References
- A. Zaslavsky, C. Perera and D. Georgakopoulos, "Sensing as a Service and Big Data," in Proceedings of International Conference on Advances in Cloud Computing (ACC), Bangalore, India, 2013.
- T. Yoo and H. Chang, "The IT convergence framework design in the internet of things environment," EURASIP Journal on Wireless Communications and Networking, vol. 1, pp. 1-10, Feb. 2013. DOI: 10.1186/1687-1499-2013-53.
- D. Mohapatra and B. Subudhi, "Development of a Cost Effective IoT-based Weather Monitoring System," IEEE Consumer Electronics Magazine, vol. 11, no. 5, pp. 81-86, Sep. 2022. DOI: 10.1109/MCE.2021.3136833.
- A. M. Joshi, P. Jain and S. P. Mohanty, "Secure-iGLU: A Secure Device for Noninvasive Glucose Measurement and Automatic Insulin Delivery in IoMT Framework," in Proceedings of 2020 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), Limassol, Cyprus, pp. 440-445, Jul. 2020. DOI: 10.1109/ISVLSI49217.2020.00-17.
- D. A. Vyas, D. Bhatt, and D. Jha, "IoT: Trends, Challenges and Future Scope," International Journal of Computer Science & Communication, no. 7, vol. 1, pp. 186-197, Sep.-Mar. 2015-2016. DOI: 10.090592/IJCSC.2016.028.
- W. Alnahari and M. T. Quasim, "Authentication of IoT Device and IoT Server Using Security Key," in Proceedings of 2021 International Congress of Advanced Technology and Engineering (ICOTEN), Taiz, Yemen, pp. 1-9, 2021. DOI: 10.1109/ICOTEN52080.2021.9493492.
- R. Khan, S. U. Khan, R. Zaheer, and S. Khan, "Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges," in Proceedings of 2012 10th international conference on frontiers of information technology, Islamabad, Pakistan, pp. 257-260, 2012. DOI: 10.1109/FIT.2012.53.
- S. Hameed, F. I. Khan, and B. Hameed, "Understanding Security Requirements and Challenges in Internet of Things (IoTs): A review," Journal of Computer Networks and Communications, vol. 2019, 9629381, Jan. 2019. DOI: 10.1155/2019/9629381.
- S. Tweneboah-Koduah, K. E. Skouby, and R. Tadayoni, "Cyber Security Threats to IoT Applications and Service Domains," Wireless Personal Communications, vol. 95, no.1, pp. 169-185, May 2017. DOI: 10.1007/s11277-017-4434-6.
- J. Ahamed and A. V. Rajan, "Internet of Things (IoT): Application systems and security vulnerabilities," in Proceedings of 2016 5th International conference on electronic devices, systems and applications (ICEDSA), Ras Al Khaimah, United Arab Emirates, pp. 1-5, Dec. 2016. DOI: 10.1109/ICEDSA.2016.7818534.
- B. Ondiege, M. Clarke, and G. Mapp, "Exploring a New Security Framework for Femote Patient Monitoring Devices," Computers, vol. 6, no. 1, 11, Feb. 2017. DOI: 10.3390/computers6010011.
- A. I. Newaz, A. K. Sikder, M. A. Rahman, and A. S. Uluagac, "A Survey on Security and Privacy Issues in Modern Healthcare Systems: Attacks and Defenses," ACM Transactions on Computing for Healthcare, vol. 2, no. 3, pp. 1-44, Jul. 2021. DOI: 10.1145/3453176.
- M. Imdad, D. W. Jacob, H. Mahdin, Z. Baharum, S. M. Shaharudin, and M. S. Azmi, "Internet of things (IoT); security requirements, attacks and counter measures," Indonesian Journal of Electrical Engineering and Computer Science, vol. 18, no. 3, pp. 1520-1530, Jun. 2020. DOI: 10.11591/ijeecs.v18.i3.pp1520-1530.
- M. M. Hossain, M. Fotouhi, and R. Hasan, "Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things," in Proceedings of 2015 ieee world congress on services, New York: NY, USA, pp. 21-28, 2015. DOI: 10.1109/SERVICES.2015.12.