[3]
Calheiros RN. Fog and edge computing: challenges and emerging trends (Invited Talk). 2nd Workshop on Fog Computing and the IoT (Fog-IoT 2020) Schloss Dagstuhl-Leibniz-Zentrum für Informatik. Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik 2020; 80:11.
[6]
Kumar Raj, Kumar Pramod, Singhal Vivek. A survey: Review of
cloud IoT security techniques, issues and challenges. Issues and
Challenges 2019 March; 12
[10]
Sivagurunathan S, Prathapchandran K. Trust- based security mechanisms for self-organized networks (SONs) securing the internet of things: Concepts, methodologies, tools, and applications. IGI Global 2020;1 :1782-805.
[11]
Nayak, P, Kayiram K, and Mallikarjuna R. IoT-enabled agricultural
system applications, challenges and security issues. IoT and analytics
for agriculture. Singapore: Springer 2020; pp. 139-63.
[13]
Sughasiny M. Enhanced Security Framework for Cloud-Linked
IoT. International Journal of Advances in Scientific Research and
Engineering 34 2017.
[14]
Moustafa N. A systemic IoT-fog-cloud architecture for big-data
analytics and cyber security systems: A review of fog computing
2019. arXiv preprint arXiv:1906.01055.
[22]
Huang Q, Yang Y, Wang L. Secure data access control with ciphertext update and computation outsourcing in fog computing for internet of things. IEEE Access Journal 2017; 5: 12.
[24]
Kumar R, Kumar P, Singhal VA. Survey: Review of Cloud IoT Security Techniques, Issues and Challenges. Proceedings of 2nd International Conference on Advanced Computing and Software Engineering (ICACSE)
[25]
Raza S. Tomas H, Panos P, Thiemo V, “SecureSense: End-to-end secure communication architecture for the cloud-connected internet of things”, Future Generation Computer Systems. Elsevier 2017.
[35]
Vasi’c V, Antoni’c AK. Pripuˇ zi’c, M. Mikuc, I. P.ˇZarko, Adaptable secure communication for the Cloud of Things. Softw Pract Exper 2017; 47(3): 489-501.
[40]
Ngu AH, Gutierrez M, Metsis V, Nepal S, Sheng QZ. IoT Middleware: A survey on issues and enabling technologies. IEEE Internet Things J 2017; 4(1): 1-20.
[48]
Conti M, Dehghantanha A, Franke K, Watson S. Internet of Things security and forensics: Challenges and opportunities. Future Gener Comput Syst 2018; 78: 544-6.
[53]
Gunti M, Mann TP. Secure booting of computer system. US Patent
No 10,592,669 2020 Mar.; 17
[56]
Hall M, Durairajan R, Sekar V. Fighting Fire with Light: A case for
defending ddos attacks using the optical layer 2020. arXiv preprint
arXiv:2002.10009
[64]
Nayak P, Kayiram K, Mallikarjuna R. IoT-enabled agricultural system applications, challenges and security issues IoT and Analytics for Agriculture. Singapore: Springer 2020; pp. 139-63.
[65]
Sivagurunathan S, Prathapchandran K. Trust- based security mechanisms for self-organized networks (SONs) securing the internet of things: Concepts, methodologies, tools, and applications. IGI Global 2020; pp. 1782-805.
[67]
Gupta BB. A beginner’s guide to internet of things security: Attacks, applications, authentication, and fundamentals. London, England: CRC Press 2020.
[69]
Deva SVSVP, Akashe S, Kim H-J. Feasible challenges and applications
of iot in healthcare: essential architecture and challenges in
various fields of internet of healthcare things. In: Advances in
Healthcare Information Systems and Administration. IGI Global;
2020. p. 178–200.
[72]
Nahas BA, et al. Blue Flood: Concurrent Transmissions for Multi-
Hop Bluetooth 5--Modeling and Evaluation 2020. arXiv preprint
arXiv:2002.12906
[75]
Gupta, Sarthak, Virain Malhotra, and Shailendra Narayan Singh
“Securing IoT-driven remote healthcare data through blockchain”
advances in data and information Sciences. Singapore: Springer
2020; pp. 47-56.
[78]
Liang Q, Shenoy P, Irwin D. AI on the Edge: Rethinking AI-based
IoT Applications Using Specialized Edge Architectures 2020.
arXiv preprint arXiv:2003.12488