참고문헌
- L. D. Xu, W. He, and S. Li, "Internet of Things in industries: A survey," IEEE Trans. Ind. Informat., vol. 10, no. 4, pp. 2233-2243, Nov. 2014. https://doi.org/10.1109/TII.2014.2300753
- P. K. Khatua, V. K. Ramachandaramurthy, P. Kasinathan, J.Y. Yong, J. Pasupuleti, and A. Rajagopalan, "Application and assessment of internet of things toward the sustainability of energy systems: Challenges and issues," Sustainable Cities and Society, vol. 53, pp. 101957, Feb. 2020.
- A. Dehghantanha, "Internet of Things Security and Forensics: Challenges and Opportunities," Future Generation Computer Systems, vol. 78, no. 2, pp. 544-546, 2018. https://doi.org/10.1016/j.future.2017.07.060
- S. A. Solangi, K. Khoumbati, and D. N. Hakro, "Multi-Hop Optimization in Wireless Sensor Networks using GA," Univ. Sindh J. Inf. Commun. Technol., vol. 2, no. 3, pp. 1-5, Nov. 2018.
- K. U. R. Khoumbati, S. A. Solangi, Z. Bhatti, and D. N. Hakro, "Optimal Route Planning by Genetic Algorithm for Wireless Sensor Networks," in ICISCT 2020 - 2nd Int. Conf. Inf. Sci. Commun. Technol, Feb. 2020.
- S. A. Solangi, D. N. Hakro, I. A. Lashari, K.-R. Khoumbati, Z. A. and Bhutto, and M. Hameed, "Genetic Algorithm Applications in Wireless Sensor Networks ( WSN ): A Review," Int. J. Manag. Sci. Bus. Res., vol. 1, no. 4, pp. 152-166, 2017.
- S. A. Solangi, K. Khoumbati, and D. N. Hakro, "Multi-Hop Optimization in Wireless Sensor Networks using Genetic Algorithm," Univ. Sindh J. Inf. Commun. Technol., vol. 3, no. 4, pp. 193-197, Nov. 2019.
- A. A. Shah, S. A. Solangi, and A. A. Shah, "Cloud Computing for Bio-Iinformatics: A Pakistani Perspective," in Third National Conference On Emerging Trends In Bioinformatics & Biosciences, Oct. 2019.
- V. Hassija, V. Chamola, V. Saxena, D. Jain, P. Goyal and B.Sikdar, "A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures", IEEE Access, vol. 7, pp. 82721-82743, Jun. 2019. https://doi.org/10.1109/ACCESS.2019.2924045
- I. Ali, S. Sabir, and Z. Ullah, "Internet of Things Security, Device Authentication and Access Control: A Review" 2019.
- S. Nagarkar, and D. V. Prasad, "Evaluating Privacy and Security Threats in IoT-based Smart Home Environment", International Journal of Applied Engineering Research, ISSN 0973-4562, Vol. 14, no. 7, Nov. 2019.
- M. Frustaci, P. Pace, G. Aloi and G. Fortino, "Evaluating Critical Security Issues of the IoT World: Present and Future Challenges" IEEE Internet of Things Journal, vol. 5, no. 4, pp. 2483-2495, Aug. 2018. https://doi.org/10.1109/JIOT.2017.2767291
- Global scale of installed IoT devices, Available online: https://www.informationmatters.net/internet-of-things-statistics/ (accessed on 10 August 2021).
- S. Panchiwala, and M. Shah, "A Comprehensive Study on Critical Security Issues and Challenges of the IoT World." Journal of Data, Information and Management, vol. 29, no. 4, pp. 1-22, Dec. 2020 https://doi.org/10.1007/s42488-020-00030-2
- M. H. Miraz, M. Ali, S. Peter, P. S. Excell, and R. Picking "A Review on Internet of Things (IoT), Internet of Everything (IoE) and Internet of Nano Things (IoNT)", Internet Technologies and Applications (ITA), pp. 219-224, IEEE, 2015.
- S. Liu, K. Yue, Y. Zhang, H. Yang, L. Liu, and X. Duan, " The Research on IOT Security Architecture and Its Key Technologies," In Proceedings of the 2018 IEEE 3rd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), Chongqing, China, October. 2018.
- H. Guo, J. Ren, D. Zhang, Y. Zhang, and J. Hu, "A scalable and manageable IoT architecture based on transparent computing," J. Parallel Distrib. Comput., vol. 118, pp. 5-13, Aug. 2018. https://doi.org/10.1016/j.jpdc.2017.07.003
- M. Obaidat, M. Khodiaeva, S. Obeidat, D. Salane, and J. Holst, "Security Architecture Framework for Internet of Things (IoT)," In Proceedings of the 2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), USA, October. 2019.
- A. Mosenia, and N. K. Jha, "A Comprehensive Study of Security of Internet-of-Things," IEEE Trans. Emerg. Topics Comput., vol. 5, pp. 586-602, Sep. 2016. https://doi.org/10.1109/TETC.2016.2606384
- K.M Sadique, R. Rahmani, and P. Johannesson, "Towards Security on Internet of Things: Applications and Challenges in Technology," Procedia Comput. Sci., vol. 141, pp. 199-206, Jan. 2018. https://doi.org/10.1016/j.procs.2018.10.168
- M. M. Dhanvijay, and S. C. Patil, "Internet of Things: A survey of enabling technologies in healthcare and its applications," Comput. Netw. vol. 153, 113-131, Apr. 2019. https://doi.org/10.1016/j.comnet.2019.03.006
- T. A. Ahanger, and A. Aljumah, "Internet of Things: A Comprehensive Study of Security Issues and Defense Mechanisms," IEEE Access, vol. 7, pp. 11020-11028, Nov. 2019 . https://doi.org/10.1109/ACCESS.2018.2876939
- I. Stellios, P. Kotzanikolaou, M. Psarakis, C. Alcaraz, and J. Lopez, "A Survey of IoT-Enabled Cyberattacks: Assessing Attack Paths to Critical Infrastructures and Services," IEEE Commun. Surv. Tutor. Vol. 20, no. 4, pp. 3453-3495, Jul. 2018,. https://doi.org/10.1109/COMST.2018.2855563
- Nat'l Inst. of Standards and Technology, NIST Cloud Computing Forensic Science Challenges, NIST draft NISTIR 8006, 2014.
- NIST Computer Security Division. F. I. P. S. Standards for Security Categorization of Federal Information and Information Systems; NIST FIPS 199; NIST: Gaithersburg, MD, USA, 2004.
- N. Neshenko, E. Bou-Harb, J. Crichigno, G. Kaddoum, and N. Ghani, "Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities and a First Empirical Look on Internet-Scale IoT Exploitations" IEEE Commun. Surv. Tutor, vol. 21, no. 3, pp. 2702-2733, Apr. 2019. https://doi.org/10.1109/COMST.2019.2910750
- H. Ghadeer, "Cybersecurity Issues in Internet of Things and Countermeasures," In Proceedings of the 2018 IEEE International Conference on Industrial Internet (ICII),, USA, Oct. 2018.
- O. Said and M. Masud, "Towards internet of things: Survey and future vision," International Journal of Computer Networks (IJCN), vol. 5, no. 1, 2013.
- H. Tao, M. Z. A. Bhuiyan, A. N. Abdalla, M. M. Hassan, J. M. Zain, and T. Hayajneh, "Secured Data Collection with Hardware-Based Ciphers for IoT-Based Healthcare," IEEE Internet Things J., vol. 6, no. 1, pp. 410-420, Jul. 2019. https://doi.org/10.1109/JIOT.2018.2854714
- A. Al Hayajneh, M. Z. A. Bhuiyan, A. McAndrew, "A Novel Security Protocol for Wireless Sensor Networks with Cooperative Communication," Computers,vol. 9, no. 1, pp. 4, Mar. 2020.
- T. Hayajneh, K. Griggs,and M. Imran, "Secure and efficient data delivery for fog-assisted wireless body area networks," Peer-to-Peer Netw. Appl., vol. 12, no. 5, pp. 1289-1307, Sep. 2019. https://doi.org/10.1007/s12083-018-0705-6
- T. Alam, "A Reliable Communication Framework and Its Use in Internet of Things (IoT)," IJSRCSEIT, vol. 3, pp. 450-456, May. 2018.
- I. Makhdoom, M. Abolhasan, J. Lipman, R. P. Liu, R. and W. Ni, "Anatomy of Threats to the Internet of Things," IEEE Commun. Surv. Tutor., vol. 21, no. 2, pp. 1636-1675, Oct. 2019. https://doi.org/10.1109/COMST.2018.2874978
- K. Jaswal, T. Choudhury, R. L. Chhokar, and S. R. Singh, "Securing the Internet of Things: A proposed framework," In Proceedings of the 2017 International Conference on Computing, Communication and Automation (ICCCA), Greater Noida, India, May. 2017.
- M. A. Obaidat, S. Obeidat, J. Holst, A. Al Hayajneh, and J. Brown, "A Comprehensive and Systematic Survey on the Internet of Things : Security and Privacy Challenges , Security Frameworks , Enabling Technologies , Threats , Vulnerabilities and Countermeasures," Comput. Artic., vol. 9, no. 44, pp. 1-43, Jun. 2020. https://doi.org/10.3390/computers9020044
- M. O. Ojo, S. Giordano, G. Procissi, and I. N. Seitanidis, "A Review of Low-End, Middle-End, and High-End Iot Devices," IEEE Access, vol. 6, pp. 70528-70554, Nov. 2018. https://doi.org/10.1109/ACCESS.2018.2879615
- P. Urien, "An innovative security architecture for low cost low power IoT devices based on secure elements: A four quarters security architecture" In Proceedings of the 2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, Jan. 2018.
- J. Newsome, E. Shi, D. Song, and A. Perrig, "The Sybil attack in sensor networks: Analysis & defenses," In Proceedings of the Third International Symposium on Information Processing in Sensor Networks, Berkeley, CA, USA, pp. 259-268, Apr. 2004.
- I. Andrea, C. Chrysostomos and H. George, "Internet of Things: Security vulnerabilities and challenges," In 2015 IEEE symposium on computers and communication (ISCC), Larnaca, Cyprus, pp. 180-187. IEEE, 2015.
- D. Puthal, S. Nepal, R. Ranjan, J. Chen, "Threats to Networking Cloud and Edge Datacenters in the Internet of Things," IEEE Cloud Comput., vol. 3, no. 3, PP. 64-71, Jul. 2016. https://doi.org/10.1109/MCC.2016.63
- T. Alelyani, A. Shaikh, A. A. Sulaiman, Y. Asiri, H. Alshahrani, H. S. Almakdi, "Research Challenges and Opportunities Towards a Holistic View of Telemedicine Systems: A Systematic Review," Enhanced Telemedicine and e-Health: Advanced IoT Enabled Soft Computing Framework, pp.3-26, 2021
- A. Shaikh, and A. Alghamdi, "IoT, smart environments and interdisciplinary applications for technology management and sustainable development," International Journal of technology management & sustainable development, vol. 19, no. 3, 2020.
- A. Shaikh, and A. Alghamdi, "IoT, Smart Environments and Interdisciplinary Applications for Technology Management and Sustainable Development," International Journal of Technology Management & Sustainable Development, vol. 19, no. 3, pp 257-261, 2020. https://doi.org/10.1386/tmsd_00025_2