참고문헌
- Burhan, M., et al., IoT elements, layered architectures and security issues: a comprehensive survey. Sensors, 2018. 18(9): p. 2796.
- Mahmoud, R., et al. Internet of things (IoT) security: Current status, challenges and prospective measures. in 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST). 2015. IEEE.
- Kumar, S.A., T. Vealey, and H. Srivastava. Security in internet of things: Challenges, solutions and future directions. in 2016 49th Hawaii International Conference on System Sciences (HICSS). 2016. IEEE.
- Abomhara, M., Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks. Journal of Cyber Security and Mobility, 2015. 4(1): p. 65-88. https://doi.org/10.13052/jcsm2245-1439.414
- Prasad, N.R. Threat model framework and methodology for personal networks (PNs). in 2007 2nd International Conference on Communication Systems Software and Middleware. 2007. IEEE.
- Kumar, J.S. and D.R. Patel, A survey on internet of things: Security and privacy issues. International Journal of Computer Applications, 2014. 90(11).
- Singh, D., G. Tripathi, and A. Jara. Secure layers based architecture for Internet of Things. in 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT). 2015. IEEE.
- Ravindran, R., J. Yomas, and E. Jubin Sebastian, IoT: A review on security issues and measures. International Journal of Engineering Science and Technology, 2015. 5(6): p. 348-351.
- Perez, S., et al. ARMOUR: Large-scale experiments for IoT security & trust. in 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT). 2016. IEEE.
- Al-Qaseemi, S.A., et al. IoT architecture challenges and issues: Lack of standardization. in 2016 Future Technologies Conference (FTC). 2016. IEEE.
- Varga, P., et al. Security threats and issues in automation IoT. in 2017 IEEE 13th International Workshop on Factory Communication Systems (WFCS). 2017. IEEE.
- Vashi, S., et al. Internet of Things (IoT): A vision, architectural elements, and security issues. in 2017 international conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC). 2017. IEEE.
- Naik, S. and V. Maral. Cyber security-IoT. in 2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT). 2017. IEEE.
- Frustaci, M., et al., Evaluating critical security issues of the IoT world: Present and future challenges. IEEE Internet of things journal, 2017. 5(4): p. 2483-2495. https://doi.org/10.1109/JIOT.2017.2767291
- Chinanu, U.E., O.E. Oche, and J.O. Okah-Edemoh, Architectural Layers of Internet of Things: Analysis of Security Threats and Their Countermeasures. Scientific Review, 2018. 4(10): p. 80-89.
- Rao, T.A., Security challenges facing IoT layers and its protective measures. International Journal of Computer Applications, 2018. 975: p. 8887.
- Aydos, M., Y. Vural, and A. Tekerek, Assessing risks and threats with layered approach to Internet of Things security. Measurement and Control, 2019. 52(5-6): p. 338-353. https://doi.org/10.1177/0020294019837991
- Azam, F., et al., Internet Of Things (Iot), Security Issues And Its Solutions. Science Heritage Journal (GWS), 2019. 3(2): p. 18-21. https://doi.org/10.26480/gws.02.2019.18.21
- Kraijak, S. and P. Tuwanut, A survey on IoT architectures, protocols, applications, security, privacy, real-world implementation and future trends. 2015.
- Ahemd, M.M., M.A. Shah, and A. Wahid. IoT security: A layered approach for attacks & defenses. in 2017 International Conference on Communication Technologies (ComTech). 2017. IEEE.
- Frustaci, M., P. Pace, and G. Aloi. Securing the IoT world: issues and perspectives. in 2017 IEEE Conference on Standards for Communications and Networking (CSCN). 2017. IEEE.
- Deogirikar, J. and A. Vidhate. Security attacks in IoT: A survey. in 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC). 2017. IEEE.
- Jain, A. and T. Singh, Security Challenges and Solutions of IoT Ecosystem, in Information and Communication Technology for Sustainable Development. 2020, Springer. p. 259-270.
- Ahmed, A.W., et al., A comprehensive analysis on the security threats and their countermeasures of IoT. International Journal of Advanced Computer Science and Applications, 2017. 8(7): p. 489-501.
- Khan, M.A. and K. Salah, IoT security: Review, blockchain solutions, and open challenges. Future Generation Computer Systems, 2018. 82: p. 395-411. https://doi.org/10.1016/j.future.2017.11.022
- Gautam, S., et al. Recent Advances and Countermeasures Against Various Attacks in IoT Environment. in 2019 2nd International Conference on Signal Processing and Communication (ICSPC). 2019. IEEE.
- Swamy, S.N., D. Jadhav, and N. Kulkarni. Security threats in the application layer in IOT applications. in 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC). 2017. IEEE.
- Chen, C.-M., et al., RCDA: Recoverable concealed data aggregation for data integrity in wireless sensor networks. IEEE Transactions on parallel and distributed systems, 2011. 23(4): p. 727-734. https://doi.org/10.1109/TPDS.2011.219
- Daneshmand, S., et al., A low-complexity GPS anti-spoofing method using a multi-antenna array. a a, 2012. 2: p. 2.
- Salman, T. and R. Jain, Networking protocols and standards for internet of things. Internet of Things and Data Analytics Handbook, 2015. 2015: p. 215-238.
- Salman, T. and R. Jain, A survey of protocols and standards for internet of things. arXiv preprint arXiv:1903.11549, 2019.
- Tukade, T.M. and R. Banakar, Data transfer protocols in IoT-An overview. International Journal of Pure and Applied Mathematics, 2018. 118(16): p. 121-138.
- Yassein, M.B. and M.Q. Shatnawi. Application layer protocols for the Internet of Things: A survey. in 2016 International Conference on Engineering & MIS (ICEMIS). 2016. IEEE.