[1] | IoT Analytics. (2014). “Why the Internet of Things Is Called Internet of Things: Definition, History, Disambiguation”, [Online]. Available: https://iot-analytics.com/Internet-of-things-definition/. |
|
[2] | Miorandi D., Sicari S., De Pellegrini F., Chalmatac I., “Internet of Things: vision, applications and research challenges”, Ad Hoc Network 10(7), 1497-1516, 2012. |
|
[3] | Borgia, E., “The Internet of Things vision: key features, applications and open issues”, Comput. Commun. 54, 1-31, 2014. |
|
[4] | Garcia-Morchon O., Kumar S., Struik R., Keoh S., Hummen R., “Security considerations in the IP-based Internet of Things”, IETF Internet-Draft, 2013. |
|
[5] | Sicari S., Rizzardi A., Grieco L., Coen-Porisini A., “Security, privacy and trust in Internet of Things: the road ahead”, Comput. Netw. 76 (0), 146-164, 2015. |
|
[6] | Notra S., Siddiqi M., Gharakheili H., Sivaraman V., Boreli R., “An experimental study of security and privacy risks with emerging household appliances”, Communications and Network Security (CNS), 2014 IEEE Conference on, pp. 79-84, 2014. |
|
[7] | Kolias, C., Stavrou, A., Voas, J., Bojanova, I., Kuhn, R., “Learning Internet-of-things security ‘Hands-on’”. IEEE Secur. Priv. 20 (February), 2-11. |
|
[8] | Ibrahim Halil Saruhan, “Detecting and Preventing Rogue Devices on the Network”, SANS Institute, pp. 5-7 2007. |
|
[9] | S.B.Vanjale, Amol K. Kadam, Pramod A. Jadhav, “Detecting\& Eliminating Rogue Access Point in IEEE 802.11 WLAN”, International Journal of Smart Sensors and Ad Hoc Networks (IJSSAN) Volume-1, Issue-1, 2011. |
|
[10] | T. Kim, H. Park, H. Jung, H. Lee, “Online detection of fake access points using received signal strengths”, 2012. |
|
[11] | Mehndi Samra, Mehak Mengi, Sparsh Sharma, Naveen Kumar Gondhi, “Detection and Mitigation of Rogue Access Point”, Journal of Scientific and Technical Advancements, Volume 1, Issue 3, pp. 195-198, 2015. |
|
[12] | Bruno Bogaz Zarpelao, Rodrigo Sanches Miani, Caludio Toshio Kawakani, Sean Carlisto de Alvarenga, “A Survey of Intrusion Detection in Internet of Things”, Journal of Network and Computer Applications, pp. 2-4, 2017. |
|
[13] | Ettercap, http://ettercap.github.io/ettercap/, [Accessed Dec 11, 2018]. |
|
[14] | Wireshark, http://www.wireshark.org/, [Accessed Dec 11, 2018]. |
|
[15] | Snort, http://www.snort.org/, [Accessed Dec 11, 2018]. |
|
[16] | Iwlist, https://linux.die.net/man/8/iwlist, [Accessed Dec 11, 2018]. |
|
[17] | RaspberryPi, https://www.raspberrypi.org/products/raspberry-pi-3-model-b/, [Accessed Dec 11, 2018]. |
|
[18] | Tenda Wireless Driver, https://github.com/Mange/rtl8192eu-linux-driver/, [Accessed Dec 11, 2018]. |
|
[19] | Iwlist Parser, https://github.com/jayluxferro/iwlist-parser, [Accessed Dec 11, 2018]. |
|
[20] | IoT-IDS, https://github.com/jayluxferro/IoT-IDS/. |
|