References:
1. S. Ali, A.Bosche, and F. Ford, “Cybersecurity Is the Key to Unlocking Demand in the Internet of Things,” Bain and Company, 2018.
2. A.Furfaro, L.Argento, A.Parise, and A.Piccolo, “Using virtual environments for the assessment of cybersecurity issues in IoT scenarios,” Simulation Modelling Practice and Theory, 73, 2017, pp.43-54.
3. Government of Dubai, “IoT security standard [1.0],” Dubai Electronic Security Center, 2018.
4. M.S.Jalali, J. P.Kaiser, M.Siegel, and S.Madnick, “The Internet of Things (IoT) Promises New Benefits–and Risks: A Systematic Analysis of Adoption Dynamics of IoT,” 2017.
5. M.S.Henriques, and N.K. Vernekar, “Using symmetric and asymmetric cryptography to secure communication between devices in IoT,” International Conference on IoT and Application (ICIOT), 2017, doi:10.1109/iciota.2017.8073643.
6. X.Liu, M.Zhao, S.Li, F. Zhang, and W.Trappe, “A security framework for the Internet of Things in the future Internet architecture,” Future Internet, 9(3), 27, 2017.
7. B.M.Piccarreta, K.N.Megas, and D.G.O'Rourke, “Internet of Things (IoT) Cybersecurity Colloquium,” NIST Interagency/Internal Report (NISTIR)-8201, 2017.
8. S.Tweneboah-Koduah, K.E.Skouby, and R.Tadayoni, “Cyber security threats to IoT applications and service domains,” Wireless Personal Communications, 95(1), 2017, pp. 169- 185.