과제정보
This work was supported by the Technology development Program funded by the Ministry of SMEs and Startups(MSS, Korea) (Grants No. S2957039, S3229617)
참고문헌
- S. Anwar and D. Kishore, "IOT Based Smart Home Security System with Alert and Door Access Control Using Smart Phone," International Journal of Engineering Research & Technology (IJERT), Vol. 5, No. 12, pp. 504-509, 2016. https://doi.org/10.15623/ijret.2016.0506088
- N.A. Hussein and I.A. Mansoori, "Smart Door System for Home Security Using Raspberry pi3," International Conference on Computer and Applications (ICCA), pp. 395-399, 2017.
- K. Artem, V. Teslyuk, I. Tsmots, and T. Myroslav, "Implementation of the Face Recognition Module for the "Smart" Home Using Remote Server," Conference on Computer Science and Information Technologies, pp. 17-27, 2018.
- D. Pavithra and R. Balakrishnan, "IoT Based Monitoring and Control System for Home Automation," Global Conference on Communication Technologies (GCCT), pp. 169-173, 2015.
- C.Y. Xu, X. Zheng, and X.M. Xiong, "The Design and Implementation of a Low Cost and High Security Smart Home System Based on Wi-Fi and SSL Technologies," Journal of Physics: Conference Series, Vol. 806, No. 1, 2017.
- X. Li, P. Jiang, T. Chen, X. Luo, and Q. Wen, "A Survey on the Security of Blockchain Systems," Future Generation Computer Systems, Vol. 107, pp. 841-853, 2020. https://doi.org/10.1016/j.future.2017.08.020
- S.A. Salami, J. Baek, K. Salah, and E. Damiani, "Lightweight Encryption for Smart Home," 11th International Conference on Availability, Reliability and Security (ARES), pp. 382-388, 2016.
- K.N. Mallikarjunan, K. Muthupriya, and S.M. Shalinie, "A Survey of Distributed Denial of Service Attack," 10th International Conference on Intelligent Systems and Control (ISCO), pp. 1-6, 2016.
- Y.C. Huang, "Secure Access Control Scheme of RFID System Application," Fifth International Conference on Information Assurance and Security, pp. 525-528, 2009.
- Q. Feng, D. He, S. Zeadally, M.K. Khan, and N. Kumar, "A Survey on Privacy Protection in Blockchain System," Journal of Network and Computer Applications, Vol. 126, pp. 45-58, 2019. https://doi.org/10.1016/j.jnca.2018.10.020
- W. Liang, Y. Fan, K.C. Li, D. Zhang, and J.L. Gaudiot, "Secure Data Storage and Recovery in Industrial Blockchain Network Environments," IEEE Transactions on Industrial Informatics, Vol. 16, No. 10, pp. 6543-6552, 2020. https://doi.org/10.1109/TII.2020.2966069
- D. Han, H. Kim, and J. Jang, "Blockchain Based Smart Door Lock System," International Conference on Information and Communication Technology Convergence (ICTC), pp. 1165-1167, 2017.
- Z. Meng, T. Morizumi, S. Miyata, and H. Kinoshita, "Design Scheme of Copyright Management System Based on Digital Watermarking and Blockchain," IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), pp. 359-364, 2018.
- S.K. Kwon, H.S. Han, and J.H. Eom, "A Study on the Operation Scheme of Layered Access Control for Effective Visitors's Access Control," Journal of Security Engineering, Vol. 9, No. 3, pp. 231-240, 2012.
- S. Pawar, V. Kithani, S. Ahuja, and S. Sahu, "Smart Home Security Using IoT and Face Recognition," Fourth International Conference on Computing Communication Control and Automation (ICCUBEA), pp. 1-6, 2018.
- B. Bhushan, G. Sahoo, and A.K. Rai, "Manin-the-Middle Attack in Wireless and Computer Networking-A Review," 3rd International Conference on Advances in Computing, Communication & Automation (ICACCA), pp. 1-6, 2017.
- J. Liang, I.J. Jang, and H.S. Yoo, "A Secure Token-Updated Authentication Scheme Using Security Key," The Journal of Society for e-Business Studies, Vol. 12, No. 1, pp. 89-97, 2007.
- Y. Feng, W. Wang, Y. Weng, and H. Zhang, "A Replay-Attack Resistant Authentication Scheme for the Internet of Things," IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), pp. 541-547, 2017.
- P. Sirohi, A. Agarwal, and S. Tyagi, "A Comprehensive Study on Security Attacks on SSL/TLS Protocol," 2nd International Conference on Next Generation Computing Technologies (NGCT), pp. 893-898, 2016.
- M. Nawir, A. Amir, N. Yaakob, and O.B. Lynn, "Internet of Things (IoT): Taxonomy of Security Attacks," 3rd International Conference on Electronic Design (ICED), pp. 321-326, 2016.
- D. Kim and K. Seo, "PGP Certification System in Blockchain Environments," Journal of Korea Multimedia Society, Vol. 23, No. 5, pp. 658-666, 2020. https://doi.org/10.9717/KMMS.2020.23.5.658
- S.H. Jung, J.H. Kim, and C.B. Sim, "Implementation of University Point Distributed System based on Public Blockchain," Journal of Korea Multimedia Society, Vol. 24, No. 2, pp. 255-266, 2021. https://doi.org/10.9717/KMMS.2020.24.2.255
- K.H. Lee and Y.H. Jung, "Blockchain-Based Access Control and Material Management System," Journal of the Korea AcademiaIndustrial cooperation Society, Vol. 22, No. 11, pp. 442-448, 2021. https://doi.org/10.5762/KAIS.2021.22.11.442
- A. Gervais, G.O. Karame, K. Wust, V. Glykantzis, H. Ritzdorf, and S. Capkun, "On the Security and Performance of Proof of Work Blockchains," Proceedings of the 2016 ACMSIGSAC Conference on Computer and Communications Security, pp. 3-16, 2016.
- L.M. Bach, B. Mihaljevic, and M. Zagar, "Comparative Analysis of Blockchain Consensus Algorithms," 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), pp. 1545-1550, 2018.
- H. Kim, "A Study on the Blockchain Based Knowledge Sharing Platform," The Journal of Society for e-Business Studies, Vol. 27, No. 1, pp. 95-109, 2022. https://doi.org/10.7838/JSEBS.2022.27.1.095
- Blockchain-based access control access code key verification service model code (2022), https://github.com/KiHyeon-Hong/Access_control_blockchain_network_paper.git (accessed May 31, 2022).
- Status of mandatory management fee disclosure complex (2022), http://www.k-apt.go.kr/ (accessed May 29, 2022).
- N. Vatcharatiansakul and P. Tuwanut, "A Performance Evaluation for Internet of Things Based on Blockchain Technology," 5th International Conference on Engineering, Applied Sciences and Technology (ICEAST), pp. 1-4, 2019.
- M. Kim and Y. Kim, "Implementing Blockchain Based Secure IoT Device Management System," Journal of IKEEE, Vol. 23, No. 4, pp. 1343-1352, 2019. https://doi.org/10.7471/IKEEE.2019.23.4.1343
- A. Dorri, S.S. Kanhere, R. Jurdak, and P. Gauravaram, "Blockchain for IoT Security and Privacy: The Case Study of a Smart Home," IEEE International Conference on Pervasive Computing and Communications Workshops, pp. 618-623, 2017