Security, Privacy and Trust for Smart Mobile- Internet of Things (M-IoT): A Survey

With an enormous range of applications, the Internet of Things (IoT) has magnetized industries and academicians from everywhere. IoT facilitates operations through ubiquitous connectivity by providing Internet access to all the devices with computing capabilities. With the evolution of wireless infrastructure, the focus from simple IoT has been shifted to smart, connected and mobile IoT (M-IoT) devices and platforms, which can enable low-complexity, low-cost and efficient computing through sensors, machines, and even crowdsourcing. All these devices can be grouped under a common term of M-IoT. Even though the positive impact on applications has been tremendous, security, privacy and trust are still the major concerns for such networks and insufficient enforcement of these requirements introduces non-negligible threats to M-IoT devices and platforms. Thus, it is important to understand the range of solutions which are available for providing a secure, privacy-compliant, and trustworthy mechanism for M-IoT. There is no direct survey available, which focuses on security, privacy, trust, secure protocols, physical layer security and handover protections in M-IoT. This paper covers such requisites and presents comparisons of state-the-art solutions for IoT which are applicable to security, privacy, and trust in smart and connected M-IoT networks. Apart from these, various challenges, applications, advantages, technologies, standards, open issues, and roadmap for security, privacy and trust are also discussed in this paper.

[1]  Maslina Daud,et al.  Securing Sensor to Cloud Ecosystem using Internet of Things (IoT) Security Framework , 2016, ICC 2016.

[2]  Rajanpreet Kaur Chahal,et al.  Fuzzy Rule-Based Expert System for Determining Trustworthiness of Cloud Service Providers , 2017, Int. J. Fuzzy Syst..

[3]  Tarik Taleb,et al.  An Accurate Security Game for Low-Resource IoT Devices , 2017, IEEE Transactions on Vehicular Technology.

[4]  Guomei Zhang,et al.  Secure Distributed Detection under Energy Constraint in IoT-Oriented Sensor Networks , 2016, Sensors.

[5]  Kunihiko Miyazaki,et al.  How to Evaluate the Security of Real-Life Cryptographic Protocols? - The Cases of ISO/IEC 29128 and CRYPTREC , 2010, Financial Cryptography Workshops.

[6]  Xu Wu,et al.  A multi-domain trust management model for supporting RFID applications of IoT , 2017, PloS one.

[7]  Muthu Ramachandran,et al.  Efficient location privacy algorithm for Internet of Things (IoT) services and applications , 2017, J. Netw. Comput. Appl..

[8]  Hsinchun Chen,et al.  Identifying Supervisory Control and Data Acquisition (SCADA) Devices and their Vulnerabilities on the Internet of Things (IoT): A Text Mining Approach , 2018 .

[9]  Konstantin Mikhaylov,et al.  Evaluation of LoRa LPWAN technology for remote health and wellbeing monitoring , 2016, 2016 10th International Symposium on Medical Information and Communication Technology (ISMICT).

[10]  Jongpil Jeong,et al.  Security analysis of fast inter-LMA domain handover scheme in proxy mobile IPv6 networks , 2017, Pervasive Mob. Comput..

[11]  Vivek Kumar Sehgal,et al.  Smart Human Security Framework Using Internet of Things, Cloud and Fog Computing , 2014, ISI.

[12]  Riaz A. Khan,et al.  Sensor fast proxy mobile IPv6 (SFPMIPv6)-A framework for mobility supported IP-WSN for improving QoS and building IoT , 2014, 2014 International Conference on Communication and Signal Processing.

[13]  Alireza Ghasempour Optimum Packet Service and Arrival Rates in Advanced Metering Infrastructure Architecture of Smart Grid , 2016, 2016 IEEE Green Technologies Conference (GreenTech).

[14]  Vicente Hernández Díaz,et al.  Cross-Layer and Reliable Opportunistic Routing Algorithm for Mobile Ad Hoc Networks , 2018, IEEE Sensors Journal.

[15]  Qiaoyan Wen,et al.  An identity-based personal location system with protected privacy in IOT , 2011, 2011 4th IEEE International Conference on Broadband Network and Multimedia Technology.

[16]  A. V. Deshpande,et al.  Trust Management Model based on Fuzzy Approach for Ubiquitous Computing , 2016, Int. J. Ambient Comput. Intell..

[17]  Yang Gao,et al.  Truthful incentive mechanism with location privacy-preserving for mobile crowdsourcing systems , 2018, Comput. Networks.

[18]  Thomas Watteyne,et al.  Understanding the Limits of LoRaWAN , 2016, IEEE Communications Magazine.

[19]  Hao Wang,et al.  CASLP: A Confused Arc-Based Source Location Privacy Protection Scheme in WSNs for IoT , 2018, IEEE Communications Magazine.

[20]  Yue Yang,et al.  Secure MAC Protocol for Periodic Smart Metering Data Communication with Compressive Sensing , 2016, 2016 IEEE Globecom Workshops (GC Wkshps).

[21]  Hung-Yu Chien,et al.  Secure fast WLAN handoff using time-bound delegated authentication , 2009, Int. J. Commun. Syst..

[22]  Sana Ullah,et al.  A Hybrid and Secure Priority-Guaranteed MAC Protocol for Wireless Body Area Network , 2014, Int. J. Distributed Sens. Networks.

[23]  Naveen K. Chilamkurti,et al.  Deep Learning: The Frontier for Distributed Attack Detection in Fog-to-Things Computing , 2018, IEEE Communications Magazine.

[24]  Jemal H. Abawajy,et al.  Scalable RFID security framework and protocol supporting Internet of Things , 2014, Comput. Networks.

[25]  Andrei V. Gurtov,et al.  Two-phase authentication protocol for wireless sensor networks in distributed IoT applications , 2014, 2014 IEEE Wireless Communications and Networking Conference (WCNC).

[26]  Reinoud Joosten,et al.  Comparing Alternatives to Measure the Impact of DDoS Attack Announcements on Target Stock Prices , 2017, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..

[27]  Roberto Casas,et al.  A Network Performance Analysis of LoRa Modulation for LPWAN Sensor Devices , 2016, UCAmI.

[28]  Jia Guo,et al.  A Mobile Cloud Hierarchical Trust Management Protocol for IoT Systems , 2017, 2017 5th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud).

[29]  Salim Hariri,et al.  IoT Security Development Framework for building trustworthy Smart car services , 2016, 2016 IEEE Conference on Intelligence and Security Informatics (ISI).

[30]  Weili Han,et al.  A Privacy Preserving Data Aggregation Scheme to Investigate Apps Installment in Massive Mobile Devices , 2017, IIKI.

[31]  McDanielPatrick,et al.  Program Analysis of Commodity IoT Applications for Security and Privacy , 2019 .

[32]  Thiemo Voigt,et al.  Lightweight IKEv2: A Key Management Solution for both Compressed IPsec and IEEE 802.15.4 Security , 2012 .

[33]  Yu-Hung Huang,et al.  A lightweight authentication protocol for Internet of Things , 2014, 2014 International Symposium on Next-Generation Electronics (ISNE).

[34]  Antonio F. Gómez-Skarmeta,et al.  Network-Layer Assisted Mechanism to Optimize Authentication Delay during Handoff in 802.11 Networks , 2007, 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services (MobiQuitous).

[35]  Jinquan Zhang,et al.  A Location Privacy Preserving Scheme Based on Repartitioning Anonymous Region in Mobile Social Network , 2017, IIKI.

[36]  Chun Chen,et al.  Handauth: Efficient Handover Authentication with Conditional Privacy for Wireless Networks , 2013, IEEE Transactions on Computers.

[37]  Ruhul Amin,et al.  Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment , 2018, Future Gener. Comput. Syst..

[38]  Zhen Li,et al.  Worst-Case Cooperative Jamming for Secure Communications in CIoT Networks , 2016, Sensors.

[39]  Sugata Sanyal,et al.  Survey of Security and Privacy Issues of Internet of Things , 2015, ArXiv.

[40]  Yuanguo Bi,et al.  Software Defined Space-Terrestrial Integrated Networks: Architecture, Challenges, and Solutions , 2018, IEEE Network.

[41]  Tai-Myung Chung,et al.  ProFiOt: Abnormal Behavior Profiling (ABP) of IoT devices based on a machine learning approach , 2017, 2017 27th International Telecommunication Networks and Applications Conference (ITNAC).

[42]  Li Xu,et al.  Ticket-based handoff authentication for wireless mesh networks , 2014, Comput. Networks.

[43]  Gang Sun,et al.  The framework and algorithm for preserving user trajectory while using location-based services in IoT-cloud systems , 2017, Cluster Computing.

[44]  Yan He,et al.  BASH: A backhaul-aided seamless handoff scheme for Wireless Mesh Networks , 2008, 2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks.

[45]  Ilsun You,et al.  Computational Offloading for Efficient Trust Management in Pervasive Online Social Networks Using Osmotic Computing , 2017, IEEE Access.

[46]  Pascal Urien LLCPS: A new security framework based on TLS for NFC P2P applications in the Internet of Things , 2013, 2013 IEEE 10th Consumer Communications and Networking Conference (CCNC).

[47]  Gyu Myoung Lee,et al.  Autonomic trust management in cloud-based and highly dynamic IoT applications , 2015, 2015 ITU Kaleidoscope: Trust in the Information Society (K-2015).

[48]  Jia Liu,et al.  K-isomorphism: privacy preserving network publication against structural attacks , 2010, SIGMOD Conference.

[49]  Thiemo Voigt,et al.  Lithe: Lightweight Secure CoAP for the Internet of Things , 2013, IEEE Sensors Journal.

[50]  Jin Li,et al.  Secure attribute-based data sharing for resource-limited users in cloud computing , 2018, Comput. Secur..

[51]  Werner Henkel,et al.  Secure physical-layer key generation protocol and key encoding in wireless communications , 2010, 2010 IEEE Globecom Workshops.

[52]  Jongpil Jeong,et al.  An Enhanced Secure Mobility Management Scheme for Building IoT Applications , 2015, FNC/MobiSPC.

[53]  Robert J. Hall,et al.  An Internet of Drones , 2016, IEEE Internet Computing.

[54]  Wade Trappe,et al.  The challenges facing physical layer security , 2015, IEEE Communications Magazine.

[55]  Mohiuddin Ahmed,et al.  Network Traffic Pattern Analysis Using Improved Information Theoretic Co-clustering Based Collective Anomaly Detection , 2014, SecureComm.

[56]  Jacob H. Gunther,et al.  Finding the optimal number of aggregators in machine-to-machine advanced metering infrastructure architecture of smart grid based on cost, delay, and energy consumption , 2016, 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[57]  Yier Jin,et al.  Privacy and Security in Internet of Things and Wearable Devices , 2015, IEEE Transactions on Multi-Scale Computing Systems.

[58]  Sajal K. Das,et al.  5G for Ultra-Reliable Low-Latency Communications , 2018, IEEE Netw..

[59]  Jia Guo,et al.  Trust Management for SOA-Based IoT and Its Application to Service Composition , 2016, IEEE Transactions on Services Computing.

[60]  Salvatore J. Stolfo,et al.  Scalability of Machine to Machine systems and the Internet of Things on LTE mobile networks , 2015, 2015 IEEE 16th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM).

[61]  Ahmad-Reza Sadeghi,et al.  Security and privacy challenges in industrial Internet of Things , 2015, 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).

[62]  Hao Jiang,et al.  A Medical Healthcare System for Privacy Protection Based on IoT , 2015, 2015 Seventh International Symposium on Parallel Architectures, Algorithms and Programming (PAAP).

[63]  Hong-Han Shuai,et al.  Eavesdropping prevention for heterogeneous Internet of Things systems , 2018, 2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[64]  Shafiz Affendi Mohd Yusof,et al.  Timely trust: The use of IoT and cultural effects on swift trust formation within global virtual teams , 2017, 2017 8th International Conference on Information Technology (ICIT).

[65]  Yonghun Kim,et al.  Achievable Multi-Security Levels for Lightweight IoT-Enabled Devices in Infrastructureless Peer-Aware Communications , 2017, IEEE Access.

[66]  Soma Bandyopadhyay,et al.  Negotiation-based privacy preservation scheme in internet of things platform , 2012, SecurIT '12.

[67]  Maria Rita Palattella,et al.  Internet of Things in the 5G Era: Enablers, Architecture, and Business Models , 2016, IEEE Journal on Selected Areas in Communications.

[68]  Hannes Tschofenig,et al.  Securing the Internet of Things: A Standardization Perspective , 2014, IEEE Internet of Things Journal.

[69]  Elias Z. Tragos,et al.  RERUM: Building a reliable IoT upon privacy- and security- enabled smart objects , 2014, 2014 IEEE Wireless Communications and Networking Conference Workshops (WCNCW).

[70]  Rongxing Lu,et al.  A New Differentially Private Data Aggregation With Fault Tolerance for Smart Grid Communications , 2015, IEEE Internet of Things Journal.

[71]  Kyungroul Lee,et al.  A Consensus Framework for Reliability and Mitigation of Zero-Day Attacks in IoT , 2017, Secur. Commun. Networks.

[72]  Juan Wang,et al.  Enabling Security-Enhanced Attestation With Intel SGX for Remote Terminal and IoT , 2018, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[73]  Alireza Ghasempour,et al.  Optimized advanced metering infrastructure architecture of smart grid based on total cost, energy, and delay , 2016, 2016 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT).

[74]  Ilsun You,et al.  SAT-FLOW: Multi-Strategy Flow Table Management for Software Defined Satellite Networks , 2017, IEEE Access.

[75]  Alireza Ghasempour Optimum number of aggregators based on power consumption, cost, and network lifetime in advanced metering infrastructure architecture for Smart Grid Internet of Things , 2016, 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[76]  Irina Gudkova,et al.  Secure and Reliable IoT Networks Using Fog Computing with Software-Defined Networking and Blockchain , 2019, J. Sens. Actuator Networks.

[77]  Julien Montavont,et al.  Indoor deployment of low-power wide area networks (LPWAN): A LoRaWAN case study , 2016, 2016 IEEE 12th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[78]  Narendra S. Chaudhari,et al.  SEGB: Security Enhanced Group Based AKA Protocol for M2M Communication in an IoT Enabled LTE/LTE-A Network , 2018, IEEE Access.

[79]  Lorenzo Mucchi,et al.  The Role of Physical Layer Security in IoT: A Novel Perspective , 2016, Inf..

[80]  Alessandro Neri,et al.  Security Access Protocols in IoT Capillary Networks , 2017, IEEE Internet of Things Journal.

[81]  Imane Aly Saroit,et al.  Secure and efficient uniform handover scheme for LTE-A networks , 2016, 2016 IEEE Wireless Communications and Networking Conference.

[82]  Roger Piqueras Jover,et al.  Connection-less communication of IoT devices over LTE mobile networks , 2015, 2015 12th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON).

[83]  Muzzammil Hussain,et al.  A secure AODV routing protocol with node authentication , 2017, 2017 International conference of Electronics, Communication and Aerospace Technology (ICECA).

[84]  Albert Y. Zomaya,et al.  Big Data Privacy in the Internet of Things Era , 2014, IT Professional.

[85]  Amitava Ghosh,et al.  NB-IoT system for M2M communication , 2016, 2016 IEEE Wireless Communications and Networking Conference.

[86]  Gu Li-ze,et al.  Trust management mechanism for Internet of Things , 2014, China Communications.

[87]  Jo Ann Oravec Emerging “cyber hygiene” practices for the Internet of Things (IoT): Professional issues in consulting clients and educating users on IoT privacy and security , 2017, 2017 IEEE International Professional Communication Conference (ProComm).

[88]  Dushantha Nalin K. Jayakody,et al.  Neural-Blockchain-Based Ultrareliable Caching for Edge-Enabled UAV Networks , 2019, IEEE Transactions on Industrial Informatics.

[89]  Dong Ren,et al.  A forward fast media independent handover control scheme for Proxy Mobile IPv6 (FFMIH-PMIPv6) over heterogeneous wireless mobile network , 2017, Telecommun. Syst..

[90]  Mohammed Atiquzzaman,et al.  Energy efficient device discovery for reliable communication in 5G-based IoT and BSNs using unmanned aerial vehicles , 2017, J. Netw. Comput. Appl..

[91]  Praveen Gauravaram,et al.  Blockchain for IoT security and privacy: The case study of a smart home , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).

[92]  Tai-Myung Chung,et al.  Comparative Handover Performance Analysis of IPv6 Mobility Management Protocols , 2013, IEEE Transactions on Industrial Electronics.

[93]  Anmin Fu,et al.  An efficient handover authentication scheme with privacy preservation for IEEE 802.16m network , 2012, Comput. Secur..

[94]  Joerg Swetina,et al.  Toward a standardized common M2M service layer platform: Introduction to oneM2M , 2014, IEEE Wireless Communications.

[95]  Gerrit Bleumer,et al.  Random Oracle Model , 2005, Encyclopedia of Cryptography and Security.

[96]  Geir M. Køien,et al.  Security and privacy in the Internet of Things: Current status and open issues , 2014, 2014 International Conference on Privacy and Security in Mobile Systems (PRISMS).

[97]  Djamal Zeghlache,et al.  Trust management system design for the Internet of Things: A context-aware and multi-service approach , 2013, Comput. Secur..

[98]  Bruce Ndibanje,et al.  A Secure and Efficient Mutual Authentication Hand-off Protocol for Sensor Device Support in Internet of Things , 2017 .

[99]  Xiaohui Liang,et al.  CPAL: A Conditional Privacy-Preserving Authentication With Access Linkability for Roaming Service , 2014, IEEE Internet of Things Journal.

[100]  Mohammad Abdullah Al Faruque,et al.  Polarization Mode Dispersion-Based Physical Layer Key Generation for Optical Fiber Link Security , 2017 .

[101]  Qiyan Wang,et al.  VeCure: A practical security framework to protect the CAN bus of vehicles , 2014, 2014 International Conference on the Internet of Things (IOT).

[102]  M. Laurent-Maknavicius,et al.  PHOABE: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT , 2018, Comput. Networks.

[103]  Athanasios V. Vasilakos,et al.  A survey on trust management for Internet of Things , 2014, J. Netw. Comput. Appl..

[104]  Ilsun You,et al.  A framework for mitigating zero-day attacks in IoT , 2018, ArXiv.

[105]  Ruoheng Liu,et al.  Securing Wireless Communications at the Physical Layer , 2014 .

[106]  M. Francisca Hinarejos,et al.  RiskLaine: A Probabilistic Approach for Assessing Risk in Certificate-Based Security , 2018, IEEE Transactions on Information Forensics and Security.

[107]  Elena Simona Lohan,et al.  Robustness, Security and Privacy in Location-Based Services for Future IoT: A Survey , 2017, IEEE Access.

[108]  Ira Cohen,et al.  Real-time anomaly detection system for time series at scale , 2017, ADF@KDD.

[109]  Rong Hao,et al.  An Efficient Symmetric Searchable Encryption Scheme for Cloud Storage , 2017, J. Internet Serv. Inf. Secur..

[110]  Selwyn Piramuthu,et al.  Security/privacy of wearable fitness tracking IoT devices , 2014, 2014 9th Iberian Conference on Information Systems and Technologies (CISTI).

[111]  Igor V. Kotenko,et al.  Parallel big data processing system for security monitoring in Internet of Things networks , 2017, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..

[112]  Amitav Mukherjee,et al.  Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints , 2015, Proceedings of the IEEE.

[113]  Naser Movahedinia,et al.  Context gathering and management for centralized context-aware handover in heterogeneous mobile networks , 2012 .

[114]  Kai-Hsiang Ke,et al.  Monitoring of Large-Area IoT Sensors Using a LoRa Wireless Mesh Network System: Design and Evaluation , 2018, IEEE Transactions on Instrumentation and Measurement.

[115]  Sheikh Iqbal Ahamed,et al.  AnonPri: A secure anonymous private authentication protocol for RFID systems , 2017, Inf. Sci..

[116]  Emin Anarim,et al.  A key agreement protocol with partial backward confidentiality , 2017, Comput. Networks.

[117]  Qinglei Kong,et al.  Achieve Secure Handover Session Key Management via Mobile Relay in LTE-Advanced Networks , 2017, IEEE Internet of Things Journal.

[118]  Awais Ahmad,et al.  Enabling multimedia aware vertical handover Management in Internet of Things based heterogeneous wireless networks , 2017, Multimedia Tools and Applications.

[119]  Anmin Fu,et al.  A Privacy Preserving Handover Authentication Scheme for EAP-Based Wireless Networks , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[120]  Jerker Delsing,et al.  An authentication and access control framework for CoAP-based Internet of Things , 2014, IECON 2014 - 40th Annual Conference of the IEEE Industrial Electronics Society.

[121]  Yong Tang,et al.  Vulnerability Detection in IoT Firmware: A Survey , 2017, 2017 IEEE 23rd International Conference on Parallel and Distributed Systems (ICPADS).

[122]  Jean-Marie Bonnin,et al.  Distributed IP mobility management from the perspective of the IETF: motivations, requirements, approaches, comparison, and challenges , 2013, IEEE Wireless Communications.

[123]  Hong Wen,et al.  Cooperative Jamming for Physical Layer Security Enhancement in Internet of Things , 2018, IEEE Internet of Things Journal.

[124]  Makis Stamatelatos,et al.  Enabling Crowd-sourcing-based Privacy Risk Assessment in EU: the Privacy Flag Project , 2017, PCI.

[125]  Stefano Giordano,et al.  A SDN-IoT Architecture with NFV Implementation , 2016, 2016 IEEE Globecom Workshops (GC Wkshps).

[126]  Andrea Zanella,et al.  Long-range communications in unlicensed bands: the rising stars in the IoT and smart city scenarios , 2015, IEEE Wireless Communications.

[127]  Selçuk Köse,et al.  A Lightweight Masked AES Implementation for Securing IoT Against CPA Attacks , 2017, IEEE Transactions on Circuits and Systems I: Regular Papers.

[128]  Jianqing Zhang,et al.  Performance evaluation of Attribute-Based Encryption: Toward data privacy in the IoT , 2014, 2014 IEEE International Conference on Communications (ICC).

[129]  David Lake,et al.  Internet of Things: Architectural Framework for eHealth Security , 2014, J. ICT Stand..

[130]  Utz Roedig,et al.  Secure communication for the Internet of Things - a comparison of link-layer security and IPsec for 6LoWPAN , 2014, Secur. Commun. Networks.

[131]  J. Kumar SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD , 2016 .

[132]  Dongman Lee,et al.  An adaptive IoT trust estimation scheme combining interaction history and stereotypical reputation , 2017, 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[133]  George R. Milne,et al.  Internet of Things: Convenience vs. privacy and secrecy , 2015 .

[134]  Maode Ma,et al.  An Efficient EAP-Based Pre-Authentication for Inter-WRAN Handover in TV White Space , 2017, IEEE Access.

[135]  Fang-Yie Leu,et al.  An Overview of 802.21a-2012 and Its Incorporation into IoT-Fog Networks Using Osmotic Framework , 2017, IoTaaS.

[136]  Jean-Marie Bonnin,et al.  Host-based distributed mobility management support protocol for IPv6 mobile networks , 2012, 2012 IEEE 8th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[137]  Dan Liu,et al.  A Vulnerability Assessment Method in Industrial Internet of Things Based on Attack Graph and Maximum Flow , 2018, IEEE Access.

[138]  Jin Li,et al.  Privacy-preserving outsourced classification in cloud computing , 2018, Cluster Computing.

[139]  Jin Li,et al.  Generic construction for secure and efficient handoff authentication schemes in EAP-based wireless networks , 2014, Comput. Networks.

[140]  Ilsun You,et al.  Extension of MIH to Support FPMIPv6 for Optimized Heterogeneous Handover , 2017, Future Gener. Comput. Syst..

[141]  Olivier Flauzac,et al.  SDN Based Architecture for IoT and Improvement of the Security , 2015, 2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops.

[142]  Kan Siew Leong,et al.  A secure multi-hop routing for IoT communication , 2014, 2014 IEEE World Forum on Internet of Things (WF-IoT).

[143]  Prem Prakash Jayaraman,et al.  Privacy preserving Internet of Things: From privacy techniques to a blueprint architecture and efficient implementation , 2017, Future Gener. Comput. Syst..

[144]  José Italo Cortez,et al.  Wireless Sensor Network for Monitoring Physical Variables Applied to Green Technology (IoT Green Technology) , 2018 .

[145]  Francesco Palmieri,et al.  Multi-layer cloud architectural model and ontology-based security service framework for IoT-based smart homes , 2018, Future Gener. Comput. Syst..

[146]  InJung Kim,et al.  National cyber security enhancement scheme for intelligent surveillance capacity with public IoT environment , 2017, The Journal of Supercomputing.

[147]  Houbing Song,et al.  ESOT: a new privacy model for preserving location privacy in Internet of Things , 2018, Telecommun. Syst..

[148]  Nan Zhang,et al.  An Empirical Study of the Framework Impact on the Security of JavaScript Web Applications , 2018, WWW.

[149]  Ilsun You,et al.  Resource-based mobility management for video users in 5G using catalytic computing , 2017, Comput. Commun..

[150]  Jingjing Huang,et al.  Compressed Sensing Method for Secret Key Generation Based on MIMO Channel Estimation , 2015 .

[151]  Yong Chen,et al.  A System Framework of Security Management in Enterprise Systems , 2013 .

[152]  Md. Apel Mahmud,et al.  Secured Communication among IoT Devices in the Presence of Cellular Interference , 2017, 2017 IEEE 85th Vehicular Technology Conference (VTC Spring).

[153]  Antonio Iera,et al.  A subjective model for trustworthiness evaluation in the social Internet of Things , 2012, 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC).

[154]  Patrick D. McDaniel,et al.  Program Analysis of Commodity IoT Applications for Security and Privacy , 2018, ACM Comput. Surv..

[155]  Victor I. Chang,et al.  A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment , 2018, Future Gener. Comput. Syst..

[156]  Ruhul Amin,et al.  Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks , 2017, Multimedia Tools and Applications.

[157]  Cas J. F. Cremers,et al.  The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols , 2008, CAV.

[158]  Panagiotis Manolios,et al.  Computer-aided reasoning : ACL2 case studies , 2000 .

[159]  Victor C. M. Leung,et al.  Fast and Secure Reauthentications for 3GPP Subscribers during WiMAX-WLAN Handovers , 2011, IEEE Transactions on Dependable and Secure Computing.

[160]  Pinyi Ren,et al.  Security Enhancement for IoT Communications Exposed to Eavesdroppers With Uncertain Locations , 2016, IEEE Access.

[161]  Junqing Zhang,et al.  Securing Wireless Communications of the Internet of Things from the Physical Layer, An Overview , 2017, Entropy.

[162]  Zhiyong Feng,et al.  Network Security Situation Awareness Based on Semantic Ontology and User-Defined Rules for Internet of Things , 2017, IEEE Access.

[163]  Luca Veltri,et al.  IoT-OAS: An OAuth-Based Authorization Service Architecture for Secure Services in IoT Scenarios , 2015, IEEE Sensors Journal.

[164]  유영환,et al.  Efficient Packet Transmission Utilizing Vertical Handover in IoT Environment , 2015 .

[165]  Peilin Hong,et al.  A Proxy Signature Based Re-authentication Scheme for Secure Fast Handoff in Wireless Mesh Networks , 2013, Int. J. Netw. Secur..

[166]  Kalliopi Kravari,et al.  ORDAIN: An Ontology for Trust Management in the Internet of Things - (Short Paper) , 2017, OTM Conferences.

[167]  Riccardo Bonetto,et al.  Secure communication for smart IoT objects: Protocol stacks, use cases and practical examples , 2012, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).

[168]  Shin-Ming Cheng,et al.  Traffic-Aware Patching for Cyber Security in Mobile IoT , 2017, IEEE Communications Magazine.

[169]  Ning Li,et al.  Intelligent Cross-layer and Reliable Opportunistic Routing Algorithm for Internet of Things , 2017, ArXiv.

[170]  Gennaro Boggia,et al.  Standardized Protocol Stack for the Internet of (Important) Things , 2013, IEEE Communications Surveys & Tutorials.

[171]  Ilsun You,et al.  SPFP: Ticket-based secure handover for fast proxy mobile IPv6 in 5G networks , 2017, Comput. Networks.

[172]  Kangbin Yim,et al.  Malware Obfuscation Techniques: A Brief Survey , 2010, 2010 International Conference on Broadband, Wireless Computing, Communication and Applications.

[173]  Flauzac Olivier,et al.  New Security Architecture for IoT Network , 2015, ANT/SEIT.

[174]  Neil W. Bergmann,et al.  IoT Privacy and Security Challenges for Smart Home Environments , 2016, Inf..

[175]  Xiaolei Dong,et al.  Security and Privacy for Cloud-Based IoT: Challenges , 2017, IEEE Communications Magazine.

[176]  K. Soundararajan,et al.  Adopting cross layer approach for detecting and segregating malicious nodes in MANET , 2017, 2017 International Conference on Signal Processing and Communication (ICSPC).

[177]  Farookh Khadeer Hussain,et al.  A Centralized Trust Management Mechanism for the Internet of Things (CTM-IoT) , 2017, BWCCA.

[178]  Roksana Boreli,et al.  Network-level security and privacy control for smart-home IoT devices , 2015, 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[179]  Florian Kammüller,et al.  Insider Threats and Auctions: Formalization, Mechanized Proof, and Code Generation , 2017, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..

[180]  Lawrence C. Paulson,et al.  Inductive analysis of the Internet protocol TLS , 1999, TSEC.

[181]  Jun Luo,et al.  An Attack Tree Based Risk Assessment for Location Privacy in Wireless Sensor Networks , 2012, 2012 8th International Conference on Wireless Communications, Networking and Mobile Computing.

[182]  Madjid Nakhjiri,et al.  AAA and Network Security for Mobile Access: Radius, Diameter, EAP, PKI and IP Mobility , 2005 .

[183]  Subutai Ahmad,et al.  Unsupervised real-time anomaly detection for streaming data , 2017, Neurocomputing.

[184]  Carsten Bormann,et al.  6LoWPAN: The Wireless Embedded Internet , 2009 .

[185]  Xi Hongsheng,et al.  Application of CLIPS Expert System to Malware Detection System , 2008, 2008 International Conference on Computational Intelligence and Security.

[186]  Vasaka Visoottiviseth,et al.  Dynamic key management for secure continuous handoff in wireless LAN , 2010, 2010 6th IEEE Workshop on Secure Network Protocols.

[187]  Athanasios V. Vasilakos,et al.  Security and privacy challenges in mobile cloud computing: Survey and way ahead , 2017, J. Netw. Comput. Appl..

[188]  Riccardo Rovatti,et al.  Low-Cost Security of IoT Sensor Nodes With Rakeness-Based Compressed Sensing: Statistical and Known-Plaintext Attacks , 2018, IEEE Transactions on Information Forensics and Security.

[189]  B. Latha,et al.  HHSRP: a cluster based hybrid hierarchical secure routing protocol for wireless sensor networks , 2017, Cluster Computing.

[190]  Asaf Shabtai,et al.  Advanced Security Testbed Framework for Wearable IoT Devices , 2016, ACM Trans. Internet Techn..

[191]  AKASHKUMAR RAJARAM,et al.  Opportunistic-Harvesting: RF Wireless Power Transfer Scheme for Multiple Access Relays System , 2017, IEEE Access.

[192]  Harsh Kupwade Patil,et al.  Big Data Security and Privacy Issues in Healthcare , 2014, 2014 IEEE International Congress on Big Data.

[193]  Rodrigo Roman,et al.  On the features and challenges of security and privacy in distributed internet of things , 2013, Comput. Networks.

[194]  Fenye Bao,et al.  Dynamic trust management for internet of things applications , 2012, Self-IoT '12.

[195]  Mahmoud Ammar,et al.  Journal of Information Security and Applications , 2022 .

[196]  Ilangko Balasingham,et al.  Risk-based adaptive security for smart IoT in eHealth , 2012, BODYNETS.

[197]  Ralf Küsters,et al.  Using ProVerif to Analyze Protocols with Diffie-Hellman Exponentiation , 2009, 2009 22nd IEEE Computer Security Foundations Symposium.

[198]  Rolf H. Weber,et al.  Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..

[199]  Hanno Wirtz,et al.  Tailoring end-to-end IP security protocols to the Internet of Things , 2013, 2013 21st IEEE International Conference on Network Protocols (ICNP).

[200]  Jörg Daubert,et al.  On the Security and Privacy of Internet of Things Architectures and Systems , 2015, 2015 International Workshop on Secure Internet of Things (SIoT).

[201]  Jin Cao,et al.  UGHA: Uniform group-based handover authentication for MTC within E-UTRAN in LTE-A networks , 2015, 2015 IEEE International Conference on Communications (ICC).

[202]  Weiqing Huang,et al.  A Polarization state Modulation based Physical Layer Security scheme for Wireless Communications , 2016, MILCOM 2016 - 2016 IEEE Military Communications Conference.

[203]  John R. Williams,et al.  P3: Privacy Preservation Protocol for Automatic Appliance Control Application in Smart Grid , 2014, IEEE Internet of Things Journal.

[204]  Ilsun You,et al.  SACA: Self-Aware Communication Architecture for IoT Using Mobile Fog Servers , 2017, Mob. Inf. Syst..

[205]  Hsinchun Chen,et al.  Identifying SCADA Systems and Their Vulnerabilities on the Internet of Things: A Text-Mining Approach , 2018, IEEE Intelligent Systems.

[206]  Mads Dam,et al.  Logical Omniscience in the Semantics of BAN Logic , 2003 .

[207]  Sebastian Mödersheim,et al.  The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications , 2005, CAV.

[208]  Pietro Manzoni,et al.  Handling mobility in IoT applications using the MQTT protocol , 2015, 2015 Internet Technologies and Applications (ITA).

[209]  Olivier Flauzac,et al.  SDN-based security framework for the IoT in distributed grid , 2016, 2016 International Multidisciplinary Conference on Computer and Energy Science (SpliTech).

[210]  David Blaauw,et al.  Hardware Designs for Security in Ultra-Low-Power IoT Systems: An Overview and Survey , 2017, IEEE Micro.

[211]  Carlo Maria Medaglia,et al.  An Overview of Privacy and Security Issues in the Internet of Things , 2010 .

[212]  Indrakshi Ray,et al.  A Generic Digital Forensic Investigation Framework for Internet of Things (IoT) , 2016, 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud).

[213]  Hamid Al-Hamadi,et al.  Trust-Based Decision Making for Health IoT Systems , 2017, IEEE Internet of Things Journal.

[214]  Neetesh Saxena,et al.  Authentication Protocol for an IoT-Enabled LTE Network , 2016, ACM Trans. Internet Techn..

[215]  Antonio F. Gómez-Skarmeta,et al.  A decentralized approach for security and privacy challenges in the Internet of Things , 2014, WF-IoT.

[216]  Guiran Chang,et al.  TRM-IoT: A trust management model based on fuzzy reputation for internet of things , 2011, Comput. Sci. Inf. Syst..

[217]  Marthony Taguinod,et al.  Policy-driven security management for fog computing: Preliminary framework and a case study , 2014, Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014).

[218]  Claudio Bettini,et al.  Longitude: Centralized Privacy-Preserving Computation of Users' Proximity , 2009, Secure Data Management.

[219]  Lin Sun,et al.  Insecurity of An Anonymous Authentication For Privacy-preserving IoT Target-driven Applications , 2015, IACR Cryptol. ePrint Arch..

[220]  Jin Cao,et al.  An Uniform Handover Authentication between E-UTRAN and Non-3GPP Access Networks , 2012, IEEE Transactions on Wireless Communications.

[221]  Alireza Ghasempour,et al.  Optimized scalable decentralized hybrid advanced metering infrastructure for smart grid , 2015, 2015 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[222]  Hadi Syafruddin,et al.  Performance analysis of using a reliable transport layer protocol for transmitting EAP message over RADIUS in inter-domain WLAN roaming , 2010, Proceeding of the 3rd International Conference on Information and Communication Technology for the Moslem World (ICT4M) 2010.

[223]  Victor C. M. Leung,et al.  Securing Uplink Transmission for Lightweight Single-Antenna UEs in the Presence of a Massive MIMO Eavesdropper , 2016, IEEE Access.

[224]  Qian Xu,et al.  Security-Aware Waveforms for Enhancing Wireless Communications Privacy in Cyber-Physical Systems via Multipath Receptions , 2017, IEEE Internet of Things Journal.

[225]  Mohsen Guizani,et al.  Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.

[226]  Antonio F. Gómez-Skarmeta,et al.  Privacy-Preserving Security Framework for a Social-Aware Internet of Things , 2014, UCAmI.

[227]  Sotirios K. Goudos,et al.  A Survey of IoT Key Enabling and Future Technologies: 5G, Mobile IoT, Sematic Web and Applications , 2017, Wirel. Pers. Commun..

[228]  Sasan Adibi A novel energy-efficient cross-application-layer platform with QoS-security support , 2017, Int. J. Commun. Syst..

[229]  Giancarlo Fortino,et al.  Evaluating Critical Security Issues of the IoT World: Present and Future Challenges , 2018, IEEE Internet of Things Journal.

[230]  Debasis Das,et al.  Algorithm for Trust Based Policy Hidden Communication in the Internet of Things , 2017, 2017 IEEE 42nd Conference on Local Computer Networks Workshops (LCN Workshops).

[231]  Jorge Sá Silva,et al.  Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues , 2015, IEEE Communications Surveys & Tutorials.

[232]  Haiyong Bao,et al.  A lightweight privacy‐preserving scheme with data integrity for smart grid communications , 2016, Concurr. Comput. Pract. Exp..

[233]  Daniel W. Engels,et al.  Black SDN for the Internet of Things , 2015, 2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems.

[234]  Otto Carlos Muniz Bandeira Duarte,et al.  An Adaptive Real-Time Architecture for Zero-Day Threat Detection , 2018, 2018 IEEE International Conference on Communications (ICC).

[235]  Ali A. Ghorbani,et al.  A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT , 2017, IEEE Access.

[236]  Abderrahim Benslimane,et al.  On location-privacy in opportunistic mobile networks, a survey , 2018, J. Netw. Comput. Appl..

[237]  Soma Bandyopadhyay,et al.  IoT-Privacy: To be private or not to be private , 2014, 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[238]  Jiri Hosek,et al.  On perspective of security and privacy-preserving solutions in the internet of things , 2016, Comput. Networks.

[239]  Saurabh Bagchi,et al.  TRIFECTA: Security, Energy Efficiency, and Communication Capacity Comparison for Wireless IoT Devices , 2017, IEEE Internet Computing.

[240]  Lei Zou,et al.  K-Automorphism: A General Framework For Privacy Preserving Network Publication , 2009, Proc. VLDB Endow..

[241]  Athanasios V. Vasilakos,et al.  Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.

[242]  Ji Wang,et al.  Trust-based mechanism design for cooperative spectrum sensing in cognitive radio networks , 2018, Comput. Commun..

[243]  Hong Liu,et al.  Cyber-Physical-Social Based Security Architecture for Future Internet of Things , 2012, IOT 2012.

[244]  Luigi Alfredo Grieco,et al.  Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.

[245]  Kathiravan Srinivasan,et al.  Managing Service-Heterogeneity using Osmotic Computing , 2017, ArXiv.

[246]  In-Young Ko,et al.  Spatially Cohesive Service Discovery and Dynamic Service Handover for Distributed IoT Environments , 2017, ICWE.

[247]  Sudip Misra,et al.  Detour: Dynamic Task Offloading in Software-Defined Fog for IoT Applications , 2019, IEEE Journal on Selected Areas in Communications.

[248]  Victor C. M. Leung,et al.  Secure Communications in CIoT Networks with a Wireless Energy Harvesting Untrusted Relay , 2017, Sensors.

[249]  Gene Tsudik,et al.  Ditio: Trustworthy Auditing of Sensor Activities in Mobile & IoT Devices , 2017, SenSys.

[250]  Wenbo Mao,et al.  Modern Cryptography: Theory and Practice , 2003 .

[251]  Nicola Bui,et al.  Low power link layer security for IoT: Implementation and performance analysis , 2013, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).

[252]  Isaac Woungang,et al.  Impact Study of a Mobile Botnet over LTE Networks , 2016, J. Internet Serv. Inf. Secur..

[253]  Qiong Huang,et al.  Generic Construction of Privacy-Preserving Optimistic Fair Exchange Protocols , 2017, J. Internet Serv. Inf. Secur..

[254]  Klaus Wehrle,et al.  Security Challenges in the IP-based Internet of Things , 2011, Wirel. Pers. Commun..

[255]  Davor Svetinovic,et al.  A taxonomy of security and privacy requirements for the Internet of Things (IoT) , 2014, 2014 IEEE International Conference on Industrial Engineering and Engineering Management.

[256]  Thilo Sauter,et al.  Seamless handover in industrial WLAN using IEEE 802.11k , 2017, 2017 IEEE 26th International Symposium on Industrial Electronics (ISIE).

[257]  Antonio F. Gómez-Skarmeta,et al.  SAFIR: Secure access framework for IoT-enabled services on smart buildings , 2015, J. Comput. Syst. Sci..

[258]  Fernand Meyer,et al.  A comparative study of LPWAN technologies for large-scale IoT deployment , 2019, ICT Express.

[259]  Christian Steger,et al.  Secured and Easy-to-Use NFC-Based Device Configuration for the Internet of Things , 2017, IEEE Journal of Radio Frequency Identification.

[260]  Ilsun You,et al.  Secure and Efficient Protocol for Route Optimization in PMIPv6-Based Smart Home IoT Networks , 2017, IEEE Access.

[261]  Zhu Han,et al.  Jamming Mitigation via Hierarchical Security Game for IoT Communications , 2018, IEEE Access.

[262]  Maurizio A. Spirito,et al.  DEMO: An IDS framework for internet of things empowered by 6LoWPAN , 2013, CCS.

[263]  Elisa Bertino,et al.  Data Security and Privacy in the IoT , 2016, EDBT.

[264]  David Monniaux Decision procedures for the analysis of cryptographic protocols by logics of belief , 1999, Proceedings of the 12th IEEE Computer Security Foundations Workshop.

[265]  Yang Yu,et al.  Distributed Trust Management Mechanism for the Internet of Things , 2013 .

[266]  Antonio F. Gómez-Skarmeta,et al.  ANASTACIA: Advanced networked agents for security and trust assessment in CPS IoT architectures , 2017, 2017 Global Internet of Things Summit (GIoTS).

[267]  Jinho Choi,et al.  Physical Layer Security for Channel-Aware Random Access With Opportunistic Jamming , 2017, IEEE Transactions on Information Forensics and Security.

[268]  Mary R. Schurgot,et al.  Experiments with security and privacy in IoT networks , 2015, 2015 IEEE 16th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM).

[269]  Kai-Di Chang,et al.  A Survey of Trust Management in WSNs, Internet of Things and Future Internet , 2012 .

[270]  Salvador Pérez,et al.  Towards the CP-ABE Application for Privacy-Preserving Secure Data Sharing in IoT Contexts , 2017, IMIS.

[271]  Jun Li,et al.  Secure and Energy-Efficient Handover in Fog Networks Using Blockchain-Based DMM , 2018, IEEE Communications Magazine.

[272]  Hsing-Chung Chen,et al.  Fuzzy-Based Protocol for Secure Remote Diagnosis of IoT Devices in 5G Networks , 2017, IoTaaS.

[273]  Geeta Sharma,et al.  A secure remote user authentication scheme for smart cities e-governance applications , 2017, Journal of Reliable Intelligent Environments.

[274]  Thuy Ngoc Nguyen,et al.  Enhanced EAP-Based Pre-Authentication for Fast and Secure Inter-ASN Handovers in Mobile WiMAX Networks , 2012, IEEE Transactions on Wireless Communications.

[275]  Theodore Tryfonas,et al.  The Internet of Things: a security point of view , 2016, Internet Res..

[276]  Dong Seong Kim,et al.  A Framework for Modeling and Assessing Security of the Internet of Things , 2015, 2015 IEEE 21st International Conference on Parallel and Distributed Systems (ICPADS).

[277]  Ilsun You,et al.  Efficient Management and Fast Handovers in Software Defined Wireless Networks Using UAVs , 2017, IEEE Network.

[278]  Qingtao Wu,et al.  An IOT Security Risk Autonomic Assessment Algorithm , 2013 .

[279]  Konrad S. Wrona,et al.  Data-centric security in military applications of commercial IoT technology , 2016, 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT).

[280]  Dushantha Nalin K. Jayakody,et al.  Cooperative trust relaying and privacy preservation via edge-crowdsourcing in social Internet of Things , 2017, Future Gener. Comput. Syst..

[281]  Jin Li,et al.  Insight of the protection for data security under selective opening attacks , 2017, Inf. Sci..

[282]  David Evans,et al.  Efficient Data Tagging for Managing Privacy in the Internet of Things , 2012, 2012 IEEE International Conference on Green Computing and Communications.

[283]  Lyes Khoukhi,et al.  Enhanced MIH (media independent handover) for collaborative green wireless communications , 2017, Int. J. Commun. Syst..

[284]  Yong Ho Hwang IoT Security & Privacy: Threats and Challenges , 2015, IoTPTS@AsiaCCS.

[285]  Kshira Sagar Sahoo,et al.  A secured SDN framework for IoT , 2015, 2015 International Conference on Man and Machine Interfacing (MAMI).

[286]  Hsiao-Hwa Chen,et al.  An Energy-Aware Trust Derivation Scheme With Game Theoretic Approach in Wireless Sensor Networks for IoT Applications , 2014, IEEE Internet of Things Journal.

[287]  Georg Carle,et al.  DTLS based security and two-way authentication for the Internet of Things , 2013, Ad Hoc Networks.

[288]  Igor Santos,et al.  Opcode sequences as representation of executables for data-mining-based unknown malware detection , 2013, Inf. Sci..

[289]  Cristina Alcaraz,et al.  A Survey of IoT-Enabled Cyberattacks: Assessing Attack Paths to Critical Infrastructures and Services , 2018, IEEE Communications Surveys & Tutorials.

[290]  Keon Chul Park,et al.  Security assessment framework for IoT service , 2017, Telecommun. Syst..

[291]  Jia Guo,et al.  Trust management for service composition in SOA-based IoT systems , 2014, 2014 IEEE Wireless Communications and Networking Conference (WCNC).

[292]  Erdal Irmak,et al.  A hybrid trust based intrusion detection system for wireless sensor networks , 2017, 2017 International Symposium on Networks, Computers and Communications (ISNCC).

[293]  Wei Shi,et al.  E-learning Material Development Framework Supporting VR/AR Based on Linked Data for IoT Security Education , 2018, EIDWT.

[294]  Stephen S. Yau,et al.  A Reference Architecture for Improving Security and Privacy in Internet of Things Applications , 2014, 2014 IEEE International Conference on Mobile Services.

[295]  Todd K. Moon,et al.  Optimizing the Number of Collectors in Machine-to-Machine Advanced Metering Infrastructure Architecture for Internet of Things-Based Smart Grid , 2016, 2016 IEEE Green Technologies Conference (GreenTech).

[296]  Omaimah Bamasag,et al.  A LIGHTWEIGHT PRIVACY AND INTEGRITY PRESERVING DATA COMMUNICATION IN SMART GRID , 2015 .

[297]  Wei Liu,et al.  A Neighbor-Based Probabilistic Broadcast Protocol for Data Dissemination in Mobile IoT Networks , 2018, IEEE Access.

[298]  Jari Veijalainen,et al.  Security and privacy threats in IoT architectures , 2012, BODYNETS.

[299]  Ilsun You,et al.  Behavior and Vulnerability Assessment of Drones-Enabled Industrial Internet of Things (IIoT) , 2018, IEEE Access.

[300]  Ejaz Ahmed,et al.  Enabling IoT platforms for social IoT applications: Vision, feature mapping, and challenges , 2017, Future Gener. Comput. Syst..

[301]  Albert Y. Zomaya,et al.  NHAD: Neuro-Fuzzy Based Horizontal Anomaly Detection in Online Social Networks , 2018, IEEE Transactions on Knowledge and Data Engineering.

[302]  K SoodSandeep,et al.  Secure authentication scheme for IoT and cloud servers , 2015 .

[303]  Alina Campan,et al.  Data and Structural k-Anonymity in Social Networks , 2009, PinKDD.

[304]  S. B. Thorat,et al.  Lightweight Anonymity-Preserving Authentication and Key Agreement Protocol for the Internet of Things Environment , 2017 .

[305]  Kevin Benton,et al.  OpenFlow vulnerability assessment , 2013, HotSDN '13.

[306]  Flora Malamateniou,et al.  Enabling data protection through PKI encryption in IoT m-Health devices , 2012, 2012 IEEE 12th International Conference on Bioinformatics & Bioengineering (BIBE).

[307]  Neeli R. Prasad,et al.  A fuzzy approach to trust based access control in internet of things , 2013, Wireless VITAE 2013.

[308]  Oumaima Ben Abderrahim,et al.  TMCoI-SIOT: A trust management system based on communities of interest for the social Internet of Things , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).

[309]  Hung-Yu Chien,et al.  Secure fast WLAN handoff using time-bound delegated authentication , 2009 .

[310]  Hengrun Zhang,et al.  A Survey on Security, Privacy, and Trust in Mobile Crowdsourcing , 2018, IEEE Internet of Things Journal.

[311]  Almudena Alcaide,et al.  Anonymous authentication for privacy-preserving IoT target-driven applications , 2013, Comput. Secur..

[312]  Mauro Conti,et al.  Advertising in the IoT Era: Vision and Challenges , 2018, IEEE Communications Magazine.

[313]  Gyu Myoung Lee,et al.  Autonomic Trust Management in Cloud-Based and Highly Dynamic IOT Applications , 2016 .

[314]  Antonio Iera,et al.  Federated IoT services leveraging 5G technologies at the edge , 2018, Ad Hoc Networks.

[315]  Navrati Saxena,et al.  Novel framework for proactive handover with seamless multimedia over WLANs , 2011, IET Commun..

[316]  Huachun Zhou,et al.  Application-aware and Dynamic Security Function Chaining for Mobile Networks , 2017, J. Internet Serv. Inf. Secur..

[317]  Nirmal Dagdee,et al.  Credential Based Hybrid Access Control Methodology for Shared Electronic Health Records , 2009, 2009 International Conference on Information Management and Engineering.

[318]  Hyeong-Ah Choi,et al.  Securing smart home: Technologies, security challenges, and security requirements , 2014, 2014 IEEE Conference on Communications and Network Security.

[319]  Souhwan Jung,et al.  A handover authentication using credentials based on chameleon hashing , 2010, IEEE Communications Letters.

[320]  Luigi Atzori,et al.  Trustworthiness Management in the Social Internet of Things , 2014, IEEE Transactions on Knowledge and Data Engineering.

[321]  Peter Herrmann,et al.  A Trust Based Distributed Intrusion Detection Mechanism for Internet of Things , 2017, 2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA).

[322]  Peter Herrmann,et al.  A Trust-based Resilient Routing Mechanism for the Internet of Things , 2017, ARES.

[323]  Ilsun You,et al.  Socializing Drones for Inter-Service Operability in Ultra-Dense Wireless Networks using Blockchain , 2017, MIST@CCS.

[324]  Yang Li,et al.  DeepXSS: Cross Site Scripting Detection Based on Deep Learning , 2018, ICCAI.

[325]  Chung-Horng Lung,et al.  IoT-equipped UAV communications with seamless vertical handover , 2017, 2017 IEEE Conference on Dependable and Secure Computing.

[326]  Sheetal Kalra,et al.  A lightweight biometrics based remote user authentication scheme for IoT services , 2017, J. Inf. Secur. Appl..

[327]  Soma Bandyopadhyay,et al.  Privacy for IoT: Involuntary privacy enablement for smart energy systems , 2015, 2015 IEEE International Conference on Communications (ICC).

[328]  Fang-Yie Leu,et al.  Secure and efficient protocol for fast handover in 5G mobile Xhaul networks , 2018, J. Netw. Comput. Appl..

[329]  Vishal Sharma,et al.  LoRaWAN-Based Energy-Efficient Surveillance by Drones for Intelligent Transportation Systems , 2018 .

[330]  Giuseppe Piro,et al.  Optimal and secure protocols in the IETF 6TiSCH communication stack , 2014, 2014 IEEE 23rd International Symposium on Industrial Electronics (ISIE).

[331]  Ludwig Seitz,et al.  Authorization framework for the Internet-of-Things , 2013, 2013 IEEE 14th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM).

[332]  Indrajit Ray,et al.  Measuring, analyzing and predicting security vulnerabilities in software systems , 2007, Comput. Secur..

[333]  Chong Kuan Chen,et al.  IoT Security: Ongoing Challenges and Research Opportunities , 2014, 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications.

[334]  Arghya Guchhait,et al.  A hybrid V2V system for collision-free high-speed internet access in intelligent transportation system , 2018, Trans. Emerg. Telecommun. Technol..

[335]  Zheng Yan,et al.  SecIoT: a security framework for the Internet of Things , 2016, Secur. Commun. Networks.

[336]  Kisu Kim,et al.  Method of Building a Security Vulnerability Information Collection and Management System for Analyzing the Security Vulnerabilities of IoT Devices , 2017, MUE/FutureTech.

[337]  Alireza Chasempour,et al.  Optimizing the Advanced Metering Infrastructure Architecture in Smart Grid , 2016 .

[338]  Abdullahi Chowdhury Cyber attacks in mechatronics systems based on Internet of Things , 2017, 2017 IEEE International Conference on Mechatronics (ICM).

[339]  Kai Zeng,et al.  Physical layer key generation in wireless networks: challenges and opportunities , 2015, IEEE Communications Magazine.

[340]  Alex Pentland,et al.  Toward an Interoperability Architecture for Blockchain Autonomous Systems , 2020, IEEE Transactions on Engineering Management.

[341]  Rodrigo Roman,et al.  Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges , 2016, Future Gener. Comput. Syst..

[342]  Lorenzo Mucchi,et al.  Physical layer security for IoT devices configuration and key management - a Proof of Concept , 2016, 2016 AEIT International Annual Conference (AEIT).

[343]  Ing-Ray Chen,et al.  Trust management for the internet of things and its application to service composition , 2012, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).

[344]  Jing Xu,et al.  Physical layer security based on artificial noise and spatial modulation , 2016, 2016 8th International Conference on Wireless Communications & Signal Processing (WCSP).

[345]  Rituparna Chaki,et al.  Study of Security Issues in Pervasive Environment of Next Generation Internet of Things , 2013, CISIM.

[346]  Ilsun You,et al.  ISMA: Intelligent Sensing Model for Anomalies Detection in Cross Platform OSNs With a Case Study on IoT , 2017, IEEE Access.

[347]  Fangyu Gai,et al.  Multidimensional Trust-Based Anomaly Detection System in Internet of Things , 2017, WASA.

[348]  Hung-Yu Chien,et al.  Fast pre-authentication with minimized overhead and high security for WLAN handoff , 2008 .

[349]  Jie Wu,et al.  PrivacyProtector: Privacy-Protected Patient Data Collection in IoT-Based Healthcare Systems , 2018, IEEE Communications Magazine.

[350]  Geir M. Køien,et al.  Reflections on Trust in Devices: An Informal Survey of Human Trust in an Internet-of-Things Context , 2011, Wirel. Pers. Commun..

[351]  Antonio F. Gómez-Skarmeta,et al.  An Architecture Based on Internet of Things to Support Mobility and Security in Medical Environments , 2010, 2010 7th IEEE Consumer Communications and Networking Conference.