Sun, R., Xi, J., Yin, C., Wang, J., Kim, G. J. (2018). Location privacy protection research based on querying anonymous region construction for smart campus. Mobile information systems, 2018
Robles RJ, Kim TH, Cook D, Das S (2010) A review on security in smart home development. Int J Adv Sci Technol 15:13–22
Google Scholar
Park JH, Salim MM, Jo JH, Sicato JCS, Rathore S, Park JH (2019) CIoT-Net: a scalable cognitive IoT based smart city network architecture. Human Compu Inf Sci 9(1):1–29
Article
Google Scholar
Wang J, Gao Y, Liu W, Sangaiah AK, Kim HJ (2019) Energy efficient routing algorithm with mobile sink support for wireless sensor networks. Sensors 19(7):1468–1494
Google Scholar
Mittal Y, Toshniwal P, Sharma S, Singhal D, Gupta R, Mittal VK (2015) A voice-controlled multi-functional smart home automation system. In: 2015 Annual IEEE India conference (INDICON), 2015
Schiefer M (2015) Smart home definition and security threats. In: 2015 ninth international conference on IT security incident management & IT forensics, 2015
Xiong B, Yang K, Zhao J, Li K (2017) Robust dynamic network traffic partitioning against malicious attacks. J Netw Comput Appl 87:20–31
Article
Google Scholar
Pongle P, Chavan G (2015) A survey: attacks on RPL and 6LoWPAN in IoT. In: 2015 international conference on pervasive computing (ICPC), 2015
Gu K, Yang L, Yin B (2018) Location data record privacy protection based on differential privacy mechanism. Inf Technol Control 47(4):639–654
Google Scholar
Sharma PK, Rathore S, Park JH (2018) DistArch-SCNet: blockchain-based distributed architecture with li-fi communication for a scalable smart city network. IEEE Consum Electr Mag 7(4):55–64
Article
Google Scholar
PR Wire (2016) Gartner: blockchain and connected home are almost at the peak of the hype cycle. https://prwire.com.au/pr/62010/gartner-blockchain-andconnected-home-are-almost-at-the-peak-of-the-hype-cycle. Accessed 28 Dec 2019
Sharma PK, Moon SY, Park JH (2017) Block-VN: a distributed blockchain based vehicular network architecture in smart city. JIPS 13:184–195
Google Scholar
Sanchez I, Satta R, Fovino IN, Baldini G, Steri G, Shaw D, Ciardulli A (2014) Privacy leakages in smart home wireless technologies. In: 2014 international carnahan conference on security technology (ICCST), 2014
Ahram T, Sargolzaei A, Sargolzaei S, Daniels J, Amaba B (2017) Blockchain technology innovations. In: 2017 IEEE technology & engineering management conference (TEMSCON), 2017
Rathore S, Pan Y, Park JH (2019) BlockDeepNet: a Blockchain-based secure deep learning for IoT network. Sustainability 11(14):3960–3974
Article
Google Scholar
Chandramohan J, Nagarajan R, Satheeshkumar K, Ajithkumar N, Gopinath PA, Ranjithkumar S (2017) Intelligent smart home automation and security system using arduino and Wi-fi. Int J Eng Comput Sci (IJECS) 6:20694–20698
Google Scholar
Chen M, Yang J, Zhu X, Wang X, Liu M, Song J (2017) Smart home 2.0: innovative smart home system powered by botanical IoT and emotion detection. Mob Netw Appl 22:1159–1169
Article
Google Scholar
Lin H, Bergmann N (2016) IoT privacy and security challenges for smart home environments. Information 7:1–15
Article
Google Scholar
Singh S, Sharma PK, Park JH (2017) SH-SecNet: an enhanced secure network architecture for the diagnosis of security threats in a smart home. Sustainability 9:1–19
Google Scholar
He S, Zeng W, Xie K, Yang H, Lai M, Su X (2017) PPNC: privacy Preserving Scheme for Random Linear Network Coding in Smart Grid. KSII Transact Internet Inf Sys 11(3):1–10
Google Scholar
Xie K, Ning X, Wang X, He S, Ning Z, Liu X, Qin Z (2017) An efficient privacy-preserving compressive data gathering scheme in WSNs. Inf Sci 390:82–94
Article
Google Scholar
Sivaraman V, Gharakheili HH, Vishwanath A, Boreli R, Mehani O (2015) Network-level security and privacy control for smart-home IoT devices. In: 2015 IEEE 11th International conference on wireless and mobile computing, networking and communications (WiMob), 2015
Copos B, Levitt K, Bishop M, Rowe J. (2016) Is anybody home? Inferring activity from smart home network traffic. In: 2016 IEEE security and privacy workshops (SPW), 2016
Lee B, Malik S, Wi S, Lee JH (2016) Firmware verification of embedded devices based on a blockchain. In: international conference on heterogeneous networking for quality, reliability, security and robustness, 2016
Bull P, Austin R, Popov E, Sharma M, Watson R (2016) Flow based security for IoT devices using an SDN gateway. In: 2016 IEEE 4th international conference on future internet of things and cloud (FiCloud), 2016
Yin C, Zhou B, Yin Z, Wang J (2019) Local privacy protection classification based on human-centric computing. Human Comput Inf Sci 9(1):33
Article
Google Scholar
Panwar N, Sharma S, Mehrotra S, Krzywiecki Ł, Venkatasubramanian N (2019) Smart home survey on security and privacy. arXiv preprint. arXiv:1904.05476
Poh GS, Gope P, Ning J (2019) Privhome: privacy-preserving authenticated communication in smart home environment. IEEE Trans Depend Secur Comput. https://doi.org/10.1109/TDSC.2019.2914911
Article
Google Scholar
Shouran Z, Ashari A, Priyambodo T (2019) Internet of things (IoT) of smart home: privacy and security. Int J Comput Appl 182:3–8
Google Scholar
Rathore S, Park JH (2018) Semi-supervised learning based distributed attack detection framework for IoT. Appl Soft Comput 72:79–89
Article
Google Scholar
Sharma PK, Rathore S, Jeong YS, Park JH (2018) SoftEdgeNet: SDN based energy-efficient distributed network architecture for edge computing. IEEE Commun Mag 56(12):104–111
Article
Google Scholar
Kim NY, Rathore S, Ryu JH, Park JH, Park JH (2018) A survey on cyber physical system security for IoT: issues, challenges, threats, solutions. J Inf Process Syst 14(6):1–10
Google Scholar
Huang X, Yu R, Kang J, Xia Z, Zhang Y (2018) Software defined networking for energy harvesting internet of things. IEEE Internet Things J 5(3):1389–1399
Google Scholar
Magurawalage CMS, Yang K, Hu L, Zhang J (2014) Energy-efficient and network-aware offloading algorithm for mobile cloud computing. Comput Netw 74:22–33
Article
Google Scholar
Rathore S, Kwon BW, Park JH (2019) BlockSecIoTNet: blockchain-based decentralized security architecture for IoT network. J Netw Comput Appl 143:167–177
Article
Google Scholar
Choi BC, Lee SH, Na JC, Lee JH (2016) Secure firmware validation and update for consumer devices in home networking. IEEE Trans Consum Electron 62:39–44
Article
Google Scholar
Palani K, Holt E, Smith S (2016) Invisible and forgotten: Zero-day blooms in the IoT. In: 2016 IEEE international conference on pervasive computing and communication workshops (PerCom Workshops), 2016
Kolias C, Kambourakis G, Stavrou A, Voas J (2017) DDoS in the IoT: mirai and other botnets. Computer 50:80–84
Article
Google Scholar
Lin IC, Liao TC (2017) A survey of blockchain security issues and challenges. IJ Netw Secur 19:653–659
Google Scholar
Salim MM, Rathore S, Park JH (2019) Distributed denial of service attacks and its defenses in IoT: a survey. J Supercomput 10:1–44
Google Scholar