1 |
미래창조과학부, "사물인터넷(IoT) 정보보호 로드맵," 2014년 10월.
|
2 |
김호원, 김동규, "IoT 기술과 보안," 한국정보보호학회지, 22권, 1호, pp. 7-13, 2012년 2월.
|
3 |
ITU-T Y.2060: Overview of the Internet of things, June 2012.
|
4 |
A. Serbanati, et al., "IoT-A Project Deliverable D4.2 - Concepts and Solutions for Privacy and Security in the Resolution Infrastructure," Feb. 2012.
|
5 |
A. Perrig, D. Song, R. Canetti, J.D. Tyger, B. Briscoe, "Timed Efficient Stream Loss-Tolerant Authentication (TESLA): Multicast Source Authentication Transform Introduction," RFC 4082, June 2005.
|
6 |
TTA, "128비트 경량 블록 암호 LEA," 정보통신단체표준, 2013년 12월.
|
7 |
D.-C. Kim, et al., "LSH: A New Fast Secure Hash Function Family," in Proc. ICISC 2014, LNCS 8949, pp. 286-313, 2015.
|
8 |
J.H. Cheon, H.T. Lee, J.H. Seo, "A New Additive Homomorphic Encryption based on the co-ACD Problem," in Proc. ACM SIGSAC Conf. Computer and Commun. Security, 2014, pp. 287-298.
|
9 |
A. Riahi, et al., "A systemic and cognitive approach for IoT security," in Proc. Int. Conf. Computing, Networking, and Commun., 2014.
|
10 |
J. Lee, B. Bagheri, H.-A. Kao, "A Cyber-Physical Systems architecture for Industry 4.0-based manufacturing systems," Manufacturing Letters, vol. 3., pp. 18-23, 2015.
DOI
|
11 |
Tofino Security, https://www.tofinosecurity.com/blog/majormanufacturer-admits-plc-security-breach
|
12 |
Stuxnet, https://en.wikipedia.org/wiki/Stuxnet
|
13 |
C. Neuman, "Challenges in security for cyber-physical systems," in Proc. DHS: S&T workshop on future directions in cyber-physical systems security, 2009.
|
14 |
E.K. Wang, et al., "Security issues and challenges for cyber physical system," in Proc. the 2010 IEEE/ACM Int'l Conf. Green Computing and Commun. & Int. Conf. Cyber, Physical and Social Computing, 2010. p. 733-738.
|