52
Blockchain Technology
Gupta, S., & Vyas, S. (2021). IoT in Green Engineering Transformation for Smart Cities. In
Smart IoT for Research and Industry (pp. 121–131). Cham: Springer.
Gupta, S., Vyas, S., & Sharma, K.P. (2020, March). A survey on security for IoT via machine
learning. In 2020 International Conference on Computer Science, Engineering and
Applications (ICCSEA) India (pp. 1–5). IEEE.
Haataja, K. (2005). Bluetooth network vulnerability to disclosure, integrity and denial-
of-service attacks. In Proceedings of the Annual Finnish Data Processing Week at
the University of Petrozavodsk (FDPW’2005), Advances in Methods of Modern
Information Technology (Vol. 7, pp. 63–103)
Hardjono, T., & Smith, N. (2016). Cloud-based commissioning of constrained devices using
permissioned Blockchains. In Proceedings of the 2nd ACM International Workshop on
IoT Privacy, Trust, and Security (pp. 29–36).
Hu, Y.-C., Perrig, A., & Johnson, D.B. (2005). Ariadne: A secure on-demand routing protocol
for ad hoc networks. Wireless Networks, 11(1–2), 21–38.
Hummen, R., Hiller, J., Wirtz, H., Henze, M., Shafagh, H., & Wehrle, K. (2013). 6LoWPAN
fragmentation attacks and mitigation mechanisms. In Proceedings of the Sixth ACM
Conference on Security and Privacy in Wireless and Mobile Networks USA (pp.
55–66).
Jang, J., Kwon, T., & Song, J. (2007). A time-based key management protocol for wireless
sensor networks. In International Conference on Information Security Practice and
Experience (pp.314–328).
Khedr, W.I. (2013). SRFID: A hash-based security scheme for low cost RFID systems.
Egyptian Informatics Journal, 14(1), 89–98.
Kibirige, G.W., & Sanga, C. (2015). A survey on detection of sinkhole attack in wireless sen
sor network. arXiv preprint arXiv:1505.01941.
Kishore, K., & Sharma, S. (2016). Evolution of wireless sensor networks as the framework
of Internet of Things: A review. International Journal of Engineering Research and
Management Technology, 5, 12.
Kishore, S.S. (2015). A review on energy efficient routing protocols & techniques in wireless
sensor networks. International Journal of Advanced Computer Science & Software
Engineering, 5(9), 552–558.
Krontiris, I., Dimitriou, T., Giannetsos, T., & Mpasoukos, M. (2007). Intrusion detection
of sinkhole attacks in wireless sensor networks. In International Symposium on
Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed
Robotics (pp. 150–161).
Lazos, L., Poovendran, R., Meadows, C., Syverson, P., & Chang, L. (2005). Preventing worm
hole attacks on wireless ad hoc networks: A graph theoretic approach. IEEE Wireless
Communications and Networking Conference, USA 2, 1193–1199.
Le, A., Loo, J., Lasebae, A., Vinel, A., Chen, Y., & Chai, M. (2013). The impact of rank
attack on network topology of routing protocol for low-power and lossy networks. IEEE
Sensors Journal, 13(10), 3685–3692.
Lee, B., & Lee, J.-H. (2017). Blockchain-based secure firmware update for embedded
devices in an Internet of Things environment. The Journal of Supercomputing, 73(3),
1152–1167.
Liu, B., Yu, X.L., Chen, S., Xu, X., & Zhu, L. (2017). Blockchain based data integrity ser
vice framework for IoT data. In 2017 IEEE International Conference on Web Services
(ICWS) (pp. 468–475).
Maple, C. (2017). Security and privacy in the internet of things. Journal of Cyber Policy,
2(2), 155–184.
Mitrokotsa, A., Rieback, M.R., & Tanenbaum, A.S. (2010). Classifying RFID attacks and
defenses. Information Systems Frontiers, 12(5), 491–505.