1.
Panagiotis I. Radoglou Grammatikis, Panagiotis G. Sarigiannidis, Ioannis D. Moscholios, Securing the Internet of Things: Challenges, threats and solutions, Internet of Things, Elsevier, Vol. 5, 2019, pp. 41–70.
2.
Hossein Ahmadi, Goli Arji, Leila Shahmoradi, Reza Safdari, Mehrbakhsh Nilashi and Mojtaba Alizadeh, The application of Internet of things in health-care: a systematic literature review and classification, Universal Access in the Information Society, 2019, Vol. 18, pp. 837–869.
3.
Faizan Khursheeed, M Sami-Ud-din, Irshad Ahmed Sumra, Muhammad Safder, A Review of Security Mechanism in the Internet of Things, IEEE, 2020, pp. 1-19.
4.
Dewanjee, R., P. Verma, and R. Vjas. "Cryptography Techniques and Internet of Things." IEEE International Conference on Electronics and Communication Systems, 2016, pp. 1-4.
5.
Ali Hameed and Alauddin alomary, "Security Issues in IoT: A Survey", IEEE International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies, 2019, pp. 1-5.
6.
Subir Halder and Mauro Conti, CrypSH: A Novel IoT Data Protection Scheme Based on BGN Cryptosystem, IEEE Transactions on Cloud Computing, 2021, pp. 1-14.
7.
Preeti Mishra, Sachin Kumar, Umang Garg, Emmanuel S. Pilli and R.C. Joshi, Security Perspectives of Various IoT Cloud Platforms: A Review & Case Study, IEEE International Conference on Computing, Communication, and Intelligent Systems, 2021, pp. 727-731.
8.
Raja S., Manikandasaran S.S., Doss R., "Threat Modeling and IoT Attack Surfaces". In: Aurelia S., Paiva S. (eds) Immersive Technology in Smart Cities. EAI/Springer Innovations in Communication and Computing. Springer, Cham. 2022, pp. 229-258.
9.
Nickson M. Karie, Nor Masri Sahri and Paul Haskell-Dowland, "IoT Threat Detection Advances, Challenges and Future Directions", IEEE Workshop on Emerging Technologies for Security in IoT, 2020, pp. 22-29.
10.
Ali Hameed and Alauddin alomary, Security Issues in IoT: A Survey, IEEE International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies, 2019, pp. 1-5.
11.
C. Linda Hepsiba, Dr. R. Jemima Priyadarsini, Dr. S.Titus, A Comprehensive Study on Routing Attacks with Countermeasures in the Internet of Things, Solid State Technology, Volume: 63 Issue: 4, 2020, pp. 1-7.
12.
Jeethu Mathew, Dr. R. Jemima Priyadarsini, A Review on DoS Attacks in IoT, Solid State Technology Volume: 63 Issue: 4, 2020, pp. 1-10.
13.
S. Alexander Suresh SDB, Dr. R. Jemima Priyadarsini, ETSET: Enhanced Tiny Symmetric Encryption Techniques to Secure Data Transmission among IoT Devices, Turkish Journal of Computer and Mathematics Education, Vol.12 No.10, 2021, pp. 1094- 1099.
14.
Ding Li, Wang Zhongsheng, Wang Xiaodong, Wu Dong, Security information transmission algorithms for IoT based on cloud computing, Computer Communications, Elsevier, Vol. 155, 2020, pp.32-39.
15.
Shancang Li, Chapter 2 - Security Architecture in the Internet of Things, Editor(s): Shancang Li, Li Da Xu, Securing the Internet of Things, Syngress, 2017, pp. 27-48.
16.
Muhammad Sheraz Mehmood, Muhammad Rehman Shahid, Abid Jamil, Rehan Ashraf, Toqeer Mahmood, Aatif Mehmood, A Comprehensive Literature Review of Data Encryption Techniques in Cloud Computing and IoT Environment, IEEE, 2019, pp. 54-59.
17.
Roderick Hodgson, Solving the security challenges of IoT with public-key cryptography, Elsevier Network Security, Vol. 2019, Issue 1, 2019, pp. 17-19.
18.
Chandrasegar Thirumalai, Senthilkumar Mohan, Gautam Srivastava, An efficient public key secure scheme for cloud and IoT security, Elsevier Computer Communications, Volume 150, 2020, pp. 634-643.
19.
Shancang Li, Chapter 4 - IoT Node Authentication, Editor(s): Shancang Li, Li Da Xu, Securing the Internet of Things, Syngress, 2017, pp. 69-95.
20.
Symmetric vs Asymmetric Encryption – What are the differences? Accessed on 04 Nov 2021, https://www.ssl2buy.com/wiki/symmetric-vs-asymmetric-encryption-what-are-differences.
21.
Susha Surendran, Amira Nassef, Babak D. Beheshti, A Survey of Cryptographic Algorithms for IoT Devices, IEEE, 2018, pp. 1-8.
22.
Kejun Chen, Shuai Zhang, Zhikun Li, Yi Zhang, Qingxu Deng, Sandip Ray and Yier Jin, Internet-of-Things Security and Vulnerabilities: Taxonomy, Challenges and Practice, Springer Journal of Hardware and Systems Security, Vol. 2, 2018, pp. 97-110.
23.
Hossein Ahmadi, Goli Arji, Leila Shahmoradi, Reza Safdari, Mehrbakhsh Nilashi and Mojtaba Alizadeh, The application of Internet of things in health-care: a systematic literature review and classification, Springer Universal Access in the Information Society, 2018, pp. 1-33.
24.
Debabrata samanta , Ahmed h. Alahmadi, Karthikeyan m. P., Mohammad Zubair khan, Amit Banerjee, Gautam Kumar Ganapa, and Seeram Ramakrishna, Cipher Block Chaining Support Vector Machine for Secured Decentralized Cloud-Enabled Intelligent IoT Architecture, IEEE Access, Vol. 9, 2021, pp. 98013- 98025.
25.
Neha Kashyap, Ajay Rana, Vineet Kansal, Himdweep Walia, Improve Cloud-Based IoT Architecture Layer Security - A Literature Review, IEEE International Conference on Computing, Communication, and Intelligent Systems, 2021, pp. 772-777.
26.
Mohd. Tajammul, Rafat Parveen, Auto encryption algorithm for uploading data on cloud storage, International Journal of Information Technology, Springer, Vol. 12, Issue 3, 2020, pp. 831–837.
27.
N. Jayapandian, A. M. J. M. Z. Rahman, S. Radhikadevi and M. Koushikaa, "Enhanced cloud security framework to confirm data security on asymmetric and symmetric key encryption," 2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave), Coimbatore, 2016, pp. 1-4.doi: 10.1109/STARTUP.2016.7583904
28.
Jayant D. Bokefodea, Avdhut S. Bhiseb, Prajakta A. Satarkara and Dattatray G. Modanic, Developing A Secure Cloud Storage System for Storing IoT Data by Applying Role-Based Encryption, Twelfth International Multi-Conference on Information Processing-2016 Procedia Computer Science 89 ( 2016 ) 43 – 50
29.
A.Vithya Vijayalakshmi and Dr L. Arockiam, Enhancing The Security Of Iot Data Using Multilevel Encryption, International Journal of Advanced Research in Computer Science, Vol. 8, Issue 9, Nov–Dec 2017, pp. 841-845.
30.
Canteaut, A., Carpov, S., Fontaine, C., Jacques, Fournier, Lac, B., Naya-Plasencia, M., Sirdey, R., & Tria, A. (2017). End-to-end data security for IoT: from a cloud of encryptions to encryption in the cloud. In Proc. IEEE Conf. (Cesar), Nov. 2017, pp. 1–21.
31.
K. Saini, V. Agarwal, A. Varshney and A. Gupta, "E2EE For Data Security For Hybrid Cloud Services: A Novel Approach," 2018 International Conference on Advances in Computing, Communication Control and Networking (ICACCCN), Greater Noida (UP), India, 2018, pp. 340-347. doi: 10.1109/ICACCCN.2018.8748782
32.
N. L. Kodumru and M. Supriya, "Secure Data Storage in Cloud Using Cryptographic Algorithms," 2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA), Pune, India, 2018, pp. 1-6.doi: 10.1109/ICCUBEA.2018.8697550.
33.
Anuj Kumar, Vinod Jain and Anupam Yadav, "A New Approach for Security in Cloud Data Storage for IoT Applications Using Hybrid Cryptography Technique", IEEE, 2020, pp.514-517.
34.
Zejun Ren, Xiangang Liu, Runguo Ye, Tao Zhang, Security and Privacy on Internet of Things, IEEE, 2017, pp. 140-144.
35.
Haiyun Ma and Zhonglin Zhang, A New Private Information Encryption Method in the Internet of Things under Cloud Computing Environment, Wireless Communications and Mobile Computing, 2020, pp. 1-9.
36.
Fatemeh Rezaeibagha, Yi Mu, Ke Huang, Lanxiang Chen, Leyou Zhang, Toward Secure Data Computation and Outsource for Multi-User Cloud-Based IoT, IEEE Transactions on Cloud Computing, 2021, pp. 1-12.