참고문헌
- S. Chae, Y. Yang, and T. Han, "The Fourth Industrial Revolution and Multimedia Converging Technology: Pervasive AR Platform Construction Using a Mobile Robot based Projection Technology," Journal of Korea Multimedia Society, Vol. 20, No. 2, pp. 298-312, 2017. https://doi.org/10.9717/kmms.2017.20.2.298
- M. Diaz, C. Martin, and B. Rubio, "State-of-the-art, Challenges, and Open Issues in the Integration of Internet of Things and Cloud Computting," Journal of Network and Computer Applications, Vol. 67, pp. 99-117, 2016. https://doi.org/10.1016/j.jnca.2016.01.010
- Q. Zhang, L. Cheng, and R. Boutaba, “Cloud Computing: State-of-the-art and Research Challenges,” Journal of Internet Services and Applications, Vol. 1, No. 1, pp. 7-18, 2010. https://doi.org/10.1007/s13174-010-0007-6
- F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, "Fog Computing and Its Role in the Internet of Things," Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computting, pp. 13-16, 2012.
- A.V. Dastjerdi and R. Buyya, "Fog Computing: Helping the Internet of Things Realize Its Potential," Computer, Vol. 49, Issue 8, pp. 112-116, 2016. https://doi.org/10.1109/MC.2016.245
- D. Dujovne, T. Watteyne, X. Vilajosana, and P. Thubert, “6TiSCH: Deterministic IP-enabled Industrial Internet(of Things),” IEEE Communications Magazine, Vol. 52, No. 12, pp. 36-41, 2014. https://doi.org/10.1109/MCOM.2014.6979984
- E. Borgia, "The Internet of Things Vision: Key Features, Applications and Open Issues," Computer Communications, Vol. 54, pp. 1-31, 2014. https://doi.org/10.1016/j.comcom.2014.09.008
- J.S. Zielinsku, “Internet of Everything (IoE) in Smart Grid,” Przeglad Elektrotechniczny, Vol. 91, No. 3, pp. 157-159, 2015.
- P.A.F. Vitti, D.R. dos Santos, C.B. Westphall, C.M. Westphall, and K.M.M. Vieir, "Current Issues in Cloud Computing Security and Management," Secuware 2014, pp. 36-42, 2014.
- S. Sarkar, V.K. Bharadwaj, and G. Priya, “Security Issues and Challenges in Cloud Computing,” International Research Journal of Engineering and Technology, Vol. 3, No. 10, pp. 1143-1146, 2016.
- R. Arora and A. Parashar, "Secure User Data in Cloud Computing Using Encryption Algorithms," International Journal of Engineering Research and Applications, Vol. 3, No. 4, pp. 1922-1926, 2013.
- NIST, Advanced Encryption Standard(AES), Federal Information Processing Standards Publication 197(FIPS-197), 2001.
- IEEE, PART 11: Wireless LAN Medium Access Control(MAC) and Physical Layer (PHY) Specifications, IEEE Std 802.11i, 2004.
- IETF, Hypertext Transfer Protocol (HTTP/1.1): Authentication, RFC 7235, 2014.
- IETF, Remote Authentication Dial-In User Service (RADIUS) Protocol Extensions, RFC 6929, 2013.
- IEEE, IEEE Standard for Ethernet, IEEE Std 802.3, 2012.
- D. Hong, J.K. Lee, D.C. Kim, D. Kwon, K.H. Ryu, and D.G. Lee, "LEA: A 128-Bit Block Cipher for Fast Encryption on Common Processors," Proceeding of International Workshop on Information Security Applications, pp. 3-27, 2013.
- IETF, Diffie-Hellman Key Agreement Method, RFC 2631, 1999.
- J.S. Coron, Y. Dodis, C. Malinaud, and P. Puniya, "Merkle-Damgard Revisited: How to Construct a Hash Function," Proceeding of Annual International Conference on Advances in Cryptology, pp. 430-448, 2005.