차세대 IoT 네트워크 보안 현황

  • Published : 2015.03.28

Abstract

Keywords

References

  1. Dave Evans, "The Internet of Things, How the Next Evolution of the Internet Is Changing Everything", White paper, CISCO, 2011.
  2. Cisco Fog computing, https://techradar.cisco.com/trends/Fog-Computing.
  3. Cisco Internet-of-everything(IoE), http://www.cisco.com/c/r/en/us/internet-of-everything-ioe/index.html.
  4. Intel IoT Gateway Product Brief, http://www.intel.com/content/www/us/en/embedded/design-tools/evaluation-platforms/gateway-solutions/iot-product-brief.html.
  5. "세계최고의 스마트 안심국가 실현을 위한 사물인터넷(IoT) 정보보호 로드맵", 미래창조과학부, 2014.10.
  6. Z. Shelby,K. Hartke, C. Bormann, "The Constrained Application Protocol (CoAP)", RFP7252, IETF, 2014.
  7. Zach Shelby, "CoAP: The Web of Things Protocol", ARM IoT Tutorial, 2014. 3.
  8. MQTT, http://mqtt.org/
  9. MQTT community wiki, https://github.com/mqtt/mqtt.github.io/wiki.
  10. NIPA 동향보고서, "통신업계의 네트워크 가상화 기술(SDN/NFV)도입 동향, 해외ICT 정책동향" , NIPA, 2014년 2호.
  11. Open network foundation(ONF), https://www.opennetworking.org/
  12. 이종화, "ETSI NFV 기술 표준화 동향", Vol.151, TTA Journal, 2014 01/02.
  13. ETSI Draft, "Network functions virtualization(NFV); NFV security; problem statement", ETSI GS NFV-SEC 001 v0.0.9, 2014.
  14. E. Rescorla,N. Modadugu, "Datagram Transport Layer Security Version 1.2", RFP6347, IETF, 2012. 1.
  15. Tamer AbuHmed, Nandinbold Nyamaa, and DaeHun Nyang, "Software-Based Remote Code Attestation in Wireless Sensor Network", IEEE "GLOBECOM" 2009.
  16. J.W. Ho, "Robust Detection of Malicious Nodes in Mobile Sensor Networks Using Software Attestation", Int'l. Journal of Distributed Sensor Networks, 2013.
  17. Marcello Lioy, "Peer-to-Peer Technology: Driving Innovative User Experiences in Mobile", AllJoyn, Presentation Slides.