1 |
S. H. Oh, S. K. Ko, S. C. Son, B. T. Lee, Y. S. Kim, "IoT Device Management Standard Protocol Trends in Mobile Communications", Electronics and Telecommunications Trends, Vol.30, No.1, pp. 94-101, 2015.
|
2 |
Y. H. Jeon, "A Study on the Security Modeling of Internet of Things(IoT)", Journal of KIIT, Vol.15, No.12, pp. 17-27, December, 2017.
|
3 |
J. Y. Ko, S. G. Lee, J. W. Kim, C. H. Lee "Technologies Analysis based on IoT Security Requirements and Secure Operating System", Journal of KCA, Vol.18, No.4, pp. 164-177, March, 2018.
|
4 |
N. H. Kim, C. S. Hong, "Secure MQTT Protocol based on Attribute-Based Encryption Scheme", Journal of KIISE, Vol.45, No.3, pp. 195-199, December, 2018.
DOI
|
5 |
N. H. Kim, C. S. Hong, "Lightweight Cryptography Algorithm based Secure MQTT Protocol", Proc. of KIISE, Vol.2016, No.12, pp. 757-759, December, 2016.
|
6 |
H. G. Schuster, "Deterministic Chaos: An Introduction: 2nd edition", VCH, pp. 24-32, December, 1997.
|
7 |
E. Ott, "Chaos in Dynamical Systems Second Edition", Cambridge University Press, pp. 15-18, September, 2002.
|
8 |
G. L. Baker, and J. P. Gollub, "Chaotic Dynamics an Introduction", Cambridge University Press, pp. 41-58, January, 1996.
|
9 |
Lynch, Stephen, "Dynamical Systems with Applications Using Matlab", Birkhauser, pp. 35-47, 2004.
|
10 |
M. H. Choi, G. S. Yim, "Passive RFID Certification Protocol Design Using Digital Chaos System", Journal of KIIT. pp. 85-92, October, 2014.
|
11 |
G. S. Yim, "Design of USN Communication Protocol Using Individual Chaotic Systems, Journal of KIIECT, Vol.8, No.6, pp. 528-533, December, 2015 .
|
12 |
Kitae Hwang, 'Design and Implementation of Dashboard Author and Viewer for IoT Systems based on MQTT', The Journal of The Institute of Internet, Broadcasting and Communication VOL. 18 No. 5, 2018
|