참고문헌
- S. Haller, S. Karnouskos, and C. Schroth, "The Internet of Things in an Enterprise Context," in Future Internet - FIS 2008 Lecture Notes in Computer Science Vol. 5468, pp. 14-28, 2009.
- S. Raza, H. Shafagh, K. Hewage, R. Hummen, and T. Voigt, "Lithe: Lightweight Secure CoAP for the Internet of Things," IEEE Sensors Journal, Vol. 13, No. 10, 2013.
- R. Roman, J. Zhou, and J. Lopez, "On the Features and Challenges of Security and Privacy in Distributed Internet of Things," Computer Networks, Vol. 57, Elsevier, pp. 2266-2279, July 2013. https://doi.org/10.1016/j.comnet.2012.12.018
- W. Trappe, R. Howard, and R. S. Moore, "Low-Energy Security: Limits and Opportunities in the Internet of Things," IEEE Security & Privacy, Vol. 13, No. 1, pp. 14-21, 2015. https://doi.org/10.1109/MSP.2015.7
- K. Jaffres-Runser, M. R. Schurgot, Q. Wang, C. Comaniciu and J M. Gorce, "A Cross-layer Framework for Multiobjective Performance Evaluation of Wireless Ad Hoc Networks," Ad Hoc Networks, Vol. 11, No. 8, pp. 2147-2171, 2013. https://doi.org/10.1016/j.adhoc.2013.04.006
- D. R. Raymond and S. F. midkiff, "Denial of service in wireless sensor Networks: Attakcs andDefenses", Pervasive Computing, Vol. 7, No. 1, pp. 74-81, Jan-Mar, 2008. https://doi.org/10.1109/MPRV.2008.6
- Gupta, M. Wurm, Y. Zhu, M. Millard, S. Fung, N. Gura, H. Eberle and S. C. Shantz, "Sizzle : A standards - Based End to End Security Architecture for the Embeded Internet", Pervasive mobile computing, Vol. 1, pp. 425-446, Dec. 2005. https://doi.org/10.1016/j.pmcj.2005.08.005
- T. Heer, O. Garcia-Morchon, R. Hummen, S. L. Keoh, S. S. Kumar and K. Wehrle, "Security challenges in the ip based interent of things", Wireless Personal Communications, Vol. 61, No. 3, pp. 527-524, 2011. https://doi.org/10.1007/s11277-011-0385-5
- R. H. Weber, "Internet of Things: New Security and Privacy Challenges," Computer Law & Security Review, vol. 26, no. 1, pp. 23-30, 2010. https://doi.org/10.1016/j.clsr.2009.11.008
- R. Roman, P. Najera, J. Lopez, "Securing the Internet of Things," Computer, vol.44, no.9, pp.51,58, Sept. 2011
- Sahid Raza, "Lightweight security solutions for the Internet Of Things", Malardalen University Sweden, 2013.
- Shahid Raza, Hossein Shafagh, Kasun Hewage, Rene Hummen, and Hiemo Voigt, "Lithe: Lightweight Secure CoAP for the Internet of Things", IEEE Sensor Journals, 2013.
- Daniele Trabalza, "Implementation and Evaluation of Datagram Transport Layer Security for the android operating system", 2013.
- H. S. Ning, H. Liu; Y, L.T. "Cyberentity Security in the Internet of Things," Computer, Vol. 46, No.4, pp. 46-53, Apr. 2013. https://doi.org/10.1109/MC.2013.74
- T. Heer, O. Garcia-Morchon, R. Hummen, S. L. Keoh, S. S. Kumar and K.laus Wehrle. Security challenges in the ipbased internet of things. Wireless Personal Comomunications, Vol. 61, No. 3, pp. 527-542, 2011. https://doi.org/10.1007/s11277-011-0385-5
- D. R Raymond and S. F. midkiff, "Denial of service in wireless sensor Networks: Attacks and Defenses" Pervasive Computing, Vol. 7, No. 1, pp. 74-81, Jan-Mar 2008. https://doi.org/10.1109/MPRV.2008.6
- V. Gupta, M Wurm, Y. Zhu, M. Millard, S Fung, N. Gura, H. Eberle and S.C. Shantz, "Sizzle: A standards - Based End to End Security Architecture for the Embeded Internet" pervasive moblie computing, Vol. 1, pp. 425-445, Dec. 2005. https://doi.org/10.1016/j.pmcj.2005.08.005
- J. W. Jung, J. D. Kim, M. G. Song, Chul-Gu Jin, "A study on Development of Certification Schemes for Cloud Security", Journal of digital Convergence , Vol. 13, No. 8, pp. 43-49, 2015. https://doi.org/10.14400/JDC.2015.13.8.43
- S. J. Lee and W. S. Bae, "Inter-device Mutual Authentication and Formal Verification in Vehicular Security System", Journal of digital Convergence, Vol. 13, No. 4, pp. 205-210, 2015. https://doi.org/10.14400/JDC.2015.13.4.205
- Y. S. Choo, B. W. Jin, J. P. Park and M. S. Jun, "Design The User Authentication Framework Using u-health System", Journal of digital Convergence, Vol. 13, No. 5, pp. 219-226, 2015. https://doi.org/10.14400/JDC.2015.13.5.219
- K. B. Kim and H. J. Cho, "A Study on the Regulation Improvement Measures for Activation of Internet of Things and Big Data Convergence", Journal of the Korea Convergence Society, Vol. 8. No. 5, pp. 29-35, 2017. https://doi.org/10.15207/JKCS.2017.8.5.029
- J. S. Park, "A Data Driven Index for Convergence Sensor Networks", Journal of the Korea Convergence Society, Vol. 7. No. 6, pp. 43-48, 2016. https://doi.org/10.15207/JKCS.2016.7.6.043
- D. Y. Jung and Y. Y. Sok, "A Study on the Edu-tainer Convergence App for Young Children's Play learning in Mobile Environments", Journal of the Korea Convergence Society, Vol. 7. No. 5, pp. 23-28, 2016. https://doi.org/10.15207/JKCS.2016.7.5.023
- S. S. Shin, S. H. Lee, "Security Requirements Analysis and Countermeasures in Cloud Computing," Journal of IT Convergence Society for SMB, Vol. 5, No. 1, pp. 27-32, 2015.
- H. G. Hong, "Business Process Support Based on IoT Technology," Journal of Convergence for Information Technology , Vol. 7, No. 1, pp. 75-79, 2017. https://doi.org/10.22156/CS4SMB.2017.7.1.075
- B. W. Min, "An Improvement of Personalized Computer Aided Diagnosis Probability for Smart Healthcare Service System," Journal of IT Convergence Society for SMB, Vol. 6, No. 4, pp. 85-91, 2016.