N., B. J. Choi, R. Lu. Authentication and Authorization Scheme for Various User Roles and Devices in Smart Grid. – IEEE Transactions on Information Forensics and Security, Vol. 11, May 2016, No 5, pp. 907-921.10.1109/TIFS.2015.2512525
54. Gupta, M., M. Abdelsalam, S. Khorsandroo, S. Mittal. Security and Privacy in Smart Farming: Challenges and Opportunities. – IEEE Access, Vol. 8, 2020, pp. 34564-34584.10.1109/ACCESS.2020.2975142
55. Koroniotis, N., N. Moustafa, E. Sitnikova. Forensics and Deep Learning Mechanisms for Botnets in Internet of Things: A Survey of Challenges and Solutions. – IEEE Access, Vol. 7, 2019, pp. 61764-61785.10.1109/ACCESS.2019.2916717
56. Kong, H., L. Lu, J. Yu, Y. Chen, F. Tang. Continuous Authentication through Finger Gesture Interaction for Smart Homes Using WiFi. – IEEE Transactions on Mobile Computing. DOI: 10.1109/TMC.2020.2994955.10.1109/TMC.2020.2994955
57. Hossain, M., R. Hasan. P-HIP: A Lightweight and Privacy-Aware Host Identity Protocol for Internet of Things. – IEEE Internet of Things Journal. DOI: 10.1109/JIOT.2020.3009024.10.1109/JIOT.2020.3009024
58. Bin, Q., C. Ziwen, X. Yong, H. Liang, S. Sheng. Rogue Base Stations Detection for Advanced Metering Infrastructure Based on Signal Strength Clustering. – IEEE Access. DOI: 10.1109/ACCESS.2019.2934222.10.1109/ACCESS.2019.2934222
59. Zhou, Y., Y. Liu, S. Hu. Smart Home Cyberattack Detection Framework for Sponsor Incentive Attacks. – IEEE Transactions on Smart Grid, Vol. 10, March 2019, No 2, pp. 1916-1927.10.1109/TSG.2017.2781695
60. Kumar, A. Braeken, A. Gurtov, J. Iinatti, P. H. Ha. Anonymous Secure Framework in Connected Smart Home Environments. – IEEE Transactions on Information Forensics and Security, Vol. 12, April 2017, No 4, pp. 968-979.10.1109/TIFS.2016.2647225
61. Ivanova-Rohling, V. N., N. Rohling. Evaluating Machine Learning Approaches for Discovering Optimal Sets of Projection Operators for Quantum State Tomography of Qubit Systems. – Cybernetics and Information Technologies, Vol. 20, 2020, No 6, pp. 61-73.10.2478/cait-2020-0061
62. Mocrii, D., Y. Chen, P. Musilek. IoT-Based Smart Homes: A Review of System Architecture, Software, Communications, Privacy and Security. – Internet of Things, Vol. 1-2, 2018, No 2, pp. 81-98.10.1016/j.iot.2018.08.009
63. Vaidya, B., J. H. Park, S. Yeo, J. J. Rodrigues. Robust One-Time Password Authentication Scheme Using Smart Card for Home Network Environment. – Computer Communications, Vol. 34, 2011, No 3, pp. 326-336.10.1016/j.comcom.2010.03.013
64. Prabadevi, N. Jeyanthi. TSCBA-A Mitigation System for ARP Cache Poisoning Attacks. –Cybernetics and Information Technologies, Vol. 18, 2018, No 4, pp. 75-93.10.2478/cait-2018-0049
65. Jeong, J., M. Y. Chung, H. Choo. Integrated OTP-Based User Authentication Scheme Using Smart Cards in Home Networks. – In: Proc. of 41st Annual Hawaii International Conference on System Sciences (HICSS’08), Waikoloa, HI, 2008, pp. 294-294.10.1109/HICSS.2008.208
66. Brindha, K., N. Jeyanthi. Secured Document Sharing Using Visual Cryptography in Cloud Data Storage. – Cybernetics and Information Technologies, Vol. 15, 2015, No 4, pp.111-123.10.1515/cait-2015-0058
67. Wazid, M., A. K. Das, V. Odelu, N. Kumar, W. Susilo. Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment. – IEEE Transactions on Dependable and Secure Computing, Vol. 17, 1 March-April 2020, No 2, pp. 391-406.10.1109/TDSC.2017.2764083
68. Santoso, F. K., N. C. H. Vun. Securing IoT for Smart Home System. – In: Proc. of International Symposium on Consumer Electronics (ISCE’15), Madrid, 2015, pp. 1-2.10.1109/ISCE.2015.7177843
69. Srivastava, M., J. Siddiqui, M. A. Ali. A Review of Hashing Based Image Copy Detection Techniques. – Cybernetics and Information Technologies, Vol. 19, 2019, No 2, pp. 1-27.10.2478/cait-2019-0012
70. Shuai, M., N. Yu, H. Wang, L. Xiong. Anonymous Authentication Scheme for Smart Home Environment with Provable Security. – Computers & Security, Vol. 86, 2019, No 3, pp. 132-146.10.1016/j.cose.2019.06.002
71. Prabadevi, B., N. Jeyanthi. Security Solution for ARP Cache Poisoning Attacks in Large Data Center Networks. – Cybernetics and Information Technologies, Vol. 17, 2017, No 4, pp. 69-86.10.1515/cait-2017-0042
72. Shayan, M., M. Naser, G. Hossein. IoT-Based Anonymous Authentication Protocol Using Biometrics in Smart Homes. – In: Proc. of 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC’19), Mashhad, Iran, 2019, pp. 114-121.10.1109/ISCISC48546.2019.8985159
73. Gaikwad, P. P., J. P. Gabhane, S. S. Golait. 3-Level Secure Kerberos Authentication for Smart Home Systems Using IoT. – In: Proc. of 1st International Conference on Next Generation Computing Technologies (NGCT’15), Dehradun, 2015, pp. 262-268.10.1109/NGCT.2015.7375123
74. Usha, S., S. Kuppuswami, M. Karthik. A New Enhanced Authentication Mechanism Using Session Key Agreement Protocol. – Cybernetics and Information Technologies, Vol. 18, 2018, No 4, pp. 61-74.10.2478/cait-2018-0048
75. Ashibani, Y., Q. H. Mahmoud. An Efficient and Secure Scheme for Smart Home Communication Using Identity-Based Signcryption. – In: Proc. of IEEE 36th International Performance Computing and Communications Conference (IPCCC’17), San Diego, CA, 2017, pp. 1-7.10.1109/PCCC.2017.8280497
76. Gumusbas, D., T. Yildirim. Offline Signature Identification and Verification Based on Capsule Representations. – Cybernetics and Information Technologies, Vol. 20, 2020, No 5, pp. 60-67.10.2478/cait-2020-0040
77. Pencheva, E. N., I. I. Atanasov, V. G. Vladislavov. Mission Critical Messaging Using Multi-Access Edge Computing. – Cybernetics and Information Technologies, Vol. 19, 2019, No 4, pp. 73-89.10.2478/cait-2019-0037
78. Naoui, S., M. H. Elhdhili, L. A. Saidane. Novel Smart Home Authentication Protocol LRP-SHAP. – In: Proc. of IEEE Wireless Communications and Networking Conference (WCNC’19), Marrakesh, Morocco, 2019, pp. 1-6.10.1109/WCNC.2019.8885493
79. Fakroon, M., M. Alshahrani, F. Gebali, I. Traore. Secure Remote Anonymous User Authentication Scheme for Smart Home Environment. – Internet of Things, Vol. 9, 2020, No 3, 100158.10.1016/j.iot.2020.100158
80. Gayathiri, P., B. Poorna. Effective Gene Patterned Association Rule Hiding Algorithm for Privacy Preserving Data Mining on Transactional Database. – Cybernetics and Information Technologies, Vol. 17, 2017, No 3, pp. 92-108.10.1515/cait-2017-0032
81. Patil, D. R., J. B. Patil. Malicious URLs Detection Using Decision Tree Classifiers and Majority Voting Technique. – Cybernetics and Information Technologies, Vol. 18, 2018, No 1, pp. 11-29.10.2478/cait-2018-0002