1 |
G. Dini and M. Tiloca, "Considerations on Security in ZigBee Networks," Proceedings of the 2010 IEEE International Conference on SUTC, pp.58-65, Jun. 2010.
|
2 |
ZigBee Alliance, "ZigBee-2007 Specification," ZigBee Document 053474r17, JAN. 2008.
|
3 |
IEEE Computer Society, "IEEE Standard for Information technology Telecommunications and information exchange between systems Local and metropolitan area networks Specific Requirements Part 11," IEEE Standards, pp.1-25 March. 2012.
|
4 |
Ender Yuksel, Hanne Riis Nielson, Flemming Nielson, "ZigBee-2007 Security Essentials," Proceedings of The 13th Nordic Workshop on Secure IT Systems NordSec, pp.65-82 October. 2008.
|
5 |
임준현, 한규석, 김광조, "ZigBee WPAN에서의 안전한 키 관리기법과 인증 프로토콜," CISC-S'10 Proceedings, pp.249-254 June. 2010.
|
6 |
김봉환, 임정미, 박창섭, "Analysis of ZigBee Security Mechanism," 보안공학연구논문지 vol.9, No.5, pp.417-430 September. 2012.
|
7 |
Shahin Farahani, "ZigBee WIRELESS NETWORKS AND TRANSCEIVERS," ELSEVIER/Newnes, 2008
|
8 |
Ender Yuksel, Hanne Riis Nielson, Flemming Nielson, "A Secure key Establishment Protocol for ZigBee Wireless Sensor Networks," The Computer Journal, Vol.54, No.4, pp.589-601 November. 2011.
DOI
ScienceOn
|
9 |
오수민, 최수경, 권예진, 박창섭, "ZigBee 무선센서 네트워크에서의 안전한 키 분배 프로토콜," 한국정보보호학회논문지 vol.22, No4, pp.745-759 August, 2012.
|
10 |
P. Radmand, M. Domingo, J. Singh, J. Arnedo, A. Talevski, S. Petersen and S. Carlsen, "ZigBee/ZigBee PRO security assessment based on compromised cryptographic keys," Proceedings of the 2010 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, pp. 465-470, Nov. 2010.
|
11 |
H. Li, Z. Jia and X. Xue, "Application and Analysis of ZigBee Security Services Specification," 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing, pp. 494-497, Apr. 2010.
|