Sorri, K., N. Mustafee, M. Seppänen. Revisiting IoT Definitions: A Framework towards Comprehensive Use. – Technological Forecasting and Social Change, Vol. 179, 06.2022, 121623.
H. Sundmaeker, P. Guillemin, P. Friess, S. Woelfflé, Eds. Vision and Challenges for Realising the Internet of Things. European Commission, Information Society and Media, Brussels, 2010.
Zhao, Z. An Efficient Anonymous Authentication Scheme for Wireless Body Area Networks Using Elliptic Curve Cryptosystem. – Journal of Medical Systems, Vol. 38, 2014, No 13. DOI: 10.1007/s10916-014-0013-5.
Chahar, N. Computer Network Security. – International Journal of Innovative Research in Science, Engineering and Technology, Vol. 7, 2022. 1031. DOI: 10.5281/zenodo.6448170.
Parkinson, S., S. Khana. Identifying High-Risk Over-Entitlement in Access Control Policies Using Fuzzy Logic. – Cybersecurity, Vol. 5, 2022, No 6. DOI: 10.1186/s42400-022-00112-1.
Rastogi, N., P. Avinav, R. Shweta. Enhanced Authentication Scheme Using Password Integrated Challenge Response Protocol. – International Journal of Computer Applications, Vol. 62, 2013, pp. 15-19. DOI: 10.5120/10107-4764.