그림 1. 블루투스 암호모듈 구성도 Fig. 1 Bluetooth password module configuration
그림 2. 블루투스 기반 H/W 구조도 Fig. 2 Bluetooth-based H/W structure
그림 3. 블루투스 기반 S/W 구조도 Fig. 3 Bluetooth-based S/W structure
그림 4. USB2642 Block Diagram Fig. 4 USB2642 Block Diagram
그림 5. Advertising 과정 Fig. 5 Advertising course
그림 6. SFMS 모듈 운용 구조 Fig. 6 SFMS module operation structure
그림 7. 기능간 인터페이스 블록 Fig. 7 Inter-functional interface block
그림 8 블루투스 블럭 Fig. 8 Bluetooth Block
그림 9. S/W 기능 상세도 Fig. 9 Detail of S/W function
표 1. 2016년 상반기 랜섬웨어 월별 침해통계 Table 1. Monthly infringement statistics of Ramsome ware by the first half of 2016
References
- D. Boneh and B. Waters, "Conjunctive, Subset and Range Queries on Encrypted Data," Theory of Cryptography Conf., Osaka, Japan, July, 2007, pp. 1-29.
- H. Lee and J. Oh, "Design and Implementation of a Small Server Room Environment Monitoring System by Using the Arduino," J. of the Korea Institute of Electronic Communication Sciences, vol. 12, no. 2, Apr. 2017, pp. 386-387.
- D. Ryu and T. Choi, "Development of Open IoT platform based on Open Source Hardware & Cloud Service," J. of the Korea Institute of Electronic Communication Sciences, vol. 11, no. 5, May 2016, pp. 485-49. https://doi.org/10.13067/JKIECS.2016.11.5.485
- K. Nam, "A Study on the Office Management Service Platform based on M2M/IoT," J. of the Korea Institute of Electronic Communication Sciences, vol. 9, no. 12, Dec. 2014, pp. 1405-1413. https://doi.org/10.13067/JKIECS.2014.9.12.1405
- D. Ryu and T. Choi, "Development of Open IoT platform based on Open Source Hardware & Cloud Service," J. of the Korea Institute of Electronic Communication Sciences, vol. 11, no. 5, Mar. 2016, pp. 485-490. https://doi.org/10.13067/JKIECS.2016.11.5.485
- H. Huh and J. Lee, "A Study on Development of H8 MCU IDB(Integrated development board) for Embedded Education," J. of the Korea Institute of Electronic Communication Sciences, vol. 4, no. 1, 2009, pp. 51-57.
- K Yoo and D. Ko, "Study on the Performance Test Technique of Open SW-based Cloud computing." J. of Korean Institute of Information Technology, vol. 10, no.7, 2012, pp.185-192.
- J. Saidov, B. Kim, J. Lee, and G. Lee, "Hardware Interlocking Security System with Secure Key Update Mechanisms In IoT Environments," J. of the Korea Institute of Electronic Communication Sciences, vol. 12, no. 4, 2017, pp. 671-678. https://doi.org/10.13067/JKIECS.2017.12.4.671
- J. Jang, C. Choi, and D. Kim, "Design of Smart Tourism in Big Data," J. of the Korea Institute of Electronic Communication Sciences, vol. 12, no. 4, 2017, pp. 637-644. https://doi.org/10.13067/JKIECS.2017.12.4.637
- J. Jang, D. Kim, and C. Choi, "Study on Hybrid Type Cloud System," J. of the Korea Institute of Electronic Communication Sciences, vol. 11, no. 6, 2016, pp. 611-618. https://doi.org/10.13067/JKIECS.2016.11.6.611