51

Security Issues in Blockchained IoT

Cao, Q., & Yang, X. (2013). SybilFence: Improving social-graph-based sybil defenses with

user negative feedback. ArXiv:1304.3819.

Caro, R.J., Garrido, D., Plaza, P., Roman, R., Sanz, N., & Serrano, J.L. (2009). Smepp: A

secure middleware for embedded p2p. In ICT Mobile and Wireless Communications

Summit (ICT-MobileSummit’09).

Cha, S.-C., Chen, J.-F., Su, C., & Yeh, K.-H. (2018). A Blockchain connected gateway for

BLE-based devices in the Internet of Things. IEEE Access, 6, 24639–24649.

Chakraborty, R.B., Pandey, M., & Rautaray, S.S. (2018). Managing computation load on

a Blockchain-based multi-layered Internet-of-Things network. Procedia Computer

Science, 132, 469–476.

Chandna, S., Singh, R., & Akhtar, F. (2014). Data scavenging threat in cloud computing.

International Journal of Advances In Computer Science and Cloud Computing, 2(2),

106–111.

Community, T.C.S. (n.d.). Cyber Security Community. Different Attacks and Counter

Measures Against ZigBee Networks. Retrieved July 20, 2020, from https://securitycom­

munity​.tcs​.com/

Conzon, D., Bolognesi, T., Brizzi, P., Lotito, A., Tomasi, R., & Spirito, M.A. (2012). The vir­

tus middleware: An xmpp based architecture for secure iot communications. In 2012

21st International Conference on Computer Communications and Networks (ICCCN)

(pp. 1–6).

Dorri, A., Kanhere, S S., Jurdak, R., & Gauravaram, P. (2017). Blockchain for IoT security

and privacy: The case study of a smart home. In 2017 IEEE International Conference

on Pervasive Computing and Communications Workshops (PerCom Workshops) (pp.

618–623).

Dorri, A., Kanhere, S.S., Jurdak, R., & Gauravaram, P. (2019). LSB: A lightweight scal­

able Blockchain for IoT security and anonymity. Journal of Parallel and Distributed

Computing, 134, 180–197.

Dvir, A., Buttyan, L., & others. (2011). VeRA-version number and rank authentication in

RPL. In 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor

Systems Valencia, Spain (pp. 709–714).

Dwivedi, A.D., Srivastava, G., Dhar, S., & Singh, R. (2019). A decentralized privacy-preserv­

ing healthcare Blockchain for IoT. Sensors, 19(2), 326–332.

Ferreira, H.G.C., de Sousa, R.T., de Deus, F.E.G., & Canedo, E.D. (2014). Proposal of a secure,

deployable and transparent middleware for internet of things. In 2014 9th Iberian

Conference on Information Systems and Technologies (CISTI) Barcelona, Spain (pp. 1–4).

Gartner. (2017). Top Trends in the Gartner Hype Cycle for Emerging Technologies. http://

www​.gartner​.com​/smarterwithgartner​/top​-trends​-in​-the​-gartner​-hype​-cycle​-for​-

emerging​-technologies​-2017/

Gómez-Goiri, A., Orduña, P., Diego, J., & López-De-Ipiña, D. (2014). Otsopack: Lightweight

semantic framework for interoperable ambient intelligence applications. Computers in

Human Behavior, 30, 460–467.

Granjal, J., Monteiro, E., & Silva, J.S. (2013). Application-layer security for the WoT:

Extending CoAP to support end-to-end message security for Internet-integrated sensing

applications. In International Conference on Wired/Wireless Internet Communication

Russia (pp. 140–153).

Gupta, M., Jain, S., Patel, R.B., (2020). Security issues in Internet of Things: Principles, chal­

lenges, taxonomy. In Proceedings of Springer Lecture Notes Electrical Engineering

at 3rd International Conference on Recent Innovations in Computing (ICRIC-2020)

India, In Press.

Gupta, M., Gopalakrishnan, G., & Sharman, R. (2017). Countermeasures against distributed

denial of service. School of Management State University of New York Buffalo, NY.