@incollection{, D916F7683A27FB3E30452CAC9F2C06B8 , author={{Rakesh KumarSaini} and {ChandraPrakash}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}2022734 } @book{b0, , author={{ RVignesh }} , title={{Samydurai ans1 Student, 2Associate Professor Security on Internet of Things (IOT) with Challenges and Counter measures in 2017IJEDR|Volume5}} } @incollection{b1, , title={{Elliptic curve cryptosystems}} , author={{ NKoblitz }} , journal={{Mathematics of computation}} 48 , year={1987} } @incollection{b2, , title={{A lightweight authentication protocol for internet of things}} , author={{ JYLee } and { WCLin } and { YHHuang }} , booktitle={{Int'l Symposium on Next-Generation Electronics (ISNE)}} , year={2014} } @incollection{b3, , title={{An Item-Level Access Control Framework for Inter-System Security in the Internet of Things}} , author={{ YXie } and { DWang }} , booktitle={{Applied Mechanics and Materials}} , year={2014} } @incollection{b4, , title={{Capability-based access control delegation model on the federated IoT network}} , author={{ BAnggorojati } and { PNMahalle } and { NRPrasad } and { RPrasad }} , booktitle={{Int'l Symposium on Wireless Personal Multimedia Communications (WPMC)}} , year={2012} } @incollection{b5, , title={{Design and implementation of a mediation system enabling secure communication among Critical Infrastructures}} , author={{ MCastrucci } and { ANeri } and { FCaldeira } and { JAubert } and { DKhadraoui } and { MAubigny }} , journal={{Int'l Journal of Critical Infrastructure Protection}} 5 , year={2012} } @incollection{b6, , title={{Enforcement of security policy rules for the internet of things}} , author={{ RNeisse } and { GSteri } and { GBaldini }} , booktitle={{Int'l Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)}} , year={2014} } @incollection{b7, , title={{Security Issues in the Internet of Things (IoT): A Comprehensive Study" by (IJACSA)}} , author={{ AbdurMirza } and { MuhammadAliRazzaq } and { Qureshi }} , journal={{International Journal of Advanced Computer Science and Applications}} 8 6 , year={2017} } @incollection{b8, , title={{A survey on internet of things: Security and privacy issues}} , author={{ JSKumar } and { DRPatel }} , journal={{International Journal of Computer Applications}} 90 11 , year={2014} } @incollection{b9, , title={{Security and privacy in the internet of things: Current status and open issues}} , author={{ MAbomhara } and { GMKøien }} , booktitle={{Privacy and Security in Mobile Systems (PRISMS), International Conference on}} , publisher={IEEE} , year={2014} } @incollection{b10, , title={{A vision of iot: Applications, challenges, and opportunities with china perspective}} , author={{ SChen } and { HXu } and { DLiu } and { BHu } and { HWang }} , journal={{IEEE Internet of Things journal}} 1 4 , year={2014} } @incollection{b11, , title={{The internet of things: A survey}} , author={{ LAtzori } and { AIera } and { GMorabito }} , journal={{Comput. Netw}} 54 15 , year={Oct2010} } @incollection{b12, , title={{Towards an analysis of security issues, challenges, and open problems in the internet of things}} , author={{ MMHossain } and { MFotouhi } and { RHasan }} , booktitle={{2015 IEEE World Congress on}} , publisher={IEEE} , year={2015} , note={in Services (SERVICES} } @incollection{b13, , title={{Internet of things in industries: A survey}} , author={{ LDaXu } and { WHe } and { SLi }} , journal={{IEEE Transactions on industrial informatics}} 10 4 , year={2014} } @incollection{b14, , title={{Internet of things in healthcare: Interoperability and security issues}} , author={{ LM RTarouco } and { LMBertholdo } and { LZGranville } and { LM RArbiza } and { FCarbone } and { MMarotta } and { JJ CDe Santanna }} , booktitle={{IEEE International Conference on}} , publisher={IEEE} , year={2012} } @incollection{b15, , title={{Cyber security for personal medical devices internet of things}} , author={{ Mohan }} , booktitle={{Distributed Computing in Sensor Systems (DCOSS), 2014 IEEE International Conference on}} , publisher={IEEE} , year={2014} } @book{b16, , author={{ MohamedAbomhara } and { GeirMKøien }} , title={{Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks}} } @incollection{b17, , title={{Service modelling for the internet of things}} , author={{ SDe } and { PBarnaghi } and { MBauer } and { SMeissner }} , booktitle={{Computer Science and Information Systems (FedCSIS), 2011 Federated Conference on}} , publisher={IEEE} , year={2011} } @book{b18, , title={{User interoperability with heterogeneous iot devices through transformation}} , author={{ GXiao } and { JGuo } and { LXu } and { ZGong }} , year={2014} } @incollection{b19, , title={{Internet of things (iot): A vision, architectural elements, and future directions}} , author={{ JGubbi } and { RBuyya } and { SMarusic } and { MPalaniswami }} , journal={{Future Generation Computer Systems}} 29 7 , year={2013} } @book{b20, , title={{From today's intranet of things to a future internet of things: a wireless-and mobility-related view}} , author={{ MZorzi } and { AGluhak } and { SLange } and { ABassi }} } @incollection{b21, , title={{}} , journal={{Wireless Communications, IEEE}} 17 6 , year={2010} } @incollection{b22, , title={{Security and trust research in m2m system}} , author={{ CHongsong } and { FZhongchuan } and { ZDongyan }} , booktitle={{Vehicular Electronics and Safety (ICVES), 2011 IEEE International Conference on}} , publisher={IEEE} , year={2011} } @incollection{b23, , title={{Trust in m2 communication}} , author={{ YCha } and { AUShah } and { ASchmidt } and { MVLeicher } and { Meyerstein }} , journal={{Vehicular Technology Magazine, IEEE}} 4 3 , year={2009} } @book{b24, , title={{Analysis of security threats, requirements, technologies and standards in wireless sensor networks}} , author={{ RLopez } and { CRoman } and { Alcaraz }} }