1 K. Zunnurhain, "Vulnerabilities with Internet of Things" 83-88, 2016
2 P. Urien, "Three Innovative Directions Based on Secure Elements for Trusted and Secure IoT Platforms" 2016
3 C. Bormann, "Terminology for Constrained Networks" 2014
4 oneM2M partners, "TS-0002-V1.0.1: Requirements, oneM2M Technical Specification" 2015
5 oneM2M partners, "TR-0008-V2.0.0: Security, oneM2M Technical Report" 2016
6 O. Salman, "Software Defined IoT Security Framework" 75-80, 2017
7 C. L. Bencheton, "Security and Resilience of Smart Home Environments Good Practices and Recommendations, ENISA Document"
8 K. Chelli, "Security Issues in Wireless Sensor Networks: Attacks and Countermeasures" 1 : 2015
9 T. Becsi, "Security Issues and Vulnerabilities in Connected Car Systems" 477-482, 2015
10 STMicroelectronics, "RM0091: Reference Manual, Specification" 2017
1 K. Zunnurhain, "Vulnerabilities with Internet of Things" 83-88, 2016
2 P. Urien, "Three Innovative Directions Based on Secure Elements for Trusted and Secure IoT Platforms" 2016
3 C. Bormann, "Terminology for Constrained Networks" 2014
4 oneM2M partners, "TS-0002-V1.0.1: Requirements, oneM2M Technical Specification" 2015
5 oneM2M partners, "TR-0008-V2.0.0: Security, oneM2M Technical Report" 2016
6 O. Salman, "Software Defined IoT Security Framework" 75-80, 2017
7 C. L. Bencheton, "Security and Resilience of Smart Home Environments Good Practices and Recommendations, ENISA Document"
8 K. Chelli, "Security Issues in Wireless Sensor Networks: Attacks and Countermeasures" 1 : 2015
9 T. Becsi, "Security Issues and Vulnerabilities in Connected Car Systems" 477-482, 2015
10 STMicroelectronics, "RM0091: Reference Manual, Specification" 2017
11 S. Babar, "Proposed Embedded Security Framework for Internet of Things(IoT)" 2011
12 oneM2M, "Organization and Structure"
13 M. Vucinic, "OSCAR: Object SecurityArchitecture for the Internet of Things" 32 : 3-15, 2015
14 V. Sivaraman, "Network-Level Security and Privacy Control for Smart-Home IoT Devices" 163-167, 2015
15 Z. Zhang, "IoT Security: Ongoing Challenges andResearch Opportunities" 203-234, 2014
16 L. Andrea, "Internet of Things: Security Vulnerability and Challenges" 180-187, 2015
17 A. Majeed, "Internet of Things(IoT): A Verification Framework" 2017
18 Z. Cekerevac, "Internet of Things and the Man-In-The-Middle Attacks - Security and Economic Risks" 5 (5): 15-25, 2017
19 ISO/IEC, "International Standard: ISO/IEC 7816-3, the Standard Documents on ISO/IEC"
20 G. Brown, "Discovering the STM32 Microcontroller, the Text book of STMicroelectronics"
21 Arduino, "Compare Board Specs"
22 Atmel, "AVR109: Self Programming, the Specification of Application Note"