1. M. A. Ferrag, L. A. Maglaras, H. Janicke, J. Jiang, and L. Shu, Security and Communication Networks (2017).
2. M. Saadeh, A. Sleit, M. Qatawneh, W. Almobaideen, “Authentication techniques for the internet ofthings: A survey,” in 2016 Cybersecurity and Cyberforensics Conference (CCC),(2016) 28–34.
3. R. S. M. Joshitta, L. Arockiam, International Journal of Information Technology and Mechanical Engineering, 2 (2016) 1–8.
4. D. Sey PeerJ Preprints 6 2018 p. e26474v1