52

Blockchain Technology

Gupta, S., & Vyas, S. (2021). IoT in Green Engineering Transformation for Smart Cities. In

Smart IoT for Research and Industry (pp. 121–131). Cham: Springer.

Gupta, S., Vyas, S., & Sharma, K.P. (2020, March). A survey on security for IoT via machine

learning. In 2020 International Conference on Computer Science, Engineering and

Applications (ICCSEA) India (pp. 1–5). IEEE.

Haataja, K. (2005). Bluetooth network vulnerability to disclosure, integrity and denial-

of-service attacks. In Proceedings of the Annual Finnish Data Processing Week at

the University of Petrozavodsk (FDPW’2005), Advances in Methods of Modern

Information Technology (Vol. 7, pp. 63–103)

Hardjono, T., & Smith, N. (2016). Cloud-based commissioning of constrained devices using

permissioned Blockchains. In Proceedings of the 2nd ACM International Workshop on

IoT Privacy, Trust, and Security (pp. 29–36).

Hu, Y.-C., Perrig, A., & Johnson, D.B. (2005). Ariadne: A secure on-demand routing protocol

for ad hoc networks. Wireless Networks, 11(1–2), 21–38.

Hummen, R., Hiller, J., Wirtz, H., Henze, M., Shafagh, H., & Wehrle, K. (2013). 6LoWPAN

fragmentation attacks and mitigation mechanisms. In Proceedings of the Sixth ACM

Conference on Security and Privacy in Wireless and Mobile Networks USA (pp.

55–66).

Jang, J., Kwon, T., & Song, J. (2007). A time-based key management protocol for wireless

sensor networks. In International Conference on Information Security Practice and

Experience (pp.314–328).

Khedr, W.I. (2013). SRFID: A hash-based security scheme for low cost RFID systems.

Egyptian Informatics Journal, 14(1), 89–98.

Kibirige, G.W., & Sanga, C. (2015). A survey on detection of sinkhole attack in wireless sen­

sor network. arXiv preprint arXiv:1505.01941.

Kishore, K., & Sharma, S. (2016). Evolution of wireless sensor networks as the framework

of Internet of Things: A review. International Journal of Engineering Research and

Management Technology, 5, 12.

Kishore, S.S. (2015). A review on energy efficient routing protocols & techniques in wireless

sensor networks. International Journal of Advanced Computer Science & Software

Engineering, 5(9), 552–558.

Krontiris, I., Dimitriou, T., Giannetsos, T., & Mpasoukos, M. (2007). Intrusion detection

of sinkhole attacks in wireless sensor networks. In International Symposium on

Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed

Robotics (pp. 150–161).

Lazos, L., Poovendran, R., Meadows, C., Syverson, P., & Chang, L. (2005). Preventing worm­

hole attacks on wireless ad hoc networks: A graph theoretic approach. IEEE Wireless

Communications and Networking Conference, USA 2, 1193–1199.

Le, A., Loo, J., Lasebae, A., Vinel, A., Chen, Y., & Chai, M. (2013). The impact of rank

attack on network topology of routing protocol for low-power and lossy networks. IEEE

Sensors Journal, 13(10), 3685–3692.

Lee, B., & Lee, J.-H. (2017). Blockchain-based secure firmware update for embedded

devices in an Internet of Things environment. The Journal of Supercomputing, 73(3),

1152–1167.

Liu, B., Yu, X.L., Chen, S., Xu, X., & Zhu, L. (2017). Blockchain based data integrity ser­

vice framework for IoT data. In 2017 IEEE International Conference on Web Services

(ICWS) (pp. 468–475).

Maple, C. (2017). Security and privacy in the internet of things. Journal of Cyber Policy,

2(2), 155–184.

Mitrokotsa, A., Rieback, M.R., & Tanenbaum, A.S. (2010). Classifying RFID attacks and

defenses. Information Systems Frontiers, 12(5), 491–505.