1. Yang, Y., Wu, L., Yin, G., Li, L., Zhao, H.: A survey on security and privacy issues in IoT. IEEE IoT J. 4(5), 1250–1258 (2017)
2. Symantec Security Center: Internet Security Threat Report. https://www.symantec.com/security-center/threat-report. Accessed 26 Jan 2021
3. Information and Technology Market Research Report: Global Internet of Things (IoT) Market. https://www.forbes.com/sites/louiscolumbus/2017/12/10/2017-roundup-of-internet-of-things-forecasts/#391d26e21480. Accessed 26 Jan 2021
4. Wang, C.F., Shih, J.D.: Pan: a network lifetime enhancement method for sink relocation and its analysis in WSNs. IEEE Sens. J. 14(6), 1932–1943 (2014)
5. Xu, L., Collier, R.: A survey of clustering techniques in WSNs and consideration of the challenges of applying such to 5G IoT scenarios. IEEE IoT J. 4(5), 1229–1249 (2017)