ICT와 산업 융합에 따른 보안 취약성 및 융합 보안 기술

  • Published : 2017.07.14

Abstract

Keywords

References

  1. S.W. Shin, D.H. Kang, K.Y. Kim, and J.S. Jang, "Analysis of deep packet inspection technology", Electronics and Telecommunications Trends, Vol 19, no. 3, pp.117-124, 2004.
  2. R. Stiennon, "DPI: next phase of firewall technology", Technology T-18-0340 Report, Gartner Group, 2002.
  3. Y.-H. Chen, "Introduction of information security for industrial control system", Korea Institute of Information Security and Cryptology, Vol. 19, no. 5, pp.52-59, 2009.
  4. openADR Alliance, http://www.openadr.org
  5. openADR 2.0 Profile Specification A Profile, openADR Alliance, 2011
  6. Zigbee Alliance, http://www.zigbee.org
  7. Electricity Metering Data Exchange - The DLMS/COSEM suite - Part5-3: DLMS/COSEM application layer, lEC 62056-5-3 Ed.1.0, International Electrotechnical Commission, 2013.
  8. Electricity Metering Data Exchange - The DLMS/COSEM SUITE-Part6-1: COSEM Object Identification System (OBIS), IEC 62056-6-1 Ed.1.0, International Electrotechnical Commission, 2013.
  9. Electricity Metering Data Exchange - The DLMS/COSEM suite-Part6-2: COSEM interface classes, IEC 62056-6-2 Ed.1.0, International Electrotechnical Commission, 2013.
  10. Nathan Pocock, Darek Kominek, and Paul Hunkar, "OPC-UA security how it works", Information Revolution 2014, 2014.
  11. OPC unified architecture - part 1 :overview and concepts, IEC62541, International Electrotechnical Commission, Feb. 2010.
  12. DNP User Group, "DNP V3.00 Documentation", DNP Product Documentation, 1995.
  13. Electronic Engineering Co., "The Concept of CAN Protocol," Electronic Engineering Magazine, pp.114-120, 1998.
  14. Z. Shelby, K. Hartke, and C. Bormann, The Constrained Application Protocol (CoAP), IETF RFC 7252, IETF, 2014.
  15. MQTT Version 3.1.1 OASIS Standard. 2014.