@incollection{, AC8D3F18500CF45D24E2DC507F8D831B , author={{Muhammad AIqbal} and {University of Louisiana at Lafayette,}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}16719 } @book{b0, , author={{ RSomayya Madakam } and { SiddharthRamaswamy } and { Tripathi }} , title={{Internet of Things (IoT): A Literature Review}} } @book{b1, , author={{ EmmanouilVasilomanolakis } and { JorgDaubert } and { ManishaLuthra }} , title={{Vangelis Gazis, Alex Wiesmaie and Panayotis Kikiras "On the Security and Privacy of Internet of Things Architectures and Systems}} } @book{b2, , title={{Leveraging Public-keybased Authentication for the Internet of Things}} , author={{ HosseinShafagh }} , year={2013} , address={Germany} RWTH Aachen University , note={Master Thesis} } @incollection{b3, , title={{Secure communication for smart IoT objects: Protocol stacks, use cases and practical examples}} , author={{ RBonetto } and { NBui } and { VLakkundi } and { AOlivereau } and { ASerbanati } and { MRossi }} 10.1109/WoWMoM.2012.6263790 , booktitle={{IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM'12)}} San Francisco, CA , year={June 2012} } @book{b4, , title={{Security in Internet of Things Systems}} , author={{ Christian Dancke Tuen }} Norwegian University of Science and Technology , note={Master Thesis} } @incollection{b5, , title={{Tiny 3-TLS: a trust delegation protocol for wireless sensor networks}} , author={{ SepidehFouladgar } and { BastienMainaud } and { KhaledMasmoudi } and { HossamAfifi }} 10.1007/11964254_5 , booktitle={{Proceedings of the Third European conference on Security and Privacy in Ad-Hoc and Sensor Net works (ESAS'06)}} the Third European conference on Security and Privacy in Ad-Hoc and Sensor Net works (ESAS'06)Hamburg, Germany , year={Nov 2006} } @incollection{b6, , title={{Sizzle: A standards-based end-to-end security architecture for the}} , author={{ VipulGupta } and { MichaelWurm } and { YuZhu } and { MatthewMillard } and { StephenFung } and { NilsGura } and { HansEberle }} , journal={{Sheueling Chang Shantz}} , year={2005} } @incollection{b7, , title={{Lightweight collaborative key establishment scheme for the Internet of Things}} , author={{ YBSaied } and { AOlivereau } and { DZeghlache } and { MLaurent }} , journal={{Computer Networks}} 64 , year={2014} } @incollection{b8, , title={{Delegation based Authentication and Authorization for the IP-based Internet of Things}} , author={{ RHummen } and { HShafagh } and { SRaza } and { TVoigt } and { KWehrle }} , booktitle={{IEEE SECON}} , year={2014} } @book{b9, , title={{That 'Internet of Things' thing}} , author={{ KAshton }} , year={June 2009} 22 } @incollection{b10, , title={{Secure End-to-End Key Establishment Protocol for Resource-Constrained Healthcare Sensors in the Context of IoT}} , author={{ MagdyMuhammad A Iqbal } and { Bayoumi }} , booktitle={{The 14th Annual IEEE International Conference on High Performance Computing and Simulations (HPCS)}} Innsbruck Austria , year={2016} 2016 } @book{b11, , title={{Handbook of Applied Cryptography}} , author={{ AJMenezes } and { SAVanstone } and { PCVan Oorschot }} , year={1996} , publisher={CRC Press, Inc} , address={Boca Raton, FL} } @incollection{b12, , title={{Kerberos: An authentication service for open network systems}} , author={{ JenniferGSteiner } and { BCliffordNeuman } and { JeffreyISchiller }} , booktitle={{Proceedings of the USENIX Winter Conference}} the USENIX Winter ConferenceDallas, Texas, USA , publisher={USENIX Association} , year={January 1988. 1988} } @incollection{b13, , title={{Datagram Transport Layer Security Version 1.2}} , author={{ ERescorla } and { NModadugu }} , journal={{IETF}} 6347 , year={2012} , note={RFC} } @incollection{b14, , title={{}} , author={{ RMoskowitz } and { RHummen }} draftmoskowitz-hip-dex-01 , journal={{HIP Diet EXchange (DEX)}} , year={2012} } @book{b15, , title={{Minimal IKEv2}} , author={{ TKivinen }} draft-kivinen- ipsecme-ikev2-minimal-01 , year={2012} , address={WiP), IETF} } @incollection{b16, , title={{Tailoring End-to-End IP Security Protocols to the Internet of Things}} , author={{ RHummen } and { HWirtz } and { JHZiegeldorf } and { JHiller } and { KWehrle }} , booktitle={{Proc. of IEEE ICNP}} of IEEE ICNP , year={2013} } @book{b17, , title={{Transport Layer Security (TLS) Cached Information Extension}} , author={{ SSantesson } and { HTschofenig }} , year={2014} , address={WiP), IETF} , note={draft-ietf-tls-cached-info-16} } @incollection{b18, , title={{DTLS based security and two-way authentication for the Internet of Things}} , author={{ TKothmayr } and { CSchmitt } and { WHu } and { MBrünig } and { GCarle }} , journal={{Ad Hoc Networks}} 11 8 , year={2013} } @incollection{b19, , title={{D-HIP: A distributed key exchange scheme for HIP-based Internet of Things}} , author={{ YSaied } and { AOlivereau }} , booktitle={{Proceeding of IEEE World of Wireless, Mobile and Multimedia Networks (WoWMoM) 2012}} eeding of IEEE World of Wireless, Mobile and Multimedia Networks (WoWMoM) 2012 , year={2012} } @incollection{b20, , title={{Secure end-to-end communication for constrained devices in IoTenabled Ambient Assisted Living systems}} , author={{ PPorambage } and { Braeken } and { MGurtov } and { SusannaYlianttila } and { Spinsante }} , booktitle={{proceedings of 2nd World Forum on Internet of Things (WF-IoT)}} 2nd World Forum on Internet of Things (WF-IoT) , year={2015} } @book{b21, , title={{Internet of Things: An overview" by Internet Society}} } @book{b22, , author={{ EmmanouilVasilomanolakis } and { JorgDaubert } and { ManishaLuthra }} , title={{Vangelis Gazis, Alex Wiesmaier and Panayotis Kikiras "On the Security and Privacy of Internet of Things Architectures and Systems}} } @incollection{b23, , title={{A view on privacy & trust in iot}} , author={{ JoergDaubert } and { AlexanderWiesmaier } and { PanayotisKikiras }} , booktitle={{IOT/CPS-Security Workshop, IEEE International Conference on Communications}} London, GB , year={2015. 2015. June 08-12, 2015} , note={page to appear. IEEE} } @book{b24, , title={{Vision and Challenges for Realising the Internet of Things}} , author={{ HSundmaeker } and { PGuillemin } and { PFriess } and { SWoelfflé }} } @incollection{b25, , title={{}} , journal={{European Commission-Information Society and Media}} , year={2010} } @incollection{b26, , title={{Lee Security Analysis and Improvements of Authentication and Access Control in the Internet of Things}} , author={{ BruceNdibanje } and { Hoon-JaeLee } and { Sang-Gon }} , booktitle={{Internet of Things: The new frontier for data security and privacy}} Bethany Lobo , publisher={Benjamin Kleine} , year={Amanada Levendowski March 2015} 27 , note={Part 1} } @book{b27, , title={{Gartner's Hype Cycle Special Report for}} , year={2015. 2015} , publisher={Gartner Inc} } @incollection{b28, , title={{Threat-Based Security Analysis for the Internet of Things}} , author={{ WAhmad } and { AndrewAtamli } and { Martin }} , booktitle={{Secure Internet of Things (SIoT)}} , publisher={IEEE} , year={2014} } @incollection{b29, , title={{Internet of Things -New security and privacy challenges}} , author={{ RolfHWeber }} , journal={{Computer Law & Security Review}} 26 1 , year={Jan 2010} } @incollection{b30, , title={{Security and Privacy in the Internet of Things: Current Status and Open Issues}} , author={{ MohamedAbomhara } and { GeirMKoien }} , booktitle={{Privacy and Security in Mobile Systems (PRISMS)}} , publisher={IEEE} , year={2014} } @incollection{b31, , title={{Secure communication for smart IoT objects: Protocol stacks, use cases and practical examples}} , author={{ RiccardoBonetto } and { NicolaBui } and { VishwasLakkundi } and { AlexisOlivereau } and { AlexandruSerbanati } and { MicheleRossi }} , booktitle={{IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2012 -Digital Proceedings}} , year={2012. 2012} } @book{b32, , title={{The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246 (Proposed Standard)}} , author={{ TDierks } and { ERescorla }} , year={August 2008} 5746 6176 } @book{b33, , title={{¨ Security in fixed and wireless networks -an introduction to securing data communications}} , author={{ GunterSch } and { ¨Afer }} , year={2003} , publisher={Wiley} } @book{b34, , title={{Security Architecture for the Internet Protocol. RFC 2401 (Proposed Standard)}} , author={{ SKent } and { RAtkinson }} , year={November 1998} 4301 , note={updated by RFC 3168} }