References
- Hiroshi Tsunoda and Glenn Mansfield Keeni, "Feasibility of societal model for securing Internet of Things," in Proc. of 13th International Wireless Communications and Mobile Computing Conference (IWCMC2017), pages 541-546, Valencia, 2017.
- Sabrina Sicari, Alessandra Rizzardi, Luigi Alfredo Grieco, and Alberto Coen-Porisini, "Security, privacy and trust in Internet of Things: The road ahead," Computer Networks, 76:146-164, 2015. https://doi.org/10.1016/j.comnet.2014.11.008
- Sye Loong Keoh, Sandeep S. Kumar, and Hannes Tschofenig, "Securing the internet of things: A standardization perspective," IEEE Internet of Things Journal, 1(3):265-275, 2014. https://doi.org/10.1109/JIOT.2014.2323395
- Mandeep Khera, "Think Like a Hacker," Journal of Diabetes Science and Technology, 11(2):207-212, 2017. https://doi.org/10.1177/1932296816677576
- Andy Greenberg, "This Gadget Hacks GM Cars to Locate, Unlock, and Start Them (UPDATED)," 2015, .
- Troy Hunt, "Controlling vehicle features of Nissan LEAFs across the globe via vulnerable APIs," , 2016.
- Nan Zhang, Soteris Demetriou, Xianghang Mi, Wenrui Diao, Kan Yuan, Peiyuan Zong, Feng Qian, XiaoFeng Wang, Kai Chen, Yuan Tian, Carl A. Gunter, Kehuan Zhang, Patrick Tague, and Yue-Hsun Lin, "Understanding IoT Security Through the Data Crystal Ball: Where we are Now and Where we are Going to Be," 2017. Available online arXiv:1703.09809.
- Ahmad-Reza Sadeghi, Chrstian Wachsmann, and Michael Waidner, "Security and privacy challenges in industrial Internet of Things," in Proc. of 52nd ACM/EDAC/IEEE Design Automation Conference (DAC), pages 1-6, June 2015.
- Lorena Cazorla, Cristina Alcaraz, and Javier Lopez, "Cyber Stealth Attacks in Critical Information Infrastructures," IEEE Systems Journal, pages 1-15, 2016.
- David De Cremer, Bang Nguyen, and Lyndon Simkin, "The integrity challenge of the Internet-of-Things (IoT): on understanding its dark side," Journal of Marketing Management, 33(1-2):145-158, 2017. https://doi.org/10.1080/0267257X.2016.1247517
- DANIEL CID, "Large CCTV Botnet Leveraged in DDoS Attacks," 2016.
- DANIEL CID, "IoT Home Router Botnet Leveraged in Large DDoS Attack," 2016.
- Pierluigi Paganini, "150,000 IoT Devices behind the 1Tbps DDoS attack on OVH," 2016.
- Roger Hallman, Josiah Bryan, Geancarlo Palavicini, Joseph Divita, and Jose Romero-Mariona, "IoDDoS The Internet of Distributed Denial of Sevice Attacks A Case Study of the Mirai Malware and IoT - Based Botnets," in Proc. of the 2nd International Conference on Internet of Things, Big Data and Security , April, 2017.
- Yin Minn Pa Pa, Shogo Suzuki, Katsunari Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, and Christian Rossow, "IoTPOT: Analysing the Rise of IoT Compromises," in Proc. Of 9th USENIX Workshop on Offensive Technologies (WOOT 15). USENIX Association, 2015.
- Hypponen Mikko and Linus Nyman, "The Internet of (Vulnerable) Things: On Hypponen's Law, Security Engineering, and IoT Legislation," Technology Innovation Management Review, 7(4):5-11, 2017.
- Bruce Schneier, "IoT Security: What's Plan B?" IEEE Security & Privacy, 15(5):96, 2017.
- Hiroshi Tsunoda and Glenn Mansfield Keeni, "Societal Model for Securing Internet of Things," in Proc. of International Conference on Business and Industrial Research, pages 220-225. Thai-Nichi Institute of Technology, 2016.
- Ke Xu, Yi Qu, and Kun Yang, "A Tutorial on the Internet of Things: From a Heterogeneous Network Integration Perspective," IEEE Network, 30(2):102-108, 2016. https://doi.org/10.1109/MNET.2016.7437031
- OWASP. OWASP Internet of Things Project. .
- Internet of things research study 2015 Report. Technical report, Hewlett Packard Enterprise, 2015. .
- Ari Keranen and Bormann Carsten, "Internet of Things: Standards and Guidance from the IETF," IETF Journal, 11(3), 2016.
- Zhengguo Sheng, Shusen Yang, Yifan Yu, Athanasios Vasilakos, Julie McCann, and Kin Leung, "A Survey on the IETF Protocol Suite for the Internet of Things: Standards, Challenges, and Opportunities," IEEE Wireless Communications, 20(6):91-98, 2013. https://doi.org/10.1109/MWC.2013.6704479
- Giulio Peretti, Vishwas. Lakkundi, and Michele Zorzi, "BlinkToSCoAP: An End-to-end Security Framework for the Internet of Things," in Proc. of 7th International Conference on Communication Systems and Networks (COMSNETS'15), pages 1-6, 2015.
- ShahidRaza, Tómas Helgason, Panos Papadimitratos, and ThiemoVoig, "Securesense: End-to-end Secure Communication Architecture for the Cloud-connected Internet of Things," Future Generation Computer Systems, 77:40-51, 2017. https://doi.org/10.1016/j.future.2017.06.008
- Cristina Alcaraz, Pablo Najera, Javier Lopez, and Rodrigo Roman, "Wireless Sensor Networks and the Internet of Things: Do We Need a Complete Integration?" in Proc. of 1st International Workshop on the Security of the Internet of Things (SecIoT10), 2010.
- Alan Grau, "Can You Trust Your Fridge?" IEEE Spectrum, 52(3):51-56, 2015.
- Riccardo Cavallari, Flavia Martelli, Ramona. Rosini, Chiara Buratti, and Roberto Verdone, "A Survey on Wireless Body Area Networks: Technologies and Design Challenges," IEEE Communications Surveys and Tutorials, 16(3):1635-1657, 2014. https://doi.org/10.1109/SURV.2014.012214.00007
- Prosanta Gope and Tzonelih Hwang, "BSN-Care: A Secure IoT-Based Modern Healthcare System Using Body Sensor Network," IEEE Sensors Journal, 16(5):1368-1376, 2016. https://doi.org/10.1109/JSEN.2015.2502401
- Mohammad Abdur Razzaque, Marija Milojevic-Jevric, Andrei. Palade, and Siobhan Clarke, "Middleware for Internet of Things: A Survey," IEEE Internet of Things Journal, 3(1):70-95, 2016. https://doi.org/10.1109/JIOT.2015.2498900
- Ramo Tiago Tiburski, Leonardo Albernaz Amaral, Everton De Matos, and Fabiano Hessel, "The Importance of a Standard Security Architecture for SOA-based IoT Middleware," IEEE Communications Magazine, 53(12):20-26, 2015. https://doi.org/10.1109/MCOM.2015.7355580
- Pawani Porambage, An Braeken, Pardeep Kumar, Andrei Gurtov, and Mika Ylianttila, "Proxy-based End-to-end Key Establishment Protocol for the Internet of Things," in Proc. of IEEE International Conference on Communication Workshop (ICCW'15), pages 2677-2682, June 2015.
- Tobias Markmann, Thomas C. Schmidt, and Matthias Wahlisch, "Federated End-to-End Authentication for the Constrained Internet of Things Using IBC and ECC," SIGCOMM Computer Commununication Review, 45(4):603-604, 2015. https://doi.org/10.1145/2829988.2790021
- Martin Henze, Lars Hermerschmidt, Daniel Kerpen, Roger Huling, Bernhard Rumpe, and Klaus Wehrle, "A Comprehensive Approach to Privacy in the Cloud-based Internet of Things," Future Generation Computer Systems, 56:701-718, 2016. https://doi.org/10.1016/j.future.2015.09.016
- A. K. Simpson, F. Roesner, and T. Kohno, "Securing Vulnerable Home IoT Devices with an In-hub Security Manager," The First International Workshop on Pervasive Smart Living Spaces (PerLS 2017) - in conjunction with IEEE PerCom 2017, 2017.
- Hsing-Chung Chen, Ilsun You, Chien-Erh Weng, Chia-Hsin Cheng, and Yung-Fa Huang, "A Security Gateway Application for End-to-End M2M Communications," Computer Standards and Interfaces, 44:85-93, 2016. https://doi.org/10.1016/j.csi.2015.09.001
- Rodrigo Roman and Javier Lopez, "Integrating Wireless Sensor Networks and the Internet: a Security Analysis," Internet Research, 19(2):246-259, 2009. https://doi.org/10.1108/10662240910952373
- Zach Shelby, Klaus Hartke, and Carsten Bormann, "The Constrained Application Protocol (CoAP)," RFC 7252, 2014.
- Andrew Banks and Gupta Rahul, "MQTT Version 3.1.1 Plus Errata 01," , 2015.
- Maria Ganzha, Marcin Paprzycki, Wieslaw Pawlowski, Pawel Szmeja, and Katarzyna Wasielewska, "Towards Common Vocabulary for IoT Ecosystems-preliminary Considerations," Intelligent Information and Database Systems, pages 35-45, 2017.
- Frank Stajano and Ross Anderson, "The Resurrecting Duckling: Security Issues for Ubiquitous Computing," Computer, 35(4):supl22-supl26, 4 2002.
- Bruno Bogaz Zarpelo, Rodrigo Sanches Miani, Cludio Toshio Kawakani, and Sean Carlisto de Alvarenga, "A Survey of Intrusion Detection in Internet of Things," Journal of Network and Computer Applications, 84:25-37, 2017. https://doi.org/10.1016/j.jnca.2017.02.009
- Jeffrey Case, Russ Mundy, David Partain, and Bob Stewart, "Introduction and Applicability Statements for Internet-Standard Management Framework," RFC 3410, 2002.
- Keith McCloghrie, Jrgen Schonwalder, David T Perkins, and Keith McCloghrie, "Structure of Management Information Version 2 (SMIv2)," RFC 2578, 1999.
- Jeffrey D. Case, Mark Fedor, Martin L. Schoffstall, and James Davin, "Simple Network Management Protocol (SNMP)," RFC 1157, 5 1990.
- Randy Presuhn, "Version 2 of the Protocol Operations for the Simple Network Management Protocol (SNMP)" RFC 3416, 2002.
- Uri Blumenthal and Bert Wijnen, "User-based Security Model (USM) for version 3 of the Simple Network Management Protocol (SNMPv3)," RFC 3414, 2002.
- Bert Wijnen, Randy Presuhn, and Keith McCloghrie, "View-based Access Control Model (VACM) for the Simple Network Management Protocol (SNMP)," RFC 3415, 2002.
- Net-SNMP.
- Tut:Extending snmpd using perl.
- Dale Francisco, Bert Wijnen, Mark Ellison, and Michael Daniele, "Agent Extensibility (AgentX) Protocol Version 1," RFC 2741, 2000.
- Phillips, "Wireless and smart lighting by Phillips - Meet Hue,"
- Phillips, "Phillips hue API - Phillips Hue API,"
- Kai Simon, Cornelius Moucha, and Jorg Keller, "Contactless Vulnerability Analysis using Google and Shodan," Journal of Universal Computer Science, vol. 23, no. 4, 2017.
- Will Arthur, David Challener, "A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security," APress, ISBN 978-1-4302-6583-2, 2015.
- Karen Seo and Stephen Kent, "Security Architecture for the Internet Protocol," RFC 4301, 2005.
- SORACOM, "SORACOM Overview"
- Shanhe Yi, Cheng Li, and Qun Li, "A Survey of Fog Computing: Concepts, Applications and Issues," in Proc. of the 2015 Workshop on Mobile Big Data, Mobidata '15, pages 37-42, 2015.
- Glenn Mansfield, Sandeep Karakala, Takeo Saito, and Norio Shiratori, "High Resolution Traffic Measurement," in Proc. of Workshop on Passive And Active Measurements on the Internet (PAM2001), pages 67-73, 2001.
- Glenn Mansfield, "The Managed Object Aggregation MIB," RFC 4498, 2006.