References
- M2M.World.News, "IDATE forecasts 80 Billion things connected in 2020", M2M World News, 2013, http://m2mworldnews.com/2013/09/18/27009-idateforecasts-80-billion-things-connected-in-2020/
- J. Rivera, R. Meulen, "Gartner's 2013 Hype Cycle for Emerging Technologies Maps Out Evolving Relationship Between Humans and Machines", Gartner Newsroom , 2013, http://www.gartner.com/newsroom/id/2575515
- Technical Report, "Security in the Internet of Things", Wind River Systems (2015)
- Barcena, Mario Ballano, and Candid Wueest. "Insecurity in the Internet of Things." Security Response, Symantec (2015).
- Viewpoint Paper, "Securing the Internet of Things -Explore Security and Privacy in an Interconnected World", Hewlett Packard Enterprise (2015)
- White Paper, "Bootstrapping Security", Ericsson (2016)
- ONF, "Software-Defined Networking: The New Norm for Networks", Open Networking Foundation, 2012
- ETSI,"Network Function Virtualisation", Introductory White Paper, 2013
- Mirai. https://www.incapsula.com/blog/malwareanalysis-mirai-ddos-botnet.html
- Docker. https://www.docker.com/
- Tensorflow. https://www.tensorflow.org/
- D. Ma, and G. Tsudik. "A new approach to secure logging", In ACM Transactions on Storage (TOS), 5(1), pp. 1-21, 2009.
- S. A. Crosby, and D. S. Wallach. "Efficient Data Structures for Tamper-Evident Logging", In Proceedings of the USENIX Security Symposium, 2009.
- ARM Trusted Firmware, https://github.com/ARMsoftware/arm-trusted-firmware
- ARM TrustZone, https://www.arm.com/products/security-on-arm/trustzone
- Hikey Board, http://www.96boards.org/product/hikey/
- S. Babar, P. Mahalle, A. Stango, N. Prasad, and R. Prasad. Proposed security model and threat taxonomy for the internet of things (iot). In Recent Trends in Network Security and Applications, pages 420-429. Springer, 2010.
- A. Riahi, Y. Challal, E. Natalizio, Z. Chtourou, and A. Bouabdallah. A systemic approach for iot security. In Distributed Computing in Sensor Systems (DCOSS), 2013 IEEE International Conference on, pages 351- 355. IEEE, 2013.
- Cisco Systems Inc. Cisco 910 Industrial Router. http://www.cisco.com/c/en/us/support/routers/910-industrial-router/model.html
- J. Maguire. Internet of Things (IoT) Service Delivery using NFV/SDN. Freescale Technology Forum 2014. FTF-NET-F0160.
- T. Yu, V. Sekar, S. Seshan, Y. Agarwal, and C. Xu. Handling a trillion (unfixable) flaws on a billion devices: Rethinking network security for the internet-of-things. In Proceedings of the 14th ACM Workshop on Hot Topics in Networks, HotNets-XIV, 2015
- Asokan, N and Ekberg, Jan-Erik and Kostiainen, Kari and Rajan, Anand and Rozas, Carlos V and Sadeghi, Ahmad-Reza and Schulz, Steffen and Wachsmann, Christian. "Mobile Trusted Computing", 2014. Proceedings of the IEEE, pp. 1189-1206.
- J.-E. Ekberg, K. Kostiainen, and N. Asokan. "The untapped potential of trusted execution environments on mobile devices", 2014. IEEE Security Privacy Mag., DOI: 10.1109/MSP.2014.38.
- ChaCha20, https://tools.ietf.org/html/rfc7539