[1] Bugeja, J.; Jacobsson, A.; Davidsson, P. "On Privacy and Security Challenges in Smart Connected Homes";EuropeanIntelligenceand Security Informatics Conference (EISIC), 2016, 172-175.##
[2] Robles, R. J.; Kim, T.h.; Cook, D.; Das, S. "A Review on Security in Smart Home Development"; IJAST. 2010, 15, 14-29.##
[3] Saleh, E. ; Abou, A. "An IDS for Detection of Active Attacks Against Rouring in Mobile Ad-Hoc Networks"; Journal of advanced defence science and technology. 2010, 1, 15-22.##
[4] Ashibani, Y.; Kauling, D.; Mahmoud, Q. H. "A Context-Aware Authentication Framework for Smart Homes"; IEEE 30th Canadian Conf. Electrical and Computer Eng. (CCECE). 2017, 1-5.##
[5] Frank, M.; Biedert, R.; Ma, E.; Martinovic, I.; Song, D. "Touchalytics: On the Applicability of Touchscreen Input As A Behavioral Biometric for Continuous Authentication"; IEEE Trans. Inf. Forensics Security. 2012, 8, 136-148.##
[6] Song, T.; Li, R.; Mei, B.; Yu, J.; Xing, X.; Cheng, X. "A Privacy Preserving Communication Protocol for Iot Applications in Smart Homes"; IEEE Internet Things J 2017, 4, 1844-1852.##
[7] Vandana, C.; Imam, T.; Dubey, S. "Security Issues in Home Automation"; IJSRCSEIT. 2017.##
[8] Jeong, J.; Chung, M. Y.; Choo, H. "Integrated OTP-based User Authentication Scheme Using Smart Cards in Home Networks"; Proc. 41st Annual Hawaii Int. Conf. System Sciences (HICSS). 2008, 294-294.##
[9] Vaidya, B.; Park, J. H.; Yeo, S.S.; Rodrigues, J. J. "Robust one-time Password Authentication Scheme Using Smart Card for Home Network Environment"; Comput Commu.n 2011, 34, 326-336.##
[10] Santoso, F. K. ; Vun, N. C. "Securing IoT for smart home system"; Int. Symposium on Consumer Electronics (ISCE). 2015, 1-2.##
[11] Chang, C.-C. ; Le, H.D. "A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad Hoc Wireless Sensor Networks"; IEEE T Wirel Commun. 2015, 15, 357-366.##
[12] Das, A. K.; Kumari, S.; Odelu, V.; Li, X.; Wu, F.; Huang, X. "Provably secure User Authentication and Key Agreement Scheme for Wireless Sensor Networks"; Secur Commun Netw. 2016, 9, 3670-3687.##
[13] Wazid, M.; Das, A. K.; Odelu, V.; Kumar, N.; Susilo, W. "Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment"; IEEE Trans. Depend. Sec. Comput. 2017.##
[14] Kumar, P.; Gurtov, A.; Iinatti, J.; Ylianttila, M.; Sain, M. "Lightweight and secure Session-Key Establishment Scheme in Smart Home Environments"; IEEE Sensors J. 2015, 16, 254-264.##
[15] Li, Y. "Design of a Key Establishment Protocol for Smart Home Energy Management System"; Fifth Int. Conf. Comput. Intell. Commun. Syst. Netw. 2013, 88-93.##
[16] Sierra, JM.; Hernández ,JC.; Alcaide, A.; Torres, J. "Validating the Use of BAN LOGIC"; Int. Conf. Comput. Sci. Appl. 2004,5, 851-858.##
[17] Masoumi, M.; Mahdizadeh, H. “The FPGA Implementation of an Efficient Elliplic Curve Cryptographic Process over GF(2163)”; Advanced Defence Sci.& Tech., 2012, 3, 199-211.##
[18] Naoui, S.; Elhdhili, M.E.; Saidane, L.A.; “Lightweight and Secure Password Based Smart Home Authentication Protocol: LSP-SHAP”; J NETW SYST MANAG. 2019, 4, 1020-1042.##
[19] Shuai, M.; Yu, N.; Wang, H.; Xiong, L.; “Anonymous Authentication Scheme for Smart Home Environment Provable Security”; COMPUT SECUR. 2019, 132-146.##
[20] Gurabi, M.A.; Alfandi, O.; Bochem, A.; Hogrefe, D.; “Hardware based Two-Factor User Authentication for the Internet of Things”; IWCMC.2018, 4, 1081-1086.##