54

Blockchain Technology

Shafagh, H., Burkhalter, L., Hithnawi, A., & Duquennoy, S. (2017). Towards Blockchain-

based auditable storage and sharing of iot data. In Proceedings of the 2017 on Cloud

Computing Security Workshop (pp. 45–50).

Sharma, K.K., & Sharma, S. (2013). Information security & privacy in real life-threats &

mitigations:A review. IJCST, 4(3).

Sharma, S., & Kishore, K. (2017). Data dissemination algorithm using cloud services: A pro­

posed integrated architecture using IoT. In 2nd International Conference on Innovative

Research in Engineering Science and Technology (IREST-2017) (pp. 7–8), Eternal

University, Baru Sahib, Sirmour (HP), India.

Sharma, S., Kishore, K., & India 1&2, S.H.P. (2017). Internet of Things (IoT): A review

of integration of precedent, existing & inevitable technologies. AGU International

Journal of Engineering and Technology, 4, 442–455.

Sharmila, S., & Umamaheswari, G. (2011). Detection of sinkhole attack in wireless sen­

sor networks using message digest algorithms. In 2011 International Conference on

Process Automation, Control and Computing USA (pp. 1–6).

Sherburne, M., Marchany, R., & Tront, J. (2014). x (pp. 37–40).

Singh, S., & Singh, N. (2016). Blockchain: Future of financial and cyber security. In 2016 2nd

International Conference on Contemporary Computing and Informatics (IC3I) India

(pp. 463–467).

Smart, N.P., & Vercauteren, F. (2010). Fully homomorphic encryption with relatively small

key and ciphertext sizes. In International Workshop on Public Key Cryptography (pp.

420–443)..

Steger, M., Dorri, A., Kanhere, S.S., Römer, K., Jurdak, R., & Karner, M. (2018). Secure wire­

less automotive software updates using Blockchains: A proof of concept. In Advanced

Microsystems for Automotive Applications 2017 (pp. 137–149). Cham: Springer.

Suo, H., Wan, J., Zou, C., & Liu, J. (2012). Security in the internet of things: A review. In

2012 International Conference on Computer Science and Electronics Engineering (Vol.

3, pp. 648–651).

Tay, H.J., Tan, J., & Narasimhan, P. (2016). A survey of security vulnerabilities in blue­

tooth low energy beacons. In Carnegie Mellon University Parallel Data Lab Technical

Report CMU-PDL-16-109.

Treleaven, P., Brown, R.G., & Yang, D. (2017). Blockchain technology in finance. Computer,

50(9), 14–17.

Vidgren, N., Haataja, K., Patino-Andres, J.L., Ramirez-Sanchis, J.J., & Toivanen, P. (2013).

Security threats in ZigBee-enabled systems: Vulnerability evaluation, practical experi­

ments, countermeasures, and lessons learned. In 2013 46th Hawaii International

Conference on System Sciences ,USA (pp. 5132–5138).

Wachsmann, C., & Sadeghi, A.-R. (2014). Physically unclonable functions (PUFs):

Applications, models, and future directions. Synthesis Lectures on Information

Security, Privacy, & Trust, 5(3), 1–91.

Wang, G., Mohanlal, M., Wilson, C., Wang, X., Metzger, M., Zheng, H., & Zhao, B.Y. (2012).

Social turing tests: Crowdsourcing sybil detection. ArXiv:1205.3856.

Wang, W., Kong, J., Bhargava, B., & Gerla, M. (2008). Visualisation of wormholes in under­

water sensor networks: A distributed approach. International Journal of Security and

Networks, 3(1), 10–23.

Wazid, M., Das, A.K., Kumari, S., & Khan, M.K. (2016). Design of sinkhole node detection

mechanism for hierarchical wireless sensor networks. Security and Communication

Networks, 9(17), 4596–4614.

Weekly, K., & Pister, K. (2012). Evaluating sinkhole defense techniques in RPL networks. In

2012 20th IEEE International Conference on Network Protocols Austin, USA (ICNP)

(pp. 1–6).