1. The Internet of Things: A survey
2. A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications
3. Access control: principle and practice
4. Sergio Gusmeroli , Salvatore Piccione , and Domenico Rotondi . 2012 . IoT access control issues: a capability based approach . In 2012 IEEE 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing. IEEE, 787-792 . https://doi.org/10.1109/IMIS.2012.38 Sergio Gusmeroli, Salvatore Piccione, and Domenico Rotondi. 2012. IoT access control issues: a capability based approach. In 2012 IEEE 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing. IEEE, 787-792. https://doi.org/10.1109/IMIS.2012.38
5. Shantanu Pal . 2019 . Limitations and approaches in access control and identity management for constrained IoT resources . In 2019 IEEE International Conference on Pervasive Computing and Communications Workshops. IEEE, 431-432 . https://doi.org/10.1109/PERCOMW.2019.8730651 Shantanu Pal. 2019. Limitations and approaches in access control and identity management for constrained IoT resources. In 2019 IEEE International Conference on Pervasive Computing and Communications Workshops. IEEE, 431-432. https://doi.org/10.1109/PERCOMW.2019.8730651