ACKNOWLEDGEMENTS
This work is supported by VC Research (grant
number VCR 0000095).
REFERENCES
Alaa, M., Zaidan, AA, Zaidan, B.B., Talal, M.& Kiah,
M.L.M. (2017). 'Review: A review of smart home
applications based on Internet of Things', Journal of
Network and Computer Applications, 97, pp. 48–65. doi:
10.1016/j.jnca.2017.08.017.
Apthorpe, N., Reisman, D., Sundaresan, S., Narayanan, A.,
& Feamster, N. (2017). Spying on the smart home:
privacy attacks and defenses on encrypted iot traffic.
Apthorpe, N., Reisman, D. & Feamster, N. (2017). ‘A Smart
Home is No Castle: Privacy Vulnerabilities of Encrypted
IoT Traffic’.
Burhan, M., Rehman, R. A., Khan, B. & Kim, B.-S. (2018).
‘IoT Elements, Layered Architectures and Security
Issues: A Comprehensive Survey’, Sensors (14248220),
18(9), pp. 1–37. doi: 10.3390/s18092796.
Butun, I., Osterberg, P., & Song, H. (2019). Security of the
Internet of Things: Vulnerabilities, Attacks and
Countermeasures. IEEE Communications Surveys &
Tutorials, vol. 22, no. 1, pp. 616-644. doi:10.1109/
comst.2019.2953364
Cremer, D. D., Nguyen, B., & Simkin, L. (2016). The
integrity challenge of the internet-of- things (iot): on
understanding its dark side. Journal of Marketing
Management, 33(1-2), 145- 158.
De Cremer, D., Nguyen, B. & Simkin, L. (2017). ‘The
integrity challenge of the Internet-of- Things (IoT): on
understanding its dark side’, Journal of Marketing
Management, 33(1/2), pp. 145–158. doi:
10.1080/0267257X.2016.1247517.
El-Sayed H., et al. (2018). ‘Edge of Things: The Big Picture
on the Integration of Edge, IoT and the Cloud in a
Distributed Computing Environment’, IEEE Access,
Access, IEEE, p. 1706. doi: 10.1109/ACCESS.2017.
2780087.
Geneiatakis, D., Kounelis, I., Neisse, R., Nai-Fovino, I., Steri,
G., & Baldini, G. (2017). ‘Security and privacy issues for
an IoT based smart home.’ International Convention on
Information & Communication Technology, Electronics
& Microelectronics. IEEE.
Guo, S., Hu, X., Guo, S., Qiu, X., & Qi, F. (2019). Blockchain
Meets Edge Computing: A Distributed and Trusted
Authentication System. IEEE Transactions on Industrial
Informatics, vol. 16, no. 3, pp. 1972-1983.
doi:10.1109/tii.2019.2938001
Kumar, NM & Mallick, PK (2018). ‘The Internet of Things:
Insights into the building blocks, component interactions,
and architecture layers’, Procedia Computer Science, vol.
132, pp. 109–117.
Lee, C. and Fumagalli, A. (2019). "Internet of Things
Security - Multilayered Method For End to End Data
Communications Over Cellular Networks," 2019 IEEE
5th World Forum on Internet of Things (WF-IoT),
Limerick, Ireland, 2019, pp. 24-28, doi: 10.1109/WF-
IoT.2019.8767227.
Lee, M.-C., Lin, J.-C. & Owe, O. (2018). ‘Privacy Mining
from IoT-based Smart Homes’.
Lee, Y. T., Hsiao, W. H., Lin, Y. S., & Chou, S. C. T. (2017).
Privacy-preserving data analytics in cloud-based smart
home with community hierarchy. IEEE Transactions on
Consumer Electronics, 63(2), 200-207.
Leng, J., Lin, Z. and Wang, P. (2020). "Poster Abstract: An
Implementation of an Internet of Things System for
Smart Hospitals," 2020 IEEE/ACM Fifth International
Conference on Internet-of-Things Design and
Implementation (IoTDI), Sydney, Australia, 2020, pp.
254-255, doi: 10.1109/IoTDI49375.2020.00034.
Mantelero, A. (2017). Regulating big data. The guidelines of
the council of Europe in the context of the European data
protection framework. Computer Law & Security
Review.
Marikyan, D., Papagiannidis, S., & Alamanos, E. (2019). A
systematic review of the smart home literature: A user
perspective. Technological Forecasting and Social
Change. Volume 138, 2019, pp.139-154. doi:10.1016/
j.techfore.2018.08.015
Mihalache, A. (2017) ‘Wireless Home Automation System
using IoT’, Informatica Economica, 21(2), pp. 17–32.
doi: 10.12948/issn14531305/21.2.2017.02.
Nguyen, B., & De Cremer, D. (2016). ‘The fairness challenge
of the internet of things.’ European Business Review,
January/February (pp. 31–33). Available at:
http://www.europeanbusinessreview.com/?p=8588
Rathore, M. M., Paul, A., Ahmad, A., & Jeon, G. (2017). IoT-
based big data: from smart city towards next generation
super city planning. International Journal on Semantic
Web & Information Systems, 13(1), 28-47.
Risteska Stojkoska, B. L. & Trivodaliev, K. V. (2017)
‘Review: A review of Internet of Things for smart home:
Challenges and solutions’, Journal of Cleaner
Production, 140(Part 3), pp. 1454– 1464. doi:
10.1016/j.jclepro.2016.10.006.
Shave, L. (2018). ‘The CIA of security and access’, IQ: The
RIM Quarterly, (2), p. 18. Yassine, A. et al. (2019). ‘IoT
big data analytics for smart homes with fog and cloud
computing’, Future Generation Computer Systems, 91,
pp. 563–573. doi: 10.1016/j.future. 2018.08.040.
Zheng, S. et al. (2018). ‘User Perceptions of Smart Home IoT
Privacy’. doi: 10.1145/3274469.
N. Komninos, E. Philippou, and A. Pitsillides, “Survey in
smart grid and smart home security: Issues, challenges
and countermeasures,” IEEE Communications Surveys
& Tutorials, vol. 16, no. 4, pp. 1933–1954, 2014.
Tetteh, N., & Amponsah, O. (2020). Sustainable Adoption of
Smart Homes from the Sub-Saharan African Perspective.
Sustainable Cities and Society, Volume 63, December
2020, p. 102434. doi:10.1016/j.scs. 2020.102434
Tsou, Y.-T., Chen, H.-L., Chen, J.-Y., Huang, Y., & Wang,
P.-C. (2017). ‘Differential privacy-based data de-
identification protection and risk evaluation system’
(2017) 2017 International Conference on Information
and Communication Technology Convergence (ICTC),
Information and Communication Technology
Convergence (ICTC), 2017 International Conference on,
p. 416. doi: 10.1109/ICTC.2017.8191015.