[1]
Stefan Poslad, Mohamed Hamdi, Habtamu Abie. International Workshop on Adaptive Security & Privacy management for the Internet of Things (ASPI 2013). UbiComp'13, September 8–12, 2013, Zurich, Switzerland.
DOI: 10.1145/2494091.2499770
Google Scholar
[2]
Kopertz. h. 2011. Internet of Things. Ch. In Real-Time Systems: Design Principles for Distributed Embedded Applications. 2 nd Edition. Springer Verlag 2011, 307-323. DOI: 10. 1007/978-1-4419-8237-7_13.
Google Scholar
[3]
Wu, G, Talwar, s., Johnsson, K, Himayat, N., and Johnson K.D. 2011. Recent Progress in Machine-to-Machine communications, IEEE communication magazine. Apr. 2011, 36-43.
DOI: 10.1109/mcom.2011.5741144
Google Scholar
[4]
Denis Kozlov, Jari Veijalainen, Yasir Ali. Security and Privacy Threats in IoT Architectures. Proceedings of the 7th International Conference on Body Area Networks, 2012, 256-262.
DOI: 10.4108/icst.bodynets.2012.250550
Google Scholar
[5]
Cole P.H. and Rannasinghe, D.C. (Eds). 2007. Networked RFID Systems and Lightweight Cryptography: Raising Barriers to Product Counterfeiting, Springer Verlag.
Google Scholar
[6]
Molina-markham, A., Shenoy,P., Fu, K., Cecchet, E., Irwin D. 2010. Private Memoirs of a Smart Meter. Proc. of Buildsys 201061-66. Doi: 10. 1145/1878446.
DOI: 10.1145/1878431.1878446
Google Scholar
[7]
Bao,F., H. and Wang,G. 2009. Information Security Practice and Experience. In Proceedings of the 5 th International conference IPSEC 2009, Xi'an, China, 13-15.
Google Scholar
[8]
Ouyang,Y., Le,Z., Liu,D., Ford J., and Makedon, F. 2008. Source Location Privacy against Laptop-Class Attacks in Sensor Networks. In proceedings of the 4 th international conference on security and privacy in communication networks, 5, (Istanbu, 2008), ACM New York, available at http: /dl. acm. org/citation. cfm?doid=1460877. 1460884.
DOI: 10.1145/1460877.1460884
Google Scholar
[9]
Bonaci,T., Bushnell,L., Poovendran, R. 2010. Node Capture Attacks in Wireless Sensor Networks: A System Theoretic approach. In Proceedings of the 13th International Conference on Network-Based Information Systems, IEEE Computer Society Press.
DOI: 10.1109/cdc.2010.5717499
Google Scholar
[10]
Weber R H. Internet of Things-New Security and Privacy Challenges[J], Computer Law & Security Review, 2010, 26(1): 23-30.
DOI: 10.1016/j.clsr.2009.11.008
Google Scholar
[11]
Leusse P, PerioreIIiP, Dimitrakos T. Self managed Security Cell, a Security Model for the Internet of Things and Service[C]. Proceeding of the 1st International Conference on Adavances in Future Internent, 2009, 2: 47-52.
DOI: 10.1109/afin.2009.15
Google Scholar