References: [1] ITU Internet Reports. The Internet of Things (2005) (Ed. 2005). [2] Infso, D. Networked enterprise & RFID INFSO G.2 Micro & Nanosystems, in cooperation with the WG on RFID of the ETP EPOSS, ‘”Internet of Things in 2020. Roadmap for the Future, vol 1, pp. 1–27 (2008). [3] Bekiarski, A., Altimirski, E. & Pleshkova, S. (2010) Multimedia surveillance station for audio-visual objects tracking with mobile robot. In: Proceedings of the of International Conferences of Systems, Greece, pp. 240–247. [4] Galluccio, L., Morabito, G. & Palazzo, S. (2011) On the potentials of object group localization in the Internet of things. In: Proceedings of the of IEEE International Symposium on World of Wireless, Mobile and Multimedia Networks WoWMoM’2011, pp. 1–9 [DOI: 10.1109/WoWMoM.2011.5986489]. [5] Heer, T., Garcia-Morchon, O., Hummen, R., Keoh, S.L., Kumar, S.S. & Wehrle, K. (2011) Security challenges in the IP-based Internet of things. Wireless Personal Communications, 61, 527–542 [DOI: 10.1007/s11277-011-0385-5]. [6] Pleshkova, S. (2011) Algorithm of feature estimation for real time objects detection in thermal images. In: Proceedings of the of International Conference on Computational Intelligence, Man-Machine Systems and Cybernetics. CIMMACS: Jakarta, pp. 209–215. [7] Park, S. et al. (2011). “IPv6 over Low Power WPAN Security Analysis”, Internet Draft. [8] Weber, R.H. (2010) Internet of Things – New security and privacy challenges. Computer Law and Security Review, 26, 23–30 [DOI: 10.1016/j.clsr.2009.11.008]. [9] Li, T. & Chen, L. (2012) Internet of things: Principle, framework and application. Future Wireless Networks and Information Systems, Springer LNEE, 144, 477–482. [10] Serbanati, A., Medaglia, C., Ceipidor, U. “Building Blocks of the Internet of Things: State of the Art and Beyond” (2011), Chapter 20. In: edited book “Deploying RFID - Challenges. Solutions, and Open Issues. [11] Roman, R., Najera, P. & Lopez, J. (2011) Securing the Internet of things. Computer, 44, 51–58 [DOI: 10.1109/MC.2011.291]. [12] Mayer, C. (2009) Security and privacy challenges in the Internet of things. Electronic Communications of the EASST, 17, 1– 12. [13] Castellani, A.P., Gheda, M., Bui, N., Rossi, M. & Zorzi, M. (2011) Web services for the Internet of things through CoAP and EXI. In: Proceedings of the of IEEE International Conference on Communications Workshops, pp. 1–6 [DOI: 10.1109/ iccw.2011.5963563]. [14] Suo, H., Wan, J., Zou, C. & Liu, J. (2012) Security in the Internet of things: A review. In: Proceedings of the of International Conference on Computer and Electronics Engineering ICCSEE, Vol. 3, pp. 648–651 [DOI: 10.1109/ICCSEE.2012.373]. [15] Kranenburg, R. et al. (2011) The Internet of things. In: Proceedings of the of Berlin Symposium on Internet and Security. [16] FP7 project Internet of things – Architecture (2012). “Introduction to the Architectural Reference Model for the Internet of Things”. www.iot-a.eu/arm/d1.3. [17] ZigBee. www.zigbee.org/. [18] Ramon, S. (2011) ZigBee alliance completes ZigBee building automation standard, BACnet. Default.aspx?Contenttype=ArticleDet&tabID=332&moduleId= 806&Aid=354&PR=PR. www.zigbee.org/. [19] DALI. www.dalibydesign.us/dali.html. [20] Kushalnagar, N., Montenegro, G. & Schmacher, C. (2007) IPv6 over low-power wireless personal area networks (6LoWPANs): Overview, assumptions, problem statement, and goals. RFC, 4919. [21] Shelby, Z. (2012). Constrained RESTful Environments (CoRE) Link Format, RFC, Vol. 6690. [22] Shelby, Z. et al. (2012). Constrained Application Protocol (CoAP), Internet Draft. [23] Mozkowitz, R. (2011). “HIP Diet Exchange (DEX)”, Internet Draft. |