1. L2VPN (L2TPv3) (2020). https://www.yamaha.com/products/en/network/techdocs/vpn/l2tpv3/
2. Alaba, F.A., Othman, M., Hashem, I.A.T., Alotaibi, F.: Internet of things security: a survey. J. Netw. Comput. Appl. 88, 10–28 (2017)
3. Bello, O., Zeadally, S., Badra, M.: Network layer inter-operation of device-to-device communication technologies in internet of things (IoT). Ad Hoc Netw. 57, 52–62 (2017)
4. Bradley, J., Loucks, J., Noronha, A., Macaulay, J., Buckalew, L.: Internet of everything (IoE) (2013). https://www.ciosummits.com/IoE_-_Top_10_Insights_from_Cisco_s_IoE_Value_Index_Survey.pdf
5. Chen, L.: Nist special publication 800–108. Recommendation for Key Derivation Using Pseudorandom Functions (Revised) (2009). http://csrc.nist.gov/publications/nistpubs/800-108/sp800-108.pdf