References: [1] Gartner Says By 2020, More Than Half of Major New Business Processes and Systems Will Incorporate Some Element of the Internet of Things. Technical report, Gartner, Inc, 2017. urlhttps://www.gartner.com/newsroom/id/3185623 (2017), [Online; accessed 08-April-2017] [2] Mirai attack. urlhttps://www.corero.com/resources/ddos-attack-types/miraibotnet-ddos-attack.html (2017). [3] ARM Trust Zone. urlhttps://www.arm.com/ products/security-on-arm/trustzone. (2018), [Online; accessed 25-Dec-2018] [4] Intel SGX. urlhttps://software.intel.com/en-us/sgx (2018), [Online; accessed 25- Dec-2018] [5] UCI Machine Learning Repository. urlhttps://archive.ics.uci.edu/ml/machinelearning-databases/00442/ (2018), [Online; accessed 03-Nov-2018] [6] IOT Components. urlhttps://www.rfpage.com/what-are-the-major-componentsof-internet-of-things/ (2019), [Online; accessed 02-April-2019] [7] Adnan, M., Eiad, D. Decentralizing Privacy Implementation at Cloud Storage Using Blockchain-Based Hybrid Algorithm p. 1-13 [8] Ali, J., Ali, T., Musa, S., Zahrani, A. (2018). Towards Secure IoT Communication with Smart Contracts in a Blockchain Infrastructure. International Journal of Advanced Computer Science and Applications 9 (10) 584 - 591. https://doi.org/10.14569/IJACSA.2018.091070, http://thesai.org/Publications/ViewPaper?Volume=9{&}Issue=10{&}Code=ijacsa{&}SerialNo=70 [9] Androulaki, E., Barger, A., Bortnikov, V., Cachin, C., Christidis, K., De Caro, A., Enyeart, D., Ferris, C., Laventman, G., Manevich, Y., Muralidharan, S., Murthy, C., Nguyen, B., Sethi, M., Singh, G., Smith, K., Sorniotti, A., Stathakopoulou, C., Vukoli_c, M., Cocco, S.W., Yellick, J. (2018). Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains. https://doi.org/10.1145/3190508.3190538, http://arxiv.org/abs/1801. 10228{%}0Ahttp://dx.doi.org/10.1145/3190508.3190538 [10] Banafa, A. (2017). Iot and blockchain convergence: Bene_ts and challenges. IEEE Internet of Things. [11] Blenn, N., Ghinette, V., Doerr, C. (2017). Quantifying the spectrum of denial-of-service attacks through internet backscatter. In: Proceedings of the 12th International Conference on Availability, Reliability and Security. p. 21. ACM. [12] Bocek, T., Rodrigues, B.B., Strasser, T., Stiller, B. (2017). Blockchains everywhere - a use-case of blockchains in the pharma supply-chain. 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM) p. 772-777. https://doi.org/10.23919/INM.2017.7987376, http://ieeexplore.ieee.org/document/7987376/ [13] Christidis, K., Devetsikiotis, M. (2016). Blockchains and Smart Contracts for the Internet of Things. IEEE Access 4, 2292-2303. https://doi.org/10.1109/ACCESS.2016.2566339 [14] Darwish, M. A., Yafi, E., Almasri, A. H., Zuhairi, M. F. (2018). Privacy and Security of Cloud Computing : A Comprehensive Review of Techniques and Challenges 7, 239-246. [15] Dorri, A., Kanhere, S. S., Jurdak, R. (2017). Towards an optimized blockchain for IoT. In: Proceedings of the Second International Conference on Internet-of-Things Design and Implementation. p. 173-178. ACM. [16] Hammi, M. T., Hammi, B., Bellot, P., Serhrouchni, A. (2018). Bubbles of Trust : a decentralized Blockchain-based authentication system for. Computers & Security (July) (2018). https://doi.org/10.1016/j.cose.2018.06.004, https://doi.org/10.1016/j. cose.2018.06.004 [17] Hammi, M. T., Livolant, E., Bellot, P., Serhrouchni, A., Minet, P. (2017). A lightweight mutual authentication protocol for the IoT. In: International Conference on Mobile and Wireless Technology. p. 3-12. Springer. [18] Hardjono, T., Smith, N. (2016). Cloud-based commissioning of constrained devices using permissioned blockchains. In: Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security. p. 29-36. ACM. [19] Hashemi, S. H., Faghri, F., Rausch, P., Campbell, R. H. (2016). World of empowered iot users. In: Internet-of-Things Design and Implementation (IoTDI), 2016 IEEE First International Conference on. p. 13-24. IEEE. [20] Hinton, G. E., Salakhutdinov, R. R. (2006). Reducing the dimensionality of data with neural networks. Science 313 (5786), 504-507. [21] Huh, S., Cho, S., Kim, S. (2017). Managing IoT devices using blockchain platform. In: Advanced Communication Technology (ICACT), 2017 19th International Conference on. p. 464-467. IEEE. [22] Johnson, S., Scarlata, V., Rozas, C., Brickell, E., Mckeen, F. (2016). Intel R software guard extensions: Epid provisioning and attestation services. White Paper 1, 1-10 (2016) [23] Komninos, N., Philippou, E., Pitsillides, A. (2014). Survey in smart grid and smart home security: Issues, challenges and countermeasures. IEEE Communications Surveys & Tutorials 16 (4) 1933-1954. [24] Lee, B., Lee, J. H. (2017). Blockchain-based secure firmware update for embedded devices in an internet of things environment. The Journal of Supercomputing 73 (3) 1152-1167. [25] Li, Y., Ma, R., Jiao, R. (2015). A hybrid malicious code detection method based on deep learning. methods 9 (5). [26] Nakamoto, S. (2008). Bitcoin: A Peer-to-Peer Electronic Cash System. Www.Bitcoin.Org p. 9. https://doi.org/10.1007/s10838-008-9062-0, https://bitcoin.org/bitcoin.pdf [27] Nauman, M., Tanveer, T. A., Khan, S., Syed, T. A. (2017). Deep neural architectures for large scale android malware analysis. Cluster Computing, p. 1-20. [28] Nichol, P. B., Brandt, J. (2016). Co-creation of trust for healthcare: The cryptocitizen framework for interoperability with blockchain. Research Proposal. ResearchGate (2016) [29] Ouaddah, A., Abou Elkalam, A., Ait Ouahman, A. Fairaccess: a new blockchain based access control framework for the internet of things. Security and Communication Networks 9 (18) 5943-5964. [30] Ouaddah, A., Elkalam, A. A., Ouahman, A. A. (2017). Towards a novel privacy-preserving access control model based on blockchain technology in IoT. In: Europe and MENA Cooperation Advances in Information and Communication Technologies, p. 523-533. Springer. [31] Roulin, C., Dorri, A. On the Activity Privacy of Blockchain for IoT [32] Walker, M. A., Dubey, A., Laszka, A., Schmidt, D. C. (2017). Platibart: a platform for transactive iot blockchain applications with repeatable testing. In: Proceedings of the 4th Workshop on Middleware and Applications for the Internet of Things. p. 17-22. ACM. [33] Wood, G. (2014). Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper 151, 1-32. |