Seshadri, A., Luk, M., & Perrig, A. (2011). SAKE: Software attestation for key establishment in sensor networks. Ad Hoc Networks, 9(6), 1059-1067.
Aghili, S. F., Mala, H., Shojafar, M., & Peris-Lopez, P. (2019). LACO: Lightweight three-factor authentication, access control and ownership transfer scheme for e-health systems in IoT. future generation computer systems, 96, 410-424.
Al Ameen, M., Liu, J., & Kwak, K. (2012). Security and privacy issues in wireless sensor networks for healthcare applications. Journal of medical systems, 36(1), 93-101.
Almulhim, M., & Zaman, N. (2018, February). Proposing secure and lightweight authentication scheme for IoT based E-health applications. In 2018 20th International Conference on advanced communication technology (ICACT) (pp. 481-487). IEEE.
Anunobi, C. V., & Okoye, I. B. (2008). The role of academic libraries in universal access to print and electronic resources in the developing countries. Library philosophy and practice, 5(20), 1-5.
Attkan, A., & Ahlawat, P. (2020). Lightweight two-factor authentication protocol and session key generation scheme for WSN in IoT deployment. In Advances in Cybernetics, Cognition, and Machine Learning for Communication Technologies (pp. 189-198). Springer, Singapore.
Gomez, C., & Paradells, J. (2010). Wireless home automation networks: A survey of architectures and technologies. IEEE Communications Magazine, 48(6), 92-101.
Mantas, G., Lymberopoulos, D., & Komninos, N. (2011). Security in smart home environment. In Wireless Technologies for Ambient Assisted Living and Healthcare: Systems and Applications (pp. 170-191). IGI global.
Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): A vision, architectural elements, and future directions. Future generation computer systems, 29(7), 1645-1660.
Han, K., Kim, J., Shon, T., & Ko, D. (2013). A novel secure key paring protocol for RF4CE ubiquitous smart home systems. Personal and ubiquitous computing, 17(5), 945-949.
He, D., Zeadally, S., Kumar, N., & Lee, J. H. (2016). Anonymous authentication for wireless body area networks with provable security. IEEE Systems Journal, 11(4), 2590-2601.
Jalal, A., Kamal, S., & Kim, D. (2014). A depth video sensor-based life-logging human activity recognition system for elderly care in smart indoor environments. Sensors, 14(7), 11735-11759.
Jara, A. J., Zamora, M. A., & Skarmeta, A. (2012). Glowbal IP: An adaptive and transparent IPv6 integration in the Internet of Things. Mobile Information Systems, 8(3), 177-197.
Kim, J. E., Barth, T., Boulos, G., Yackovich, J., Beckel, C., & Mosse, D. (2017). Seamless integration of heterogeneous devices and access control in smart homes and its evaluation. Intelligent Buildings International, 9(1), 23-39.
Kim, J. T. (2014). Attacks and threats on the U-healthcare application with mobile agent. International Journal of Security and Its Applications, 8(4), 59-66.
Minaie, A., Sanati-Mehrizy, A., Sanati-Mehrizy, P., & Sanati-Mehrizy, R. (2013, June). Application of wireless sensor networks in health care system. In 2013 ASEE Annual Conference & Exposition (pp. 23-200).
Nayak, M., & Agrawal, N. (2013). Security in Body Sensor Networks for Healthcare applications. IOSR Journal of Computer Engineering, pg, 41-46.
Balakrishna, D., Sujeethnanda, M., & Murthy, G. R. (2013, February). Mobile Wireless Sensor Networks: Healthcare in Hospitals. In ifth International Conference on eHealth, Telemedicine, and Social Medicine (eTELEMED 2013).
Pandesswaran, C., Surender, S., & Karthik, K. V. (2016). Remote patient monitoring system based coap in wireless sensor networks. International Journal of Sensor Networks and Data Communications, 5(3).