54
Blockchain Technology
Shafagh, H., Burkhalter, L., Hithnawi, A., & Duquennoy, S. (2017). Towards Blockchain-
based auditable storage and sharing of iot data. In Proceedings of the 2017 on Cloud
Computing Security Workshop (pp. 45–50).
Sharma, K.K., & Sharma, S. (2013). Information security & privacy in real life-threats &
mitigations:A review. IJCST, 4(3).
Sharma, S., & Kishore, K. (2017). Data dissemination algorithm using cloud services: A pro
posed integrated architecture using IoT. In 2nd International Conference on Innovative
Research in Engineering Science and Technology (IREST-2017) (pp. 7–8), Eternal
University, Baru Sahib, Sirmour (HP), India.
Sharma, S., Kishore, K., & India 1&2, S.H.P. (2017). Internet of Things (IoT): A review
of integration of precedent, existing & inevitable technologies. AGU International
Journal of Engineering and Technology, 4, 442–455.
Sharmila, S., & Umamaheswari, G. (2011). Detection of sinkhole attack in wireless sen
sor networks using message digest algorithms. In 2011 International Conference on
Process Automation, Control and Computing USA (pp. 1–6).
Sherburne, M., Marchany, R., & Tront, J. (2014). x (pp. 37–40).
Singh, S., & Singh, N. (2016). Blockchain: Future of financial and cyber security. In 2016 2nd
International Conference on Contemporary Computing and Informatics (IC3I) India
(pp. 463–467).
Smart, N.P., & Vercauteren, F. (2010). Fully homomorphic encryption with relatively small
key and ciphertext sizes. In International Workshop on Public Key Cryptography (pp.
420–443)..
Steger, M., Dorri, A., Kanhere, S.S., Römer, K., Jurdak, R., & Karner, M. (2018). Secure wire
less automotive software updates using Blockchains: A proof of concept. In Advanced
Microsystems for Automotive Applications 2017 (pp. 137–149). Cham: Springer.
Suo, H., Wan, J., Zou, C., & Liu, J. (2012). Security in the internet of things: A review. In
2012 International Conference on Computer Science and Electronics Engineering (Vol.
3, pp. 648–651).
Tay, H.J., Tan, J., & Narasimhan, P. (2016). A survey of security vulnerabilities in blue
tooth low energy beacons. In Carnegie Mellon University Parallel Data Lab Technical
Report CMU-PDL-16-109.
Treleaven, P., Brown, R.G., & Yang, D. (2017). Blockchain technology in finance. Computer,
50(9), 14–17.
Vidgren, N., Haataja, K., Patino-Andres, J.L., Ramirez-Sanchis, J.J., & Toivanen, P. (2013).
Security threats in ZigBee-enabled systems: Vulnerability evaluation, practical experi
ments, countermeasures, and lessons learned. In 2013 46th Hawaii International
Conference on System Sciences ,USA (pp. 5132–5138).
Wachsmann, C., & Sadeghi, A.-R. (2014). Physically unclonable functions (PUFs):
Applications, models, and future directions. Synthesis Lectures on Information
Security, Privacy, & Trust, 5(3), 1–91.
Wang, G., Mohanlal, M., Wilson, C., Wang, X., Metzger, M., Zheng, H., & Zhao, B.Y. (2012).
Social turing tests: Crowdsourcing sybil detection. ArXiv:1205.3856.
Wang, W., Kong, J., Bhargava, B., & Gerla, M. (2008). Visualisation of wormholes in under
water sensor networks: A distributed approach. International Journal of Security and
Networks, 3(1), 10–23.
Wazid, M., Das, A.K., Kumari, S., & Khan, M.K. (2016). Design of sinkhole node detection
mechanism for hierarchical wireless sensor networks. Security and Communication
Networks, 9(17), 4596–4614.
Weekly, K., & Pister, K. (2012). Evaluating sinkhole defense techniques in RPL networks. In
2012 20th IEEE International Conference on Network Protocols Austin, USA (ICNP)
(pp. 1–6).