1.
Hameed, Sufian, Faraz Idris Khan, and Bilal Hameed. "Understanding security requirements and challenges in Internet of Things (IoT): A review." Journal of Computer Networks and Communications 2019 (2019).
2.
Yaqoob, Ibrar, Ejaz Ahmed, Ibrahim Abaker Targio Hashem, Abdelmuttlib Ibrahim Abdalla Ahmed, Abdullah Gani, Muhammad Imran, and Mohsen Guizani. "Internet of things architecture: Recent advances, taxonomy, requirements, and open challenges." IEEE wireless communications 24, no. 3 (2017): 10-16.
3.
Bhavadharini, R. M., S. Karthik, N. Karthikeyan, and Anand Paul "Wireless networking performance in IoT using adaptive contention window." Wireless Communications and Mobile Computing 2018 (2018).
4.
M. Mahmud Hossain, M.Fotouhi, and R. Hasan, “Towards an Analysis of Security Issues, Challenges and Open Problems in the Internet of Things,” in Services (SERVICES), 2015 IEEE World Congress on. IEEE, 2015, pp.21-28
5.
Sharma, Neha, Usha Batra, and Sherin Zafar. "A neoteric swarm intelligence stationed IOT–IWD algorithm for revolutionizing pharmaceutical industry leading to digital health." In Emergence of Pharmaceutical Industry Growth with Industrial IoT Approach, pp. 1-19. Academic Press, 2020
6.
Li, L. Da Xu, and S. Zhao, “The Internet of Things: A Survey,” in [Information Systems Frontiers], ©[Springer]. doi: [10.1007/s10796-014-9492-7], New York, 2014, pp.243-299.
7.
Bhavadharini, R. M., S. Karthik, N. Karthikeyan, and Anand Paul. "Wireless networking performance in IoT using adaptive contention window." Wireless Communications and Mobile Computing 2018 (2018).
8.
Bashir, Muhammad Rizwan, and Asif Qumer Gill. "Towards an IoT big data analytics framework: smart buildings systems." In 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS), pp. 1325-1332. IEEE, 2016.
9.
Lee, Carman KM, C. L. Yeung, and M. N. Cheng. "Research on IoT based cyber physical system for industrial big data analytics." In 2015 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM), pp. 1855-1859. IEEE, 2015.
10.
Lee, Jay, Hossein Davari Ardakani, Shanhu Yang, and Behrad Bagheri. "Industrial big data analytics and cyber- physical systems for future maintenance & service innovation." Procedia Cirp 38 (2015): 3-7
11.
Yasin, Adwan, and Mahmoud Abu Zant. "Detecting and isolating black-hole attacks in MANET using timer based baited technique." Wireless Communications and Mobile Computing 2018 (2018).
12.
Dumne, P.R. and Manjaramkar, A., 2016, September. Cooperative bait detection scheme to prevent collaborative blackhole or grayhole attacks by malicious nodes in MANETs. In 2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions)(ICRITO) (pp. 486-490). IEEE.
13.
P.-C. Tsou, J.-M. Chang, Y.-H. Lin, H.-C. Chao, and J.-L. Chen, “Developing a BDSR scheme to avoid black hole attack based on proactive and reactive architecture in MANETs,” in Proceedings of the 13th International Conference on Advanced Communication Technology: Smart Service Innovation through Mobile Interactivity, ICACT 2011, pp. 755–760, Seoul, Republic of Korea, February 2011.
14.
B. Singh, D. Srikanth, and C. R. S. Kumar, “Mitigating effects of black hole attack in mobile Ad-Hoc NETworks: Military perspective,” in Proceedings of the 2nd IEEE International Conference on Engineering and Technology, ICETECH 2016, pp. 810–814, Coimbatore, India, March 2016.
15.
A. R. Rajeswari, K. Kulothungan, and A. Kannan, “GNB-AODV: guard node based –aodv to mitigate black hole attack in MANET,” International Journal of Scientific Research in Science, Engineering and Technology, vol. 2, no. 6, pp. 671–677, 2016.
16.
S. R. Deshmukh, P. N. Chatur, and N. B. Bhople, “AODV-Based secure routing against blackhole attack in MANET,” in Proceedings of the 1st IEEE International Conference on Recent Trends in Electronics, Information and Communication Technology, RTEICT 2016, pp. 1960–1964, Bangalore, India, May 2016.
17.
S. Dhende, S. Musale, S. Shirbahadurkar, and A. Najan, “SAODV: Black hole and gray hole attack detection protocol in MANETs,” in Proceedings of the 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), pp. 2391–2394, Chennai, India, March 2017.
18.
M. Sathish, K. Arumugam, S. N. Pari, and V. S. Harikrishnan, “Detection of single and collaborative black hole attack in MANET,” in Proceedings of the 2016 IEEE International Conference on Wireless Communications, Signal Processing and Networking, WiSPNET 2016, pp. 2040–2044, Chennai, India, March 2016.
19.
Ali, Shoukat, et al. "Detection and prevention of Black Hole Attacks in IOT & WSN." 2018 Third International Conference on Fog and Mobile Edge Computing (FMEC). IEEE, 2018.
20.
Weingartner, Elias, Hendrik Vom Lehn, and Klaus Wehrle. "A performance comparison of recent network simulators." In 2009 IEEE International Conference on Communications, pp. 1-5. IEEE, 2009
21.
Guptha, Y.P.K. and Madhu, M., 2017. Improving security and detecting black hole attack in wireless sensor network. International Journal of Professional Engineering Studies, 8(5), pp.260-265.
22.
Otoum, S., Kantarci, B. and Mouftah, H.T., 2017, May. Hierarchical trust-based black-hole detection in WSN-based smart grid monitoring. In 2017 IEEE international conference on communications (ICC) (pp. 1-6). IEEE.
23.
Chhabra, A., Vashishth, V. and Sharma, D.K., 2017, March. A game theory based secure model against black hole attacks in opportunistic networks. In 2017 51st Annual conference on information sciences and systems (CISS) (pp. 1-6). IEEE.
24.
P. Hemalatha, J. Vijithaananthi, “An Effective Performance For Denial Of Service Attack (DoS) Detection” IEEE, International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)”, pp 229 – 233, Palladam, India, 10 – 11 February 2017.
25.
Abdullah Aljumah, Tariq Ahamed Ahanger, “Futuristic Method to Detect and Prevent Black-Hole Attack in Wireless Sensor Networks” IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.2, 05 February 2017.
26.
Saurabh Sharma, Dr. Sapna Gambhir, “CRCMD&R: Cluster and Reputation based Cooperative Malicious Node Detection & Removal Scheme in MANETs”, IEEE, 11th International Conference on Intelligent Systems and Control (ISCO), pp 36 – 340, Coimbatore,India, 5-6 January 2017.
27.
Mert Melih Ozcelik, Erdal Irmak, Suat Ozdemir “A Hybrid Trust Based IDS for WSN” IEEE, Networks, Computers andCommunications (ISNCC), pp 1 – 6, Marrakech, Morocco, 16-18 May 2017
28.
Gurjinder Kaur1, V.K. Jain, Yogesh Chaba “Detection and Prevention of Black hole Attacks in WSN” Springer, International Conference on Intelligent, Secure, Dependable Systems in Distributed and Cloud Environments (ISDDC), pp 118-126, Vancouver, BC, Canada, 25-27October 2017.
29.
Marjani, Mohsen, Fariza Nasaruddin, Abdullah Gani, Ahmad Karim, Ibrahim Abaker Targio Hashem, Aisha Siddiqa, and Ibrar Yaqoob. "Big IoT data analytics: architecture, opportunities, and open research challenges." ieee access 5 (2017): 5247-5261.
30.
Hameed, Sufian, and Usman Ali. "Efficacy of live DDoS detection with Hadoop." In NOMS 2016-2016 IEEE/IFIP Network Operations and Management Symposium, pp. 488-494. IEEE, 2016.