1. Z.-K. Zhang, M. Cheng Yi Cho, C.-W. Wang, C.-W. Hsu, C.-K. Chen, S. Shieh, IoT security: ongoing challenges and research opportunities, in 2014 IEEE 7th International Conference on Service-oriented Computing and Applications (IEEE, 2014), pp. 230–234
2. A. Dorri, S.S. Kanhere, R. Jurdak, P. Gauravaram, Blockchain for IoT security and privacy: the case study of a smart home, in 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops) (IEEE, 2017), pp. 618–623
3. J. Cache, V. Liu, J. Wright, Hacking Exposed Wireless: Wireless Security Secrets and Solutions (McGraw-Hill, 2007)
4. M. Warren, S. Leitch, Social engineering and its impact via the internet, in Proceedings of the 4th Australian Information Security Management Conference (Australian Information Security Management, 2006), pp. 184–189
5. J. Katz, A.J. Menezes, P.C. Van Oorschot, S.A. Vanstone, Handbook of Applied Cryptography (CRC Press, 1996)