J. Ramirez and &. C. Pedraza, Performance analysis of communication protocols for internet of things platforms, IEEE Colombian Conference on Communications and Computing (COLCOM), pp.1-7, 2017.

M. Junaid, M. A. Shah, and &. I. Satti, A survey of internet of things, enabling technologies and protocols, 23rd International Conference on Automation and Computing (ICAC), pp.1-5, 2017.

J. Pan and &. J. Mcelhannon, , pp.ap- plications, 2017.

R. Hassan, A. M. Jubair, K. Azmi, and &. A. Bakar, Adaptive congestion control mechanism in CoAP application protocol for internet of things (IoT, 2016 International Conference on Signal Processing and Communication (ICSC), pp.121-125, 2016.

W. Lei and &. L. Xu, Research and implementation of access control model of internet of things, 5th International Conference on Computer Science and Network Technology (ICCSNT), pp.102-106, 2016.

Z. Ren, X. Liu, R. Ye, and &. T. Zhang, Security and privacy on internet of things, 7th IEEE International Conference on Electronics Information and Emergency Communication (ICEIEC), pp.140-144, 2017.

S. Prabavathy, K. Sundarakantham, and &. S. Shalinie, Decentralized secure framework for social collaborative internet of things, Fourth International Conference on Signal Processing, Communication and Networking (ICSCN), pp.1-6, 2017.

J. Marot and &. S. Bourennane, Raspberry pi for image processing education, 25th European Signal Processing Conference (EUSIPCO), pp.2364-2366, 2017.
URL : https://hal.archives-ouvertes.fr/hal-02474710

S. Bhave, M. Tolentino, H. Zhu, and &. J. Sheng, Emsbedded middleware for distributed raspberry pi device to enable big data applications, IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), pp.103-108, 2017.

A. Sanada, Y. Nogami, K. Iokibe, and &. M. Khandaker, Security analysis of raspberry pi against side-channel attack with RSA cryptography, IEEE International Conference on Consumer Electronics -Taiwan (ICCE-TW), pp.287-288, 2017.

T. Tavade and &. P. Nasikkar, Raspberry pi: Data logging IOT device, International Conference on Power and Embedded Drive Control (ICPEDC), pp.275-279, 2017.

S. Dowling, M. Schukat, and &. H. Melvin, A ZigBee honeypot to assess IoT cyberattack behaviour, 28th Irish Signals and Systems Conference (ISSC), pp.1-6, 2017.

O. Eigner, P. Kreimel, and P. Tavolato, Detection of man-in-the-middle attacks on industrial control networks, International Conference on Software Security and Assurance (ICSSA), pp.64-69, 2016.

S. Dowling, M. Schukat, and H. Melvin, Using analysis of temporal variances within a honeypot dataset to better predict attack type probability, Proceedings of the IEEE World Congress on Internet Security, 2016.

-. In, Y. Song, and . Lee, Improvement of key exchange protocol to prevent man-inthe-middle attack in the satellite environment, Eighth International Conference on Ubiquitous and Future Networks (ICUFN), pp.408-413, 2016.

N. Saqib, Key exchange protocol for WSN resilient against man in the middle attack, IEEE International Conference on Advances in Computer Applications (ICACA), pp.265-269, 2016.

X. Li, J. Hao, Z. Feng, and B. An, Optimal Personalized Defense Strategy against Man-In-The-Middle Attack, vol.2, 2017.

M. Conti, N. Dragoni, and &. V. Lesyk, A survey of man in the middle attacks, IEEE Communications Surveys & Tutorials, vol.18, issue.3, pp.2027-2051, 2016.

T. Shubh and S. Sharma, Man-In-The-Middle-Attack Prevention Using HTTPS and SSL, vol.5, pp.569-579, 2015.

Y. Chen, X. Dong, P. Saxena, J. Mao, and Z. Liang, Man-in-the-browser-cache: Persisting HTTPS attacks via browser cache poisoning, Computers & Security, vol.55, pp.62-80, 2015.

E. Kheirkhah, S. Amin, H. Sistani, and H. Acharya, An Experimental Study of SSH Attacks by using Honeypot Decoys, vol.612, pp.5567-5578, 2013.

H. Alsaadi and M. Alkubaisi, Penetration Testing of Remote Secure OpenSSH On Raspberry Pi 2, 2016.

G. E. De-luca, E. A. Carnuccio, G. G. Garcia, and &. S. Barillaro, IoT fall detection system for the elderly using intel galileo development boards generation I, IEEE Congreso Argentino De Ciencias De La Informática y Desarrollos De Investigación (CACIDI), pp.1-6, 2016.

M. P. Valverde and &. J. González, A software controlled hardware acceleration architecture for image processing using an embedded development board, IEEE 36th Central American and Panama Convention (CONCAPAN XXXVI), pp.1-5, 2016.

S. Mischie and &. A. Muntean, Distance estimation through stereoscopy using BeagleBoneBlack and RaspberryPi, International Symposium on Signals, Circuits and Systems (ISSCS), pp.1-4, 2017.

K. Sukvichai, K. Wongsuwan, N. Kaewnark, and P. Wisanuvej, Implementation of visual odometry estimation for underwater robot on ROS by using RaspberryPi 2, International Conference on Electronics, Information, and Communications (ICEIC), pp.1-4, 2016.

I. Coonjah, P. C. Catherine, and &. K. Soyjaudah, Performance evaluation and analysis of layer 3 tunneling between OpenSSH and OpenVPN in a wide area network environment, International Conference on Computing, Communication and Security (ICCCS), pp.1-4, 2015.

I. Coonjah, P. C. Catherine, and &. K. Soyjaudah, A VPN framework through multi-layer tunnels based on OpenSSH, International Conference on Computing, Communication & Automation, pp.1395-1401, 2015.

H. Studiawan, B. A. Pratomo, and &. R. Anggoro, Clustering of SSH brute-force attack logs using k-clique percolation, International Conference on Information & Communication Technology and Systems (ICTS), pp.39-42, 2016.

G. K. Sadasivam, C. Hota, and &. B. Anand, Classification of SSH attacks using machine learning algorithms, 6th International Conference on IT Convergence and, 2016.