J. Mabrouki, M. Azrour, Y. Farhaoui, and S. El Hajjaji, Intelligent system for monitoring and detecting water quality, in Big Data and Networks Technologies, Y. Farhaoui, ed. Springer International Publishing, 2020, pp.172-182.
S. I. Samsudin, S. I. M. Salim, K. Osman, S. F. Sulaiman, and M. I. A. Sabri, A smart monitoring of a water quality detector system, Indonesian Journal of Electrical Engineering and Computer Science, vol. 10, no. 3, pp. 951-958, 2018.
N. Zidan, M. Maree, and S. Samhan, An IoT-based monitoring and controlling system for water chlorination treatment, in Proceedings of the 2nd International Conference on Future Networks and Distributed Systems-ICFNDS’18, Amman, Jordan, 2018, pp. 1-6.
B. Patil and D. J. Digge, Water quality monitoring in IoT environment, International Organization of Scientific Research Journal of Engineering, vol. 2, pp. 20-25, 2018.
S. Pappu, P. Vudatha, A. V. Niharika, T. Karthick, and S. Sankaranarayanan, Intelligent IoT-based water quality monitoring system, International Journal of Engineering Research and Applications, vol. 12, no. 16, pp. 5447-5454, 2017.
N. A. A. Bakar, W. M. W. Ramli, and N. H. Hassan, The Internet of Things in healthcare: An overview, challenges and model plan for security risks management process, Indonesian Journal of Electrical Engineering and Computer Science, vol. 15, no. 1, pp. 414-420, 2019.
N. Chawla, AI, IoT and wearable technology for smart healthcare - A review, International Journal of Recent Research Aspects, vol. 7, no. 1, pp. 9-13, 2020.
M. S. Hossain, G. Muhammad, and A. Alamri, Smart healthcare monitoring: A voice pathology detection paradigm for smart cities, Multimedia Systems, vol. 25, no. 5, pp. 565-575, 2019.
A. Kumar, G. Chattree, and S. Periyasamy, Smart healthcare monitoring system, Wirel Pers Commun, vol. 101, no. 1, pp. 453-463, 2018.
D. W. Sukmaningsih, W. Suparta, A. Trisetyarso, B. S. Abbas, and C. H. Kang, Proposing smart disaster management in urban area, in Intelligent Information and Database Systems: Recent Developments, M. Huk, M. Maleszka, and E. Szczerbicki, eds. Springer International Publishing, 2020, pp. 3-16.
X. Wei, N.-B. Chang, K. Bai, and W. Gao, Satellite remote sensing of aerosol optical depth: Advances, challenges, and perspectives, Critical Reviews in Environmental Science and Technology, vol. 50, no. 16, pp. 1640-1725, 2020.
B. Bayat, N. Crasta, A. Crespi, A. M. Pascoal, and A. Ijspeert, Environmental monitoring using autonomous vehicles: A survey of recent searching techniques, Current Opinion in Biotechnology, .
A. Kulkarni and D. Mukhopadhyay, Internet of Things-based weather forecast monitoring system, Indonesian Journal of Electrical Engineering and Computer Science, vol. 9, no. 3, pp. 555-557, 2018.
H. Sayuti, R. A. Rashid, N. M. A. Latiff, M. R. A. Rahim, and N. E. Ghazali, Smart home and ambient assisted living based on the Internet of Things, International Journal of Electrical & Computer Engineering, vol. 7, no. 3, pp. 1480-1488, 2017.
W. M. Kang, S. Y. Moon, and J. H. Park, An enhanced security framework for home appliances in smart home, Human-centric Computing and Information Sciences, vol. 7, no. 1, pp. 1-12, 2017.
B. L. R. Stojkoska and K. V. Trivodaliev, A review of Internet of Things for smart home: Challenges and solutions, Journal of Cleaner Production, vol. 140, no. 3, pp. 1454-1464, 2017.
X. Hong, C. Yang, and C. Rong, Smart home security monitor system, International Symposium on Parallel & Distributed Computing, .
M. A. E.-L. Mowad, A. Fathy, and A. Hafez, Smart home automated control system using android application and microcontroller, International Journal of Scientific & Engineering Research, vol. 5, no. 5, pp. 935-939, 2014.
M. Soliman, T. Abiodun, T. Hamouda, J. Zhou, and C.-H. Lung, Smart home: Integrating Internet of Things with web services and cloud computing, .
A. Osseiran, O. Elloumi, J. Song, and J. F. Monserrat, Internet of Things, IEEE Communications Magazine, vol. 1, no. 2, p. 84, 2017.
A. Sedrati and A. Mezrioui, A survey of security challenges in Internet of Things, Advances in Science Technology and Engineering Systems Journal, vol. 3, no. 1, pp. 274-280, 2018.
N. Ye, Y. Zhu, R. Wang, R. Malekian, and L. Qiao-min, An efficient authentication and access control scheme for perception layer of Internet of Things, Applied Mathematics & Information Sciences, vol. 8, no. 4, pp. 1617-1624, 2014.
M. Azrour, M. Ouanan, Y. Farhaoui, and A. Guezzaz, Security analysis of Ye et al. authentication protocol for Internet of Things, in Big Data and Smart Digital Environment, Y. Farhaoui and L. Moussaid, eds. Springer International Publishing, 2019, pp. 67-74.
M. A. Jan, P. Nanda, X. He, Z. Tan, and R. P. Liu, A robust authentication scheme for observing resources in the Internet of Things environment, .
S. Kalra and S. K. Sood, Secure authentication scheme for IoT and cloud servers, Pervasive & Mobile Computing, vol. 24, pp. 210-223, 2015.
V. S. Miller, Use of elliptic curves in cryptography, .
M. Wu, J. Chen, and R. Wang, An enhanced anonymous password-based authenticated key agreement scheme with formal proof, International Journal of Network Security, vol. 19, no. 5, pp. 785-793, 2017.
R. Fantacci, T. Pecorella, R. Viti, and C. Carlini, A network architecture solution for efficient IOT WSN backhauling: Challenges and opportunities, IEEE Wireless Communications, vol. 21, no. 4, pp. 113-119, 2014.
K. T. Nguyen, M. Laurent, and N. Oualha, Survey on secure communication protocols for the Internet of Things, Ad Hoc Networks, vol. 32, pp. 17-31, 2015.
M. Bayat, M. Beheshti-Atashgah, M. Barari, and M. R. Aref, Cryptanalysis and improvement of a user authentication scheme for Internet of Things using elliptic curve cryptography, IJ Network Security, vol. 21, no. 6, pp. 897-911, 2019.
X. Li, J. Niu, S. Kumari, F. Wu, A. K. Sangaiah, and K.-K. R. Choo, A three-factor anonymous authentication scheme for wireless sensor networks in Internet of Things environments, Journal of Network and Computer Applications, vol. 103, pp. 194-204, 2018.
W.-L. Tai, Y.-F. Chang, and P.-L. Hou, Security analysis of a three-factor anonymous authentication scheme for wireless sensor networks in Internet of Things environments, IJ Network Security, vol. 21, no. 6, pp. 1014-1020, 2019.
G. Sharma and S. Kalra, A secure remote user authentication scheme for smart cities e-governance applications, Journal of Reliable Intelligent Environments, vol. 3, no. 3, pp. 177-188, 2017.
P. K. Dhillon and S. Kalra, Multi-factor user authentication scheme for IoT-based healthcare services, Journal of Reliable Intelligent Environments, vol. 4, no. 3, pp. 141-160, 2018.
C. J. F. Cremers, The scyther tool: Verification, falsification, and analysis of security protocols, .
S. Kumari, M. Karuppiah, A. K. Das, X. Li, F. Wu, and N. Kumar, A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers, The Journal of Supercomputing, vol. 74, no. 12, pp. 6428-6453, 2018.
W.-B. Hsieh and J.-S. Leu, A robust user authentication scheme using dynamic identity in wireless sensor networks, Wireless Personal Communications, vol. 77, no. 2, pp. 979-989, 2014.
C.-C. Chang and H.-D. Le, A provably secure, efficient, and flexible authentication scheme for Ad Hoc wireless sensor networks, IEEE Wireless Communications, vol. 15, no. 1, pp. 357-366, 2016.
H. L. Yeh, T. H. Chen, P. C. Liu, T. H. Kim, and H. W. Wei, A secured authentication protocol for wireless sensor networks using elliptic curves cryptography, Sensors, vol. 11, no. 5, pp. 4767-4779, 2011.
A. K. Das, A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks, Peer-to-Peer Networking and Applications, vol. 9, no. 1, pp. 223-244, 2016.
A. Ghani, K. Mansoor, S. Mehmood, S. A. Chaudhry, A. U. Rahman, and M. Najmus Saqib, Security and key management in IoT-based wireless sensor networks: An authentication protocol using symmetric key, International Journal of Communication Systems, vol. 32, no. 16, pp. 1-18, 2019.