L. CoppolinoS. D’AntonioA. GarofaloL. Romano 2013 Applying data mining techniques to intrusion detection in wireless sensor networks P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), 2013 Eighth International Conference on IEEE 247 254
D. DujovneT. WatteyneX. VilajosanaP. Thubert 2014 6tisch: deterministic ip-enabled industrial internet (of things) IEEE Communications Magazine 52 12 36 41
A. DunkelsB. GronvallT. Voigt 2004 Contiki-a lightweight and flexible operating system for tiny networked sensors Local Computer Networks 2004 29th Annual IEEE International Conference on IEEE 455 462
P. GuptaP. Kumar 1998 Critical power for asymptotic connectivity in wireless networks Stochastic Analysis, Control, Optimization and Applications Boston
C. KoliasG. KambourakisA. StavrouJ. Voas 2017 Ddos in the iot: Mirai and other botnets Computer 50 7 80 84
H. KumarageI. KhalilZ. TariA. Zomaya 2013 Distributed anomaly detection for industrial wireless sensor networks based on fuzzy data modelling Journal of Parallel and Distributed Computing 73 6 790 806
S. LiL. Xu DaS. Zhao 2015 The internet of things: a survey Information Systems Frontiers 17 2 243 259
Y. MalehA. EzzatiY. QasmaouiM. Mbida 2015 A global hybrid intrusion detection system for wireless sensor networks Procedia Computer Science 52 1047 1052
D. MidiA. RulloA. MudgerikarE. Bertino 2017 Kalisa system for knowledge-driven adaptable intrusion detection for the internet of things Distributed Computing Systems (ICDCS), 2017 IEEE 37th International Conference on IEEE 656 666
S. Y. MoonJ. W. KimT. H. Cho 2014 An energy-efficient routing method with intrusion detection and prevention for wireless sensor networks Advanced Communication Technology (ICACT), 2014 16th International Conference on IEEE 467 470
F. OsterlindA. DunkelsJ. ErikssonN. FinneT. Voigt 2006 Cross-level sensor network simulation with cooja Local computer networks, proceedings 2006 31st IEEE conference on IEEE 641 648
M. Penrose 2003 Random Geometric Graphs Oxford University Press
Y. PonomarchukD.-W. Seo 2010 Intrusion detection based on traffic analysis in wireless sensor networks Wireless and Optical Communications Conference (WOCC), 2010 19th Annual IEEE 1 7
S. RazaL. WallgrenT. Voigt 2013 SVELTE: Real-time intrusion detection in the Internet of Things Ad hoc networks 11 8 2661 2674
T. Ring 2015 Connected cars–the next targe tfor hackers Network Security 2015 11 11 16
Z. ShelbyC. Bormann 2011 6LoWPAN: The wireless embedded Internet 43 John Wiley & Sons
Z. ShelbyK. HartkeC. Bormann 2014 The constrained application protocol (coap), Technical report
Statista 2018 Size of the internet of things market worldwide in 2014 and 2020, by industry (in billion u.s. dollars) URL: https://www.statista.com/statistics/512673/worldwide-internet-of-things-market/
Z. ZhengA. LiuL. X. CaiZ. ChenX. S. Shen 2016 Energy and memory efficient clone detection in wireless sensor networks IEEE Transactions on Mobile Computing 15 5 1130 1143