You are on page 1of 13

%1

@article{alsharif2021study,
title={Study of machine learning for cloud assisted iot security as a
service},
author={Alsharif, Maram and Rawat, Danda B},
journal={Sensors},
volume={21},
number={4},
pages={1034},
year={2021},
publisher={Multidisciplinary Digital Publishing Institute}
}

%2
@article{ali2021security,
title={Security Issues and Vulnerability of IoT Devices},
author={Ali, Kurdistan and Askar, Shavan and others},
journal={International Journal of Science and Business},
volume={5},
number={3},
pages={101--115},
year={2021},
publisher={IJSAB International}
}

%3
@article{george2018graph,
title={A graph-based security framework for securing industrial IoT networks
from vulnerability exploitations},
author={George, Gemini and Thampi, Sabu M},
journal={IEEE Access},
volume={6},
pages={43586--43601},
year={2018},
publisher={IEEE}
}

%4
@article{rathore2021deep,
title={Deep learning and blockchain-empowered security framework for
intelligent 5G-enabled IoT},
author={Rathore, Shailendra and Park, Jong Hyuk and Chang, Hangbae},
journal={IEEE Access},
volume={9},
pages={90075--90083},
year={2021},
publisher={IEEE}
}
%5
@article{rathore2021deep,
title={Deep learning and blockchain-empowered security framework for
intelligent 5G-enabled IoT},
author={Rathore, Shailendra and Park, Jong Hyuk and Chang, Hangbae},
journal={IEEE Access},
volume={9},
pages={90075--90083},
year={2021},
publisher={IEEE}
}

%6
@article{latvala2020evaluation,
title={Evaluation of out-of-band channels for IoT security},
author={Latvala, Sampsa and Sethi, Mohit and Aura, Tuomas},
journal={SN Computer Science},
volume={1},
number={1},
pages={1--17},
year={2020},
publisher={Springer}
}

%7
@article{mrabet2020survey,
title={A survey of IoT security based on a layered architecture of sensing
and data analysis},
author={Mrabet, Hichem and Belguith, Sana and Alhomoud, Adeeb and Jemai,
Abderrazak},
journal={Sensors},
volume={20},
number={13},
pages={3625},
year={2020},
publisher={Multidisciplinary Digital Publishing Institute}
}

%8
@article{yue2021deep,
title={Deep learning-based security behaviour analysis in IoT environments:
A survey},
author={Yue, Yawei and Li, Shancang and Legg, Phil and Li, Fuzhong},
journal={Security and Communication Networks},
volume={2021},
year={2021},
publisher={Hindawi}
}
%9
@article{fadele2019novel,
title={A novel countermeasure technique for reactive jamming attack in
internet of things},
author={Fadele, Alaba Ayotunde and Othman, Mazliza and Hashem, Ibrahim
Abaker Targio and Yaqoob, Ibrar and Imran, Muhammad and Shoaib, Muhammad},
journal={Multimedia Tools and Applications},
volume={78},
number={21},
pages={29899--29920},
year={2019},
publisher={Springer}
}

%10
@article{alaba2017internet,
title={Internet of Things security: A survey},
author={Alaba, Fadele Ayotunde and Othman, Mazliza and Hashem, Ibrahim
Abaker Targio and Alotaibi, Faiz},
journal={Journal of Network and Computer Applications},
volume={88},
pages={10--28},
year={2017},
publisher={Elsevier}
}

%11
@article{bilal2017review,
title={A review of internet of things architecture, technologies and
analysis smartphone-based attacks against 3D printers},
author={Bilal, Muhammad},
journal={arXiv preprint arXiv:1708.04560},
year={2017}
}

%12
@article{hussain2020machine,
title={Machine learning in IoT security: Current solutions and future
challenges},
author={Hussain, Fatima and Hussain, Rasheed and Hassan, Syed Ali and
Hossain, Ekram},
journal={IEEE Communications Surveys \& Tutorials},
volume={22},
number={3},
pages={1686--1721},
year={2020},
publisher={IEEE}
}
%13
@article{coulter2018intelligent,
title={Intelligent agents defending for an IoT world: A review},
author={Coulter, Rory and Pan, Lei},
journal={Computers \& Security},
volume={73},
pages={439--458},
year={2018},
publisher={Elsevier}
}

%14
@article{coulter2018intelligent,
title={Intelligent agents defending for an IoT world: A review},
author={Coulter, Rory and Pan, Lei},
journal={Computers \& Security},
volume={73},
pages={439--458},
year={2018},
publisher={Elsevier}
}

%15
@article{ganeshkumar2016novel,
title={A novel jammer detection framework for cluster-based wireless sensor
networks},
author={Ganeshkumar, P and Vijayakumar, KP and Anandaraj, M},
journal={EURASIP Journal on Wireless Communications and Networking},
volume={2016},
number={1},
pages={1--25},
year={2016},
publisher={Springer}
}

%16
@article{mpitziopoulos2009survey,
title={A survey on jamming attacks and countermeasures in WSNs},
author={Mpitziopoulos, Aristides and Gavalas, Damianos and Konstantopoulos,
Charalampos and Pantziou, Grammati},
journal={IEEE Communications Surveys \& Tutorials},
volume={11},
number={4},
pages={42--56},
year={2009},
publisher={IEEE}
}

%17
@article{oliveri2019sagishi,
title={Sagishi: An undercover software agent for infiltrating IoT botnets},
author={Oliveri, Andrea and Lauria, Filippo},
journal={Network Security},
volume={2019},
number={1},
pages={9--14},
year={2019},
publisher={MA Business London}
}

%18
@inproceedings{sankaran2016lightweight,
title={Lightweight security framework for IoTs using identity based
cryptography},
author={Sankaran, Sriram},
booktitle={2016 International Conference on Advances in Computing,
Communications and Informatics (ICACCI)},
pages={880--886},
year={2016},
organization={IEEE}
}

%19
@article{kasturi2020detection,
title={Detection and Classification of Radio Frequency Jamming Attacks using
Machine learning.},
author={Kasturi, GS and Jain, Ansh and Singh, Jagdeep},
journal={J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
volume={11},
number={4},
pages={49--62},
year={2020}
}

%20
@article{zou2016survey,
title={A survey on wireless security: Technical challenges, recent advances,
and future trends},
author={Zou, Yulong and Zhu, Jia and Wang, Xianbin and Hanzo, Lajos},
journal={Proceedings of the IEEE},
volume={104},
number={9},
pages={1727--1765},
year={2016},
publisher={IEEE}
}

%21
@inproceedings{namvar2016jamming,
title={Jamming in the internet of things: A game-theoretic perspective},
author={Namvar, Nima and Saad, Walid and Bahadori, Niloofar and Kelley,
Brian},
booktitle={2016 IEEE Global Communications Conference (GLOBECOM)},
pages={1--6},
year={2016},
organization={IEEE}
}

%22
@article{pei2015leauch,
title={LEAUCH: low-energy adaptive uneven clustering hierarchy for cognitive
radio sensor network},
author={Pei, Errong and Han, Haozhe and Sun, Zehua and Shen, Bin and Zhang,
Tianqi},
journal={EURASIP Journal on Wireless Communications and Networking},
volume={2015},
number={1},
pages={1--8},
year={2015},
publisher={Springer}
}

%23
@article{singh2010routing,
title={Routing protocols in wireless sensor networks--A survey},
author={Singh, Shio Kumar and Singh, MP and Singh, Dharmendra K and others},
journal={International Journal of Computer Science \& Engineering Survey
(IJCSES)},
volume={1},
number={2},
pages={63--83},
year={2010}
}

%24
@article{raymond2008effects,
title={Effects of denial-of-sleep attacks on wireless sensor network MAC
protocols},
author={Raymond, David R and Marchany, Randy C and Brownfield, Michael I and
Midkiff, Scott F},
journal={IEEE transactions on vehicular technology},
volume={58},
number={1},
pages={367--380},
year={2008},
publisher={IEEE}
}
%25
@inproceedings{aman2015managing,
title={Managing security trade-offs in the internet of things using adaptive
security},
author={Aman, Waqas and Snekkenes, Einar},
booktitle={2015 10th International Conference for Internet Technology and
Secured Transactions (ICITST)},
pages={362--368},
year={2015},
organization={IEEE}
}

%26
@article{grover2014jamming,
title={Jamming and anti--jamming techniques in wireless networks: a survey},
author={Grover, Kanika and Lim, Alvin and Yang, Qing},
journal={International Journal of Ad Hoc and Ubiquitous Computing},
volume={17},
number={4},
pages={197--215},
year={2014},
publisher={Inderscience Publishers}
}

%27
@article{khader2021survey,
title={Survey of DoS/DDoS attacks in IoT},
author={Khader, Rozan and Eleyan, Derar},
journal={Sustainable Engineering and Innovation},
volume={3},
number={1},
pages={23--28},
year={2021}
}

%28
@article{qiu2016mutual,
title={A mutual authentication and key establishment scheme for M2M
communication in 6LoWPAN networks},
author={Qiu, Yue and Ma, Maode},
journal={IEEE transactions on industrial informatics},
volume={12},
number={6},
pages={2074--2085},
year={2016},
publisher={IEEE}
}

%29
@misc{lin2020security,
title={Security and privacy techniques in IoT environment},
author={Lin, Jerry Chun-Wei and Yeh, Kuo-Hui},
journal={Sensors},
volume={21},
number={1},
pages={1},
year={2020},
publisher={MDPI}
}

%30
@inproceedings{kasinathan2013denial,
title={Denial-of-Service detection in 6LoWPAN based Internet of Things},
author={Kasinathan, Prabhakaran and Pastrone, Claudio and Spirito, Maurizio
A and Vinkovits, Mark},
booktitle={2013 IEEE 9th international conference on wireless and mobile
computing, networking and communications (WiMob)},
pages={600--607},
year={2013},
organization={IEEE}
}

%31
@article{hatzivasilis2017scotres,
title={SCOTRES: secure routing for IoT and CPS},
author={Hatzivasilis, George and Papaefstathiou, Ioannis and Manifavas,
Charalampos},
journal={IEEE Internet of Things Journal},
volume={4},
number={6},
pages={2129--2141},
year={2017},
publisher={IEEE}
}

%32
@article{hussen2020exploring,
title={Exploring Impacts of Random Proactive Jamming Attack in Wireless
Sensor Network},
author={Hussen, Ali Mohammed},
journal={International Journal of Computer (IJC)},
volume={36},
number={1},
pages={18--33},
year={2020}
}

%33
@article{djuraev2020channel,
title={Channel-hopping-based jamming mitigation in wireless LAN considering
throughput and fairness},
author={Djuraev, Sirojiddin and Nam, Seung Yeob},
journal={Electronics},
volume={9},
number={11},
pages={1749},
year={2020},
publisher={Multidisciplinary Digital Publishing Institute}
}

%34
@article{yin2020novel,
title={A novel temporal and spatial panorama stream processing engine on IoT
applications},
author={Yin, Yifan and Xu, Boyi and Cai, Hongming and Yu, Han},
journal={Journal of Industrial Information Integration},
volume={18},
pages={100143},
year={2020},
publisher={Elsevier}
}

%35
@article{strasser2010detection,
title={Detection of reactive jamming in sensor networks},
author={Strasser, Mario and Danev, Boris and {\v{C}}apkun, Srdjan},
journal={ACM Transactions on Sensor Networks (TOSN)},
volume={7},
number={2},
pages={1--29},
year={2010},
publisher={ACM New York, NY, USA}
}

%36
@article{xu2006jamming,
title={Jamming sensor networks: attack and defense strategies},
author={Xu, Wenyuan and Ma, Ke and Trappe, Wade and Zhang, Yanyong},
journal={IEEE network},
volume={20},
number={3},
pages={41--47},
year={2006},
publisher={IEEE}
}

%37
@inproceedings{wood2007deejam,
title={DEEJAM: Defeating energy-efficient jamming in IEEE 802.15. 4-based
wireless networks},
author={Wood, Anthony D and Stankovic, John A and Zhou, Gang},
booktitle={2007 4th Annual IEEE Communications Society Conference on Sensor,
Mesh and Ad Hoc Communications and Networks},
pages={60--69},
year={2007},
organization={IEEE}
}

%38
@inproceedings{tarkowski2017improved,
title={Improved jamming resistance using electronically steerable parasitic
antenna radiator},
author={Tarkowski, Michal and Rzymowski, Mateusz and Kulas, Lukasz and Nyka,
Krzysztof},
booktitle={IEEE EUROCON 2017-17th International Conference on Smart
Technologies},
pages={496--500},
year={2017},
organization={IEEE}
}

%39
@inproceedings{heo2017dodge,
title={Dodge-jam: Anti-jamming technique for low-power and lossy wireless
networks},
author={Heo, Jeongyoon and Kim, Jung-Jun and Bahk, Saewoong and Paek,
Jeongyeup},
booktitle={2017 14th annual IEEE international conference on sensing,
communication, and networking (SECON)},
pages={1--9},
year={2017},
organization={IEEE}
}

%40
@book{wang2010system,
title={System Level Analysis of LTE-advanced: With Emphasis on Multi-
component Carrier Management: PhD Thesis: a Dissertation Submitted to
Department of Electronic Systems, the Faculty of Engineering and Science,
Aalborg University in Partial Fulfillment for the Degree of Doctor of
Philosophy},
author={Wang, Yuanye},
year={2010},
publisher={Yuanye Wang}
}

%41
@article{alaba2017internet,
title={Internet of Things security: A survey},
author={Alaba, Fadele Ayotunde and Othman, Mazliza and Hashem, Ibrahim
Abaker Targio and Alotaibi, Faiz},
journal={Journal of Network and Computer Applications},
volume={88},
pages={10--28},
year={2017},
publisher={Elsevier}
}

%42
@article{fu2017farms,
title={FARMS: Efficient mapreduce speculation for failure recovery in short
jobs},
author={Fu, Huansong and Chen, Haiquan and Zhu, Yue and Yu, Weikuan},
journal={Parallel Computing},
volume={61},
pages={68--82},
year={2017},
publisher={Elsevier}
}

%43
@article{pawar2012behavioral,
title={Behavioral modeling of wsn mac layer security attacks: A sequential
uml approach},
author={Pawar, Pranav M and Nielsen, Rasmus Hjorth and Prasad, Neeli R and
Ohmori, Shingo and Prasad, Ramjee},
journal={Journal of Cyber Security and Mobility},
volume={1},
number={1},
pages={65--82},
year={2012},
publisher={River Publishers}
}

%44
@article{lu2014overview,
title={Overview of security and privacy issues in the internet of things},
author={Lu, Chris},
journal={Internet of Things (IoT): A vision, Architectural Elements, and
Future Directions},
pages={1--11},
year={2014}
}

%45
@article{panoff2021sensor,
title={On Sensor Security in the Era of IoT and CPS},
author={Panoff, Max and Dutta, Raj Gautam and Hu, Yaodan and Yang, Kaichen
and Jin, Yier},
journal={SN Computer Science},
volume={2},
number={1},
pages={1--14},
year={2021},
publisher={Springer}
}

%46
@article{nolin2016internet,
title={The Internet of Things and convenience},
author={Nolin, Jan and Olson, Nasrine},
journal={Internet Research},
year={2016},
publisher={Emerald Group Publishing Limited}
}

%47
@article{lee2012effective,
title={Effective and efficient jamming based on routing in wireless ad hoc
networks},
author={Lee, Jae-Joon and Lim, Jaesung},
journal={IEEE communications letters},
volume={16},
number={11},
pages={1903--1906},
year={2012},
publisher={IEEE}
}

%48
@article{sufyan2013detection,
title={Detection of jamming attacks in 802.11 b wireless networks},
author={Sufyan, Nadeem and Saqib, Nazar Abbass and Zia, Muhammad},
journal={EURASIP Journal on Wireless Communications and Networking},
volume={2013},
number={1},
pages={1--18},
year={2013},
publisher={Springer}
}

%49
@article{babu2013defending,
title={Defending Wireless Sensor Networks using Trigger Identification
Service for Reactive Jammers},
author={BABU, BURNENI SURESH and SChakradhar, GOUD},
year={2013}
}

%50
@article{li2016internet,
title={The Internet of Things: a security point of view},
author={Li, Shancang and Tryfonas, Theo and Li, Honglei},
journal={Internet Research},
year={2016},
publisher={Emerald Group Publishing Limited}
}

You might also like