51
Security Issues in Blockchained IoT
Cao, Q., & Yang, X. (2013). SybilFence: Improving social-graph-based sybil defenses with
user negative feedback. ArXiv:1304.3819.
Caro, R.J., Garrido, D., Plaza, P., Roman, R., Sanz, N., & Serrano, J.L. (2009). Smepp: A
secure middleware for embedded p2p. In ICT Mobile and Wireless Communications
Summit (ICT-MobileSummit’09).
Cha, S.-C., Chen, J.-F., Su, C., & Yeh, K.-H. (2018). A Blockchain connected gateway for
BLE-based devices in the Internet of Things. IEEE Access, 6, 24639–24649.
Chakraborty, R.B., Pandey, M., & Rautaray, S.S. (2018). Managing computation load on
a Blockchain-based multi-layered Internet-of-Things network. Procedia Computer
Science, 132, 469–476.
Chandna, S., Singh, R., & Akhtar, F. (2014). Data scavenging threat in cloud computing.
International Journal of Advances In Computer Science and Cloud Computing, 2(2),
106–111.
Community, T.C.S. (n.d.). Cyber Security Community. Different Attacks and Counter
Measures Against ZigBee Networks. Retrieved July 20, 2020, from https://securitycom
munity.tcs.com/
Conzon, D., Bolognesi, T., Brizzi, P., Lotito, A., Tomasi, R., & Spirito, M.A. (2012). The vir
tus middleware: An xmpp based architecture for secure iot communications. In 2012
21st International Conference on Computer Communications and Networks (ICCCN)
(pp. 1–6).
Dorri, A., Kanhere, S S., Jurdak, R., & Gauravaram, P. (2017). Blockchain for IoT security
and privacy: The case study of a smart home. In 2017 IEEE International Conference
on Pervasive Computing and Communications Workshops (PerCom Workshops) (pp.
618–623).
Dorri, A., Kanhere, S.S., Jurdak, R., & Gauravaram, P. (2019). LSB: A lightweight scal
able Blockchain for IoT security and anonymity. Journal of Parallel and Distributed
Computing, 134, 180–197.
Dvir, A., Buttyan, L., & others. (2011). VeRA-version number and rank authentication in
RPL. In 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor
Systems Valencia, Spain (pp. 709–714).
Dwivedi, A.D., Srivastava, G., Dhar, S., & Singh, R. (2019). A decentralized privacy-preserv
ing healthcare Blockchain for IoT. Sensors, 19(2), 326–332.
Ferreira, H.G.C., de Sousa, R.T., de Deus, F.E.G., & Canedo, E.D. (2014). Proposal of a secure,
deployable and transparent middleware for internet of things. In 2014 9th Iberian
Conference on Information Systems and Technologies (CISTI) Barcelona, Spain (pp. 1–4).
Gartner. (2017). Top Trends in the Gartner Hype Cycle for Emerging Technologies. http://
www.gartner.com/smarterwithgartner/top-trends-in-the-gartner-hype-cycle-for-
emerging-technologies-2017/
Gómez-Goiri, A., Orduña, P., Diego, J., & López-De-Ipiña, D. (2014). Otsopack: Lightweight
semantic framework for interoperable ambient intelligence applications. Computers in
Human Behavior, 30, 460–467.
Granjal, J., Monteiro, E., & Silva, J.S. (2013). Application-layer security for the WoT:
Extending CoAP to support end-to-end message security for Internet-integrated sensing
applications. In International Conference on Wired/Wireless Internet Communication
Russia (pp. 140–153).
Gupta, M., Jain, S., Patel, R.B., (2020). Security issues in Internet of Things: Principles, chal
lenges, taxonomy. In Proceedings of Springer Lecture Notes Electrical Engineering
at 3rd International Conference on Recent Innovations in Computing (ICRIC-2020)
India, In Press.
Gupta, M., Gopalakrishnan, G., & Sharman, R. (2017). Countermeasures against distributed
denial of service. School of Management State University of New York Buffalo, NY.