Page 50 - ITU KALEIDOSCOPE, ATLANTA 2019
P. 50
2019 ITU Kaleidoscope Academic Conference
Univers Hangzhou, China-
[10] M. A. K. Sultan H. AlMotiri and M. A. AlGhamdi, https://arxiv.org/ftp/arxiv/papers/1708/1708.04560.p
"Mobile Health (m-health) System in the context of df.
IoT," 2016 4th International Conference on Future
Internet of Things and Cloud Workshops,DOI: B. Silva and K. &. H. , Internet of Things: A
10.1109/W-FiCloud.2016.24, no. ;, 2016. Comprehensive Review of Enabling Technologies,
Architecture, and Challenges," IETE Technical
[11] A. &. H. T. Chacko, "Security and Privacy Issues Review, DOI: 10.1080/02564602.2016.1276416,
with IoT in Healthcare," EAI Endorsed Transactions 2017.
on Pervasive Health and Technology. 4. 155079.
10.4108/eai.13-7-2018.155079. , 2018. [22] J. e. a. Lin, " A Survey on Internet of Things:
Architecture, Enabling Technologies, Security and
[12] F. O. f. I. Security, "Cyber Security Requirements for Privacy, and Applications," IEEE Internet of Things
Network-Connected Medical Devices," 13 11 2018. Journal, vol. 4, no. 5, pp. 1125-1142, doi: 10.110, Oct
[Online]. Available: https://www.allianz-fuer- 2017.
cybersicherheit.de/ACS/DE/_/downloads/BSI-
CS_132E.pdf; jsessionid=A73F550EB7FB2E04A98 [23] Rashmi, "IoT (Internet of Things) Concept and
6F9E477D6E8A5.1_cid360?__blob=publicationFile Improved Layered Architecture," JEDR , Volume 6,
&v=5. Issue 2, ISSN: 2321-9939, 2018.
[13] "Therapeautic Goods Administration,Department of [24] Recommendation ITU-T Y.2060 (2012), Overview
Health, Australian Givernment," TGA, 19 July 2019. of the Internet of things.
[Online]. Available:
https://www.tga.gov.au/publication/medical-device-
cyber-security-guidance-industry. [25] "Infrastructure, Internet Protocol Aspects And Next-
Generation Networks- Overview Of The Internet Of
Things".
[14] A. Mulero, "France Drafts Medical Device
Cybersecurity Recommendations," 23 July 2019.
[Online]. Available: https://www.raps.org/news-and- [26] D. Darwish, "Improved Layered Architecture for
articles/news-articles/2019/7/france-drafts-medical- Internet of Things".- International Journal of
device-cybersecurity-recomme. Computing Academic Research (IJCAR) ISSN 2305-
9184 Volume 4, Number 4 (August 2015), pp.214-223
© MEACSE Publications
[15] K. e. a. Boeckl, "Considerations for Managing http://www.meacse.org/ijcar.
Internet of Things (IoT) Cybersecurity and Privacy
Risks," National Institute of Standards and
Technology, June 2018. [27] ETSI, "Why do we need 5G?," [Online]. Available:
https://www.etsi.org/technologies/5g.
[16] G. &. K. E. Rosner, "Privacy and the Internet
of Things Emerging Frameworks For Policy [28] 3. T. S. C. Balazs Bertenyi, "3GPP system standards
and Design," Center For Long-Term CyberSecurity. heading into the 5G era," Eurescom message, Spring
issue 2014, 2014.
[17] M. Noura and M. &. G. Atiquzzaman,
"Interoperability in Internet of Things: Taxonomies [29] "Wi-Fi Alliance® introduces Wi-Fi 6," 2018.
and Open Challenges," Mobile Networks and [Online]. Available: https://www.wi-fi.org/news-
Applications(2019) 24:796–809, 2018. events/newsroom/wi-fi-alliance-introduces-wi-fi-6.
[18] P. Hatto, "Standards and Standardization Handbook," [30] "What is LoRa®?," [Online]. Available:
Directorate-General for Research-European https://www.semtech.com/lora/what-is-lora.
Commission, 2010.
[31] "Sigfox Technology Overview," [Online]. Available:
[19] R. Atoui, "Eurosmart IoT Device Certification https://www.sigfox.com/en/sigfox-iot-technology-
Scheme". overview.
[20] M. Bilal, "A Review of Internet of Things
Architecture, Technologies and Analysis
Smartphone-based Attacks Against 3D
printers".Department of Computer Science, Zhejiang
– 30 –