References
- Dave Evans, "The Internet of Things, How the Next Evolution of the Internet Is Changing Everything", White paper, CISCO, 2011.
- Cisco Fog computing, https://techradar.cisco.com/trends/Fog-Computing.
- Cisco Internet-of-everything(IoE), http://www.cisco.com/c/r/en/us/internet-of-everything-ioe/index.html.
- Intel IoT Gateway Product Brief, http://www.intel.com/content/www/us/en/embedded/design-tools/evaluation-platforms/gateway-solutions/iot-product-brief.html.
- "세계최고의 스마트 안심국가 실현을 위한 사물인터넷(IoT) 정보보호 로드맵", 미래창조과학부, 2014.10.
- Z. Shelby,K. Hartke, C. Bormann, "The Constrained Application Protocol (CoAP)", RFP7252, IETF, 2014.
- Zach Shelby, "CoAP: The Web of Things Protocol", ARM IoT Tutorial, 2014. 3.
- MQTT, http://mqtt.org/
- MQTT community wiki, https://github.com/mqtt/mqtt.github.io/wiki.
- NIPA 동향보고서, "통신업계의 네트워크 가상화 기술(SDN/NFV)도입 동향, 해외ICT 정책동향" , NIPA, 2014년 2호.
- Open network foundation(ONF), https://www.opennetworking.org/
- 이종화, "ETSI NFV 기술 표준화 동향", Vol.151, TTA Journal, 2014 01/02.
- ETSI Draft, "Network functions virtualization(NFV); NFV security; problem statement", ETSI GS NFV-SEC 001 v0.0.9, 2014.
- E. Rescorla,N. Modadugu, "Datagram Transport Layer Security Version 1.2", RFP6347, IETF, 2012. 1.
- Tamer AbuHmed, Nandinbold Nyamaa, and DaeHun Nyang, "Software-Based Remote Code Attestation in Wireless Sensor Network", IEEE "GLOBECOM" 2009.
- J.W. Ho, "Robust Detection of Malicious Nodes in Mobile Sensor Networks Using Software Attestation", Int'l. Journal of Distributed Sensor Networks, 2013.
- Marcello Lioy, "Peer-to-Peer Technology: Driving Innovative User Experiences in Mobile", AllJoyn, Presentation Slides.