[1] H. Abdulkarim, Review on machine learning and deep learning algorithms for IoT security, Int. J. Nonlinear Anal. Appl. 14 (2023), no. 5, 27–35.
[2] M. Amoozadeh, A. Raghuramu, Ch.-N. Chuah, D. Ghosal, H.M. Zhang, J. Rowe, and K. Levitt, Security vulnerabilities of connected vehicle streams and their impact on cooperative driving, IEEE Commun. Mag. 53 (2015), 6, 126–132.
[3] A. Baliga, Understanding blockchain consensus models, Persistent 4 (2017), no. 1, 14.
[4] A. Banafa, IoT and blockchain convergence: Benefits and challenges, IEEE Internet of Things 9 (2017), no. 2017.
[5] V. Beltran, J.A. Martinez, A. Skarmeta, and P. Martinez-Julia, An arm-compliant IoT platform: Security by design for the smart home, IEEE 5th Glob. Conf. Consum. Electron., IEEE, 2016, pp. 1–2.
[6] G. Brambilla, M. Amoretti, and F. Zanichelli, Using blockchain for peer-to-peer proof-of-location, arXiv preprint arXiv:1607.00174 20 (2016).
[7] J. Buchmann, Introduction to Cryptography, vol. 335, Springer, 2004.
[8] E. Castello Ferrer, The blockchain: A new framework for robotic swarm systems, Proc. Future Technol. Conf. (FTC) 2018, Volume 2, Springer, 2019, pp. 1037–1058.
[9] M. L. Das, Privacy and security challenges in Internet of Things, Distrib. Comput. Internet Technol.: 11th Int. Conf., ICDCIT 2015, Bhubaneswar, India, February 5-8, 2015. Proceedings 11, Springer, 2015, pp. 33–48.
[10] S.K. Datta, Ch. Bonnet, and N. Nikaein, An IoT gateway centric architecture to provide novel m2m services, IEEE World Forum on Internet of Things (WF-IoT), IEEE, 2014, pp. 514–519.
[11] M.C. Domingo, An overview of the internet of underwater things, J. Network Comput. Appl. 35 (2012), no. 6, 1879–1890.
[12] A. Dorri, S.S. Kanhere, R. Jurdak, and P. Gauravaram, Blockchain for IoT security and privacy: The case study of a smart home, IEEE Int. Conf. Pervasive Comput. Commun. Workshops (PerCom workshops), IEEE, 2017, pp. 618–623.
[13] A. Ekblaw, A. Azaria, J.D. Halamka, and A. Lippman, A case study for blockchain in healthcare: “medrec” prototype for electronic health records and medical research data, Proc. IEEE Open Big Data Conf., vol. 13, 2016, pp. 13.
[14] H. Gross, M. Holbl, D. Slamanig, and R. Spreitzer, Privacy-aware authentication in the internet of things, Cryptol. Network Secur.: 14th Int. Conf., CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings 14, Springer, 2015, pp. 32–39.
[15] G. Ho, D. Leung, P. Mishra, A. Hosseini, D. Song, and D. Wagner, Smart locks: Lessons for securing commodity Internet of Things devices, Proc. 11th ACM Asia Conf. Comput. Commun. Secur., 2016, pp. 461–472.
[17] I. Kotenko, I. Saenko, and A. Branitskiy, Framework for mobile Internet of Things security monitoring based on big data processing and machine learning, IEEE Access 6 (2018), 72714–72723.
[18] L. Li, R. Lu, K.-K.R. Choo, A. Datta, and J. Shao, Privacy-preserving-outsourced association rule mining on vertically partitioned databases, IEEE Trans. Inf. Forensics Secur.11 (2016), no. 8, 1847–1861.
[19] A. Mosenia and N.K. Jha, A comprehensive study of security of internet-of-things, IEEE Trans. Emerg. Topics Comput. 5 (2016), no. 4, 586–602.
[20] A. Narayanan, J. Bonneau, E. Felten, A. Miller, and S. Goldfeder, Bitcoin and Cryptocurrency Technologies, Princeton University Press, 2016.
[21] A. Ouaddah, H. Mousannif, A. Abou Elkalam, and A.A. Ouahman, Access control in the internet of things: Big challenges and new opportunities, Comput. Networks 112 (2017), 237–262.
[22] R. Roman, J. Zhou, and J. Lopez, On the features and challenges of security and privacy in distributed Internet of Things, Comput. Networks 57 (2013), no. 10, 2266–2279.
[23] S. Sicari, A. Rizzardi, L.A. Grieco, and A. Coen-Porisini, Security, privacy and trust in Internet of Things: The road ahead, Comput. Networks 76 (2015), 146–164.
[24] J. Sun, J. Yan, and K.Z.K. Zhang, Blockchain-based sharing services: What blockchain technology can contribute to smart cities, Financ. Innov. 2 (2016), no. 1, 1–9.
[26] Ch. Wang, Zh. Bi, and L.D. Xu, Iot and cloud computing in automation of assembly modeling systems, IEEE Trans. Ind. Inf. 10 (2014), no. 2, 1426–1434.
[27] Y. Wang and Q. Wen, A privacy-enhanced dns scheme for the Internet of Things, IET Int. Conf. Commun. Technol. Appl., 2011, pp. 699–702.
[28] G. Wood, Ethereum: A secure decentralised generalised transaction ledger, Ethereum project yellow paper 151 (2014), no. 2014, 1–32.
[29] Ch. Yang, X. Chen, and Y. Xiang, Blockchain-based publicly verifiable data deletion scheme for cloud storage, J. Network Comput. Appl. 103 (2018), 185–193.
[30] K. Zhao and L. Ge, A survey on the Internet of Things security, Ninth Int. Conf. Comput. Intell. Secur., IEEE, 2013, pp. 663–667.
[31] W. Zhou, Y. Jia, A. Peng, Y. Zhang, and P. Liu, The effect of IoT new features on security and privacy: New threats, existing solutions, and challenges yet to be solved, IEEE Internet Things J. 6 (2018), no. 2, 1606–1616.