53
Security Issues in Blockchained IoT
Mohaisen, A., Hopper, N., & Kim, Y. (2011). Keep your friends close: Incorporating trust
into social network-based sybil defenses. In 2011 Proceedings IEEE INFOCOM China
(pp. 1943–1951).
Mosenia, A., & Jha, N.K. (2016). A comprehensive study of security of internet-of-things.
IEEE Transactions on Emerging Topics in Computing, 5(4), 586–602.
Nasurudeen, T.F.K., Shukla, V.K., & Gupta, S. (2021, June). Automation of Disaster Recovery
and Security in Cloud Computing. In 2021 International Conference on Communication
information and Computing Technology (ICCICT) Mumbai, India(pp. 1–6). IEEE.
Ngai, E.C.H., Liu, J., & Lyu, M.R. (2006). On the intruder detection for sinkhole attack in
wireless sensor networks. In 2006 IEEE International Conference on Communications
Istanbul, Turkey (Vol. 8, pp. 3383–3389).
Nia, A.M., Sur-Kolay, S., Raghunathan, A., & Jha, N.K. (2015). Physiological information
leakage: A new frontier in health information security. IEEE Transactions on Emerging
Topics in Computing, 4(3), 321–334.
Noubir, G., & Lin, G. (2003). Low-power DoS attacks in data wireless LANs and counter
measures. ACM SIGMOBILE Mobile Computing and Communications Review, 7(3),
29–30.
OneM2M, Security solutions –OneM2M Technical Specification. (2017). http://onem2m.org/
technical/latest-drafts
Ongtang, M., McLaughlin, S., Enck, W., & McDaniel, P. (2012). Semantically rich application-
centric security in Android. Security and Communication Networks, 5(6), 658–673.
Ouaddah, A., Abou Elkalam, A., & Ait Ouahman, A. (2016). FairAccess: A new Blockchain-
based access control framework for the Internet of Things. Security and Communication
Networks, 9(18), 5943–5964.
OWASP. (2016). Top IoT Vulnerabilities. https://www.owasp.org/index.php/Top_IoT
_Vulnerabilities
Pirretti, M., Zhu, S., Vijaykrishnan, N., McDaniel, P., Kandemir, M., & Brooks, R. (2006).
The sleep deprivation attack in sensor networks: Analysis and methods of defense.
International Journal of Distributed Sensor Networks, 2(3), 267–287.
Pirzada, A.A., & McDonald, C. (2005). Circumventing sinkholes and wormholes in wireless
sensor networks. In IWWAN’05: Proceedings of International Workshop on Wireless
Ad-Hoc Networks (Vol. 71).
Pongle, P., & Chavan, G. (2015). A survey: Attacks on RPL and 6LoWPAN in IoT. In 2015
International Conference on Pervasive Computing (ICPC) Pune, India (pp. 1–6).
Poovendran, R., & Lazos, L. (2007). A graph theoretic framework for preventing the worm
hole attack in wireless ad hoc networks. Wireless Networks, 13(1), 27–59.
Purohit, R., & Bhargava, D. (2017). An illustration to secured way of data mining using
privacy preserving data mining. Journal of Statistics and Management Systems, 20(4),
637–645.
Raju, I., & Parwekar, P. (2016). Detection of sinkhole attack in wireless sensor network. In
Proceedings of the Second International Conference on Computer and Communication
Technologies India (pp. 629–636).
Raza, S., Wallgren, L., & Voigt, T. (2013). SVELTE: Real-time intrusion detection in the
Internet of Things. Ad Hoc Networks, 11(8), 2661–2674.
Rescorla, E., & Modadugu, N. (2012). Datagram transport layer security version 1.2.
Salehi, S.A., Razzaque, M.A., Naraei, P., & Farrokhtala, A. (2013). Detection of sinkhole
attack in wireless sensor networks. In 2013 IEEE International Conference on Space
Science and Communication (IconSpace) India (pp. 361–365).
Sethi, M., Arkko, J., & Keränen, A. (2012). End-to-end security for sleepy smart object net
works. In 37th Annual IEEE Conference on Local Computer Networks-Workshops
Clearwater USA (pp. 964–972).