References
- D. Y. Kim, J. S. Park, Y. H. Choi, and Y. C. Choi, "Device state and packet transmission control scheme of 5G networks for supporting uplink-oriented IoT services," in Proceedings of the 2016 Institute of Electronics and Information Engineers Fall Conference, Daegu, Korea, pp. 335-337, 2016.
- J. H. Lee, "A literature review on security for Internet of Things in Korea based on IoT S-P-N-D-Se ecosystem model," Journal of Security Engineering, vol. 12, no. 4, pp. 397-414, 2015. DOI: 10.14257/jse.2015.08.05.
- Y. A. Hur and K. H. Lee, "A study on countermeasures of convergence for big data and security threats to attack DRDoS in u-healthcare device," Journal of the Korea Convergence Society, vol. 6, no. 4, pp. 243-248, 2015. DOI: 10.15207/JKCS.6.4.243.
- S. H. Park and J. K. Park, "Security technology trend of IoTs," in Proceedings of the Korea Institute of Information & Telecommunication Facilities Engineering Summer Conference, pp. 169-171, 2016.
- H. S. Chang, H. J. Kim, and T. Shon, "Study of cyber security issues in industrial IoT," KIISE Review, vol. 25, no. 5, pp. 12-17, 2015.
- S. J. Na, J. W. Lee, and K. H. Kim, "A study of DoS attack scenario in LoRaWAN," in Proceedings of the Korea Institute of Information & Telecommunication Facilities Engineering Summer Conference, pp. 53-55, 2016.
- LoRa Alliance, "LoRaWAN Specification v1.0," 2015 [Internet], Available: https://lora-alliance.org/resource-hub/lorawantm-specificationv10.
- K. C. Rim and K. B. Lee, "An analysis of voter behavior in campaign scenes utilizing an inverse-order tree and a smartphone application," International Journal of Applied Engineering Research, vol. 11, no. 2, pp. 815-819, 2016.
Cited by
- Adaptable Online Game Server Design vol.18, pp.2, 2018, https://doi.org/10.6109/jicce.2020.18.2.82
- Hyperledger Blockchain Design for Sharing, Spreading, and Protecting National Cybersecurity Information vol.18, pp.2, 2018, https://doi.org/10.6109/jicce.2020.18.2.94