H. Sundmaeker, P. Guillemin, and P. Friess, Vision and Challenges for Realising the Internet of Things, pp.10-2759, 2010.

S. K. Mohapatra, S. Pattnaik, and P. K. , 54432-libelium-unveils-the-top-50-internet-of-things applica- tions 3. Internet of Things in 2020:A roadmap for the future, Libelium Unveils the Top 50 Internet of Things Applications: A Survey on Applications of Wireless Sensor Network Using Cloud Computing. In : International Journal of Computer Science & Emerging Technologies (E-ISSN, pp.2044-6004, 2010.

K. Ahmed and M. Gregory, Integrating Wireless Sensor Networks with Cloud Computing, 2011 Seventh International Conference on Mobile Ad-hoc and Sensor Networks, 2011.
DOI : 10.1109/MSN.2011.86

R. Roman, P. Najera, and J. Lopez, Securing the Internet of Things, Computer, vol.44, issue.9, pp.51-58, 2011.
DOI : 10.1109/MC.2011.291

T. Bhattasali and R. Chaki, A Survey of Recent Intrusion Detection Systems for Wireless Sensor Network, Advances in Network Security and Applications: Conference Proceedings of Fourth International Conference on Network Security and Applications, pp.978-981, 2011.
DOI : 10.1007/978-3-642-22540-6_27

T. Bhattasali and R. Chaki, Lightweight Hierarchical Model For HWSNET, International Journal of Advanced Smart Sensor Network Systems (IJASSN), pp.17-32, 2011.

T. Bhattasali, R. Chaki, and S. Sanyal, Sleep Deprivation Attack Detection in Wireless Sensor Network, Sensor-Cloud Infrastructure. In: Proceedings of the 13th International Conference on Network-Based Information Systems, pp.19-25, 2010.
DOI : 10.5120/5056-7374

URL : http://arxiv.org/abs/1203.0231

A. Kapadia, D. Kotz, N. Triandopoulos, A. Kapadia, S. Myvers et al., Opportunistic Sensing: Security Challenges for the New Paradigm Secure Cloud Computing with Brokered Trusted Sensor Networks, Proceedings of the First International Conference on Communication Systems and Networks (COMSNETS) Proceedings of the International Symposium on Collaborative Technologies and Systems (CTS '10, 2008.

M. Sethi, Security in Smart object Networks, nordsecmob.aalto.fi/ en/publications/ theses 2012 sethi-mohit thesis, p.pdf, 2012.

S. Zhou, Z. Xie, S. Cirani, G. Ferrari, and L. Veltri, On Cryptographic Approaches to Internet-of-Things Security, www.lix. polytechnique.fr/ hipercom ... papers houSu ing.pdf 19 Enforcing Security Mechanisms in the IP-Based Internet of Things: An Algorithmic Overview, pp.1999-4893197, 2013.

S. O. Amin, M. S. Siddiqui, C. S. Hong, and J. Choe, A novel coding scheme to implement signature based IDS in IP based Sensor Networks, 2009 IFIP/IEEE International Symposium on Integrated Network Management-Workshops, pp.978-979, 2009.
DOI : 10.1109/INMW.2009.5195973

S. O. Amin, Y. J. Yoon, M. S. Siddiqui, and C. S. Hong, A Novel Intrusion Detection Framework for IP Based Sensor Networks, Conference Proceedings of International Conference on Information Networking, pp.978-89, 2009.

R. Fu, K. Zheng, D. Zhang, and Y. Yang, An Intrusion Detection Scheme Based on Anomaly Mining in Internet of Things, Conference Proceedings of the 4th International Conference on Wireless, Mobile and Multimedia Networks, p.China, 2011.

C. Liu, J. Yang, Y. Zhang, R. Chen, and J. Zeng, Research on immunity-based intrusion detection technology for the Internet of Things, 2011 Seventh International Conference on Natural Computation, pp.978-979, 2006.
DOI : 10.1109/ICNC.2011.6022060

. Varshney, Pervasive Healthcare and Wireless Health Monitoring, Mobile Networks and Applications, vol.8, issue.4, 2007.
DOI : 10.1007/s11036-007-0017-1