[46] Yılmaz, Y., Uludag, S. Timely detection and mitigation of iot-based cyberattacks in the smart
grid. Journal of the Franklin Institute, 2019.
[47] Bellovin, S.M. Security problems in the tcp/ip protocol suite. ACM SIGCOMM Computer
Communication Review, 1989, 19(2): 32–48.
[48] Schuba, C.L., Krsul, I.V., Kuhn, M.G., Spafford, E.H., Sundaram, A., Zamboni, D. Analysis of a
denial of service attack on tcp. In Security and Privacy, 1997. Proceedings., 1997 IEEE
Symposium on, 208–223. IEEE, 1997.
[49] Yuan, J., Mills, K. Monitoring the macroscopic effect of ddos flooding attacks. IEEE
Transactions on Dependable and secure computing, 2005, 2(4): 324–335.
[50] Lee, K., Kim, J., Kwon, K.H., Han, Y., Kim, S. Ddos attack detection method using cluster
analysis. Expert Systems with Applications, 2008, 34(3): 1659–1665.
[51] Xie, Y., Yu, S.-Z. Monitoring the application-layer ddos attacks for popular websites. IEEE/
ACM Transactions on Networking (TON), 2009, 17(1): 15–25.
[52] Kumar, K., Joshi, R., Singh, K. A distributed approach using entropy to detect ddos attacks in
isp domain. In 2007 International Conference on Signal Processing, Communications and
Networking, 331–337. IEEE, 2007.
[53] Lin, H., Bergmann, N. IoT privacy and security challenges for smart home environments.
Information, 2016, 7(3): 44.
[54] Wang, E.K., Liang, Z., Chen, C.-M., Kumari, S., Khan, M.K. Porx: A reputation incentive scheme
for blockchain consensus of iiot. Future Generation Computer Systems, 2019.
[55] Kolias, C., Kambourakis, G., Stavrou, A., Voas, J. Ddos in the iot: Mirai and other botnets.
Computer, 2017, 50(7): 80–84.
[56] Wurm, J., Hoang, K., Arias, O., Sadeghi, A.-R., Jin, Y. Security analysis on consumer and
industrial iot devices. In 2016 21st Asia and South Pacific Design Automation Conference
(ASP-DAC), 519–524. IEEE, 2016.
[57] Avizienis, A., Laprie, J., Randell, B. Fundamental Concepts of Dependability. Technical Report
Series-University of Newcastle upon Tyne Computing Science, 2001.
[58] Fahmideh, M., Zowghi, D. An exploration of IoT platform development. Information Systems,
2020, 87: 101409.
[59] Yu, T., Sekar, V., Seshan, S., Agarwal, Y., Xu, C. Handling a trillion (unfixable) flaws on
a billion devices: Rethinking network security for the internet-of-things. In Proceedings of the
14th ACM Workshop on Hot Topics in Networks, page 5. ACM, 2015.
[60] Avižienis, A., Laprie, J., Randell, B., and U. of Newcastle upon Tyne. Computing Science.
Fundamental Concepts of Dependability. Technical report series. University of Newcastle
upon Tyne, Computing Science, 2001.
[61] Brown, K. Three-legacy mode payment card with parametric authentication and data input
elements, Sept. 9 2004. US Patent App. 10/800,821.
[62] Lin, D.D.-H., Shaheen, A.A., Yellepeddy, K.K. Multiple remote data access security mechanism
for multitiered internet computer networks, Apr. 18 2000. US Patent 6,052,785.
[63] Yu, S., Wang, C., Ren, K., Lou, W. Achieving secure, scalable, and fine-grained data access
control in cloud computing. In 2010 Proceedings IEEE INFOCOM, 1–9. Ieee, 2010.
[64] Antonakakis, M., April, T., Bailey, M., Bernhard, M., Bursztein, E., Cochran, J., Durumeric, Z.,
Halderman, J.A., Invernizzi, L., Kallitsis, M., et al. Understanding the mirai botnet. In 26th
{USENIX} Security Symposium ({USENIX} Security 17), 1093–1110, 2017.
[65] MalwareMustDie. Mmd-0055-2016–linux/pnscan; elf worm that still circles around. http://
blog.malwaremustdie.org/2016/08/mmd-0054-2016-pnscanelf-worm-that.html.
[66] Swiler, L.P., Phillips, C., Ellis, D., Chakerian, S. Computer-attack graph generation tool. In
Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX’01,
volume 2, 307–321. IEEE, 2001.
Impact evaluation of DDoS and Malware attack using IoT devices25