[1] European Commission, “Internet of Things factsheet Privacy and Security,” January 2019. Available on: http://ec.europa.eu/information_society [Accessed:]##
[2] Zarpelao, B. Bruno, S. M. Rodrigo, T. K. Cláudio, and C. de A. Sean, “A survey of intrusion detection in Internet of Things,” Journal of Network and Computer Applications, vol. 84, pp. 25-37, 2017.##
[3] T. Itu, “Series y: Global information infrastructure,” Internet protocol aspects and next-generation networks, Next Generation Networks - Frameworks and functionalarchitecture models,##
[4] International Telecommunication Union, Overview of the Internet of things, Rec. ITU-T Y.2060, January 2019. Available on: https://www.itu.int##
[5] M. U. Farooq, W. Muhammad, K. Anjum, and M. Sadia, “A critical analysis on the security concerns of internet of things (IoT),” International Journal of Computer Applications, vol. 111, no. 7, 2015.##
[6] A. K. Sikder, P. Giuseppe, A. Hidayet, J. Trent, and A. Selcuk Uluagac, “A Survey on Sensor-based Threats to Internet-of-Things (IoT) Devices and Applications,” arXiv preprint, arXiv:1802.02041, 2018.##
[7] N. A. Bruno, M. Marc, N. N. Xuan, O. Katia, and T. Thierry, “A Survey of Software-Defined Networking: Past, Present, and Future of Programmable Networks,” IEEE Communications Surveys and Tutorials, vol. 16, no. 3, pp. 1617-1634, 2014.##
[8] J. Li, A. Eitan, and T. Corinne, “A general SDN-based IoT framework with NVF implementation” ZTE communications, vol. 13, no. 4, pp. 42-45, 2015.##
[9] Y. Jarraya, M. Taous, and D. Mourad, “A Survey and a Layered Taxonomy of Software-Defined Networking,” IEEE Communications Surveys and Tutorials, vol. 16, no. 4, pp. 1955-1980, 2014.##
[10] O. Flauzac, C. Gonzalez, and F. Nolot, “New security architecture for IoT network” Procedia Computer Science, vol. 52, pp. 1028-1033, 2015.##
[11] O. Flauzac, C. Gonzalez, A. Hachani, and F. Nolot, “SDN based architecture for IoT and improvement of the security,” In Advanced Information Networking and Applications Workshops (WAINA), IEEE 29th International Conference on, IEEE, pp. 688-693, 2015.##
[12] Y. Qiao, F. Richard Yu, G. Qingxiang, and L. Jianqiang, “Software-defined networking (SDN) and distributed denial of service attacks in cloud computing environments: A survey, some research issues, and challenges,” IEEE Communications Surveys & Tutorials, vol. 18, no. 1, pp. 602-622, 2016.##