|
[1]Madakam, S., Lake, V., Lake, V., & Lake, V. (2015). Internet of Things (IoT): A literature review. Journal of Computer and Communications, 3(05), 164. [2]Gokhale, P., Bhat, O., & Bhat, S. (2018). Introduction to IOT. International Advanced Research Journal in Science, Engineering and Technology, 5(1), 41-44. [3]數位時代 ( 2018 ) 台灣因「駭客攻擊」年損8100億!6成民眾沒「這觀念」,資安意識差到連3年全球倒數第一。上網日期:2022年11月3日。檢自: https://www.storm.mg/lifestyle/448195?srcid=73746f726d2e6d675f6e756c6c_1557684909 [4]Neshenko, N., Bou-Harb, E., Crichigno, J., Kaddoum, G., & Ghani, N. (2019). Demystifying IoT security: An exhaustive survey on IoT vulnerabilities and a first empirical look on Internet-scale IoT exploitations. IEEE Communications Surveys & Tutorials, 21(3), 2702-2733. [5]Mahmoud, R., Yousuf, T., Aloul, F., & Zualkernan, I. (2015, December). Internet of things (IoT) security: Current status, challenges and prospective measures. In 2015 10th international conference for internet technology and secured transactions (ICITST) (pp. 336-341). IEEE. [6]Jurcut, A. D., Ranaweera, P., & Xu, L. (2020). Introduction to IoT security. IoT security: advances in authentication, 27-64. [7]TWNIC(2018)。2018台灣網路報告。上網日期:2022年11月3日。檢自:https://report.twnic.tw/2018/StrategyThreeEstablishAndDevelopSmart%20HomeApplications.html [8]Gou, Q., Yan, L., Liu, Y., & Li, Y. (2013, August). Construction and strategies in IoT security system. In 2013 IEEE international conference on green computing and communications and IEEE internet of things and IEEE cyber, physical and social computing (pp. 1129-1132). IEEE. [9]Maksimović, M., Vujović, V., Davidović, N., Milošević, V., & Perišić, B. (2014). Raspberry Pi as Internet of things hardware: performances and constraints. design issues, 3(8), 1-6. [10]Singh, J.P., Roy, B.K. A more chaotic and easily hardware implementable new 3-D chaotic system in comparison with 50 reported systems. Nonlinear Dyn 93, 1121–1148 (2018). https://doi.org/10.1007/s11071-018-4249-3 [11]Xinmiao Zhang and K. K. Parhi, "Implementation approaches for the Advanced Encryption Standard algorithm," in IEEE Circuits and Systems Magazine, vol. 2, no. 4, pp. 24-46, 2002, doi: 10.1109/MCAS.2002.1173133. [12]Helmy, M., El-Rabaie, E. S. M., Eldokany, I., & Abd El-Samie, F. E. (2022). Proposed Hybrid Encryption Algorithm for Robust 3D Image Communication over Wireless Channels. Optik, 170205. [13]Schmidbauer, T., & Wendzel, S. (2022). Detection Of Computational Intensive Reversible Covert Channels Based On Packet Runtime. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 13(1), 137-166. [14]Lin, C. H., Hu, G. H., Chen, J. S., Yan, J. J., & Tang, K. H. (2022). Novel design of cryptosystems for video/audio streaming via dynamic synchronized chaos-based random keys. Multimedia Systems, 1-16. [15]SANTOSO, H. D. (2022). Implementasi Message Authentication Code Dan Algoritme Advanced Encryption Standard Pada Protokol Komunikasi Mqtt (Doctoral dissertation, Universitas Jenderal Soedirman). [16]Hunkeler, U., Truong, H. L., & Stanford-Clark, A. (2008, January). MQTT-S—A publish/subscribe protocol for Wireless Sensor Networks. In 2008 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE'08) (pp. 791-798). IEEE. [17]Chen, F., Huo, Y., Zhu, J., & Fan, D. (2020, November). A review on the study on MQTT security challenge. In 2020 IEEE International Conference on Smart Cloud (SmartCloud) (pp. 128-133). IEEE. [18]Lin, J. S., & Yan, J. J. (2009). Adaptive synchronization for two identical generalized Lorenz chaotic systems via a single controller. Nonlinear Analysis: Real World Applications, 10(2), 1151-1159. [19]Hou, Y. Y., Liao, T. L., & Yan, J. J. (2007). H∞ synchronization of chaotic systems using output feedback control design. Physica A: Statistical Mechanics and Its Applications, 379(1), 81-89. [20]不詳, "TCP與SOCKET的三次握手的對應關係",上網日期:2022年11月3日,檢自:https://www.itread01.com/content/1547369120.html. [21]Barré, S., Paasch, C., & Bonaventure, O. (2011, May). Multipath TCP: from theory to practice. In International conference on research in networking (pp. 444-457). Springer, Berlin, Heidelberg. [22]Chun, W. (2001). Core python programming (Vol. 1). Prentice Hall Professional. [23]Hunt, J. (2019). Sockets in Python. In Advanced Guide to Python 3 Programming (pp. 457-470). Springer, Cham. [24]Lee, S. Y. (2016). Design and Implementation of Multi-Access BLE/Wi-Fi Gateway using Arduino. Journal of Knowledge Information Technology and Systems, 11(6), 703-712. [25]Taniguchi, Y., Mukaida, T., Ochi, Y., & Iguchi, N. (2021, March). A BLE-based monitoring system for estimating congestion on university campuses. In 2021 IEEE 3rd Global Conference on Life Sciences and Technologies (LifeTech) (pp. 414-415). IEEE. [26]Okamoto, T., Sasaki, Y., & Suzuki, S. (2017, October). Targeted advertising using BLE beacon. In 2017 IEEE 6th Global Conference on Consumer Electronics (GCCE) (pp. 1-5). IEEE. [27]Radhakrishnan, M., Misra, A., Balan, R. K., & Lee, Y. (2015, October). Smartphones and ble services: Empirical insights. In 2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems (pp. 226-234). IEEE. [28]Hernandez-Rojas, D., Mazon-Olivo, B., Novillo-Vicuña, J., Escudero-Cascon, C., Pan-Bermudez, A., & Belduma-Vacacela, G. (2017, November). IoT android gateway for monitoring and control a WSN. In International Conference on Technology Trends (pp. 18-32). Springer, Cham. [29]Yan, J. J., Chen, W. Y., & Chang, E. R. (2022). Design of synchronized multimode random key generators based on chaos-based peak value coding and its application to secure communication. [30]Pham, V. T., Vaidyanathan, S., Volos, C. K., & Jafari, S. (2015). Hidden attractors in a chaotic system with an exponential nonlinear term. The European Physical Journal Special Topics, 224(8), 1507-1517. [31]Yan, J. J., Chen, C. Y., & Tsai, J. S. H. (2016). Hybrid chaos control of continuous unified chaotic systems using discrete rippling sliding mode control. Nonlinear Analysis: Hybrid Systems, 22, 276-283. [32]了解藍牙 RSSI 的措施。上網日期:2032年1月10日。檢自: https://ieeexplore.ieee.org/document/7366936
|