1 |
J. I. Lee. (2015). Convergent Case Study of Research and Education: Internet of Things Based Wireless Device Forming Research. Journal of the Korea Convergence Society, 6(4), 1-7,
DOI
|
2 |
CoAP(Constrained Application Protocol), IETF(Internet Engineering Task Force, http://www.ietf.org)
|
3 |
L. A. Tawalbeh, F. Muheidat, M. Tawalbeh & M. Quwaider. (2020). IoT Privacy and security: Challenges and solutions. Applied Sciences, 10(12), 4102.
DOI
|
4 |
B. K. Rios & J. Butts. (2017). When IoT Attacks: understanding the safety risks associated with connected devices. Proceedings of Black Hat USA. https://www.blackhat.com/docs/us-17/wednesday/us-17-Rios-When-IoT-Attacks-Understanding-The-Safety-Risks-Associated-With-Connected-Devices.pdf
|
5 |
D. Y. Kang & J. H. Hwang. (2019). A Study on Priority of Certification Criteria for IoT Security Certification Service. The Journal of the Korea Contents Association, 19(7), 13-21.
DOI
|
6 |
Y. An. (2016). A Strong Biometric-based Remote User Authentication Scheme for Telecare Medicine Information Systems with Session Key Agreement. International Journal of Internet, Broadcasting and Communication, 8(3), 41-49, DOI : 10.7236/IJIBC.2016.8.3.41
DOI
|
7 |
Common Criteria Recognition Arrangement. (2017). Common Criteria for Information Technology Security Evaluation. Part 1 : Introduction and general model, CCMB-2017-04-001.
|
8 |
B. W. Jin, J. O. Park & M. S. Jun. (2017). A Study on Authentication Management and Communication Method using AKI Based Verification System in Smart Home Environment. The Journal of The Institute of Internet, Broadcasting and Communication, 16(6), 25-31, DOI : 10.7236/JIIBC.2016.16.6.25
DOI
|
9 |
T. H Kim, J. H Hong & H. Y. Jung. (2015). Trend in Trustworthy Communication for the Next-Generation. Electronics and Telecommunications Trends, 30(4), 129-139.
|
10 |
T. H. J. Kim et al. (2013). Accountable key infrastructure (AKI) a proposal for a public-key validation infrastructure. In Proceedings of the 22nd international conference on World Wide Web (pp. 679-690).
|
11 |
Y. T. Kim. (2015.). Secure Messenger System using Attribute Based Encryption. Journal of Security Engineering, 12(5), 469-486,
DOI
|
12 |
S. E. Ponta, H. Plate & A. Sabetta. (2018, September). Beyond metadata: Code-centric and usage-based analysis of known vulnerabilities in open-source software. In 2018 IEEE International Conference on Software Maintenance and Evolution (ICSME) (pp. 449-460). IEEE.
|
13 |
Y. Yang, L. Wu, G. Yin, L. Li & H. Zhao. (2017). A survey on security and privacy issues in Internet-of-Things. IEEE Internet of Things Journal, 4(5), 1250-1258. DOI : 10.1109/JIOT.2017.2694844
DOI
|
14 |
K. H. Lee, ( 2013). A Security Threats in Wireless Charger Systems in M2M. Journal of the Korea Convergence Society, 4(1), 27-31. DOI : 10.15207/JKCS.2013.4.1.027
DOI
|
15 |
Malcolm Shore. (2017). IoT Common Security Principle v1.0, KISA.
|