1 |
A. Coppa, "Secure and User-Friendly Commissioning and Bootstrapping of Constrained Devices,"Norwegian University of Science and Technology, December, 2015
|
2 |
C. Botnet, Internet Census 2012 - Port scanning/0 using insecure embedded devices, October, 2012 (http://internetcensus2012.bitbucket.org/paper.html)
|
3 |
M. B. Barcena and C. Wueest, "Insecurity in the Internet of Things," Symantec, March, 2015 (https://www.symantec.com/content/dam/symantec/docs/white-papers/insecurity-in-the-internet-ofthings-en.pdf)
|
4 |
Symantec, "Internet Security Threat Report (ISTR)," Symantec, Vol.21, April, 2016 (https://www.symantec.com/content/dam/symantec/docs/reports/istr-21-2016-en.pdf)
|
5 |
ENISA, "Cyber security and resilience for Smart Hospitals," ENISA, November, 2016 (https://www.enisa.europa.eu/publications/cyber-security-andresilience-for-smart-hospitals)
|
6 |
D. Plonka, "The Internet of Things Unchecked", IETF Journal, November, 2016 (https://www.ietfjournal.org/the-internet-of-things-unchecked/)
|
7 |
B. Kenyon, "Security in 2017 and Beyond: Symantec's Predictions for the Year Ahead," Symantec, December, 2016 (https://www.symantec.com/connect/blogs/security-2017-and-beyondsymantec-s-predictions-year-ahead)
|
8 |
트렌드마이크로, "넥스트 티어(The Next Tier) -2017 년 보안 예측," 트렌드마이크로, 2016 (http://www.trendmicro.co.kr/cloud-content/kr/pdfs/the_next_tier_kr.pdf)
|
9 |
X . Huang, X . Gao and Z . Yan, "Security protocols in body sensor networks using visible light communications," International Journal of Communication Systems, Vol. 29, No. 16, 2015
|
10 |
T. Kovacevic, T. Perkovic and M. Cagalj, "Flashing displays: user-friendly solution for bootstrapping secure associations between multiple constrained wireless devices," Security and Communication Networks, December, 2015
|
11 |
J. HAN, Y.H. Lin, A.Perrig and F.Bai, "MVSec: Secure and Easy-to-Use Pairing of Mobile Devices with Vehicles (CMU-CyLab-14-006)," 2014
|
12 |
R . Nandakumar, K. K. Chintalapudi, V . Padmanabhan and R. Venkatesan, "Dhwani: secure peer-to-peer acoustic NFC," ACM SIGCOMM Computer Communication Review, Vol.43, No.4, ACM, August, 2013, pp. 63-74
|
13 |
C.Jennings, "Transitive Trust Enrollment for Constrained Devices,"IETF draft, October 13, 2012
|
14 |
Electric Imp, "Electric Imp BlinkUp" (https://youtu.be/a8-G4m1LYWs)
|