Zhu Q, Wang R, Chen Q, Liu Y, Qin W (2010) Iot gateway: bridgingwireless sensor networks into Internet of Things. In: 2010 IEEE/IFIP international conference on embedded and ubiquitous computing. IEEE, pp 347–352
Chiang M, Zhang T (2016) Fog and IoT: an overview of research opportunities. IEEE Internet Things J 3(6):854–864
Google Scholar
Conti M, Dehghantanha A, Franke K, Watson S (2018) Internet of Things security and forensics: challenges and opportunities. Elsevier, Amsterdam
Google Scholar
Sakhnini J, Karimipour H, Dehghantanha A, Parizi RM, Srivastava G (2019) Security aspects of Internet of Things aided smart grids: a bibliometric survey. Internet Things. https://doi.org/10.1016/j.iot.2019.100111
Article
Google Scholar
Darabian H, Dehghantanha A, Hashemi S, Taheri M, Azmoodeh A, Homayoun S, Choo K-KR, Parizi RM (2020) A multiview learning method for malware threat hunting: windows, IoT and android as case studies. World Wide Web. https://doi.org/10.1007/s11280-019-00755-0
Domingo MC (2012) An overview of the Internet of Things for people with disabilities. J Netw Comput Appl 35(2):584–596
Google Scholar
Jia X, Feng Q, Fan T, Lei Q (2012) RFID technology and its applications in Internet of Things (IoT). In: 2012 2nd International conference on consumer electronics, communications and networks (CECNet). IEEE, pp 1282–1285
Wang L, Da Xu L, Bi Z, Xu Y (2013) Data cleaning for RFID and WSN integration. IEEE Trans Ind Inf 10(1):408–418
Google Scholar
Liu CH, Yang B, Liu T (2014) Efficient naming, addressing and profile services in Internet-of-Things sensory environments. Ad Hoc Netw 18:85–101
Google Scholar
HaddadPajouh H, Dehghantanha A, Parizi RM, Aledhari M, Karimipour H (2019) A survey on Internet of Things security: requirements, challenges, and solutions. Internet Things. https://doi.org/10.1016/j.iot.2019.100129
Article
Google Scholar
Gaur A, Scotney B, Parr G, McClean S (2015) Smart city architecture and its applications based on IoT. Procedia Comput Sci 52:1089–1094
Google Scholar
Binti N, Kamaludeen A, Lee SP, Parizi RM (2019) Guideline-based approach for IoT home application development. In: 2019 International conference on Internet of Things (iThings) and IEEE green computing and communications (GreenCom) and IEEE cyber, physical and social computing (CPSCom) and IEEE smart data (SmartData), pp 929–936
Yun M, Yuxin B (2010) Research on the architecture and key technology of Internet of Things (IoT) applied on smart grid. In: 2010 International conference on advances in energy engineering. IEEE, pp 69–72
Behera TM, Mohapatra SK, Samal UC, Khan MS, Daneshmand M, Gandomi AH (2019) Residual energy-based cluster-head selection in wsns for IoT application. IEEE Internet Things J 6:5132–5139
Google Scholar
Catarinucci L, De Donno D, Mainetti L, Palano L, Patrono L, Stefanizzi ML, Tarricone L (2015) An IoT-aware architecture for smart healthcare systems. IEEE Internet Things J 2(6):515–526
Google Scholar
He W, Yan G, Da Xu L (2014) Developing vehicular data cloud services in the IoT environment. IEEE Trans Ind Inf 10(2):1587–1595
Google Scholar
Behera TM, Mohapatra SK, Samal UC, Khan MS, Daneshmand M, Gandomi AH (2020) I-sep: an improved routing protocol for heterogeneous WSN for IoT-based environmental monitoring. IEEE Internet Things J 7(1):710–717
Google Scholar
Paranjothi A, Tanik U, Wang Y, Khan MS (2019) Hybrid-vehfog: a robust approach for reliable dissemination of critical messages in connected vehicles. Trans Emerg Telecommun Technol 30(6):e3595 (e3595 ETT-18-0175.R3)
Google Scholar
Gardašević G, Veletić M, Maletić N, Vasiljević D, Radusinović I, Tomović S, Radonjić M (2017) The IoT architectural framework, design issues and application domains. Wirel Pers Commun 92(1):127–148
Google Scholar
Karanki SS, Khan MS (2017) SMMV: secure multimedia delivery in vehicles using roadside infrastructure. Veh Commun 7:40–50
Google Scholar
Ngu AH, Gutierrez M, Metsis V, Nepal S, Sheng QZ (2016) IoT middleware: a survey on issues and enabling technologies. IEEE Internet Things J 4(1):1–20
Google Scholar
Kelly SDT, Suryadevara NK, Mukhopadhyay SC (2013) Towards the implementation of IoT for environmental condition monitoring in homes. IEEE Sens J 13(10):3846–3853
Google Scholar
Giuliano R, Mazzenga F, Neri A, Vegni AM (2016) Security access protocols in IoT capillary networks. IEEE Internet Things J 4(3):645–657
Google Scholar
Zhang Y, Raychadhuri D, Ravindran R, Wang G (2013) ICN based architecture for IoT. IRTF Contribution
Chang K-H (2014) Bluetooth: a viable solution for IoT?[Industry perspectives]. IEEE Wirel Commun 21(6):6–7
Google Scholar
Santos J, Rodrigues JJ, Silva BM, Casal J, Saleem K, Denisov V (2016) An IoT-based mobile gateway for intelligent personal assistants on mobile health environments. J Netw Comput Appl 71:194–204
Google Scholar
Behera TM, Khan MS, Mohapatra SK, Samail UC, Bhuiyan MZA (2019) Energy-efficient routing for greenhouse monitoring using heterogeneous sensor networks. In: 2019 International conference on Internet of Things (iThings) and IEEE green computing and communications (GreenCom) and IEEE cyber, physical and social computing (CPSCom) and IEEE smart data (SmartData), pp 953–958
Ren J, Guo H, Xu C, Zhang Y (2017) Serving at the edge: a scalable IoT architecture based on transparent computing. IEEE Netw 31(5):96–105
Google Scholar
HaddadPajouh H, Dehghantanha A, Khayami R, Choo K-KR (2018) A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting. Future Gener Comput Syst 85:88–96
Google Scholar
Baccelli E, Gündoğan C, Hahm O, Kietzmann P, Lenders MS, Petersen H, Schleiser K, Schmidt TC, Wählisch M (2018) RIOT: an open source operating system for low-end embedded devices in the IoT. IEEE Internet Things J 5(6):4428–4440
Google Scholar
Levis P et al (2005) TinyOS: an operating system for sensor networks. In: Weber W, Rabaey JM, Aarts E (eds) Ambient intelligence. Springer, Berlin, Heidelberg, pp 115–148
Google Scholar
Dovom EM, Azmoodeh A, Dehghantanha A, Newton DE, Parizi RM, Karimipour H (2019) Fuzzy pattern tree for edge malware detection and categorization in IoT. J Syst Architect 97:1–7
Google Scholar
Alaba FA, Othman M, Hashem IAT, Alotaibi F (2017) Internet of Things security: a survey. J Netw Comput Appl 88:10–28
Google Scholar
Jing Q, Vasilakos AV, Wan J, Lu J, Qiu D (2014) Security of the Internet of Things: perspectives and challenges. Wireless Netw 20(8):2481–2501
Google Scholar
Kupreev O, Kupreev O, Badovskaya E, Gutnikov A. DDoS attacks in Q4 2018, Securelist english. [Online].
https://securelist.com/ddos-attacks-in-q4-2018/89565/. Accessed 21 Dec 2019
Patel P, Ali MI, Sheth A (2017) On using the intelligent edge for IoT analytics. IEEE Intell Syst 32(5):64–69
Google Scholar
Li H, Ota K, Dong M (2018) Learning IoT in edge: deep learning for the Internet of Things with edge computing. IEEE Netw 32(1):96–101
Google Scholar
Yazdinejad A, Parizi RM, Dehghantanha A, Zhang Q, Choo KR (2020) An energy-efficient SDN controller architecture for IoT networks with blockchain-based security. IEEE Trans Serv Comput. https://doi.org/10.1109/TSC.2020.2966970
Article
Google Scholar
Moosavi SR, Gia TN, Rahmani A-M, Nigussie E, Virtanen S, Isoaho J, Tenhunen H (2015) SEA: a secure and efficient authentication and authorization architecture for IoT-based healthcare using smart gateways. Procedia Comput Sci 52:452–459
Google Scholar
Leusse PD, Dimitrakos T (2010) SOA-Based security governance middleware. In: 2010 fourth international conference on emerging security
information, systems and technologies
Vučinić M, Tourancheau B, Rousseau F, Duda A, Damon L, Guizzetti R (2015) OSCAR: object security architecture for the Internet of Things. Ad Hoc Netw 32:3–16
Google Scholar
Nawir M, Amir A, Yaakob N, Lynn OB (2016) Internet of Things (IoT): taxonomy of security attacks. In: 2016 3rd International conference on electronic design (ICED). IEEE, pp 321–326
Pinto S, Gomes T, Pereira J, Cabral J, Tavares A (2017) IIoTEED: an enhanced, trusted execution environment for industrial IoT edge devices. IEEE Internet Comput 21(1):40–47
Google Scholar
Jang J, Kong S, Kim M, Kim D, Kang BB (2015) SeCReT: secure channel between rich execution environment and trusted execution
environment. In: Proceedings 2015 network and distributed system security symposium
Dai W, Jin H, Zou D, Xu S, Zheng W, Shi L, Yang LT (2015) TEE: a virtual DRTM based execution environment for secure cloud-end computing. Future Gener Comput Syst 49:47–57
Google Scholar
Bormann C, Castellani AP, Shelby Z (2012) Coap: an application protocol for billions of tiny internet nodes. IEEE Internet Comput 2:62–67
Google Scholar
Hunkeler U, Truong HL, Stanford-Clark A (2008) MQTT-S A publish/subscribe protocol for wireless sensor networks. In: 2008 3rd International conference on communication systems software and middleware and workshops (COMSWARE’08). IEEE, pp 791–798
Ito M, Iyatomi H (2018) Web application firewall using character-level convolutional neural network. In: 2018 IEEE 14th International colloquium on signal processing and its applications (CSPA). IEEE, pp 103–106
Bekara C (2014) Security issues and challenges for the IoT-based smart grid. Procedia Comput Sci 34:532–537
Google Scholar
Pajouh HH, Dastghaibyfard G, Hashemi S (2017) Two-tier network anomaly detection model: a machine learning approach. J Intell Inf Syst 48(1):61–74
Google Scholar
Pajouh HH, Javidan R, Khayami R, Dehghantanha A, Choo KR (2016) A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks. IEEE Trans Emerg Top Comput. 7(2):314–323
Google Scholar
Azmoodeh A, Dehghantanha A, Conti M et al (2018) Detecting crypto-ransomware in IoT networks based on energy consumption footprint. J Ambient Intell Hum Comput 9:1141–1152
Google Scholar
Al-Garadi MA, Mohamed A, Al-Ali A, Du X, Guizani M (2018) A survey of machine and deep learning methods for Internet of Things (IoT) security. arXiv:1807.11023
Antonakakis M, April T, Bailey M, Bernhard M, Bursztein E, Cochran J, Durumeric Z, Halderman JA, Invernizzi L, Kallitsis M (2017) Understanding the mirai botnet. In: 26th {USENIX} security symposium ({USENIX} Security 17), pp 1093–1110
Kolias C, Kambourakis G, Stavrou A, Voas J (2017) DDoS in the IoT: Mirai and other botnets. Computer 50(7):80–84
Google Scholar
Yaqoob I, Ahmed E, Hashem IAT, Ahmed AIA, Gani A, Imran M, Guizani M (2017) Internet of Things architecture: recent advances, taxonomy, requirements, and open challenges. IEEE Wirel Commun 24(3):10–16
Google Scholar
HosseiniNejad R, HaddadPajouh H, Dehghantanha A, Parizi RM (2019) A cyber kill chain based analysis of remote access trojans. In: Dehghantanha A, Choo KK (eds) Handbook of big data and iot security. Springer, Cham
Google Scholar
Taylor PJ, Dargahi T, Dehghantanha A (2019) Analysis of APT actors targeting iot and big data systems: shell_crew, nettraveler, projectsauron, copykittens, volatile cedar and transparent tribe as a case study. In: Handbook of big data and iot security, pp 257–272
Mwiki H, Dargahi T, Dehghantanha A, Choo KKR (2019) Analysis and triage of advanced hacking groups targeting western countries criticalnational infrastructure: APT28, RED October, and Regin. In: Gritzalis D, Theocharidou M, Stergiopoulos G (eds) Critical infrastructure security and resilience. Advanced sciences and technologies for security applications. Springer, Cham
Google Scholar
Bahrami PN, Dehghantanha A, Dargahi T, Parizi RM, Choo KK, Javadi HH (2019) Cyber kill chain-based taxonomy of advanced persistent threat actors: analogy of tactics. techniques, and procedures. J Inf Process Syst 15(4):865–889
Google Scholar
Erl T (2005) Service-oriented architecture (SOA): concepts, technology, and design
Bhuyan P, Ray A, Mohapatra DP (2015) A service-oriented architecture (SOA) framework component for verification of choreography. In: Jain
L, Behera H, Mandal J, Mohapatra D (eds) Computational intelligence in data mining. Smart Innovation, Systems and Technologies, vol 3. Springer, New Delhi
Guan L, Liu P, Xing X, Ge X, Zhang S, Yu M, Jaeger T (2017) Trustshadow: secure execution of unmodified applications with arm trustzone. In: Proceedings of the 15th annual international conference on mobile systems, applications, and services. ACM, pp 488–501
Tiburski RT, Moratelli CR, Johann SF, Neves MV, de Matos E, Amaral LA, Hessel F (2019) Lightweight security architecture based on embedded virtualization and trust mechanisms for IoT edge devices. IEEE Commun Mag 57(2):67–73
Google Scholar
Ahmed AIA, Gani A, Hamid SHA, Abdelmaboud A, Syed HJ, Habeeb Mohamed RAA, Ali I (2019) Service management for IoT: requirements, taxonomy, recent advances and open research challenges. IEEE Access 7:155472–155488
Google Scholar
Woo MW, Lee J, Park K (2018) A reliable IoT system for personal healthcare devices. Future Gener Comput Syst 78:626–640
Google Scholar