D. Desai, and H. Upadhyay, “Security and Privacy consideration for internet of things in smart home environments,” International Journal of Engineering Research and Development, vol. 10, no. 11, pp. 73-83, November 2014.
 Chengliang Wang, Y. Peng, D. De, W. Song, “DPHK Real-Time Distributed Predicted Data Collecting based on activity pattern Knowledge mined from trajectories in Smart Environment”, Frontiers of Computer Science, Vol. 10, Issue 6, pp. 1000–1011, 2016.
 J. E. Kim, G. Boulos, J. Yackovich, T. Barth, C. Beckel, and D. Mosse, “Seamless integration of heterogeneous devices and access control in smart homes,” in Proc. 8th Int. Conf. Intell. Environ. (IE). pp. 206-213 June 2012.
 P. Kumar, A. Gurtov, J. Iinatti, M. Ylianttilla, and M. Sain, “Lightweight and secure session-key establishment scheme in smart home environments,” IEEE Sensors Journal, vol. 16, no. 1, pp.254-264, 2016.
 A. Kailas, V. Cecchi, and A. Mukherjee, “A survey of communication and networking technologies for energy management in building and home automation,” Journal of Computer Networks and communication, vol. 2012, 2012.
 GENIO—Next Generation Home. (Online). Available; http://projects.celtic-initiative.org/genio/, Jul. 15, 2015.
 SM4ALL—Smart Home for All. (Online). Available: http://www.sm4all-project.eu/, accessed Jul. 16, 2015.
 HOPE— Smart Home For Elderly People. (Online). Available: http://www.hope-project.eu/, accessed Jul. 15, 2015.
 R. Roshan, and A. Kr. Ray, “Challenges and risk to implement IOT in smart homes: An Indian perspective,” International Journal of Computer Applications, vol. 153, no. 3, pp. 16-19, November 2016.
 Chengliang Wang, Yu Zhang, “Time-Window and Voronoi-Partition Based Aggregation Scheduling in Multi-Sink Wireless Sensor Networks”, Ad Hoc & Sensor Wireless Networks. Vol. 32, issue, 3-4, pp. 221-238, in 2016.
 P. Kumar, A. Braeken, A. Gurtov, J. Iinatti, and P. H. Ha, “Anonymous secure framework in connected smart home environments,” Journal of Latex Class Files, IEEE Transactions on Information Forensics and Security, vol. 13, no. 9, 2017.
 B. Vaidya, D. Makrakis, and H. T. Mouftah, “Device authentication mechanism for smart energy home area network”, in Proc. IEEE Int. Conference Consum. Electron. (ICCE), June, 2013, pp. 88-93.
 N. P. Hoang and D. Pishva, “A TOR-based anonymous communication approach to secure smart home appliances,” in 2015 17th International Conferences on Advanced Communication Technology (ICACT). IEEE, 2015, pp. 517-525.
 E. Ayday and S. Rajagopal, “Secure Device Authentication Mechanisms for the Smart Grid-Enabled Home Area networks,” Tech. Rep., 2013.
 M. Burrough, and J. Gill. Smart thermostat Security: Turning up the Heat. (Online). Available: http://www.burrough.org/Documents/Thermostat-final-paper.pdf, accessed April, 10, 2015.
 “AVISPA: Automated Validation of Internet Security Protocols and Applications,” http://www.avispa-project.org/web-interface/basic.php.