Articles Data Breaches and Identity Theft | Page 20
Cyber security and the Internet of Things 83
[6] B. Schneier, Secrets and lies: digital security in a networked world. John
Wiley & Sons, 2011.
[7] J. M. Kizza, Guide to Computer Network Security. Springer, 2013.
[8] M. Taneja, “An analytics framework to detect compromised iot devices
using mobility behavior,” in ICT Convergence (ICTC), 2013 Interna-
tional Conference on. IEEE, 2013, pp. 38–43.
[9] G. M. Koien and V. A. Oleshchuk, Aspects of Personal Privacy in
Communications-Problems, Technology and Solutions. River Publishers,
2013.
[10] N. R. Prasad, “Threat model framework and methodology for personal
networks (pns),” in Communication Systems Software and Middleware,
2007. COMSWARE 2007. 2nd International Conference on. IEEE, 2007,
pp. 1–6.
[11] O. Vermesan, P. Friess, P. Guillemin, S. Gusmeroli, H. Sundmaeker,
A. Bassi, I. S. Jubert, M. Mazura, M. Harrison, M. Eisenhauer et al.
“Internet of things strategic research roadmap,” Internet of Things-
Global Technological and Societal Trends, pp. 9–52, 2011.
[12] S. De, P. Barnaghi, M. Bauer, and S. Meissner, “Service modelling for
the internet of things,” in Computer Science and Information Systems
(FedCSIS), 2011 Federated Conference on. IEEE, 2011, pp. 949–955.
[13] G. Xiao, J. Guo, L. Xu, and Z. Gong, “User interoperability with
heterogeneous iot devices through transformation,” 2014.
[14] J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, “Internet of
things (iot): A vision, architectural elements, and future directions,”
Future Generation Computer Systems, vol. 29, no. 7, pp. 1645–1660,
2013.
[15] M. Zorzi, A. Gluhak, S. Lange, and A. Bassi, “From today’s intranet
of things to a future internet of things: a wireless-and mobility-related
view,” Wireless Communications, IEEE, vol. 17, no. 6, pp. 44–51,
2010.
[16] C. Hongsong, F. Zhongchuan, and Z. Dongyan, “Security and trust
research in m2m system,” in Vehicular Electronics and Safety
(ICVES), 2011 IEEE International Conference on. IEEE, 2011,
pp. 286–290.
[17] I. Cha, Y. Shah, A. U. Schmidt, A. Leicher, and M. V. Meyerstein, “Trust
in m2m communication,” Vehicular Technology Magazine, IEEE, vol. 4,
no. 3, pp. 69–75, 2009.
[18] J. Lopez, R. Roman, and C. Alcaraz, “Analysis of security threats,
requirements, technologies and standards in wireless sensor networks,”