Articles Data Breaches and Identity Theft | Page 21

84 M. Abomhara and G. M. Køien [19] [20] [21] [22] [23] [24] [25] [26] [27] [28] [29] in Foundations of Security Analysis and Design V. Springer, 2009, pp. 289–338. R. Roman, J. Zhou, and J. Lopez, “On the features and challenges of security and privacy in distributed internet of things,” Computer Networks, vol. 57, no. 10, pp. 2266–2279, 2013. Y. Cheng, M. Naslund, G. Selander, and E. Fogelstrom, “Privacy in machine-to-machine communications a state-of-the-art survey,” in Com- munication Systems (ICCS), 2012 IEEE International Conference on. IEEE, 2012, pp. 75–79. M. Rudner, “Cyber-threats to critical national infrastructure: An intelli- gence challenge,” International Journal of Intelligence and CounterIn- telligence, vol. 26, no. 3, pp. 453–481, 2013. R. Kozik and M. Choras, “Current cyber security threats and chal- lenges in critical infrastructures protection,” in Informatics and Appli- cations (ICIA), 2013 Second International Conference on. IEEE, 2013, pp. 93–97. P. N. Mahalle, N. R. Prasad, and R. Prasad, “Object classification based context management for identity management in internet of things,” International Journal of Computer Applications, vol. 63, no. 12, pp. 1–6, 2013. A. Gluhak, S. Krco, M. Nati, D. Pfisterer, N. Mitton, and T. Razafind- ralambo, “A survey on facilities for experimental internet of things research,” Communications Magazine, IEEE, vol. 49, no. 11, pp. 58–67, 2011. Y. Benazzouz, C. Munilla, O. Gunalp, M. Gallissot, and L. Gurgen, “Sharing user iot devices in the cloud,” in Internet of Things (WF-IoT), 2014 IEEE World Forum on. IEEE, 2014, pp. 373–374. G. M. Køien, “Reflections on trust in devices: an informal survey of human trust in an internet-of-things context,” Wireless Personal Communications, vol. 61, no. 3, pp. 495–510, 2011. D. Miorandi, S. Sicari, F. De Pellegrini, and I. Chlamtac, “Internet of things: Vision, applications and research challenges,” Ad Hoc Networks, vol. 10, no. 7, pp. 1497–1516, 2012. M. Thoma, S. Meyer, K. Sperner, S. Meissner, and T. Braun, “On iot- services: Survey, classification and enterprise integration,” in Green Computing and Communications (GreenCom), 2012 IEEE International Conference on. IEEE, 2012, pp. 257–260. M. Abomhara and G. Koien, “Security and privacy in the internet of things: Current status and open issues,” in PRISMS 2014 The 2nd