1.
Kevin Asthon, “That ’ Internet of Things ’ Thing,” RFID Journal, p. 4986, 2010.
2.
Y. Ibrar and Ahmed Ejaz et al, “Internet of Things Architecture?: Recent Advances , Taxonomy , Requirements , and Open Challenges,” IEEE Wireless Communication, no. June, pp. 10–16, 2017.
3.
R. Kaur and S. Mittal, “Enhanced Handoff Decision Making for Application-Aware Environment by Using Blended Approach,” International Journal of Intelligent Engneering Systems, vol. 14, no. 1, pp. 433–443, 2020.
4.
A. Tewari and B. B. Gupta, “Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework,” Future Generation Computer Systems, vol. 108, pp. 909–920, 2020.
5.
S. M. R. Islam, D. Kwak, M. H. Kabir, M. Hossain, and K. S. Kwak, “The internet of things for health care: A comprehensive survey,” IEEE Access, vol. 3, pp. 678–708, 2015.
6.
S. R. Moosavi et al., “SEA: A secure and efficient authentication and authorization architecture for IoT-based healthcare using smart gateways,” Procedia Computer Science, vol. 52, no. 1, pp. 452–459, 2015.
7.
J. L. Hou and K. H. Yeh, “Novel Authentication Schemes for IoT Based Healthcare Systems,” Int. J. Distrib. Sens. Networks, vol. 2015, no. ii, 2015.
8.
P. K. Dhillon and S. Kalra, “A secure multi-factor ECC based authentication scheme for Cloud-IoT based healthcare services,” Journal of Ambient Intelligent Smart Environment, vol. 11, pp. 149–164, 2019.
9.
S. A. Medaglia, Carlo Maria, “An Overview of Privacy and Security Issues in the Internet of Things,” Giusto D., Iera A., Morabito G., Atzori L. Internet Things. Springer, New York, NY, pp. 367–373, 2010.
10.
G. M. Køien, “Reflections on trust in devices: An informal survey of human trust in an Internet-of-Things context,” Wireless Personal Communications, vol. 61, no. 3, pp. 495–510, 2011.
11.
J. Liu, Y. Xiao, and C. L. P. Chen, “Authentication and access control in the Internet of things,” Proc. - 32nd IEEE International Conference on Distributed Computing Systems Workshops ICDCSW 2012, pp. 588–592, 2012.
12.
R. Roman, J. Zhou, and J. Lopez, “On the features and challenges of security and privacy in distributed internet of things,” Computer Networks, vol. 57, no. 10, pp. 2266–2279, 2013.
13.
Z. K. Zhang, M. C. Y. Cho, C. W. Wang, C. W. Hsu, C. K. Chen, and S. Shieh, “IoT security: Ongoing challenges and research opportunities,” Proc. - IEEE 7th International Conference on service-oriented computing and applications SOCA 2014, pp. 230–234, 2014.
14.
F. L. ?iplea, “A lightweight authentication protocol for RFID,” International Conference on Cryptography and Security Systems, pp. 110-121. Springer, Berlin, Heidelberg, 2014.
15.
P. Porambage, C. Schmitt, P. Kumar, A. Gurtov, and M. Ylianttila, “PAuthKey: A Pervasive Authentication Protocol and Key Establishment Scheme for Wireless Sensor Networks in Distributed IoT Applications,” International Journal of Distributed Sensor Networks, vol. 2014, 2014.
16.
S. Sicari, A. Rizzardi, L. A. Grieco, and A. Coen-Porisini, “Security, privacy and trust in Internet of things: The road ahead,” Computer Networks, vol. 76, pp. 146–164, 2015.
17.
S. A. Kumar, T. Vealey, and H. Srivastava, “Security in internet of things: Challenges, solutions and future directions,” Proceedings Annual Hawaii International Conference on System Sciences, vol. 2016-March, pp. 5772–5781, 2016.
18.
P. K. Dhillon and S. Kalra, “Secure multi-factor remote user authentication scheme for Internet of Things environments,” International Journal of Communication Systems, vol. 30, no. 16, pp. 1–20, 2017.
19.
M. Ammar, G. Russello, and B. Crispo, “Internet of Things: A survey on the security of IoT frameworks,” Journal of Information Security and Applications, vol. 38, pp. 8–27, 2018.
20.
A. Luntovskyy and L. Globa, “Performance, Reliability and Scalability for IoT,” Proceedings International Conference on Information and Digital Technologies 2019, IDT 2019, pp. 316–321, 2019.
21.
S. Behrad, E. Bertin, S. Tuffin, and N. Crespi, “A new scalable authentication and access control mechanism for 5G-based IoT,” Future Generation Computer Systems, vol. 108, pp. 46–61, 2020.
22.
D. He, C. Chen, S. Chan, and J. Bu, “Secure and efficient handover authentication based on bilinear pairing functions,” IEEE Transactions on Wireless Communications, vol. 11, no. 1, pp. 48–53, 2012.
23.
D. He, C. Chen, S. Chan, and J. Bu, “Analysis and improvement of a secure and efficient handover authentication for wireless networks,” IEEE Communications Letters, vol. 16, no. 8, pp. 1270–1273, 2012.
24.
J. L. Tsai, N. W. Lo, and T. C. Wu, “Secure handover authentication protocol based on bilinear pairings,” Wireless Personal Communications, vol. 73, no. 3, pp. 1037–1047, 2013.
25.
D. He, J. Bu, S. Chan, and C. Chen, “Handauth: Efficient handover authentication with conditional privacy for wireless networks,” IEEE Transactions on Computers, vol. 62, no. 3, pp. 616–622, 2013.
26.
G. Li, Q. Jiang, F. Wei, and C. Ma, “A New Privacy-Aware Handover Authentication Scheme for Wireless Networks,” Wireless Personal Communications, vol. 80, no. 2, pp. 581–589, 2014.
27.
W. Wang and L. Hu, “A secure and effcient handover authentication protocol for wireless networks,” Sensors (Switzerland), vol. 14, no. 7, pp. 11379–11394, 2014.
28.
S. A. Chaudhry, M. S. Farash, H. Naqvi, S. H. Islam, and T. Shon, “A Robust and Efficient Privacy Aware Handover Authentication Scheme for Wireless Networks,” Wireless Personal Communications, vol. 93, no. 2, pp. 311–335, 2017.
29.
X. Duan and X. Wang, “Authentication handover and privacy protection in 5G hetnets using software-defined networking,” IEEE Communication Magazine, vol. 53, no. 4, pp. 28–35, 2015.
30.
D. He, S. Chan, and M. Guizani, “Handover authentication for mobile networks: Security and efficiency aspects,” IEEE Networks, vol. 29, no. 3, pp. 96–103, 2015.
31.
D. He, S. Zeadally, L. Wu, and H. Wang, “Analysis of handover authentication protocols for mobile wireless networks using identity-based public key cryptography,” Computer Networks, vol. 128, pp. 154–163, 2017.
32.
J. L. Tsai and N. W. Lo, “Provably secure anonymous authentication with batch verification for mobile roaming services,” Ad Hoc Networks, vol. 44, pp. 19–31, 2016.
33.
D. He, D. Wang, Q. Xie, and K. Chen, “Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation,” Science China Information Sciences, vol. 60, no. 5, pp. 1–17, 2017.
34.
Y. Xie, L. Wu, N. Kumar, and J. Shen, “Analysis and Improvement of a Privacy-Aware Handover Authentication Scheme for Wireless Network,” Wireless Personal Commununications, vol. 93, no. 2, pp. 523–541, 2017.
35.
D. Wang, L. Xu, F. Wang, and Q. Xu, “An anonymous batch handover authentication protocol for big flow wireless mesh networks,” Eurasip Journal Wireless Communication Networks, vol. 2018, no. 1, 2018.
36.
R. Khan, S. U. Khan, R. Zaheer, and S. Khan, “Future internet: The internet of things architecture, possible applications and key challenges,” Proceedings - 10th International Conference on frontiers of Information Technology FIT 2012, pp. 257–260, 2012.
37.
P. K. Dhillon and S. Kalra, “A lightweight biometrics based remote user authentication scheme for IoT services,” Journal of Information Security and Applications, vol. 34, pp. 255–270, 2017.
38.
A. Armando, D. Basin, Y. Boichut, Y. Chevalier, and L. Compagna, “The AVISPA Tool for the Automated Validation,” Computer Aided Verification, vol. 3576, pp. 281–285, 2005.