References
- DOCOMO 5G White Paper, "5g radio access: Requirements, concepts and technologies," Tech. Rep. 2014.
- Singh, D., et al. (2014). A survey of Internet-of-Things: Future vision, architecture, challenges and services. Internet of Things (WF-IoT), 2014 IEEE World Forum on.
- J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, "Internet of things (iot): A vision, architectural elements, and future directions," Future generation computer systems, Vol. 29, pp. 1645-1660, 2013. https://doi.org/10.1016/j.future.2013.01.010
- I. Lee and K. Lee, "The internet of things (iot): Applications, investments, and challenges for enterprises," Business Horizons, Vol. 58, pp. 431-440, 2015. https://doi.org/10.1016/j.bushor.2015.03.008
- Zanella, A.; Bui, N.; Castellani, A.; Vangelista, L.; Zorzi, M., "Internet of Things for Smart Cities," IEEE Internet of Things Journal, Vol. 1, pp. 22, 32, Feb. 2014.
- Boban Davidovic, Aleksandra Labus, "A SMART HOME SYSTEM BASED ON SENSOR TECHNOLOGY", Electronics and Energetics Vol. 29, September 2016, pp. 451-460
- Geng Yang; Li Xie; Mantysalo, M.; Xiaolin Zhou; Zhibo Pang; Li Da Xu; Kao-Walter, S.; Qiang Chen; Li-rong Zheng, "A Health-IoT Platform Based on the Integration of Intelligent Packaging, Unobtrusive Bio-Sensor, and Intelligent Medicine Box," Industrial Informatics, IEEE Transactions on, Vol. 10, pp. 2180, 2191, Nov. 2014.
- 3GPP TR 22.885, "Study on LTE support for Vehicle to Everything (V2X) services," 2015.
- Kothmayr, T., Schmitt, C., Hu, W., Brunig, M., & Carle, G. (2012, October). A DTLS based end-toend security architecture for the Internet of Things with two-way authentication. In Local Computer Networks Workshops (LCN Workshops), 2012 IEEE 37th Conference on (pp. 956-963). IEEE.
- M. Abomhara, G. M. Koien, "Security and privacy in the internet of things: Current status and open issues", 2014 International Conference on Privacy and Security in Mobile Systems (PRISMS), pp. 1-8, 2014.
- A. Iqbal, R. Saleem, and M. Suryani, "Internet of Things (IOT): on going Security Challenges and Risks," International Journal of Computer Science and Information Security, Vol. 14, pp. 671, 2016.
- C. Maple, "Security and privacy in the internet of things," J. Cyber Policy, Vol. 2, pp. 155-184, 2017. https://doi.org/10.1080/23738871.2017.1366536
- N. K. Ratha, J. H. Connell, and R. M. Bolle, "Enhancing security and privacy in biometricsbased authentication systems", IBM Systems Journal, Vol. 40, 2001.
- Shweta Gaur, V.A.Shah, Manish Thakker, "Biometric Recognition Techniques: A Review", IJARE, Vol. 1, Issue 4, October 2012.
- Kirti V. Awalkar, Sanjay G. Kanade, Dattatray V. Jadhav, TSSM's BSCOER, Narhe, Pune, Maharashtra, India. "A Multi-modal and Multialgorithmic Biometric System Combining Iris and Face", 2015 IEEE International Conference on Information Processing (ICIP) Vishwakarma Institute of Technology. Dec 16-19, IEEE 2015.
- A. JameerBasha, V. Palanisamy, T. Purusothaman, "Efficient Multimodal Biometric Authentication Using Fast Fingerprint Verification and Enhanced Iris Features", JCS, 2011.
- https://www.arduino.cc/en/Guide/Introduction
- White paper - Small Cell Backhaul Performance Assurance
- Z. Li and M. Wilson, "User Plane and Control Plane Separation Framework for Home Base Stations," Fujitsu Sc.Technol. J, Vol. 46, pp. 79-86, 2010.