References
[1]. Ahmed, E., Yaqoob, I., Gani, A., Imran, M., & Guizani,
M. (2016). Internet-of-things-based smart environments:
state of the art, taxonomy, and open research challenges.
IEEE Wireless Communications, 23(5), 10-16. https://doi.org/10.1109/MWC.2016.7721736
[2]. Akhtar, F., Rehmani, M. H., & Reisslein, M. (2016). White
space: Definitional perspectives and their role in
exploiting spectrum opportunities. Telecommunications Policy, 40(4), 319-331. https://doi.org/10.1016/j.telpol.2016.01.003
[3]. Atzori, L., Iera, A., & Morabito, G. (2010). The internet
of things: A survey. Computer Networks, 54(15), 2787-2805. https://doi.org/10.1016/j.comnet.2010.05.010
[4]. Citron, R., Maxwell, K., & Woods, E. (2017). Smart City
Services Market. Technical report, Navigant Research.
[5]. Colom, J. F., Gil, D., Mora, H., Volckaert, B., & Jimeno,
A. M. (2018). Scheduling framework for distributed
intrusion detection systems over heterogeneous network
architectures. Journal of Network and Computer
Applications, 108, 76-86. https://doi.org/10.1016/j.jnca.2018.02.004
[6]. Gillis A. S. (n.d.). What is the Internet of Things (Iot)?
Retrieved from http://internetofthingsagenda.techtarget.com/definition/Internet-of-Things-IoT
[7]. Giusto, D., Iera, A., Morabito, G., & Atzori, L. (Eds.).
(2010). The Internet of Things: 20th Tyrrhenian Workshop
on Digital Communications. Springer Science & Business
Media.
[8]. Guo, J., Chen, R., & Tsai, J. J. (2017). A survey of trust
computation models for service management in internet
of things systems. Computer Communications, 97, 1-14.
https://doi.org/10.1016/j.comcom.2016.10.012
[9]. Heater, B. (2016). Lenovo Shows Off a Pair of Intel-
Powered Smart Shoes, Retrieved from https://techcrunch.com/2016/06/09/lenovo-smart-shoes/
[10]. Jain, R. (2018). A congestion control system based
on VANET for small length roads. Annals of Emerging
Technologies in Computing (AETiC), 2(1), 17–21. https://doi.org/10.33166/AETiC.2018.01.003
[11]. Khan, A. A., Rehmani, M. H., & Rachedi, A. (2017a).
Cognitive-radio-based internet of things: Applications,
architectures, spectrum related functionalities, and future
research directions. IEEE Wireless Communications, 24(3),
17-25. https://doi.org/10.1109/MWC.2017.1600404
[12]. Khan, S., Parkinson, S., & Qin, Y. (2017b). Fog
computing security: a review of current applications and
security solutions. Journal of Cloud Computing, 6(1),
1-22. https://doi.org/10.1186/s13677-017-0090-3
[13]. Mahmud, S. H., Assan, L., & Islam, R. (2018). Potentials
of internet of things (IoT) in Malaysian construction industry.
Annals of Emerging Technologies in Computing (AETiC),
2(1), 44-52. https://doi.org/10.33166/AETiC.2018.04.004
[14]. Miraz, M. H., Ali, M., Excell, P. S., & Picking, R. (2018).
Internet of nano-things, things and everything: future
growth trends. Future Internet, 10(8), 68. https://doi.org/10.3390/fi10080068
[15]. Mollah, M. B., Azad, M. A. K., & Vasilakos, A. (2017).
Security and privacy challenges in mobile cloud
computing: Survey and way ahead. Journal of Network
and Computer Applications, 84, 38-54. https://doi.org/10.1016/j.jnca.2017.02.001
[16]. Patel, K. K., Patel, S. M., & Scholar, P. (2016). Internet
of things-IOT: definition, characteristics, architecture,
enabling technologies, application & future challenges.
International Journal of Engineering Science and
Computing, 6(5), 6122–6131.
[17]. Sani, A. S., Yuan, D., Jin, J., Gao, L., Yu, S., & Dong, Z.
Y. (2019). Cyber security framework for internet of thingsbased
energy internet. Future Generation Computer
Systems, 93, 849-859. https://doi.org/10.1016/j.future.2018.01.029
[18]. Sanz, R. M. G. (2018). Your Guide to the GDPR.
Retrieved from https://spectrum.ieee.org/your-guide-tothe-gdpr
[19]. Sicari, S., Rizzardi, A., Grieco, L. A., & Coen-Porisini, A. (2015). Security, privacy and trust in Internet of Things:
The road ahead. Computer Networks, 76, 146-164.
https://doi.org/10.1016/j.comnet.2014.11.008
[20]. Soomro, S., Miraz, M. H., Prasanth, A., & Abdullah, M.
(2018). Artificial intelligence enabled IoT: traffic
congestion reduction in smart cities. IET 2018 Smart Cities
Symposium, 81–86. https://doi.org/10.1049/cp.2018.1381
[21]. Stergiou, C., Psannis, K. E., Kim, B. G., & Gupta, B.
(2018). Secure integration of IoT and cloud computing.
Future Generation Computer Systems, 78, 964-975.
https://doi.org/10.1016/j.future.2016.11.031
[22]. Veena, S., Mahesh, K., Rajesh, M., & Salmon, S. (2018).
The survey on smart agriculture using IOT. International
Journal of Innovative Research in Engineering &
Management (IJIREM), 5(2), 63-66.
[23]. Wachter, S. (2018a). GDPR and the Internet of
Things: Guidelines to Protect Users' Identity and Privacy.
Oxford Internet Institute, United Kingdom, (pp. 25).
[24]. Wachter, S. (2018b). Normative challenges of
identification in the internet of things: Privacy, profiling,
discrimination, and the GDPR. Computer Law & Security
Review, 34(3), 436-449. https://doi.org/10.1016/j.clsr.2018.02.002
[25]. Zanjal, S. V., & Talmale, G. R. (2016). Medicine
reminder and monitoring system for secure health using
IOT. Procedia Computer Science, 78, 471-476. https://doi.org/10.1016/j.procs.2016.02.090