0% found this document useful (0 votes)
11 views

Internet_of_Things_Security_Principles_Application

The document discusses the Internet of Things (IoT) and its security implications, detailing its evolution, architecture, communication protocols, and the challenges it faces. It aims to provide a comprehensive understanding for architects, developers, and researchers, while addressing the security issues and countermeasures associated with IoT applications, including autonomous vehicles. The book serves as a resource for ongoing research and future directions in the field of IoT security.

Uploaded by

muneebhassan2018
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views

Internet_of_Things_Security_Principles_Application

The document discusses the Internet of Things (IoT) and its security implications, detailing its evolution, architecture, communication protocols, and the challenges it faces. It aims to provide a comprehensive understanding for architects, developers, and researchers, while addressing the security issues and countermeasures associated with IoT applications, including autonomous vehicles. The book serves as a resource for ongoing research and future directions in the field of IoT security.

Uploaded by

muneebhassan2018
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 44

Internet of Things Security

Internet of Things Security


Principles, Applications, Attacks,
and Countermeasures

B. B. Gupta
Megha Quamara
CRC Press
Taylor & Francis Group
6000 Broken Sound Parkway NW, Suite 300
Boca Raton, FL 33487-2742

© 2020 by Taylor & Francis Group, LLC


CRC Press is an imprint of Taylor & Francis Group, an Informa business

No claim to original U.S. Government works

Printed on acid-free paper

International Standard Book Number-13: 978-0-367-37396-2 (Hardback)

This book contains information obtained from authentic and highly regarded sources. Reason­
able efforts have been made to publish reliable data and information, but the author and publisher
cannot assume responsibility for the validity of all materials or the consequences of their use. The
authors and publishers have attempted to trace the copyright holders of all material reproduced in
this publication and apologize to copyright holders if permission to publish in this form has not
been obtained. If any copyright material has not been acknowledged please write and let us know
so we may rectify in any future reprint.

Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced,
transmitted, or utilized in any form by any electronic, mechanical, or other means, now known
or hereafter invented, including photocopying, microfilming, and recording, or in any informa­
tion storage or retrieval system, without written permission from the publishers.

For permission to photocopy or use material electronically from this work, please access www.
copyright.com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc.
(CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organiza­
tion that provides licenses and registration for a variety of users. For organizations that have been
granted a photocopy license by the CCC, a separate system of payment has been arranged.

Trademark Notice: Product or corporate names may be trademarks or registered trademarks,


and are used only for identification and explanation without intent to infringe.
Visit the Taylor & Francis Web site at
http://www.taylorandfrancis.com

and the CRC Press Web site at


http://www.crcpress.com
Dedicated to my parents and family for their constant support during
the course of this book

B. B. Gupta

Dedicated to my mentor, my parents, and my friends for their constant


encouragement and belief during the course of this book

Megha Quamara
Contents

List of Figures xi
List of Tables xiii
Preface xv
Acknowledgments xvii
Authors xix

1 Internet of Things – Evolution, Statistics, and Forecasts 1


1.1 Introduction 1
1.2 Definition of IoT 2
1.3 Evolution 3
1.4 Related Statistics 5
1.5 Industrial Forecasts 6
1.5.1 General Forecasts 6
1.5.2 Security-Related Forecasts 6
1.6 Chapter Summary 8
References 8

2 IoT Architecture and Business Models 11


2.1 Introduction 11
2.2 IoT Architecture 12
2.3 Business Models for IoT 14
2.3.1 What Are Business Models? 14
2.3.2 Components of Business Models 15
2.3.3 Challenges in Developing Business Model
Frameworks for the IoT 16
2.3.4 IoT Business Models 18
2.3.5 Technological Perspective of Business Models 19
2.3.5.1 Industrial Context 19
2.3.5.2 Blockchain 20
2.3.5.3 5G 20
2.4 Chapter Summary 21
References 21

vii
viii Contents

3 Communication and Development Primitives in IoT 25


3.1 Introduction 25
3.2 Communication Protocols, Standards, and Regulations 26
3.2.1 Message Queuing Telemetry Transport 28
3.2.2 Constrained Application Protocol 30
3.3 Design and Development Tools 32
3.4 Datasets 34
3.5 Chapter Summary 36
References 36

4 Challenges in IoT 39
4.1 Introduction 39
4.2 Challenges Associated with IoT Architecture 39
4.3 Challenges Associated with Entities 43
4.4 Technology-Oriented Challenges 44
4.5 Challenges Associated with Features 45
4.6 Challenges Associated with Development Practices 47
4.7 Summary 48
References 49

5 Data Explosion in IoT 51


5.1 Introduction 51
5.2 Big Data Definition 51
5.3 Underlying Factors for Data Explosion in the IoT 52
5.4 Key Challenges Associated with Managing the Data
Explosion in the IoT 53
5.5 Technological Support 54
5.5.1 Machine Learning 55
5.5.2 Artificial Intelligence 55
5.5.3 Intelligent Edge Processing 55
5.6 Summary 56
References 56

6 Computing Paradigms and Security Issues in Connected


and Autonomous Driving Vehicles 59
6.1 Introduction 59
6.2 Connected and Autonomous Driving
Vehicle – A Technical Background 61
6.2.1 Functional Blocks 61
6.2.2 Underlying Technologies 63
6.2.2.1 Radio Detection and Ranging 63
Contents ix

6.2.2.2 Light Detection and Ranging 63


6.2.2.3 Global Positioning System 64
6.2.2.4 Ultrasonic Sensors 64
6.2.2.5 Dedicated Short Range Communications 65
6.2.2.6 Cameras 65
6.2.2.7 Other Sensors 66
6.2.2.8 Mapping Technologies 66
6.2.2.9 Route Planning and Navigation Algorithms 66
6.2.3 Potential Benefits and Forecasts 67
6.3 Computing Paradigms 68
6.3.1 Artificial Intelligence 68
6.3.2 Vehicular Cloud Computing or Edge Computing 70
6.3.3 End-to-End Networking 71
6.4 Security Issues and Existing Countermeasures 72
6.4.1 Challenges and Countermeasures Associated
with Computing Paradigms 72
6.4.1.1 Artificial Intelligence 75
6.4.1.2 Vehicular Cloud Computing 76
6.4.1.3 End-to-End Networking 76
6.4.2 Challenges and Countermeasures Associated
with Participating Entities 76
6.4.2.1 Vehicles 77
6.4.2.2 Connection Infrastructure 77
6.4.2.3 Human Aspects 79
6.5 Ongoing Research Efforts 80
6.6 Open Research Challenges 80
6.6.1 Deployment and Operational Costs 81
6.6.2 Security 81
6.6.3 Privacy 81
6.6.4 Legal and Ethical Aspects 82
6.6.5 Validation and Testing 82
6.6.6 Standardization 83
6.6.7 Other Aspects 83
6.7 Summary 83
References 84

Index 91
List of figures

1.1 Global financial damages to businesses due to cyber


attacks (as of April 2018) 5
1.2 Global IoT security spending forecast 7
2.1 IoT architecture 14
2.2 Components of business models 15
6.1 Capabilities of autonomous vehicles 60
6.2 Society of Automotive Engineers (SAE) – levels of automation 61
6.3 Inter-connection among CADV modules 62
6.4 CADV computing paradigms 68
6.5 Factors associated with security attacks against autonomous
vehicles 73
6.6 Taxonomy of security challenges in CADV technology 73

xi
List of tables

1.1 Events associated with the evolution of IoT 4


3.1 Layer-wise IoT protocols 26
3.2 Standards for IoT 28
3.3 Comparison of MQTT and CoAP 31
3.4 Design and development tools for IoT 32
3.5 Datasets for IoT development 34
4.1 Challenges in the IoT 40
5.1 Big data attributes 52
6.1 Security challenges and existing countermeasures
associated with computing paradigms 74
6.2 Vehicle-specific security challenges and existing
countermeasures 77

xiii
Preface

The Internet of Things (IoT) is defined as an idea of inter-connected devices


around us that are capable of sharing information and resources among each
other to work for the achievement of a specific goal. It involves devices and
technologies with heterogeneous capabilities and properties for the improve­
ment of the efficiency of the resulting applications and to raise economic and
social benefits for people. With the growing edge of the concept of the IoT,
it becomes necessary to understand and counter the challenges, including
security issues, associated with the field. The overall purpose of producing this
book is to develop an understanding of the core concepts of the IoT among the
readers including architects, developers, researchers, and industrialists in
the field so that they can contribute toward its overall development, while at
the same time, considering the novel and challenging aspects associated with
its adoption. The subject matter of the book explores, and aims at drawing the
attention of the reader toward, the existing literature, ongoing research, and
possible future research directions in the field.
Specifically, the chapters contained in this book are summarized as
follows:
Chapter 1 introduces the concept of the IoT with some related definitions
and comprises the events associated with the evolution of the IoT, related sta­
tistics, and industrial forecasts provided by well known organizations across
the world.
Chapter 2 discusses the architectural model of the IoT in detail, encom­
passing different layers with a description of the various entities involved, their
functionalities, along with security aspects. Moreover, it discusses potential
and innovative business models for the IoT including the underlying compo­
nents, challenges, and technological perspectives.
Chapter 3 discusses various protocols for IoT networks, along with dif­
ferent communication standards, regulation, tools, and datasets for IoT
development.

xv
xvi Preface

Chapter 4 discusses the challenges associated with the architecture,


different entities, underlying technologies, characteristics, and developmental
practices in the IoT ecosystem.
Chapter 5 addresses the problem of data explosion in the IoT.
Chapter 6 presents autonomous driving vehicles as an application area of
the IoT and highlights the computing paradigms and security issues associated
with them.
Acknowledgments

Many people have contributed greatly to this book on the Internet of Things
Security: Principles, Applications, Attacks, and Countermeasures. The authors
would like to acknowledge all of them for their valuable help and generous
ideas in improving the quality of this book. With our feelings of gratitude,
we would like to introduce them in turn. The first mention is the staff of both
CRC Press and Taylor & Francis Group for their constant encouragement,
continuous assistance, and untiring support. Without their technical support,
this book would not be completed. The next mention is the authors’ families
for being the source of continuous love, unconditional support, and prayers
not only for this work, but throughout our lives. Last, but far from least, we
express our heartfelt thanks to the Almighty for bestowing over us the courage
to face the complexities of life and complete this work.

B. B. Gupta
Megha Quamara

xvii
Authors

B. B. Gupta received a PhD degree from the Indian Institute of Technology,


Roorkee, India, in the area of information and cyber security. He has pub­
lished more than 200 research papers in international journals and conferences
of high repute including IEEE, Elsevier, ACM, Springer, Wiley, Taylor &
Francis Group, Inderscience, etc. He has visited several countries, i.e.,
Canada, Japan, the United States, the United Kingdom, Malaysia, Australia,
Thailand, China, Hong Kong, Italy, Spain, etc. to present his research work.
His biography was selected and published in the 30th Edition of Marquis
Who’s Who in the World, 2012. Dr. Gupta also received the Young Faculty
Research Fellowship award from the Ministry of Electronics and Information
Technology, Government of India in 2018. He is also working as a princi­
pal investigator of various research and development projects. He is serving
as an associate editor of IEEE Access, IEEE TII, and the executive editor
of IJITCA, Inderscience, respectively. At present, Dr. Gupta is working as
an assistant professor in the Department of Computer Engineering, National
Institute of Technology, Kurukshetra, India. His research interests include
information security, cyber security, mobile security, cloud computing, web
security, intrusion detection, and phishing.

Megha Quamara received her master of technology (M.Tech) degree


in cyber security from the National Institute of Technology (NIT),
Kurukshetra, India, in 2018. She was awarded the Gold Medal for being
the best graduating student throughout the course. She received her bach­
elor of technology (B.Tech) degree in computer science and engineering
from the University Institute of Engineering and Technology (UIET),
Kurukshetra University, India, in the year 2015, with a First Division with
Honour. Her research interests include security in the Internet of Things
(IoT) and cloud computing, authentication in smart card technology, secu­
rity in autonomous vehicles, and data privacy. She has published and pre­
sented 11 research papers (including one book chapter) in international
platforms of high repute, including Wiley, Elsevier, IEEE, and Springer.
She is a co-author of the book Smart Card Security: Applications, Attacks,

xix
xx Authors

and Countermeasures published by CRC Press. She is also serving as a


reviewer of various journals and conferences. Soon, she will start pursu­
ing a doctoral program at CEA, Paris, in collaboration with the University
of Toulouse, France, where her main area of work will be the safety and
security of cyber-physical systems.
Internet of
Things –
Evolution,
1
Statistics, and
Forecasts

1.1 INTRODUCTION
The Internet of Things is the idea of seamless integration of physical devices
with the Internet that are equipped with sensors, processors, and communi­
cation components facilitating sensing, computing, and communication capa­
bilities for perceiving, processing, and exchanging information through the
Internet with limited or no human intervention. These devices may include
security systems, vehicles, home appliances, electronic gadgets, people, ani­
mals, and so forth. User interface is provided for their installation and for pro­
viding commands to these devices to control their functionality [1–4]. These
devices share data with one another, or they are sent to the local processing
units or remote cloud servers for processing.
From its very beginning, the idea of the IoT is transforming various
aspects of our everyday lives and has proven to be a revolutionary technologi­
cal and networking paradigm. Various industries are adopting the concept of
the IoT in order to function in a smooth and more efficient manner, with a
better understanding of how to deliver enhanced services to the customers and

1
2 Internet of Things Security

for improving the decision-making process to increase the overall revenue.


It encourages business organizations to integrate and adapt new business mod­
els, and to monitor the overall business processes for the improvement of busi­
ness strategies. Network and communication protocols used in IoT networks
are highly dependent on the nature of underlying applications. These real-
world applications range from consumer-oriented applications, such as smart
homes, wearables, and healthcare, to enterprise applications, such as smart
cities, agriculture, smart industries, and traffic management. It is not incor­
rect to say that the current hype of the IoT is immense, and newer IoT-enabled
products are coming to the market every day [5–8].
Despite various benefits of the idea of inter-connecting things, the IoT
accompanies various challenges as well. Ever-growing Internet-connected
devices and data points expand the attack surface that makes security and pri­
vacy aspects that are often ignored crucial. Beyond this, setting up infrastruc­
ture capabilities involving large numbers of devices that are of a heterogeneous
nature is another challenging aspect. Many of the IoT-enabled initiatives have
failed due to lack of effective integration and collaboration among various
components, while at the same time creating a new culture of the technology.
Even with the availability of resources, poor analysis and decision-making
prevent industries from obtaining substantial benefits from the IoT. It is thus
worth digging into knowing what the IoT exactly is and how its different com­
ponents are inter-related.
The next section presents some of the definitions presented by well-known
organizations from around the globe to understand the concept of the IoT.
In later sections, evolutionary aspects of the IoT along with industrial statistics
and forecasts are discussed.

1.2 DEFINITION OF IoT


National Institute of Standards and Technology defines the IoT as a system
involving sensing, actuation, communication, and computation compo­
nents [9,10]. IoT devices are different from the conventional digital devices in
the sense that these can interact with the physical world, cannot be accessed,
monitored, and managed through conventional means, and are characterized
by enhanced security and privacy capabilities in terms of availability, effec­
tiveness, and efficiency. According to Gartner, the IoT is the network con­
sisting of physical objects having embedded technology for communication
and sensing and for interaction with internal states and the external environ­
ment [11]. It will have a great economic impact through the transformation
1 • Internet of Things – Evolution, Statistics, and Forecasts 3

of traditional enterprises into digital and smart businesses. It will also facili­
tate new business models that would improve the efficiency and employee-
customer engagement.
Recommendation ITU-T Y.2060 defines the IoT as a global infrastructure
for the information society, which enables advanced and high-end services
through inter-connection of physical and virtual things based on existing and
progressing information and communication technologies that support inter-
operability [12]. Physical things are a part of the physical world, and these can
be sensed, actuated, and connected. These can interact with each other via
gateway, without gateway, or directly. On the other hand, virtual things (e.g.,
application software, multi-media content) are a part of the information world,
and these can be stored, processed, and accessed remotely. Fundamental char­
acteristics of the IoT include inter-connectivity, heterogeneity, dynamic state
changes, and scalability.
Cisco defines the IoT as a network of sensors that are attached to the
objects and communication devices and provide data that can be analyzed and
utilized for initiating automated actions [13]. Decision-making is dependent on
when the objects can sense and when they can communicate. The IoT has been
designated as a crucial component for business growth in terms of deploy­
ing IoT-enabled components or business strategies. It will speed up time-to­
market, optimize asset utilization, improve supply-chain efficiency, optimize
asset utilization, improve product development, and implement predictive
maintenance.

1.3 EVOLUTION
Since its invention, the IoT has paved an eventful journey and has now become
a powerful driver for the growth of businesses. Although the IoT is rapidly
progressing, there is a need to look at the development of key fundamentals
associated with the evolutionary process of the IoT and to understand in a bet­
ter way how it entered into the current technological mainstream.
The concept of Internet connectivity began proliferating in the early
1990s when consumer markets and enterprises were in the growing stage.
Kevin Ashton, who was the co-founder of Auto-ID Center at MIT, coined
the term “Internet of Things” in the year 1999. The core idea was to identify
and track the products more accurately using Radio Frequency Identification.
Since then, numerous technologies have come into existence to support the
growth of the IoT. Table 1.1 summarizes the milestones achieved during this
evolutionary process.
4 Internet of Things Security

TABLE 1.1 Events associated with the evolution of IoT

YEAR EVENTS
1999 Kevin Ashton, executive director and co-founder of Auto-ID
Center, coined the term Internet of Things (IoT); First
Machine-to-Machine (M2M) protocol Message Queuing
Telemetry Transport (MQTT) was developed.
2000 LG, a South Korean multi-national electronics company, announced
its first Internet-connected refrigerator plan named Internet Digital
DIOS, which used Local Area Network (LAN) port for Internet
connectivity; idea of cloud computing came into existence.
2001 United States-based National Science Foundation established an
Industry-University Cooperative Research Centre (IUCRC) for
using IoT-based predictive analytics technology.
2002 Collaborative development of Near Field Communication
Technology (NFCT) was announced by Philips and Sony.
2003–2004 Mainstream publications including the Guardian, the Boston
Globe, and Scientific American mentioned the term the IoT.
2005 International Telecommunications Union (ITU) published its first
report on the IoT.
2006 A Bluetooth smart technology wire was introduced by Nokia.
2007 European Research Cluster on IoT (IERC), a European Union based
organization, was founded.
2008 First European IoT conference was organized; Internet-connected
devices exceeded the number of people worldwide.
2009 Google started self-driving cars tests.
2010 ioBridge, an IoT company, developed the first online tide
monitoring system.
2011 IoT Global Standards Initiative (GSI) was created; the term Industry
4.0 was revived.
2012 IPv6 was launched worldwide.
2013 Internet.org, a partnership between Nokia, Samsung, Ericsson,
MediaTek, Opera Software, Qualcomm, and social networking
service provider Facebook, was launched.
2014 IoT Incubation Council was launched.
2015 Internet of Things Security Foundation (IoTSF) was launched.
2016 DDoS attacks powered by IoT devices were conducted using Mirai
malware.
2017 IoT Terms Database was created by IoT One, which is a reliable source
containing information about the Industrial Internet of Things (IIoT).
2018 California became the first state to pass IoT cybersecurity law.
2019 Year for the 4th annual IoT Global Innovation Forum.
1 • Internet of Things – Evolution, Statistics, and Forecasts 5

1.4 RELATED STATISTICS


At present, there are 26.66 billion connected IoT devices in the market for
the year 2019, and every second 127 new devices are being connected to the
Internet [14]. 40.2% of these devices are in use for business and manufactur-
ing. Key areas include delivering real-time analytics of supply chains, providing
diagnostic information about the equipment, and controlling the robotic machin-
ery. Thirty and three tenths percent of IoT devices are a part of the healthcare
industry for health monitoring and storing personal records safely. Eight and
three tenths percent are a part of retail services including inventory tracking,
providing online services to the clients, and consumer analytics. Seven and seven
tenths percent are used in the security domain including remote sensing, bio-
metric locks, and facial recognition. Four and one tenths percent are a part of
the transportation industry including Global Positioning System (GPS) locators
and performance tracking. Statistics also show that around 75% of the business-
related IoT projects are facing failure due to limited internal expertise, time to
completion, exceeding budget, and quality of data as some of the key reasons.
Considering the global machine-to-machine (M2M) connections that are most
commonly used in the commercial sector, 27% are in China, 29% are in Europe,
40% are in Asia, and 19% are in the United States.
Apart from delivering substantial benefits to the users, the IoT is facing
unprecedented security challenges as well. The average financial damages
caused by cyber attacks to businesses across the globe as of the year 2018 are
shown in Figure 1.1 [15]. A survey showed that as of 2018, 38% of the organi-
zations across the globe have adopted a set of security standards and constant
monitoring techniques [16].

35
30
Share of Attacks (in %)

30
25
20 19
17
15
15
11
10 8
5
0
$5m+ $2.5m–$4.9m $1m–$2.9m $500k–$999k $100k–$499k Less than $100k
Amount (in US dollars)

FIGURE 1.1 Global financial damages to businesses due to cyber attacks (as of
April 2018).
6 Internet of Things Security

1.5 INDUSTRIAL FORECASTS


In this section, we discuss some of the industrial forecasts for the IoT.
Beginning with general anticipations, we will switch our attention to security-
related predictions.

1.5.1 General Forecasts


According to Gartner’s forecasts, usage of 14.2 billion connected things will
be seen in the year 2019, and this will reach to 25 billion by the year 2021 [17].
Worldwide technology-wise spending on the IoT is estimated to reach
$1.2 trillion by the year 2022, with a Compound Annual Growth Rate (CAGR)
growth of 13.6% from 2017 to 2022 [18]. The sensor market is expected to progress
through the year 2023, with newer applications, algorithms, and reduced prices.
DBS Asian forecasts predict that the IoT installed base will experience a growth
from 6.3 million units to 1.25 billion from the year 2016 to 2030 [19].
IoT Analytics predicts that the global market for the IoT will reach
$1.56 trillion by the year 2025, and the market for industry 4.0 services and
products will reach $310 billion by the year 2023 [20,21]. Statista predicted
that by the year 2020, transportation and logistics, discrete manufacturing and
utilities industries are expected to spend $40 billion on IoT systems, platforms,
and services [22]. In addition, usage of 12.86 billion IoT devices and sensors
in the consumer segment is expected by the year 2020, with a CAGR growth
of 24.57% from the year 2017 [23]. The number of IoT devices are expected to
reach 75.44 billion by the year 2025 [24]. Ericsson’s forecast expects the num­
ber of cellular IoT connections to reach 3.5 billion by the year 2023 accompa­
nied with a CAGR growth of 30% [25].
According the Gartner, the top ten strategic IoT technologies and trends
would include artificial intelligence, social, legal, and ethical IoT, infonomics
and data broking, intelligent mesh, IoT governance, sensor innovation, trusted
hardware and operating systems, user experiences, silicon chip innovation,
and wireless networking technologies [26].

1.5.2 Security-Related Forecasts


Security has become an inherent part of the IoT vision and architecture, and
it is expected that security breaches will promote industries to come up with
1 • Internet of Things – Evolution, Statistics, and Forecasts 7

2500

2000
Amount (in $ million)

1500

1000

500

0
2016 2017 2018 2019 2020 2021
Year
Endpoint Security Gateway Security Professional Services

FIGURE 1.2 Global IoT security spending forecast.

more and enhanced security solutions. Although the exact influence of these
predictions is accompanied with several questions, it will certainly help in
shaping the industrial evolutionary process in the domain [27].
Gartner predicted that newer threats would come into the picture by the
year 2021 with hackers finding novel ways for attacking IoT systems and
protocols raising a requirement of hardware and software amendments [28].
It is also predicted that the investment in IoT endpoint security solutions
would rise from $240 in the year 2016 to $631 million in the year 2021,
accompanied with a CAGR growth of 21.38% [29]. Gateway security spend-
ing will reach from $102 in 2016 to $415 in 2021. Similarly, professional
service securities will see an investment growth from $570 in 2016 to $2071
in 2021. Figure 1.2 shows the IoT security-spending forecast. Worldwide
IoT security spending will reach $3.1 billion in the year 2021, with a CAGR
growth of 27.87% from the year 2016 [30]. Size of the IoT security market
from the year 2016 to 2025 across the globe is expected to reach $30.9 bil-
lion from $7.28 billion [31].
The smart home security segment is expected to achieve a revenue of
$28.19 billion by the year 2023 across the globe [32]. Many hardware manu-
facturers including Dell, Cisco, and HPE, are developing specialized infra-
structure for end-point security for preventing loss of data, ensuring threat
protection and access control, enforcing right privileges, and so forth.
8 Internet of Things Security

1.6 CHAPTER SUMMARY


Ubiquitous sensing, computing, and communication facilities provided by IoT
are seeking attention of industries at various levels and in different sectors
due to their significant impact on various aspects of our everyday lives. To
understand its current state of being, it becomes necessary to outline the events
associated with the journey of the IoT so far. This chapter began with a brief
introduction to the IoT paradigm through various definitions and progressed
toward highlighting the historical events associated with the development of
this ground-breaking idea. Further sections presented the industrial statistics
and forecasts related to the domain. In the next chapter, we will discuss the
existing architectural concepts and business models associated with the IoT
that would enlighten its workflow concepts.
References
Tewari, A., & Gupta, B. B. (2017). A lightweight mutual authentication protocol based
on elliptic curve cryptography for IoT devices. International Journal of Advanced
Intelligence Paradigms, 9(2–3), 111–121.
Stergiou, C., Psannis, K. E., Gupta, B. B., & Ishibashi, Y. (2018). Security, privacy &
efficiency of sustainable cloud computing for big data & IoT. Sustainable
Computing: Informatics and Systems, 19, 174–184.
Tewari, A., & Gupta, B. B. (2018). Security, privacy and trust of different layers in
Internet-of-Things (IoTs) framework. Future Generation Computer Systems.
https://doi.org/10.1016/j.future.2018.04.027.
Gupta, B. B., & Quamara, M. (2018). An overview of Internet of Things (IoT):
Architectural aspects, challenges, and protocols. Concurrency and Computation:
Practice and Experience, e4946.
Gupta, B. B., & Sheng, Q. Z. (Eds.). (2019). Machine learning for computer and cyber
security: Principle, algorithms, and practices. Boca Raton, FL: CRC Press.
Jiang, F., Fu, Y., Gupta, B. B., Lou, F., Rho, S., Meng, F., & Tian, Z. (2018). Deep
learning based multi-channel intelligent attack detection for data security. IEEE
Transactions on Sustainable Computing.
Gupta, B. B., & Agrawal, D. P. (Eds.). (2019). Handbook of research on cloud comput­
ing and big data applications in IoT. Hershey, PA: IGI Global.
Adat, V., & Gupta, B. B. (2018). Security in Internet of Things: Issues, challenges, tax­
onomy, and architecture. Telecommunication Systems, 67(3), 423–441.
Voas, J., Kuhn, R., Laplante, P., & Applebaum, S. (2018). Internet of Things (IoT) Trust
Concerns (No. NIST Internal or Interagency Report (NISTIR) 8222 (Draft)).
Gaithersburg, MD: National Institute of Standards and Technology.
NIST. https://csrc.nist.gov/News/2016/Release-of-Special-Publication-800-183,­
Network-of. Accessed April 2019.
Gartner. https://www.gartner.com/it-glossary/internet-of-things/. Accessed April 2019.
ITU. https://www.itu.int/en/ITU-T/gsi/iot/Pages/default.aspx. Accessed May 2019.
CISCO. https://www.cisco.com/c/en/us/about/press/internet-protocol-journal/back­
issues/table-contents-57/153-internet.html. Accessed May 2019.
Safeatlast. https://safeatlast.co/blog/iot-statistics/. Accessed March 2019.
Statista. https://www.statista.com/statistics/881158/average-financial-damages-via­
cyber-attacks/. Accessed April 2019.
Statista. https://www.statista.com/statistics/780553/worldwide-enterprise-iot-solu­
tions-security-deployment/. Accessed April 2019.
Gartner. https://www.gartner.com/en/newsroom/press-releases/2018-11-07-gartner­
identifies-top-10-strategic-iot-technologies-and-trends. Accessed February 2019.
Forbes. https://www.forbes.com/sites/louiscolumbus/2018/12/13/2018-roundup-of­
internet-of-things-forecasts-and-market-estimates/#13db9a517d83. Accessed
January 2019.
DBS Asian Insights. https://www.dbs.com/aics/pdfController.page?pdfpath=/content/
article/pdf/AIO/062018/180625_insights_internet_of_things_the_pillar_of_arti­
ficial_intelligence.pdf. Accessed March 2019.
IoT Analytics. https://iot-analytics.com/state-of-the-iot-update-q1-q2-2018-number­
of-iot-devices-now-7b/. Accessed December 2018.
IoT Analytics. https://iot-analytics.com/industry-4-0-and-smart-manufacturing/.
Accessed December 2018.
Statista. https://www.statista.com/statistics/666864/iot-spending-by-vertical-world­
wide/. Accessed April 2019.
Statista. https://www.statista.com/statistics/370350/internet-of-things-installed-base­
by-category/. Accessed April 2019.
Statista. https://www.statista.com/statistics/471264/iot-number-of-connected-devices­
worldwide/. Accessed April 2019.
Ericsson. https://www.ericsson.com/assets/local/mobility-report/documents/2018/eric­
sson-mobility-report-june-2018.pdf. Accessed April 2019.
Gartner. https://www.gartner.com/en/newsroom/press-releases/2018-11-07-gartner­
identifies-top-10-strategic-iot-technologies-and-trends. Accessed April 2019.
I-Scoop. https://www.i-scoop.eu/internet-of-things-guide/iot-security-forecasts/.
Accessed April 2019.
Gartner. http://www.gartner.com/newsroom/id/3221818. Accessed April 2019.
Gartner. https://www.gartner.com/en/newsroom/press-releases/2018-03-21-gartner­
says-worldwide-iot-security-spending-will-reach-1-point-5-billion-in-2018.
Accessed March 2019.
Gartner. https://www.gartner.com/document/3863770. Accessed April 2019.
Statista. https://www.statista.com/statistics/993789/worldwide-internet-of-things­
security-market-size/. Accessed April 2019.
Statista. https://www.statista.com/statistics/645392/revenue-in-the-smart-home-seg­
ment-security-worldwide/. Accessed April 2019.
Gupta, B. B. (Ed.). (2018). Computer and cyber security: Principles, algorithm, appli­
cations, and perspectives. Boca Raton, FL: CRC Press.
Stergiou, C., Psannis, K. E., Gupta, B. B., & Ishibashi, Y. (2018). Security, privacy &
efficiency of sustainable cloud computing for big data & IoT. Sustainable
Computing: Informatics and Systems, 19, 174–184.
Tewari, A., & Gupta, B. B. (2018). Security, privacy and trust of different lay­
ers in Internet-of-Things (IoTs) framework. Future Generation Computer
Systems. https://doi.org/10.1016/j.future.2018.04.027.
Gupta, B. B., & Sheng, Q. Z. (Eds.). (2019). Machine learning for computer and cyber
security: Principle, algorithms, and practices. Boca Raton, FL: CRC Press.
Issarny, V., Bouloukakis, G., Georgantas, N., & Billet, B. (2016, October). Revisiting ser­
vice-oriented architecture for the IoT: A middleware perspective. In International
conference on service-oriented computing (pp. 3–17). Cham, Switzerland: Springer.
Olivier, F., Carlos, G., & Florent, N. (2015). New security architecture for IoT network.
Procedia Computer Science, 52, 1028–1033.
Kaur, N., & Sood, S. K. (2015). An energy-efficient architecture for the Internet of
Things (IoT). IEEE Systems Journal, 11(2), 796–805.
Duan, R., Chen, X., & Xing, T. (2011, October). A QoS architecture for IOT.
In International conference on Internet of things and 4th international confer­
ence on cyber, physical and social computing (pp. 717–720). IEEE.
Datta, S. K., Bonnet, C., & Nikaein, N. (2014, March). An IoT gateway centric archi­
tecture to provide novel M2M services. In 2014 IEEE World Forum on Internet of
Things (WF-IoT) (pp. 514–519). IEEE.
Datta, S. K., Gyrard, A., Bonnet, C., & Boudaoud, K. (2015, August). oneM2M archi­
tecture based user centric IoT application development. In 3rd international con­
ference on future Internet of things and cloud (pp. 100–107). IEEE.
Datta, S. K., Bonnet, C., Da Costa, R. P. F., & Härri, J. (2016, May). Datatweet: An
architecture enabling data-centric IoT services. In 2016 IEEE region 10 sympo­
sium (TENSYMP) (pp. 343–348). IEEE.
Catarinucci, L., De Donno, D., Mainetti, L., Palano, L., Patrono, L., Stefanizzi, M.
L., & Tarricone, L. (2015). An IoT-aware architecture for smart healthcare sys­
tems. IEEE Internet of Things Journal, 2(6), 515–526.
Gaur, A., Scotney, B., Parr, G., & McClean, S. (2015). Smart city architecture and its
applications based on IoT. Procedia Computer Science, 52, 1089–1094.
Novo, O. (2018). Blockchain meets IoT: An architecture for scalable access manage­
ment in IoT. IEEE Internet of Things Journal, 5(2), 1184–1195.
Flauzac, O., González, C., Hachani, A., & Nolot, F. (2015, March). SDN based archi­
tecture for IoT and improvement of the security. In 2015 IEEE 29th international
conference on advanced information networking and applications workshops
(pp. 688–693). IEEE.
Ojo, M., Adami, D., & Giordano, S. (2016, December). A SDN-IoT architecture with
NFV implementation. In 2016 IEEE Globecom Workshops (GC Wkshps) (pp.
1–6). IEEE.
Datta, S. K., Da Costa, R. P. F., Bonnet, C., & Härri, J. (2016, June). oneM2M archi­
tecture based IoT framework for mobile crowd sensing in smart cities. In 2016
European conference on networks and communications (EuCNC) (pp. 168–173).
IEEE.
Thota, C., Sundarasekar, R., Manogaran, G., Varatharajan, R., & Priyan, M. K. (2018).
Centralized fog computing security platform for IoT and cloud in healthcare sys­
tem. In Fog computing: Breakthroughs in research and practice (pp. 365–378).
IGI Global.
Sarkar, C., Akshay Uttama Nambi, S. N., Prasad, R. V., Rahim, A., Neisse, R., & Baldini,
G. (2014). DIAT: A scalable distributed architecture for IoT. IEEE Internet of
Things Journal, 2(3), 230–239.
Jiang, F., Fu, Y., Gupta, B. B., Lou, F., Rho, S., Meng, F., & Tian, Z. (2018). Deep
learning based multi-channel intelligent attack detection for data security. IEEE
Transactions on Sustainable Computing.
Gupta, B. B., & Agrawal, D. P. (Eds.). (2019). Handbook of research on cloud comput­
ing and big data applications in IoT. Hershey, PA: IGI Global.
Adat, V., & Gupta, B. B. (2018). Security in Internet of things: Issues, challenges, tax­
onomy, and architecture. Telecommunication Systems, 67(3), 423–441.
Plageras, A. P., Stergiou, C., Kokkonis, G., Psannis, K. E., Ishibashi, Y., Kim, B. G., &
Gupta, B. B. (2017, July). Efficient large-scale medical data (ehealth big data)
analytics in internet of things. In 2017 IEEE 19th conference on business infor­
matics (CBI) (Vol. 2, pp. 21–27). IEEE.
Gupta, B., Agrawal, D. P., & Yamaguchi, S. (Eds.). (2016). Handbook of research on
modern cryptographic solutions for computer and cyber security. Hershey, PA:
IGI Global.
Tewari, A., & Gupta, B. B. (2017). Cryptanalysis of a novel ultra-lightweight
mutual authentication protocol for IoT devices using RFID tags. Journal of
Supercomputing, 73(3), 1085–1102.
Gupta, B. B., & Quamara, M. (2018). An overview of Internet of Things (IoT):
Architectural aspects, challenges, and protocols. Concurrency and computation:
Practice and experience, e4946.
Chan, H. C. (2015). Internet of things business models. Journal of Service Science and
Management, 8(4), 552.
Dijkman, R. M., Sprenkels, B., Peeters, T., & Janssen, A. (2015). Business models for
the Internet of Things. International Journal of Information Management, 35(6),
672–678.
Fleisch, E., Weinberger, M., & Wortmann, F. (2015). Business models and the internet
of things. In Interoperability and open-source solutions for the Internet of things
(pp. 6–10). Cham, Switzerland: Springer.
Tech.pinions. https://techpinions.com/battle-of-the-tablet-business-models-amazon­
kindle-fire/10619. Accessed January 2019.
Gassmann, O., Frankenberger, K., and Csik, M. (2014). The business model navigator:
55 models that will revolutionise your business. Financial Times.
Zhang, Y., & Wen, J. (2017). The IoT electric business model: Using blockchain tech­
nology for the internet of things. Peer-to-Peer Networking and Applications,
10(4), 983–994.
Palattella, M. R., Dohler, M., Grieco, A., Rizzo, G., Torsner, J., Engel, T., & Ladid,
L. (2016). Internet of things in the 5G era: Enablers, architecture, and busi­
ness models. IEEE Journal on Selected Areas in Communications, 34(3),
510–527.
Gupta, B. B. (Ed.). (2018). Computer and cyber security: Principles, algorithm, appli­
cations, and perspectives. Boca Raton, FL: CRC Press.
Stergiou, C., Psannis, K. E., Gupta, B. B., & Ishibashi, Y. (2018). Security, privacy &
efficiency of sustainable cloud computing for big data & IoT. Sustainable
Computing: Informatics and Systems, 19, 174–184.
Tewari, A., & Gupta, B. B. (2018). Security, privacy and trust of different layers in
Internet-of-Things (IoTs) framework. Future Generation Computer Systems.
https://doi.org/10.1016/j.future.2018.04.027.
Gupta, B. B., & Sheng, Q. Z. (Eds.). (2019). Machine learning for computer and cyber
security: Principle, algorithms, and practices. Boca Raton, FL: CRC Press.
Gupta, B. B., & Agrawal, D. P. (Eds.). (2019). Handbook of research on cloud comput­
ing and big data applications in IoT. Hershey, PA: IGI Global.
Adat, V., & Gupta, B. B. (2018). Security in Internet of Things: Issues, challenges, tax­
onomy, and architecture. Telecommunication Systems, 67(3), 423–441.
Plageras, A. P., Stergiou, C., Kokkonis, G., Psannis, K. E., Ishibashi, Y., Kim, B. G., &
Gupta, B. B. (2017, July). Efficient large-scale medical data (ehealth big data)
analytics in internet of things. In 2017 IEEE 19th conference on business infor­
matics (CBI) (Vol. 2, pp. 21–27). IEEE.
Mulligan, G. (2007, June). The 6LoWPAN architecture. In Proceedings of the 4th work­
shop on embedded networked sensors (pp. 78–82). ACM.
Accettura, N., Grieco, L. A., Boggia, G., & Camarda, P. (2011, April). Performance
analysis of the RPL routing protocol. In 2011 IEEE international conference on
mechatronics (pp. 767–772). IEEE.
Basagni, S., Petrioli, C., Petroccia, R., & Spaccini, D. (2015). CARP: A channel-aware
routing protocol for underwater acoustic wireless networks. Ad Hoc Networks,
34, 92–104.
Hunkeler, U., Truong, H. L., & Stanford-Clark, A. (2008, January). MQTT-S—A pub­
lish/subscribe protocol for wireless sensor networks. In 2008 3rd international
conference on communication systems software and middleware and workshops
(COMSWARE’08) (pp. 791–798). IEEE.
Bormann, C., Castellani, A. P., & Shelby, Z. (2012). CoAP: An application protocol for
billions of tiny internet nodes. IEEE Internet Computing, 16(2), 62–67.
Drytkiewicz, W., Radusch, I., Arbanowski, S., & Popescu-Zeletin, R. (2004, October).
pREST: A REST-based protocol for pervasive systems. In 2004 IEEE interna­
tional conference on mobile ad-hoc and sensor systems (IEEE Cat. No. 04EX975)
(pp. 340–348). IEEE.
Saint-Andre, P. (2011). Extensible messaging and presence protocol (XMPP): Core.
Fremont, CA: Internet Engineering Task Force (IETF).
Vinoski, S. (2006). Advanced message queuing protocol. IEEE Internet Computing,
(6), 87–89.
Pimentel, V., & Nickerson, B. G. (2012). Communicating and displaying real-time data
with WebSocket. IEEE Internet Computing, 16(4), 45–53.
Adame, T., Bel, A., Bellalta, B., Barcelo, J., & Oliver, M. (2014). IEEE 802.11 AH:
The WiFi approach for M2M communications. IEEE Wireless Communications,
21(6), 144–152.
Decuir, J. (2013). Introducing Bluetooth smart: Part 1: A look at both classic and new
technologies. IEEE Consumer Electronics Magazine, 3(1), 12–18.
Fouladi, B., & Ghanoun, S. (2013). Security evaluation of the Z-Wave wireless proto­
col. Black Hat USA, 24, 1–2.
Logvinov, O., Kraemer, B., Adams, C., Heiles, J., Stuebing, G., Nielsen, M. L., &
Mancuso, B. (2016). Standard for an architectural framework for the Internet of
Things (IoT) IEEE p. 2413. Tech. Rep. September, 2016.
Um, T. W., Lee, G. M., & Choi, J. K. (2016). Strengthening trust in the future social­
cyber-physical infrastructure: An ITU-T perspective. IEEE Communications
Magazine, 54(9), 36–42.
Industrial Internet Consortium. Industrial Internet Consortium. Industrial Internet
Consortium official website. http://www.iiconsortium.org/. Accessed
September 14, 2016.
Villari, M., Celesti, A., Fazio, M., & Puliafito, A. (2014, November). AllJoyn Lambda:
An architecture for the management of smart environments in IoT. In 2014 inter­
national conference on smart computing workshops (pp. 9–14). IEEE.
Gupta, B. B., Gupta, S., & Chaudhary, P. (2017). Enhancing the browser-side con­
text-aware sanitization of suspicious HTML5 code for halting the DOM-based
XSS vulnerabilities in cloud. International Journal of Cloud Applications and
Computing (IJCAC), 7(1), 1–31.
Thangavel, D., Ma, X., Valera, A., Tan, H. X., & Tan, C. K. Y. (2014, April). Performance
evaluation of MQTT and CoAP via a common middleware. In 2014 IEEE ninth
international conference on intelligent sensors, sensor networks and information
processing (ISSNIP) (pp. 1–6). IEEE.
Tessel. https://tessel.io. Accessed May 2019.
http://embedded-computing.com/news-id/?50159.
Beagleboard. http://beagleboard.org. Accessed May 2019.
OpenIoT. http://www.openiot.eu. Accessed May 2019.
TUWIEN. http://www.iue.tuwien.ac.at/cse/index.php/projects/120-iotsys-internet-of­
things-integration-middleware.html. Accessed May 2019.
Contiki-os. http://www.contiki-os.org. Accessed March 2019.
Raspberrypi. https://www.raspberrypi.org/downloads/raspbian/. Accessed March 2019.
Nodered. https://nodered.org. Accessed March 2019.
M2Mlabs. http://www.m2mlabs.com. Accessed March 2019.
Platformio. https://platformio.org. Accessed March 2019.
Arduino. https://www.arduino.cc. Accessed April 2019.
Devicehive. https://devicehive.com. Accessed April 2019.
IoT.Eclipse. https://iot.eclipse.org. Accessed April 2019.
ThingSpeak. https://thingspeak.com. Accessed April 2019.
Home Assistant. https://www.home-assistant.io. Accessed April 2019.
OpenSCADA. http://oscada.org. Accessed April 2019.
LinkedSensorData. http://wiki.knoesis.org/index.php/LinkedSensorData. Accessed
March 2019.
https://www.microsoft.com/en-us/download/details.aspx?id=52367&from=https%3A
%2F%2Fresearch.microsoft.com%2Fen-us%2Fdownloads%2Fb16d359d-d164­
469e-9fd4-daa38f2b2e13%2F.
Internet of People, Things and Computers. http://nptlab.di.unimi.it. Accessed April
2019.
Eurostat. https://ec.europa.eu/eurostat. Accessed April 2019.
National Land Numeric Information. http://nlftp.mlit.go.jp/ksj-e/jpgis/datalist/
KsjTmplt-S05-d.html. Accessed September 2018.
Crawdad. https://crawdad.org. Accessed April 2019.
UCI Machine Learning Repository. https://archive.ics.uci.edu/ml/index.php. Accessed
April 2019.
Kaggle. https://www.kaggle.com. Accessed April 2019.
Stergiou, C., Psannis, K. E., Gupta, B. B., & Ishibashi, Y. (2018). Security, privacy &
efficiency of sustainable cloud computing for big data & IoT. Sustainable
Computing: Informatics and Systems, 19, 174–184.
Tewari, A., & Gupta, B. B. (2018). Security, privacy and trust of different layers in
Internet-of-Things (IoTs) framework. Future Generation Computer Systems.
https://doi.org/10.1016/j.future.2018.04.027.
Gupta, B. B., & Sheng, Q. Z. (Eds.). (2019). Machine learning for computer and cyber
security: Principle, algorithms, and practices. Boca Raton, FL: CRC Press.
Gupta, B. B., & Quamara, M. (2018). An overview of Internet of Things (IoT):
Architectural aspects, challenges, and protocols. Concurrency and Computation:
Practice and Experience, e4946.
Gupta, B. B., & Agrawal, D. P. (Eds.). (2019). Handbook of research on cloud comput­
ing and big data applications in IoT. Hershey, PA: IGI Global.
Adat, V., & Gupta, B. B. (2018). Security in Internet of Things: Issues, challenges, tax­
onomy, and architecture. Telecommunication Systems, 67(3), 423–441.
Plageras, A. P., Stergiou, C., Kokkonis, G., Psannis, K. E., Ishibashi, Y., Kim, B. G., &
Gupta, B. B. (2017, July). Efficient large-scale medical data (ehealth big data)
analytics in Internet of things. In 2017 IEEE 19th conference on business infor­
matics (CBI) (Vol. 2, pp. 21–27). IEEE.
Fortino, G., Savaglio, C., Palau, C. E., de Puga, J. S., Ganzha, M., Paprzycki, M.,... &
Llop, M. (2018). Towards multi-layer interoperability of heterogeneous IoT plat­
forms: The INTER-IoT approach. In Integration, interconnection, and interoper­
ability of IoT systems (pp. 199–232). Cham, Switzerland: Springer.
Chen, S., Xu, H., Liu, D., Hu, B., & Wang, H. (2014). A vision of IoT: Applications,
challenges, and opportunities with china perspective. IEEE Internet of Things
Journal, 1(4), 349–359.
Kanuparthi, A., Karri, R., & Addepalli, S. (2013, November). Hardware and embedded
security in the context of internet of things. In Proceedings of the 2013 ACM
workshop on security, privacy & dependability for cyber vehicles (pp. 61–64).
ACM.
Taivalsaari, A., & Mikkonen, T. (2017). A roadmap to the programmable world:
Software challenges in the IoT era. IEEE Software, 34(1), 72–80.
Zhang, Z. K., Cho, M. C. Y., Wang, C. W., Hsu, C. W., Chen, C. K., & Shieh, S. (2014,
November). IoT security: Ongoing challenges and research opportunities.
In 2014 IEEE 7th international conference on service-oriented computing and
applications (pp. 230–234). IEEE.
Christin, D., Reinhardt, A., Mogre, P. S., & Steinmetz, R. (2009). Wireless sensor net­
works and the internet of things: Selected challenges. Proceedings of the 8th GI/
ITG KuVS Fachgespräch Drahtlose sensornetze (pp. 31–34).
Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2014, August). On the integration
of cloud computing and Internet of things. In 2014 international conference on
future Internet of Things and cloud (pp. 23–30). IEEE.
Mahmoud, R., Yousuf, T., Aloul, F., & Zualkernan, I. (2015, December). Internet of
things (IoT) security: Current status, challenges and prospective measures.
In 2015 10th international conference for Internet Technology and secured trans­
actions (ICITST) (pp. 336–341). IEEE.
Gupta, B. B., Gupta, S., & Chaudhary, P. (2017). Enhancing the browser-side con­
text-aware sanitization of suspicious HTML5 code for halting the DOM-based
XSS vulnerabilities in cloud. International Journal of Cloud Applications and
Computing (IJCAC), 7(1), 1–31.
Gupta, S., & Gupta, B. B. (2015, May). PHP-sensor: A prototype method to dis­
cover workflow violation and XSS vulnerabilities in PHP web applications.
In Proceedings of the 12th ACM international conference on computing frontiers
(p. 59). ACM.
Gupta, S., & Gupta, B. B. (2015). BDS: Browser dependent XSS sanitizer. In Handbook
of research on securing cloud-based databases with biometric applications (pp.
174–191). Hershey, PA: IGI Global.
Gupta, S., & Gupta, B. B. (2016). JS‐SAN: Defense mechanism for HTML5‐based
web applications against JavaScript code injection vulnerabilities. Security and
Communication Networks, 9(11), 1477–1495.
Weber, R. H. (2010). Internet of Things–New security and privacy challenges. Computer
Law & Security Review, 26(1), 23–30.
Abera, T., Asokan, N., Davi, L., Koushanfar, F., Paverd, A., Sadeghi, A. R., &
Tsudik, G. (2016, June). Things, trouble, trust: On building trust in IoT
systems. In Proceedings of the 53rd annual design automation conference
(p. 121). ACM.
Banafa, A. (2017). Three major challenges facing IoT. IEEE IoT Newsletter.
Samuel, S. S. I. (2016, March). A review of connectivity challenges in IoT-smart home.
In 2016 3rd MEC international conference on big data and smart city (ICBDSC)
(pp. 1–4). IEEE.
Brass, I., Tanczer, L., Carr, M., & Blackstock, J. (2017). Regulating IoT: Enabling
or disabling the capacity of the Internet of Things? Risk & Regulation, 33,
12–15.
Ren, J., Guo, H., Xu, C., & Zhang, Y. (2017). Serving at the edge: A scalable IoT archi­
tecture based on transparent computing. IEEE Network, 31(5), 96–105.
Sheng, Z., Yang, S., Yu, Y., Vasilakos, A. V., McCann, J. A., & Leung, K. K. (2013).
A survey on the IETF protocol suite for the Internet of Things: Standards, chal­
lenges, and opportunities. IEEE Wireless Communications, 20(6), 91–98.
Reyna, A., Martín, C., Chen, J., Soler, E., & Díaz, M. (2018). On blockchain and its
integration with IoT. Challenges and opportunities. Future Generation Computer
Systems, 88, 173–190.
Breivold, H. P., & Sandström, K. (2015, December). Internet of things for industrial
automation--challenges and technical solutions. In 2015 IEEE International
Conference on Data Science and Data Intensive Systems (pp. 532–539).
IEEE.
IBM. http://www-01.ibm.com/software/data/bigdata. Accessed May 2019.
Barnaghi, P., Sheth, A., & Henson, C. (2013). From data to actionable knowledge: Big
data challenges in the web of things. IEEE Intelligent Systems, 28(6), 6–11.
Stergiou, C., Psannis, K. E., Gupta, B. B., & Ishibashi, Y. (2018). Security, privacy &
efficiency of sustainable cloud computing for big data & IoT. Sustainable
Computing: Informatics and Systems, 19, 174–184.
Tewari, A., & Gupta, B. B. (2018). Security, privacy and trust of different layers in
Internet-of-Things (IoTs) framework. Future Generation Computer Systems.
https://doi.org/10.1016/j.future.2018.04.027.
Gupta, B. B., & Sheng, Q. Z. (Eds.). (2019). Machine learning for computer and cyber
security: Principle, algorithms, and practices. Boca Raton, FL: CRC Press.
Gupta, B. B., & Agrawal, D. P. (Eds.). (2019). Handbook of research on cloud comput­
ing and big data applications in IoT. Hershey, PA: IGI Global.
Addo-Tenkorang, R., & Helo, P. T. (2016). Big data applications in operations/supply­
chain management: A literature review. Computers & Industrial Engineering, 101,
528–543.
Adat, V., & Gupta, B. B. (2018). Security in Internet of Things: Issues, challenges, tax­
onomy, and architecture. Telecommunication Systems, 67(3), 423–441.
Plageras, A. P., Stergiou, C., Kokkonis, G., Psannis, K. E., Ishibashi, Y., Kim, B. G., &
Gupta, B. B. (2017, July). Efficient large-scale medical data (ehealth big data)
analytics in Internet of things. In 2017 IEEE 19th conference on business infor­
matics (CBI) (Vol. 2, pp. 21–27). IEEE.
Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., & Khan, S. U. (2015).
The rise of “big data” on cloud computing: Review and open research issues.
Information Systems, 47, 98–115.
Gupta, B. B., Gupta, S., & Chaudhary, P. (2017). Enhancing the browser-side con­
text-aware sanitization of suspicious HTML5 code for halting the DOM-based
XSS vulnerabilities in cloud. International Journal of Cloud Applications and
Computing (IJCAC), 7(1), 1–31.
Gou, Z., Yamaguchi, S., & Gupta, B. B. (2017). Analysis of various secu­
rity issues and challenges in cloud computing environment: A survey.
In Identity theft: Breakthroughs in research and practice (pp. 221–247).
Hershey, PA: IGI Global.
Gupta, B. B., Yamaguchi, S., & Agrawal, D. P. (2018). Advances in security and
privacy of multimedia big data in mobile and cloud computing. Multimedia
Tools and Applications, 77(7), 9203–9208.
Gupta, B. B., & Badve, O. P. (2017). Taxonomy of DoS and DDoS attacks and
desirable defense mechanism in a cloud computing environment. Neural
Computing and Applications, 28(12), 3655–3682.
Chen, H., Chiang, R. H., & Storey, V. C. (2012). Business intelligence and ana­
lytics: From big data to big impact. MIS Quarterly, 36(4), 1165–1188.
Sadler, J. M., Ames, D. P., & Khattar, R. (2016). A recipe for standards-based
data sharing using open source software and low-cost electronics. Journal
of Hydroinformatics, 18(2), 185–197.
Talend. https://www.talend.com/resources/iot-data/. Accessed May 2019.
Perera, C., Ranjan, R., Wang, L., Khan, S. U., & Zomaya, A. Y. (2015). Big data
privacy in the Internet of things era. IT Professional, 17(3), 32–39.
Patil, H. K., & Seshadri, R. (2014, June). Big data security and privacy issues
in healthcare. In 2014 IEEE international congress on big data (pp. 762–
765). IEEE.
Mashhadi, A., Kawsar, F., & Acer, U. G. (2014, March). Human data interaction
in IoT: The ownership aspect. In 2014 IEEE world forum on Internet of
Things (WF-IoT) (pp. 159–162). IEEE.
Bodin, W., Jaramillo, D., Redman, J., & Thorson, D. (2007). Method for data man­
agement and data rendering for disparate data types. U.S. Patent Application
No. 11/226,744.
Bin, S., Yuan, L., & Xiaoyi, W. (2010, April). Research on data mining mod­
els for the Internet of things. In 2010 international conference on image
analysis and signal processing (pp. 127–132). IEEE.
Guan, Z., Zhang, Y., Wu, L., Wu, J., Li, J., Ma, Y., & Hu, J. (2019). APPA:
An anonymous and privacy preserving data aggregation scheme for fog-
enhanced IoT. Journal of Network and Computer Applications, 125,
82–92.
Tonyali, S., Akkaya, K., Saputro, N., Uluagac, A. S., & Nojoumian, M. (2018).
Privacy-preserving protocols for secure and reliable data aggregation
in IoT-enabled smart metering systems. Future Generation Computer
Systems, 78, 547–557.
Ma, M., Wang, P., & Chu, C. H. (2013, August). Data management for Internet
of things: Challenges, approaches and opportunities. In 2013 IEEE inter­
national conference on green computing and communications and IEEE
Internet of Things and IEEE cyber, physical and social computing (pp.
1144–1151). IEEE.
Al-Jarrah, O. Y., Yoo, P. D., Muhaidat, S., Karagiannidis, G. K., & Taha,
K. (2015). Efficient machine learning for big data: A review. Big Data
Research, 2(3), 87–93.
O’Leary, D. E. (2013). Artificial intelligence and big data. IEEE Intelligent
Systems, 28(2), 96–99.
Cdlbiz. https://www.cdlbiz.com/uploads/5/0/1/6/50168079/sap_whitepaper_edge.
pdf. Accessed May 2019.
Protiviti. https://www.protiviti.com/US-en/insights/evolution-autonomous­
vehicles. Accessed April 2018.
Ray, S. (2017, November). Transportation security in the era of autonomous
vehicles: Challenges and practice. In Proceedings of the 36th international
conference on computer-aided design (pp. 1034–1038). IEEE Press.
Plathottam, S. J., & Ranganathan, P. (2018, January). Next generation distrib­
uted and networked autonomous vehicles. In 2018 10th International
Conference on Communication Systems & Networks (COMSNETS) (pp.
577–582). IEEE.
Tewari, A., & Gupta, B. B. (2018). Security, privacy and trust of different lay­
ers in Internet-of-Things (IoTs) framework. Future Generation Computer
Systems. https://doi.org/10.1016/j.future.2018.04.027.
Gupta, B. B., & Agrawal, D. P. (Eds.). (2019). Handbook of research on cloud
computing and big data applications in IoT. Hershey, PA: IGI Global.
Adat, V., & Gupta, B. B. (2018). Security in Internet of Things: Issues, challenges,
taxonomy, and architecture. Telecommunication Systems, 67(3), 423–441.
Gupta, B. B. (Ed.). (2018). Computer and cyber security: Principles, algorithm,
applications, and perspectives. Boca Raton, FL: CRC Press.
Gupta, B., Agrawal, D. P., & Yamaguchi, S. (Eds.). (2016). Handbook of research
on modern cryptographic solutions for computer and cyber security.
Hershey, PA: IGI global.
McGehee, D. V., Brewer, M., Schwarz, C., & Smith, B. W. (2016). Review of
automated vehicle technology: Policy and implementation implications.
Ames, IA: Iowa Department of Transportation.
Dominic, D., Chhawri, S., Eustice, R. M., Ma, D., & Weimerskirch, A.
(2016, October). Risk assessment for cooperative automated driving.
In Proceedings of the 2nd ACM workshop on cyber-physical systems secu­
rity and privacy (pp. 47–58). ACM.
Dey, K. C., Rayamajhi, A., Chowdhury, M., Bhavsar, P., & Martin, J. (2016).
Vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) commu­
nication in a heterogeneous wireless network–Performance evaluation.
Transportation Research Part C: Emerging Technologies, 68, 168–184.
Olariu, C., McLoughlin, S., & Thompson, G. (2017, November). Cloud-support
for collaborative services in connected cars scenarios. In Vehicular net­
working conference (VNC) (pp. 255–258). IEEE.
Rahimian, P., O’Neal, E. E., Zhou, S., Plumert, J. M., & Kearney, J. K. (2018).
Harnessing vehicle-to-pedestrian (V2P) communication technol­
ogy: Sending traffic warnings to texting pedestrians. Human Factors,
0018720818781365.
Giordani, M., Zanella, A., Higuchi, T., Altintas, O., & Zorzi, M. (2018).
Performance study of LTE and mmWave in vehicle-to-network communi­
cations. arXiv preprint arXiv:1805.04271.
Bai, X., & Moradi-Pari, E. (2018). U.S. Patent Application No. 15/942,939.
Trepagnier, P. G., Nagel, J. E., Kinney, P. M., Dooner, M. T., Wilson, B. M.,
Schneider Jr, C. R., & Goeller, K. B. (2011). U.S. Patent No. 8,050,863.
Washington, DC: U.S. Patent and Trademark Office.
Gong, S., Zhou, A., Wang, J., Li, T., & Peeta, S. (2018). Cooperative adaptive
cruise control for a platoon of connected and autonomous vehicles consider­
ing dynamic information flow topology. arXiv preprint arXiv:1807.02224.
Branson, E. (2018). U.S. Patent Application No. 15/714,750.
Gao, H., Cheng, B., Wang, J., Li, K., Zhao, J., & Li, D. (2018). Object clas­
sification using CNN-based fusion of vision and LIDAR in autonomous
vehicle environment. IEEE Transactions on Industrial Informatics, 14(9),
4224–4231.
Chesworth, A. A., & Huddleston, J. (2018, January). Precision optical components
for lidar systems developed for autonomous vehicles. In Next-generation
optical communication: Components, sub-systems, and systems VII (Vol.
10561, p. 105610J). International Society for Optics and Photonics.
Gleaves, M., Ludlow, P., Christie, S., & Liu, P. (2018, May). Advanced radar
for autonomous vehicles and degraded visual environments. In Society of
photo-optical instrumentation engineers (SPIE) conference series (Vol.
10634).
Zofka, M. R., Essinger, M., Fleck, T., Kohlhaas, R., & Zöllner, J. M. (2018, May).
The sleepwalker framework: Verification and validation of autonomous
vehicles by mixed reality LiDAR stimulation. In 2018 IEEE International
Conference on Simulation, Modeling, and Programming for Autonomous
Robots (SIMPAR) (pp. 151–157). IEEE.
Cui, Y., & Ge, S. S. (2003). Autonomous vehicle positioning with GPS in urban
canyon environments. IEEE Transactions on Robotics and Automation,
19(1), 15–25.
Liu, Y., Fan, X., Lv, C., Wu, J., Li, L., & Ding, D. (2018). An innovative infor­
mation fusion method with adaptive Kalman filter for integrated INS/
GPS navigation of autonomous vehicles. Mechanical Systems and Signal
Processing, 100, 605–616.
Jun, M., & Markel, A. J. (2017). Infrastructure-Based Sensors Augmenting
Efficient Autonomous Vehicle Operations: Preprint (No. NREL/CP-5400­
62390). Golder, CO: National Renewable Energy Lab (NREL).
Vidhya, D. S., Rebelo, D. P., D’Silva, C. J., Fernandes, L. W., & Costa, C. J.
(2016). Obstacle detection using ultrasonic sensors. International Journal
for Innovative Research in Science & Technology, 2(11), 316–320.
Li, S. E., Li, G., Yu, J., Liu, C., Cheng, B., Wang, J., & Li, K. (2018). Kalman
filter-based tracking of moving objects using linear ultrasonic sensor
array for road vehicles. Mechanical Systems and Signal Processing, 98,
173–189.
Wang, G., Chong, P. H. J., Seet, B. C., & Zhang, K. (2018, July). The vehicle
collision warning method based on the information fusion of GPS/INS and
DSRC. In IOP conference series: Materials science and engineering (Vol.
394, No. 3, p. 032110). Bristol: IOP Publishing.
Elie, L. D., & Rhode, D. S. (2018). U.S. Patent Application No. 15/793,888.
Cao, T., Xiang, Z. Y., & Liu, J. L. (2015). Perception in disparity: An effi­
cient navigation framework for autonomous vehicles with stereo cam­
eras. IEEE Transactions on Intelligent Transportation Systems, 16(5),
2935–2948.
Park, E. S., Yu, C. H., & Choi, J. W. (2015). Development of a lateral control
system for autonomous vehicles using data fusion of vision and IMU sen­
sors with field tests. Journal of Institute of Control, Robotics and Systems,
21(3), 179–186.
Rupp, M. Y., Engelman, G. H., Miller, A. M., Zwicky, T. D., Tellis, L., &
Stephenson, R. L. (2015). U.S. Patent No. 9,079,587. Washington, DC:
U.S. Patent and Trademark Office.
Marin-Plaza, P., Hussein, A., Martin, D., & Escalera, A. D. L. (2018).
Global and local path planning study in a ROS-based research plat­
form for autonomous vehicles. Journal of Advanced Transportation,
2018, 1–10.
Burgard, W., Franke, U., Enzweiler, M., & Trivedi, M. (2016). The mobile rev­
olution-machine intelligence for autonomous vehicles (Dagstuhl Seminar
15462). In Dagstuhl Reports (Vol. 5, No. 11). Schloss Dagstuhl-Leibniz-
Zentrum fuer Informatik.
Seif, H. G., & Hu, X. (2016). Autonomous driving in the iCity—HD maps as
a key challenge of the automotive industry. Engineering, 2(2), 159–162.
Maturana, D., Chou, P. W., Uenoyama, M., & Scherer, S. (2018). Real-time
semantic mapping for autonomous off-road navigation. In Field and
Service Robotics (pp. 335–350). Cham, Switzerland: Springer.
Li, B., Yang, L., Xiao, J., Valde, R., Wrenn, M., & Leflar, J. (2018). Collaborative
mapping and autonomous parking for multi-story parking garage. IEEE
Transactions on Intelligent Transportation Systems, 19(5), 1629–1639.
Lin, Y. H., Huang, L. C., Chen, S. Y., & Yu, C. M. (2018). The optimal route
planning for inspection task of autonomous underwater vehicle composed
of MOPSO-based dynamic routing algorithm in currents. Applied Ocean
Research, 75, 178–192.
Durst, P. J., Goodin, C. T., Bethel, C. L., Anderson, D. T., Carruth, D. W., & Lim,
H. (2018). A perception-based fuzzy route planning algorithm for autono­
mous unmanned ground vehicles. Unmanned Systems.
McAllister, R., Gal, Y., Kendall, A., Van Der Wilk, M., Shah, A., Cipolla, R., &
Weller, A. V. (2017, August). Concrete problems for autonomous vehi­
cle safety: Advantages of Bayesian deep learning. International Joint
Conferences on Artificial Intelligence.
Wuthishuwong, C., Traechtler, A., & Bruns, T. (2015). Safe trajectory planning
for autonomous intersection management by using vehicle to infrastruc­
ture communication. EURASIP Journal on Wireless Communications and
Networking, 2015(1), 33.
González, D., Pérez, J., Milanés, V., & Nashashibi, F. (2016). A review of
motion planning techniques for automated vehicles. IEEE Transactions on
Intelligent Transportation Systems, 17(4), 1135–1145.
Zhang, C., Hu, J., Qiu, J., Yang, W., Sun, H., & Chen, Q. (2018). A novel fuzzy
observer-based steering control approach for path tracking in autonomous
vehicles. IEEE Transactions on Fuzzy Systems, 27(2), 278–290.
Schambers, A., Eavis-O’Quinn, M., Roberge, V., & Tarbouchi, M. (2018, April).
Route planning for electric vehicle efficiency using the Bellman-Ford
algorithm on an embedded GPU. In 2018 4th International Conference on
Optimization and Applications (ICOA) (pp. 1–6). IEEE.
Maurer, M., Gerdes, J. C., Lenz, B., & Winner, H. (2016). Autonomous driving.
Berlin, Germany: Springer.
Greenblatt, J. B., & Saxena, S. (2015). Autonomous taxis could greatly reduce
greenhouse-gas emissions of US light-duty vehicles. Nature Climate
Change, 5(9), 860.
Statista. https://www.statista.com/statistics/428692/projected-size-of-global­
autonomous-vehicle-market-by-vehicle-type/. Accessed August 2018.
Litman, T. (2017). Autonomous vehicle implementation predictions. Victoria,
Canada: Victoria Transport Policy Institute.
Techemergence. https://www.techemergence.com/self-driving-car-timeline­
themselves-top-11-automakers/. Accessed August 2018.
Gartner Survey Reveals 55 Percent of Respondents Will Not Ride in a Fully
Autonomous Vehicle. https://www.gartner.com/newsroom/id/3790963.
Accessed November 2017.
Zhang, X., Gao, H., Guo, M., Li, G., Liu, Y., & Li, D. (2016). A study on key tech­
nologies of unmanned driving. CAAI Transactions on Intelligence Technology,
1(1), 4–13.
Bertozzi, M., Broggi, A., Cellario, M., Fascioli, A., Lombardi, P., & Porta, M. (2002).
Artificial vision in road vehicles. Proceedings of the IEEE, 90(7), 1258–1271.
Chen, Y., Peng, H., & Grizzle, J. (2018). Obstacle avoidance for low-speed
autonomous vehicles with barrier function. IEEE Transactions on Control
Systems Technology, 26(1), 194–206.
Guerrero-Ibanez, J. A., Zeadally, S., & Contreras-Castillo, J. (2015). Integration
challenges of intelligent transportation systems with connected vehicle,
cloud computing, and Internet of Things technologies. IEEE Wireless
Communications, 22(6), 122–128.
Yan, G., Wen, D., Olariu, S., & Weigle, M. C. (2013). Security challenges in vehic­
ular cloud computing. IEEE Transactions on Intelligent Transportation
Systems, 14(1), 284–294.
Gerla, M., Lee, E. K., Pau, G., & Lee, U. (2014, March). Internet of vehicles:
From intelligent grid to autonomous cars and vehicular clouds. In Internet
of Things (WF-IoT), 2014 IEEE world forum on (pp. 241–246). IEEE.
Muller, U., Ben, J., Cosatto, E., Flepp, B., & Cun, Y. L. (2006). Off-road obstacle
avoidance through end-to-end learning. In Advances in neural information
processing systems (pp. 739–746).
Xu, H., Gao, Y., Yu, F., & Darrell, T. (2017). End-to-end learning of driving mod­
els from large-scale video datasets. arXiv preprint.
Bojarski, M., Del Testa, D., Dworakowski, D., Firner, B., Flepp, B., Goyal, P., &
Zhang, X. (2016). End to end learning for self-driving cars. arXiv preprint
arXiv:1604.07316.
Karnouskos, S., & Kerschbaum, F. (2018). Privacy and integrity considerations
in hyperconnected autonomous vehicles. Proceedings of the IEEE, 106(1),
160–170.
Amoozadeh, M., Raghuramu, A., Chuah, C. N., Ghosal, D., Zhang, H. M.,
Rowe, J., & Levitt, K. (2015). Security vulnerabilities of connected vehicle
streams and their impact on cooperative driving. IEEE Communications
Magazine, 53(6), 126–132.
Thing, V. L., & Wu, J. (2016, December). Autonomous vehicle security: A tax­
onomy of attacks and defences. In 2016 IEEE International Conference
on Internet of Things (iThings) and IEEE green computing and commu­
nications (GreenCom) and IEEE cyber, physical and social computing
(CPSCom) and IEEE smart data (SmartData) (pp. 164–170). IEEE.
Petit, J., & Shladover, S. E. (2015). Potential cyberattacks on automated vehicles.
IEEE Transactions on Intelligent Transportation Systems, 16(2), 546–556.
Amodei, D., Olah, C., Steinhardt, J., Christiano, P., Schulman, J., & Mané, D.
(2016). Concrete problems in AI safety. arXiv preprint arXiv:1606.06565.
Rodrigues, M., McGordon, A., Gest, G., & Marco, J. (2017, April). Developing
and testing of control software framework for autonomous ground vehicle.
In 2017 IEEE International Conference on Autonomous Robot Systems
and Competitions (ICARSC) (pp. 4–10). IEEE.
Lu, J., Sibai, H., Fabry, E., & Forsyth, D. (2017). No need to worry about adver­
sarial examples in object detection in autonomous vehicles. arXiv preprint
arXiv:1707.03501.
George, N., & Thomas, J. (2018, August). Authenticating communication of
autonomous vehicles with artificial intelligence. In IOP Conference
Series: Materials Science and Engineering (Vol. 396, No. 1, p. 012017).
Bristol: IOP Publishing.
Siau, K., & Wang, W. (2018). Building trust in artificial intelligence, machine
learning, and robotics. Cutter Business Technology Journal, 31(2), 47–53.
Ali Alheeti, K. M., & McDonald-Maier, K. (2018). Intelligent intrusion detec­
tion in external communication systems for autonomous vehicles. Systems
Science & Control Engineering, 6(1), 48–56.
Lee, E., Lee, E. K., Gerla, M., & Oh, S. Y. (2014). Vehicular cloud network­
ing: Architecture and design principles. IEEE Communications Magazine,
52(2), 148–155.
Joy, J., Rabsatt, V., & Gerla, M. (2018). Internet of Vehicles: Enabling safe, secure,
and private vehicular crowdsourcing. Internet Technology Letters, 1(1), e16.
Hamida, E. B., Noura, H., & Znaidi, W. (2015). Security of cooperative intel­
ligent transport systems: Standards, threats analysis and cryptographic
countermeasures. Electronics, 4(3), 380–423.
Lohachab, A. (2018). Using quantum key distribution and ECC for secure
inter-device authentication and communication in IoT infrastructure. In
Proceedings of 3rd International Conference on Internet of Things and
Connected Technologies (ICIoTCT) (pp. 26–27).
Wyglinski, A. M., Huang, X., Padir, T., Lai, L., Eisenbarth, T. R., &
Venkatasubramanian, K. (2013). Security of autonomous systems employ­
ing embedded computing and sensors. IEEE Micro, 33(1), 80–86.
Gupta, B. B., & Quamara, M. (2018). An identity based access control and mutual
authentication framework for distributed cloud computing services in IoT
environment using smart cards. Procedia Computer Science, 132, 189–197.
Cheah, M., Shaikh, S. A., Haas, O., & Ruddle, A. (2017). Towards a system­
atic security evaluation of the automotive Bluetooth interface. Vehicular
Communications, 9, 8–18.
Glancy, D. J. (2012). Privacy in autonomous vehicles. Santa Clara Law Review,
52, 1171.
Sherif, A. B., Rabieh, K., Mahmoud, M. M., & Liang, X. (2017). Privacy-
preserving ride sharing scheme for autonomous vehicles in big data era.
IEEE Internet of Things Journal, 4(2), 611–618.
Taeihagh, A., & Lim, H. S. M. (2018). Governing autonomous vehicles:
Emerging responses for safety, liability, privacy, cybersecurity, and indus­
try risks. Transport Reviews, 1–26.
CSRC 2017 Report. http://corporatenews.pressroom.toyota.com/releases/
csrc+2017+report.htm. Accessed December 2017.
Victor, T., Rothoff, M., Coelingh, E., Ödblom, A., & Burgdorf, K. (2017). When
autonomous vehicles are introduced on a larger scale in the road trans­
port system: The Drive Me project. In Automated Driving (pp. 541–546).
Cham: Springer International Publishing.
Automated Driving – SAE International. https://www.smmt.co.uk/wp-content/
uploads/sites/2/automated_driving.pdf. Accessed December 2017.
Johnson-Roberson, M., Barto, C., Mehta, R., Sridhar, S. N., Rosaen, K., &
Vasudevan, R. (2017, May). Driving in the matrix: Can virtual worlds
replace human-generatedannotations for real world tasks? In 2017 IEEE
International Conference on Robotics and Automation (ICRA) (pp. 746–
753). IEEE.
Chater, N., Misyak, J., Watson, D., Griffiths, N., & Mouzakitis, A. (2018).
Negotiating the traffic: Can cognitive science help make autonomous vehi­
cles a reality? Trends in Cognitive Sciences, 22(2), 93–95.
Liu, H., Zhang, Y., & Yang, T. (2018). Blockchain-enabled security in electric
vehicles cloud and edge computing. IEEE Network, 32(3), 78–83.
Kim, T., & Kim, S. (2018). Pedestrian detection at night time in FIR domain:
Comprehensive study about temperature and brightness and new bench­
mark. Pattern Recognition, 79, 44–54.
Daziano, R. A., Sarrias, M., & Leard, B. (2017). Are consumers willing to pay
to let cars drive for them? Analyzing response to autonomous vehicles.
Transportation Research Part C: Emerging Technologies, 78, 150–164.
Takefuji, Y. (2018). Connected vehicle security vulnerabilities [commentary].
IEEE Technology and Society Magazine, 37(1), 15–18.
Barabás, I., Todoruţ, A., Cordoş, N., & Molea, A. (2017, October). Current
challenges in autonomous driving. In IOP Conference Series: Materials
Science and Engineering (Vol. 252, No. 1, p. 012096). Bristol: IOP
Publishing.
Dokic, J., Müller, B., & Meyer, G. (2015). European roadmap smart systems
for automated driving. European Technology Platform on Smart Systems
Integration, 2015, 1–39.
Hevelke, A., & Nida-Rümelin, J. (2015). Responsibility for crashes of autono­
mous vehicles: An ethical analysis. Science and Engineering Ethics, 21(3),
619–630.
Vishnukumar, H. J., Butting, B., Müller, C., & Sax, E. (2017, September).
Machine learning and deep neural network—Artificial intelligence core
for lab and real-world test and validation for ADAS and autonomous vehi­
cles: AI for efficient and quality test and validation. In Intelligent systems
conference (IntelliSys), 2017 (pp. 714–721). IEEE.
Schoitsch, E., Schmittner, C., Ma, Z., & Gruber, T. (2016). The need for safety
and cyber-security co-engineering and standardization for highly auto­
mated automotive vehicles. In Advanced microsystems for automotive
applications 2015 (pp. 251–261). Cham, Switzerland: Springer.
University of Michigan. Assessing risk: Identifying and analyzing cybersecurity
threats to automated vehicles. https://www.clickondetroit.com/all-about­
ann-arbor/2018/01/04/university-of-michigans-mcity-releases-threat­
identifying-tool-for-automated-vehicles/. Accessed July 2018.
Fagnant, D. J., & Kockelman, K. (2015). Preparing a nation for autonomous vehi­
cles: Opportunities, barriers and policy recommendations. Transportation
Research Part A: Policy and Practice, 77, 167–181.

You might also like