Browse > Article

IoT 보안 기술 동향  

Seo, Hwa-Jeong (부산대학교 정보컴퓨터공학부)
Lee, Dong-Geon (부산대학교 정보컴퓨터공학부)
Choe, Jong-Seok (부산대학교 정보컴퓨터공학부)
Kim, Ho-Won (부산대학교 정보컴퓨터공학부)
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 C. Canniere, O. Dunkelman, M. Knezevic, Katan, and Ktantan - "A family of small and efficient hardware-oriented block ciphers", In Proceedings of the International Conference on Cryptographic Hardware and Embedded Systems(CHES 09), pp. 272-288, 2009.
2 R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems", Communications of the ACM, vol. 21, no. 2, pp. 120-126, 1978.   DOI
3 ITU-T, "Framework of Web of Things", 2012.
4 A. Bogdanov, L. R. Knudsen, G. Le, C. Paar, A. Poschmann, M. J. B. Robshaw, Y. Seurin, and C. Vikkelsoe, "Present: An ultra-lightweight block cipher", In Proceedings of the International Conference on Cryptographic Hardware and Embedded Systems(CHES 07), pp. 405-466, 2007.
5 D. Engels, M. J. O. Saarinen, P. Schweitzer, and E. M. Smith, "The hummingbird-2 lightweight authenticated encryption algorithm", In Proceedings of the 7th International Conference on RFID Security and Privacy(RFIDSec'11), pp. 19-31, 2011.
6 D. Hong, J. Sung, S. Hong, J. Lim, S. Lee, B. Koo, C. Lee, D. Chang, J. Lee, K. Jeong, H. Kim, J. Kim, and S. Chee, "Hight: a new block cipher suitable for low-resource device", In Proceedings of the International Conference on Cryptographic Hardware and Embedded Systems(CHES 06), pp.46-59, 2006.
7 국가보안기술연구소, "LEA", 2013.
8 J. P. Aumasson, L. Henzen, W. Meier, and M. N. Plasencia, "QUARK: a lightweight hash", http:// 131002.net/quark, 2012.
9 M. Hell, T. Johansson, A. Maximov, and W. MeIer, "A stream cipher proposal: Grain-128", In IEEE International Symposium on Information Theory (ISIT 2006), 2006.
10 J. Guo, T. Peyrin, and A. Poschmann, "The photon family of lightweight hash functions", in Crypto 2011, Lncs, vol. 6841, pp. 222-239, 2011.
11 A. Bogdanov, M. Knezevic, G. Leander, D. Toz, K. Varici, I. Verbauwhede, and Spongent: "The design space of lightweight cryptographic hashing", http:// sites.google.com/site/spongenthash, 2012.
12 N. Koblitz, "Elliptic curve cryptosystems", Mathematics of Computation, vol. 48, no. 77, pp. 203- 209, 1987.   DOI
13 Bluetooth, http://www.bluetooth.org
14 Wi-Fi Alliance, http://www.wi-fi.org
15 ZigBee Alliance, http://www.zigbee.org
16 DASH7 Alliance, http://www.dash7.org
17 O. Savry, F. Vacherand, "Security and privacy protection of contactless devices", In The Internet of Things, pp. 409-419, 2010.
18 P. de Leusse, P. Periorellis, T. Dimitrakos, and S. K. Nair, "Self managed security cell, a security model for the internet of things and services", In Advances in Future Internet, 2009 First International Conference on, pp. 47-52, 2009.
19 J. Zhang, M. Liang, "A new architecture for convertged internet of things", In Internet Technology and Applications, International Conference on, pp. 1-4, 2010.
20 B. Zhang, X. X. Ma, and Zhi-Guang Qin, "Security architecture on the trusting internet of things", Journal of Elecrtonic Science and Technology, 2011.
21 L. Hongpei, "What is trusted network architecture", Network & Computer Security, no. 2, pp. 36-38, 2005.
22 Z. Yanwe, W. U. Zhenqiang, and Y. E. Jiangca, "Study of new trusted network framework", Computer Application, vol. 29, no. 9, pp. 2535-2565, Sep. 2009.
23 OASIS, Web Services Security: SOAP Message Security 1.0(WS-Security 2004), http://docs.oasisopen. org/wss/2004/01/oasis-200401-wss-soap-mess age-security-1.0.pdf, Mar. 2004.
24 J. Reagle, "IETF RFC2807 XML Signature Requiremets", Jul. 2000.
25 W3C, XML-Signature Syntax and Processing, http:// www.w3.org/TR/xmldsig-core, Feb. 2002.
26 W3C, XML Encryption Syntax and Processing, http://www.w3.org/TR/xmlenccore, Dec. 2002.
27 W3C, Decryption Transform for XML Signature, http://www.w3.org/TR/xmlencdecrypt, Dec. 2002.
28 W3C, XML Key Management Specification (XKMS) Ver 2.0-Candidate Recommendation, http:// www.w3.org/TR/xkms2, Apr. 2004.
29 W3C, SOAP Security Extensions: Digital Signature, http://www.w3.org/TR/2001/NOTE-SOAPdsig- 20010206, Feb. 2001.
30 OASIS, eXtensible Access Control Markup Language( XACML) Version 1.0 - Standards, Feb. 2003.
31 OASIS, Web Services Security: SAML Token Profile - working drafts, http://www.oasis-open.org/committees/ download. php/7837/WSS-SAML-15.pdf, Jul. 2004.
32 OASIS, Security Assertion Markup Language (SAML), http://www.oasis-open.org/committees /security, Jul. 2004.
33 Z. Shelby, K. Hartke, and C. Bormann, "Constrained application protocol(coap)", 2013.
34 E. Rescorla, N. Modadugu, "Datagram transport layer security", 2006.
35 K. Cameron, The Laws of Identity, http://www. identityblog.com/?page_id=354, May 2005.
36 D. Recordon, B. Fitzpatrick, OpenID Authentication 1.1, http://www.openid.net/specs/openidauthentication- 1_1.txt, May 2006.
37 D. Recordon, D. Reed, "OpenID 2.0: a platform for user-centric identity management", In Proceedings of the Second ACM Workshop on Digital Identity Management, pp. 11-16. ACM, 2006.
38 T. Wason, "Liberty ID-FF architecture overview", Liberty Alliance Project, 2004. http://www.projectliberty. org/specs
39 조영섭, 진승헌, 문필주, 정교일, "ID 연계 기반 의 인터넷 ID Management System: e-IDMS", 전자공학회논문지, 43, 2006년.
40 김호원, 제 4회 스마트그리드 보안 워크샵, 2013 년 7월.
41 A. Wright, "Cyber security for the power grid: cyber security issues & Securing control systems", ACM CCS, Nov. 2009.
42 J. Daemen, V. Rijmen, "AES proposal: Rijndael", NIST AES Proposal, 1998.
43 M2M/IoT 포럼, "http://www.m2miot.or.kr"
44 CERP-IoT, "Internet of things - Strategic research roadmap", Sep. 2009.
45 NIST, FIPS PUB 46-3 Data Encryption Standard (DES), 1999.
46 NIST, FIPS PUB 180-4 Secure Hash Standard, 2012.
47 IETF, RFC-1321 The MD5 Message-Digest Algorithm, 1992.
48 Guido Bertoni, Joan Daemen, Micahel Peeters, and Gilles Van Assche, "The Keccak reference", http:// keccak.noekeon.org, 2011.