사물인터넷 보안 요구사항과 oneM2M 표준 보안 기술 분석

  • Published : 2017.01.31

Abstract

Keywords

References

  1. Apple. (2016). iOS - Home. [online] Available at: http://www.apple.com/ios/home/ [Accessed 27 Dec. 2016].
  2. Google, (2016) Home - Nest. [online] Available at: http://nest.com/ [Accessed 27 Dec. 2016].
  3. NlST, "Guide to Storage Encryption Technologies for End User Devices", NlST SP 800-111, Nov. 2007
  4. NlST, "Security Requirements for Cryptographic Modules", NIST FIPS PUB 140-2, Dec. 2002
  5. Autosar.org. (2016). AUTOSAR: Home. [online] Available at: http://www.autosar.org/ [Accessed 27 Dec. 2016].
  6. oneM2M Partners, "Requirements", 2016
  7. oneM2M Partners, "Security Solutions", 2016
  8. oneM2M Partners, "Analysis of Security Solutions for the oneM2M System", 2016
  9. IETF(Intemet Engineering Task Force), "The Transport Layer Security Protocol Version 1.2", RFC 5246, pp. 3-5, Aug. 2008
  10. IETF(Intemet Engineering Task Force), "Datagram Transport Layer Security Version 1.2", RFC 6347, pp. 3-4, Jan. 2012
  11. oneM2M Partners, "Functional Architecture", 2016