This work is licensed under the Creative Commons Attribution 4.0 International License.
Gao, M., Wang, Q., Arafin, M. T., Lyu, Y., & Qu, G. (2017). Approximate computing for low power and security in the internet of things. Computer, 50(6), 27–34.Search in Google Scholar
Debe, M., Salah, K., Rehman, M. H. U., & Svetinovic, D. (2020). Blockchain-based decentralized reverse bidding in fog computing. IEEE Access, 2020(99).Search in Google Scholar
Bediya, A. K., & Kumar, R. (2021). A novel intrusion detection system for internet of things network security. Journal of information technology research(3), 14.Search in Google Scholar
Xie, T., Tu, G. H., Li, C. Y., & Peng, C. (2020). How can iot services pose new security threats in operational cellular networks?. IEEE Transactions on Mobile Computing, PP(99), 1–1.Search in Google Scholar
Hong, S. (2019). Authentication techniques in the internet of things environment: a survey. International Journal of Network Security, 21(3), 462–470.Search in Google Scholar
Abdalzaher, M. S., & Muta, O. (2020). A game-theoretic approach for enhancing security and data trustworthiness in iot applications. IEEE Internet of Things Journal, PP(99), 1–1.Search in Google Scholar
Bu, L., Isakov, M., & Kinsy, M. A. (2019). A secure and robust scheme for sharing confidential information in iot systems. Ad hoc networks, 92(SEP.), 101762.1–101762.11.Search in Google Scholar
Sequeiros, J. B. F., Chimuco, F. T., Samaila, M. G., Mário M. Freire, & Pedro R. M. Inácio. (2020). Attack and system modeling applied to iot, cloud, and mobile ecosystems: embedding security by design. ACM Computing Surveys, 53(2), 1–32.Search in Google Scholar
Liang, W., Li, W., & Feng, L. (2021). Information security monitoring and management method based on big data in the internet of things environment. IEEE Access, PP(99), 1–1.Search in Google Scholar
Kandhoul, N., Dhurandher, S. K., & Woungang, I. (2019). T_cafe: a trust based security approach for opportunistic iot. IET Communications, 13(20).Search in Google Scholar
Gebremichael, T., Ledwaba, L. P. I., Eldefrawy, M., Hancke, G. P., & Akerberg, J. (2020). Security and privacy in the industrial internet of things: current standards and future challenges. IEEE Access, PP(99), 1–1.Search in Google Scholar
Oktian, Y. E., & Lee, S. G. (2020). Borderchain: blockchain-based access control framework for the internet of things endpoint. IEEE Access, PP(99), 1–1.Search in Google Scholar
Ali, M. I., Kaur, S., Khamparia, A., Gupta, D., & Al-Turjman, F. (2020). Security challenges and cyber forensic ecosystem in iot driven byod environment. IEEE Access, 8, 172770–172782.Search in Google Scholar
Tariq, U., Aseeri, A. O., Alkatheiri, M. S., & Zhuang, Y. (2020). Context-aware autonomous security assertion for industrial iot. IEEE Access, 8, 191785–191794.Search in Google Scholar
Gomes, T., Salgado, F., Pinto, S., Cabral, J., & Tavares, A. (2018). A 6lowpan accelerator for internet of things endpoint devices. IEEE Internet of Things Journal, 5(1), 371–377.Search in Google Scholar
Lu, Z., Kuo-Hui, Y., Gerhard, H., Zhe, L., & Chunhua, S. (2018). Security and privacy for the industrial internet of things: an overview of approaches to safeguarding endpoints. IEEE Signal Processing Magazine, 35(5), 76–87.Search in Google Scholar
Dao, N. N., Phan, T. V., Sa’Ad, U., Kim, J., & Cho, S. (2021). Securing heterogeneous iot with intelligent ddos attack behavior learning. IEEE Systems Journal, PP(99), 1–10.Search in Google Scholar
Natalia, M., & Alexander, T. (2019). Internet of things: information security challenges and solutions. Cluster Computing, 1–17.Search in Google Scholar
Yang, Y., Peng, H., Li, L., & Niu, X. (2017). General theory of security and a study case in internet of things. Internet of Things Journal, IEEE, 4(2), 592–600.Search in Google Scholar
Jason, R., C., Nurse, Sadie, Creese, & David, et al. (2017). Security risk assessment in internet of things systems. IT Professional, 19(5), 20–26.Search in Google Scholar
Zou, Y., & Lv, J. (2018). Information security transmission technology in internet of things control system. International Journal of Online Engineering, 14(6), 177.Search in Google Scholar