[1] L. Yushi, J. Fei, and Y. Hui, “Study on application modes of military Internet of Things (MIOT),” 2012 IEEE International Conference on Computer Science and Automation Engineering (CSAE) , pp. 630-634, 2012.##
[2] R. P Feynman, “Simulating physics with computers,” International journal of theoretical physics 21.6-7, pp. 467-488, 1982.##
[3] A. M. Childs and et al., “Quantum walks on graphs,” Proceedings of 35th ACM Symposium on Theory of Computing STOC, 2003.##
[4] H. C. Bennett and G. Brassard, “Quantum Cryptography: Public Key Distribution and Coin Tossing,” IEEE International Conference on Computers Systems and Signal Processing, vol. 560, pp. 175-179, 1984.##
[5] “IoT Roadmap - Iran Telecommunication Research Center,” 1396. (In Persian) [Online]. Available: https: //iot.itrc.ac.ir/sites/default/files/PRESENTATION%20-IOT.pdf.##
[6] “The Guardian,” 2016. [Online]. Available: https: //www.theguardian.com/technology/2016/feb/09/internet-of-things-smart-home-devices-government-surveillance-james-clapper.##
[7] “Military Applications Iot,” 2018. [Online]. Available: http: //wfiot2018.iot.ieee.org/sps2-military-applications-iot/.##
[8] “Global Research,” 2015. [Online]. Available: https: //www.globalresearch.ca/nsa-cyber-war-will-use-internet-of-things-as-weapons-platform-your-home-is-the-battlefield/5425526.##
[9] “The Hill,” Morgan Wright, Opinion Contributor- 03/14/18 06: 00 AM EDT, 2018. [Online]. Available: https: //thehill.com/opinion/technology/378286-for-national-security-the-internet-of-things-is-the-internet-of-trouble.##
[10] “High Council of Cyberspace,” 1396. (In Persian) [Online]. Available: http: //www.ion.ir/News/305245.html.##
[11] “The need for national coordination in the use of the Internet of Things,” Establishment of Internet of Things Working Group at the National Cyberspace Center, 1396. (In Persian) [Online]. Available: majazi.ir.##
[12] “Goals and Achievements - Internet of Things,” 1396. (In Persian). [Online]. Available: https: //iot.itrc.ac.ir/node/83##
[13] M. A. Jan, F. Khan, M. Alam, and M. Usman, “A payload-based mutual authentication scheme for Internet of Things,” Future Generation Computer Systems 92, pp. 1028-1039, 2019.##
[14] L. Zhou, X. Li, K.-H. Yeh, C. Su, and W. Chiu, “Lightweight IoT-based authentication scheme in cloud computing circumstance,” Future Generation Computer Systems 91, pp. 244-251, 2019.##
[15] D. Chen, N. Zhang, and Z. Qin, “S2M: a lightweight acoustic fingerprints based wireless device authentication protocol,” IEEE Internet of Things Journal, vol. 4, no. 1, pp. 88-100, 2017.##