References
- I. Yaqoob, E. Ahmed, I. A. T. Hashem, A. I. A. Ahmed, A. Gani, M. Imran, and M. Guizani, "Internet of things architecture: Recent advances, taxonomy, requirements, and open challenges," IEEE wireless communications, vol. 24, no. 3, June 2017, pp. 10-16. https://doi.org/10.1109/MWC.2017.1600421
- A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and M. Ayyash, "Internet of things: A survey on enabling technologies, protocols, and applications," IEEE communications surveys & tutorials, vol. 17, no. 4, June 2015, pp. 2347-2376. https://doi.org/10.1109/COMST.2015.2444095
- T. CHOI, D. Ryu, "Development of Portable IoT Device for Lifesaving," J. of The Korea Institute of Electronic Communication Sciences, vol. 17, no. 5, Oct. 2022, pp. 883~888.
- M. AbuNaser and A. A. Alkhatib, "Advanced survey of blockchain for the internet of things smart home," 2019 IEEE Jordan Int. joint Conf. on electrical engineering and information technology (JEEIT), Amman, Jordan, May 2019, pp. 58-62.
- M. Lee and K. Jung, "Design of IoT-based Energy Monitoring System for Residential Building," J. of The Korea Institute of Electronic Communication Sciences, vol. 16, no. 6, Dec. 2021, pp. 1223-1230.
- Y. Lee, S. Rathore, J. H. Park, and J. H. Park, "A blockchain-based smart home gateway architecture for preventing data forgery," Human-centric Computing and Information Sciences, vol. 10, no. 1, Mar. 2020, pp. 1-14. https://doi.org/10.1186/s13673-019-0205-6
- S. Sicari, A. Rizzardi, L. A. Grieco, and A. Coen-Porisini, "Security, privacy and trust in Internet of Things: The road ahead," Computer networks, vol. 76, Jan. 2015, pp. 146-164. https://doi.org/10.1016/j.comnet.2014.11.008
- L. Lao, Z. Li, S. Hou, B. Xiao, S. Guo, and Y. Yang, "A survey of IoT applications in blockchain systems: Architecture, consensus, and traffic modeling," ACM Computing Surveys (CSUR), vol. 53, no. 1, Feb. 2020, pp. 1-32. https://doi.org/10.1145/3372136
- S. Nakamoto, "Bitcoin: A peer-to-peer electronic cash system," Decentralized Business Review, vol. 21260, Aug. 2019.
- X. Yuan, J. Chen, N. Zhang, X. Fang, and D. Liu, "A federated bidirectional connection broad learning scheme for secure data sharing in Internet of Vehicles," China Communications, vol. 18, no. 7, July 2021, pp. 117-133. https://doi.org/10.23919/JCC.2021.07.010
- R. Madani, B. Alturki, S. Reiff-Marganiec, and W. Alsafery, "My smart remote: A smart home management solution for children," 2018 1st Int. Conf. on Computer Applications & Information Security (ICCAIS), Riyadh, Saudi Arabia, Apr. 2018, pp. 1-8.
- D. S. Namdeo and V. R. Pawar, "A review: IoT based power & security management for smart home system," 2017 Int. Conf. of Electronics, Communication and Aerospace Technology (ICECA), Coimbatore, India, Apr. 2017, pp. 552-556.
- C. Lin, D. He, N. Kumar, X. Huang, P. Vijayakumar, and K. K. R. Choo, "HomeChain: A blockchain-based secure mutual authentication system for smart homes," IEEE Internet of Things J., vol. 7, no. 2, Sept. 2019, pp. 818-829. https://doi.org/10.1109/JIOT.2019.2944400
- M. Ma, Z. He, Q. Xu, and X. J. Li, "Design and development of smart home sensing supported by blockchain technology," In Proc. the 2019 7th Int. Conf. on Information Technology: IoT and Smart City, Shanghai, China, Dec. 2019, pp. 525-530.
- E. Androulaki, A. Barger, V. Bortnikov, C. Cachin, K. Christidis, A. De Caro, and J. Yellick, "Hyperledger fabric: a distributed operating system for permissioned blockchains," In Proc. the thirteenth EuroSys Conf., Porto, Portugal, Apr. 2018, pp. 1-15.
- C. Boettiger, "An introduction to Docker for reproducible research," ACM SIGOPS Operating Systems Review, vol. 49, no. 1, Jan. 2015, pp. 71-79. https://doi.org/10.1145/2723872.2723882
- D. Ongaro and J. Ousterhout, "The raft consensus algorithm," Lecture Notes CS, Oct. 2015.
- H. Javaid, C. Hu, and G. Brebner, "Optimizing validation phase of hyperledger fabric," 2019 IEEE 27th Int. Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS), Rennes, France, Oct. 2019, pp. 269-275.
- D. Johnson, A. Menezes, and S. Vanstone, "The elliptic curve digital signature algorithm (ECDSA)," Int. J. of information security, vol. 1, no. 1, July 2001, pp. 36-63. https://doi.org/10.1007/s102070100002
- G. Saldamli, C. Upadhyay, D. Jadhav, R. Shrishrimal, B. Patil, and L. A. Tawalbeh, "Improved gossip protocol for blockchain applications," Cluster Computing, vol. 25, no. 3, Jan. 2022, pp. 1915-1926. https://doi.org/10.1007/s10586-021-03504-z
- R. C. Pandey, M. Verma, L. K. Sahu, and S. Deshmukh, "Internet of things (IOT) based gas leakage monitoring and alerting system with MQ-2 sensor," Int. J. of Engineering Development and Research, vol. 5, no. 2, Jan. 2017, pp. 2135-2137.
- M. A. Pagnutti, R. E. Ryan, M. J. Gold, R. Harlan, E. Leggett, and J. F. Pagnutti, "Laying the foundation to use Raspberry Pi 3 V2 camera module imagery for scientific and engineering purposes," J. of Electronic Imaging, vol. 26, no. 1, Feb. 2017, pp. 1-13. https://doi.org/10.1117/1.JEI.26.1.013014
- R. Wahyuni, A. Rickyta, U. Rahmalisa, and Y. Irawan, "Home security alarm using Wemos D1 and HC-SR501 sensor based telegram notification," J. of Robotics and Control (JRC), vol. 2, no. 3, May 2021, pp. 200-204. https://doi.org/10.18196/jrc.2378
- L. Junyan, X. Shiguo, and L. Yijie, "Application research of embedded database SQLite," 2009 Int. Forum on Information Technology and Applications, Chengdu, China, May 2009, pp. 539-543.