1. “rfc3174”, 2021. Datatracker.ietf.org. [Online]. Available: https://datatracker.ietf.org/doc/html/rfc3174. [Accessed: 03- Jul- 2021].
2. A Secure and Lightweight Drones-Access Protocol for Smart City Surveillance;Akram,2021
3. Al-Kuwari, S., Davenport, J. and Bradford, R. “Cryptographic Hash Functions: Recent Design Trends and Security Notions”. Eprint.iacr.org, 2021. [Online]. Available: https://eprint.iacr.org/2011/565. [Accessed: 14- Jul- 2021].
4. A Survey on Cyber Security Threats in IoT-Enabled Maritime Industry;Ashraf,2022
5. Building hash functions from block cypher, their security and implementation properties;Bartkewitz,2009