1 |
Bong-Im Jang, Chang-Su Kim, "A Study on the Security Technology for the Internet of Things", Journal of Security Engineering, Vol.11, No.5, pp.429-438, August 2014.
DOI
|
2 |
ITU-T Y.2060, Overview of the Internet of Things, 2012.
|
3 |
Hye-Nam Kim, Yong Pa가, "Design of Context- Aware Middleware in Ubiquitous Computing Environment", Korea society of computer and information Vol.10, No.5, pp.115-122, November 2005.
|
4 |
Lee, Ki-Young ; Kim, Dong-Oh, "Design of a Location Management System in the Ubiquitous Computing Environments", Journal of the Korea society of computer and information, Vol.12, No.6, pp.115-121, December 2007.
|
5 |
http://www.bosa.co.kr/umap/sub.asp?news_pk=598466
|
6 |
Yoon Hwan Shin, "Pattern Analysis of Biometric Data for the Needle Points Selection in Big Data Environments", PhD thesis, Chungbuk National University, August 2014.
|
7 |
A. Wrigh(2009), Cyter security for the power grid: cyber security issues & Securing control system, ACM CCS, Nov.9-13; Chicago, IL, USA.
|
8 |
Donghee Kim, Seokung Yoon, Yongpil Lee, "Security for the IoT Service", The Korean Institute of Communication and Information Sciences, Vol.30, No.8, pp.53-59, August 2013.
|
9 |
Hae-soon Ahn, Eun-jun Yoon, Ki-dong Bu, In-gil Nam, "Secure and Efficient DB Security and Authentication Scheme for RFID System", journal of korean institute of communications and information sciences, Vol.36, No.4, pp.197-206, April 2011.
DOI
|
10 |
Howon Kim, "Security issues in the IoT Serives", Communications of the Korean Insitute of Information Scientists and Engineers, Vol.32, No.6, pp.37-41, June 2014.
|
11 |
Jong-yeop Sung, Sang-duck Lee, Chang-ju Ryu, Seung-jo Han, "Mutual Authentication Protocol using One Time Password for Mobile RFID System", Journal of the Korea Institute of Information and Communication Engineering, Vol.18, No.7, pp.1634-1642, July 2014.
DOI
|
12 |
Bong-Hwan Kim, Jung-Mi Lim, Chang-Seop Park, "Analysis of ZigBee Security Mechanism", Journal of Security Engineering, Vol.9, No.5, pp.417-430, October 2012.
|