1. Ashton, K., "That ‘internet of things’ thing", RFID Journal, Vol.
22, No. 7, (2009), 97-114.
2. Belkeziz, R. and Jarir, Z., "A survey on internet of things
coordination", in International Conference on Systems of
Collaboration., (2016), 1-6.
3. Darshan, K. and Anandakumar, K., "A comprehensive review on
usage of internet of things (iot) in healthcare system", in 2015
International Conference on Emerging Research in Electronics,
Computer Science and Technology (ICERECT), IEEE., (2015),
132-136.
4. Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H. and Zhao, W., "A
survey on internet of things: Architecture, enabling technologies,
security and privacy, and applications", IEEE Internet of Things
Journal, Vol. 4, No. 5, (2017), 1125-1142.
5. Miraz, M.H., Ali, M., Excell, P.S. and Picking, R., "A review on
internet of things (iot), internet of everything (ioe) and internet of
nano things (iont)", in 2015 Internet Technologies and
Applications (ITA), IEEE., (2015), 219-224.
6. Samuel, S.S.I., "A review of connectivity challenges in iot-smart
home", in 2016 3rd MEC International conference on big data and
smart city (ICBDSC), IEEE. Vol., No. Issue, (2016), 1-4.
7. Suresh, P., Daniel, J.V., Parthasarathy, V. and Aswathy, R., "A
state of the art review on the internet of things (iot) history,
technology and fields of deployment", in 2014 International
conference on science engineering and management research
(ICSEMR), IEEE., (2014), 1-8.
8. Tayeb, S., Latifi, S. and Kim, Y., "A survey on iot communication
and computation frameworks: An industrial perspective", in 2017
IEEE 7th Annual Computing and Communication Workshop
and Conference (CCWC), IEEE., (2017), 1-6.
9. Andrea, I., Chrysostomou, C. and Hadjichristofi, G., "Internet of
things: Security vulnerabilities and challenges", in 2015 IEEE
Symposium on Computers and Communication (ISCC), IEEE.,
(2015), 180-187.
10. Botta, A., De Donato, W., Persico, V. and Pescapé, A., "On the
integration of cloud computing and internet of things", in 2014
International Conference on Future Internet of Things and Cloud,
IEEE., (2014), 23-30.
11. Wei, W., Yang, A.T. and Shi, W., "Security in internet of things:
Opportunities and challenges", in 2016 International Conference
on Identification, Information and Knowledge in the Internet of
Things (IIKI), IEEE., (2016), 512-518.
12. Roman, R., Zhou, J. and Lopez, J., "On the features and
challenges of security and privacy in distributed internet of
things", Computer Networks, Vol. 57, No. 10, (2013), 22662279.
13. Mollah, M.B., Azad, M.A.K. and Vasilakos, A., "Secure data
sharing and searching at the edge of cloud-assisted internet of
things", IEEE Cloud Computing, Vol. 4, No. 1, (2017), 34-42.
14. Jiang, H., Shen, F., Chen, S., Li, K.-C. and Jeong, Y.-S., "A secure
and scalable storage system for aggregate data in iot", Future
Generation Computer Systems, Vol. 49, (2015), 133-141.
15. Blakley, G.R., "Safeguarding cryptographic keys", in
Proceedings of the national computer conference. Vol. 48, (1979),
313-317.
16. Shamir, A., "How to share a secret", Communications of the
ACM, Vol. 22, No. 11, (1979), 612-613.
17. Asadi, F. and Hamidi, H., "An architecture for security and
protection of big data", International Journal of Engineering,
Vol. 30, No. 10, (2017), 1479-1486.
18. Chen, S., Chen, Y., Jiang, H., Yang, L.T. and Li, K.-C., "A secure
distributed file system based on revised blakley's secret sharing
scheme", in 2012 IEEE 11th International Conference on Trust,
Security and Privacy in Computing and Communications, IEEE.,
(2012), 310-317.
19. Shen, F., Jiang, H. and Xu, Z., "On post-generation data
operations in secure distributed storage systems with internal
padding", in 2010 10th IEEE International Conference on
Computer and Information Technology, IEEE., (2010), 26982705.