[1] | Dave Evans, The Internet of Things: How the Next Evolution of the Internet is Changing Everything, Cisco Internet Business Solutions Group (IBSG), pp. 3, April 2011. |
|
[2] | Garcia-Morchon O. Kumar S., Struik R., Keoh S., Hummen R., Security considerations in the IP-based Internet of Things, IETF Internet-Draft, 2013. |
|
[3] | Notra S., Siddiqi M., Gharakheili H., Sivaraman V., Boreli R., An Experimental Study of Security and Privacy Risks with Emerging Household Appliances, In: Communications and Network Security (CNS), 2014 IEEE Conference on, pp. 79-84, 2014. |
|
[4] | Kolias C., Stavrou A., Voas J., Bojanova I., Kuhn R., Learning Internet -of-things Security “Hands-on”. IEEE Secur. Priv. 20 (February), 2-11. |
|
[5] | Plummer, D. C. (1982), An Ethernet Address Resolution Protocol. RFC 826. |
|
[6] | AI Sukkar G., Saifan R., Khwaldeh S., Maqableh M., Jafar L., Address Resolution Protocol (ARP); Spoofing Attack and Proposed Defense, Communications and Network, 8, 118-130, 2016. |
|
[7] | Mauro Conti, Nicola Dragoni, Viktor Lesyk, A Survey of Man In the Middle Attacks, IEEE Communications Surveys & Tutorials, Vol. 18, No. 3, 2016. |
|
[8] | J. Belenguer, C. T. Calafate, A low-cost Embedded IDS to Monitor and Prevent Man-In-The-Middle Attacks on Wired LAN Environments, Proc. Int. Conf. SecureWave Emerging Secur. Inf. Sys. Technol., 2007, pp. 122-127. |
|
[9] | Isaac B., Secure ARP and Secure DHCP Protocols to Mitigate Security Attacks, International Journal of Network Security, 8, 107-118, 2009. |
|
[10] | D. Bruschi, A. Ornaghi, E. Rosti, S-ARP: A Secure Address Resolution Protocol, Proc. 19th Annu. Comput. Secur. Appl. Conf., pp. 66-74, 2003. |
|
[11] | Lootah W., Enck W., McDaniel P., TARP: Ticket-Based Address Resolution Protocol, Computer Networks, 51, 4322-4337, 2007. |
|
[12] | R. Philip, Securing Wireless Networks from ARP Cache Poisoning, Master’s Thesis, San Jose State University, California, 2007. |
|
[13] | S. Y. Nam, D. Kim, J. Kim, Enhanced ARP: Preventing ARP Poisoning-Based Man-In-The-Middle Attacks, IEEE Commun. Lett., vol. 14, No. 2, pp. 187-189, 2010. |
|
[14] | S. Y. Nam, S. Jurayev, S.-S. Kim, K. Choi, G. S. Choi, Mitigating ARP Poisoning-Based Man-In-The-Middle Attacks in Wired or Wirelesss LAN, EURASIP Journal on Wireless Communications and Networking. 2012. |
|
[15] | S. Y. Nam, S. Djuraev, M. Park, Collaborative Approach to Mitigate ARP Poisoning-Based Man-In-The-Middle Attack, Comput. Netw. Vol 58, No. 18, pp 3866-3884, 2013. |
|
[16] | Bruno Bogaz Zarpelao, Rodrigo Sanches Miani, Caludio Toshio Kawakani, Sean Carlisto de Alvarenga, A Survey of Intrusion Detection in Internet of Things, Journal of Network and Computer Applications, pp 2-4, 2017. |
|
[17] | Raspberry Pi, https://www.raspberrypi.org/products/raspberry-pi-3-model-b/, [Accessed Dec 11, 2018]. |
|
[18] | NodeMcu, http://www.nodemcu.com/index_en.html, [Accessed Dec 22, 2018]. |
|
[19] | IoT IDS, https://github.com/jayluxferro/IoT-IDS/. |
|