참고문헌
- Kim S.Y., Park S.K., Choi H.D., "Wide Range loT Technology and Standardization based on LPWA", Electronics and Telecommunications Trends, Vol. 31, No. 2, pp. 95-106, Apr, 2016
- P. Syverson, "A taxonomy of replay attacks [cryptographic protocols]," in Computer Security Foundations Workshop VII, 1994. CSFW 7. Proceedings. IEEE, 1994, pp.187-191.
- T. Kwon and J. Song, "Clarifying straight replays and forced delays," ACM SIGOPS Operating Systems Review, vol. 33, no. 1, pp. 47-52, 1999. https://doi.org/10.1145/309829.309842
- H. Lipmaa, P. Rogaway, and D. Wagner, "Ctr-mode encryption," in First NIST Workshop on Modes of Operation, 2000.
- R. Miller, "Lora security building a secure lora solution," [Online]. Available: http://www.lovdata.no/cgiwift/ldles?doc=/sf/sf/sf-20100326-0489.htm
- K. G. Paterson and A. K. Yau, "Cryptography in theory and practice: The case of encryption in ipsec," in Annual International Conference on the Theory and Applications
- O'Flynn, Colin P. "Message denial and alteration on IEEE 802.15. 4 low-power radio networks." New Technologies, Mobility and Security (NTMS), 2011 4th IFIP International Conference on. IEEE, 2011.
- Sung-Hyung Lee, Jae-Hyun Kim. "Device Authentication Protocol for LR-WPAN using Pre-Authentication Mechanism." The Institute of Electronics Engineers of Korea - Telecommunications, 47.4 (2010.4): 63-72.
- Zulian, Simone. "Security threat analysis and countermeasures for LoRaWAN join procedure." (2016).
- Mitchell, Changhua He John C. "Security Analysis and Improvements for IEEE 802.11 i." The 12th Annual Network and Distributed System Security Symposium (NDSS'05) Stanford University, Stanford. 2005.
- S. Ansari, S. Rajeev, and H. Chandrashekar, "Packet sniffing: a brief introduction," IEEE potentials, vol. 21, no. 5, pp. 17-19, 2002. https://doi.org/10.1109/MP.2002.1166620
- P. Asrodia and H. Patel, "Analysis of various packet sniffing tools for network monitoring and analysis," International Journal of Electrical, Electronics and Computer Engineering, vol. 1, no. 1, pp. 55-58, 2012.
- N. Sornin, M. Luis, T. Eirich, T. Kramp, and O. Hersent, "Lorawan specifications", LoRa Alliance, 2015.
- W. Diffie and M. E. Hellman, "Privacy and authentication: An introduction to cryptography," Proceedings of the IEEE, vol. 67, no. 3, pp. 397-427, 1979. https://doi.org/10.1109/PROC.1979.11256
- N. F. Pub, "197: Advanced encryption standard (aes)," Federal Information Processing Standards Publication, vol. 197, pp. 441-0311, 2001.
- A. H. Lashkari, M. M. S. Danesh, and B. Samadi, "A survey on wireless security protocols (wep, wpa and wpa2/802.11 i)," in Computer Science and Information Technology, 2009. ICCSIT 2009. 2nd IEEE International Conference on. IEEE, 2009, pp. 48-52.
- H. Suo, J. Wan, C. Zou, and J. Liu, "Security in the internet of things: a review," in Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on, vol. 3. IEEE, 2012, pp. 648-651.
- J. Song, R. Poovendran, J. Lee, and T. Iwata, "The aes-cmac algorithm," Tech. Rep., 2006.
- S. Zulian, "Security threat analysis and countermeasures for lorawanjoin procedure," 2016.
- Na S.J, Hwang D.Y., Shin W.S, Kim K.H, "Scenario and Countermeasure for Replay Attack Using Join Request Messages in LoRaWAN", ICOlN 2017 (31st International Conference on Information Networking), pp. 718-720, 2017
- Lee J. W, Hwang D. Y, Park J.H, Kim K.H, "Risk Analysis and Countermeasure for Bit-Flipping Attack in LoRa WAN", ICOlN 2017 (31 st International Conference on Information Networking), pp549-551, 2017