1 |
Global IoT market size grew 22% in 2021 - these 16 factors affect the growth trajectory to 2027 (IoT Analytics , Available online) : https://iot-analytics.com/iot-market-size/(30 Mach 2022).
|
2 |
Dhanda, Sumit Singh, Brahmjit Singh, and Poonam Jindal. "Lightweight cryptography: a solution to secure IoT." Wireless Personal Communications 112.3 (2020): 1947-1980.
DOI
|
3 |
Banerjee, Utsav, et al. "An energy-efficient re-configurable DTLS cryptographic engine for End-to-End security in iot applications." 2018 IEEE International Solid-State Circuits Conference-(ISSCC). IEEE, 2018.
|
4 |
Khairi, Anjum, et al. "A Critical Analysis on the Security Concerns of Internet of Things (IoT)." Perception 111 (2015).
|
5 |
Muzammal, Syeda M., Raja Kumar Murugesan, and N. Z. Jhanjhi. "A comprehensive review on secure routing in internet of things: Mitigation methods and trust-based approaches." IEEE Internet of Things Journal 8.6 (2020): 4186-4210.
|
6 |
AWS Cloud HSM 주요 기능 : https://aws.amazon.com/ko/cloudhsm/features/.
|
7 |
Uskov, Alexander, Adam Byerly, and Colleen Heinemann. "Advanced Encryption Standard Analysis with Multimedia Data on Intel® AES-NI Architecture." International Journal of Computer Science &Applications 13.2 (2016).
|
8 |
Kothmayr, Thomas, et al. "A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication." 37th Annual IEEE Conference on Local Computer Networks-Workshops. IEEE, 2012.
|
9 |
Mahmoud, Rwan, et al. "Internet of things (IoT) security: Current status, challenges and prospective measures." 2015 10th international conference for internet technology and secured transactions (ICITST). IEEE, 2015.
|
10 |
Purohit, Kamlesh C., et al. "Hybrid approach for securing IoT communication using authentication and data confidentiality." 2017 3rd International Conference on Advances in Computing, Communication & Automation (ICACCA)(Fall). IEEE, 2017.
|
11 |
RISC-V Resource-Constrained Cores: A Survey and Energy Comparison
|