[1] M. Antikainen, M. Sethi, S. Matetic and T. Aura, Commitment-based device-pairing protocol with synchronized drawings and comparison metrics, Pervasive Mobile Comput. 16 (2015), 205–219.
[2] M. Chen, S. Gonzalez, Q. Zhang and M.V.C. Leung, Software agent-based intelligence for code-centric RFID systems, IEEE Intell. Syst. 25 (2010), 12–19.
[3] U. Gasser, R. Faris and R. Heacock, Internet monitor 2013: Reflections on the digital world, Berkman Center Res. Pub. 27 (2013).
[4] G. Giaretta, J. Kempf and V. Devarapalli, Mobile IPv6 bootstrapping in split scenario (No. RFC 5026), Network Working Group, 2007.
[5] J. Gubbi, R. Buyya, S. Marusic and M. Palaniswami, Internet of things (IoT): A vision, architectural elements, and future directions, Future Gen. Comput. Syst. 29 (2013), no. 7, 1645–1660.
[6] S. Hartman and J. Howlett, A GSS-API mechanism for the extensible authentication protocol, JANET(UK), 2013.
[7] T. Hannes, Enriching bootstrapping with authorization information, IETF 2005 (2005), 1-26.
[8] I. Ishaq, D. Carels, G. K. Teklemariam, J. Hoebeke, F.V.D. Abeele, E.D. Poorter and P. Demeester, IETF standardization in the field of the internet of things (IoT): Asurvey, J. Sensor Actuator Networks 2 (2013), no. 2, 235–287.
[9] V. Karagiannis, P. Chatzimisios, F. Vazquez-Gallego and J. Alonso-Zarate, A survey on application layer protocols
for the internet of things, Trans. IoT Cloud Comput. 3 (2015), no. 1, 11–17.
[10] Y. Liao and Ch. Hsiao, A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol, Ad Hoc Networks. 18 (2014), 133–146.
[11] G. Marsh, A.P. Sampat, S. Potluri and D.K. Panda, Scaling advanced message queuing protocol (AMQP) architecture with broker federation and infiniband, Ohio State University, Tech. Rep. 38 (2008).
[12] P. Mell and T. Grance, The NIST definition of cloud computing, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology Gaithersburg, 2011.
[13] M. Nakhjiri, AAA and network security for mobile access: Radius, diameter, EAP, PKI and IP mobilit, John Wiley and Sons, Hoboken, NJ, USA, 2005.
[14] A. Neto, H. Patil, L. Oliveira, A. Souza, I. Cunha and M. Nogueira, Aot: Authentication and access control for the entire iot device life-cycle, Proc. 14th ACM Conf. Embedded Network Sensor Syst. CD-ROM, 2016, pp. 1–15.
[15] J. Nieminen, T. Savolainen, M. Isomaki, B. Patil, Z. Shelby and C. Gomez, IPv6 over bluetooth(r) low energy, IETF, RFC7668, 2015.
[16] K. Rose, S. Eldridge and L. Chapin, The internet of things: An overview, Internet Soc. 80 (2015), 1–50.
[17] H. Shuai and X. Jianchuan, Ensuring data storage security through a novel third party auditor scheme in cloudcomputing, IEEE Int. Conf. Cloud Comput. Intell. Syst. IEEE, 2011, pp. 264–268.
[18] Z. Shelby and C. Bormann, 6LoWPAN: The wireless embedded internet, Vol. 43, John Wiley and Sons, 2011.
[19] G. Suciu, A. Vulpe, S. Halunga, O. Fratu, G. Todoran and V. Suciu, Smart cities built on resilient cloud computing and secure internet of things, 19Th Int. Conf. Control Syst. Comput. Sci., 2013.
[20] D. Thaler, H. Tschofenig and M. Barnes, Architectural considerations in smart object networking, Tech. RFC 7452 (2015).
[21] J.R. Vacca, Computer and information security handbook, 2nd ed., Morgan Kaufmann: San Francisco, CA, USA, 2013.
[22] K. Vamsee and R. Sriram, Data security in cloud computing, J. Comput. Math. Sci. 2 (2011), 1–169.
[23] M. Vuˇcini´c, B. Tourancheau, F. Rousseau, A. Duda, L. Damon and R. Guizzetti, OSCAR: Object security architecture for the internet of things, Ad Hoc Networks 32 (2015), 3–16.
[24] R.H. Weber, Internet of Things–New security and privacy challenges, Comput. Law Security Rev. 26 (2010), no. 1, 23–30.
[25] R. Westerholt and B. Resch, Asynchronous Geospatial Processing: An Event-Driven Push-Based Architecture for the OGC Web Processing Service, Trans. GIS 19 (2015), no. 3, 455–479.
[26] Q. Zhang, L. Cheng and R. Boutaba, Cloud computing: state-of-the-art and research challenges, J. Internet Serv. Appl. 1 (2010), no. 1, 7–18.