Browse > Article

사물인터넷 경량장치를 위한 안전한 초기 설정 기술 동향  

Ban, Hyo-Jin (덕성여자대학교)
Gang, Nam-Hui (덕성여자대학교)
Publication Information
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 A. Coppa, "Secure and User-Friendly Commissioning and Bootstrapping of Constrained Devices,"Norwegian University of Science and Technology, December, 2015
2 C. Botnet, Internet Census 2012 - Port scanning/0 using insecure embedded devices, October, 2012 (http://internetcensus2012.bitbucket.org/paper.html)
3 M. B. Barcena and C. Wueest, "Insecurity in the Internet of Things," Symantec, March, 2015 (https://www.symantec.com/content/dam/symantec/docs/white-papers/insecurity-in-the-internet-ofthings-en.pdf)
4 Symantec, "Internet Security Threat Report (ISTR)," Symantec, Vol.21, April, 2016 (https://www.symantec.com/content/dam/symantec/docs/reports/istr-21-2016-en.pdf)
5 ENISA, "Cyber security and resilience for Smart Hospitals," ENISA, November, 2016 (https://www.enisa.europa.eu/publications/cyber-security-andresilience-for-smart-hospitals)
6 D. Plonka, "The Internet of Things Unchecked", IETF Journal, November, 2016 (https://www.ietfjournal.org/the-internet-of-things-unchecked/)
7 B. Kenyon, "Security in 2017 and Beyond: Symantec's Predictions for the Year Ahead," Symantec, December, 2016 (https://www.symantec.com/connect/blogs/security-2017-and-beyondsymantec-s-predictions-year-ahead)
8 트렌드마이크로, "넥스트 티어(The Next Tier) -2017 년 보안 예측," 트렌드마이크로, 2016 (http://www.trendmicro.co.kr/cloud-content/kr/pdfs/the_next_tier_kr.pdf)
9 X . Huang, X . Gao and Z . Yan, "Security protocols in body sensor networks using visible light communications," International Journal of Communication Systems, Vol. 29, No. 16, 2015
10 T. Kovacevic, T. Perkovic and M. Cagalj, "Flashing displays: user-friendly solution for bootstrapping secure associations between multiple constrained wireless devices," Security and Communication Networks, December, 2015
11 J. HAN, Y.H. Lin, A.Perrig and F.Bai, "MVSec: Secure and Easy-to-Use Pairing of Mobile Devices with Vehicles (CMU-CyLab-14-006)," 2014
12 R . Nandakumar, K. K. Chintalapudi, V . Padmanabhan and R. Venkatesan, "Dhwani: secure peer-to-peer acoustic NFC," ACM SIGCOMM Computer Communication Review, Vol.43, No.4, ACM, August, 2013, pp. 63-74
13 C.Jennings, "Transitive Trust Enrollment for Constrained Devices,"IETF draft, October 13, 2012
14 Electric Imp, "Electric Imp BlinkUp" (https://youtu.be/a8-G4m1LYWs)