References
- M2M/IoT 포럼, "http://www.m2miot.or.kr"
- CERP-IoT, "Internet of things - Strategic research roadmap", Sep. 2009.
- A. Wright, "Cyber security for the power grid: cyber security issues & Securing control systems", ACM CCS, Nov. 2009.
- J. Daemen, V. Rijmen, "AES proposal: Rijndael", NIST AES Proposal, 1998.
- NIST, FIPS PUB 46-3 Data Encryption Standard (DES), 1999.
- NIST, FIPS PUB 180-4 Secure Hash Standard, 2012.
- IETF, RFC-1321 The MD5 Message-Digest Algorithm, 1992.
- Guido Bertoni, Joan Daemen, Micahel Peeters, and Gilles Van Assche, "The Keccak reference", http:// keccak.noekeon.org, 2011.
- R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems", Communications of the ACM, vol. 21, no. 2, pp. 120-126, 1978. https://doi.org/10.1145/359340.359342
- ITU-T, "Framework of Web of Things", 2012.
- A. Bogdanov, L. R. Knudsen, G. Le, C. Paar, A. Poschmann, M. J. B. Robshaw, Y. Seurin, and C. Vikkelsoe, "Present: An ultra-lightweight block cipher", In Proceedings of the International Conference on Cryptographic Hardware and Embedded Systems(CHES 07), pp. 405-466, 2007.
- C. Canniere, O. Dunkelman, M. Knezevic, Katan, and Ktantan - "A family of small and efficient hardware-oriented block ciphers", In Proceedings of the International Conference on Cryptographic Hardware and Embedded Systems(CHES 09), pp. 272-288, 2009.
- D. Engels, M. J. O. Saarinen, P. Schweitzer, and E. M. Smith, "The hummingbird-2 lightweight authenticated encryption algorithm", In Proceedings of the 7th International Conference on RFID Security and Privacy(RFIDSec'11), pp. 19-31, 2011.
- D. Hong, J. Sung, S. Hong, J. Lim, S. Lee, B. Koo, C. Lee, D. Chang, J. Lee, K. Jeong, H. Kim, J. Kim, and S. Chee, "Hight: a new block cipher suitable for low-resource device", In Proceedings of the International Conference on Cryptographic Hardware and Embedded Systems(CHES 06), pp.46-59, 2006.
- 국가보안기술연구소, "LEA", 2013.
- J. P. Aumasson, L. Henzen, W. Meier, and M. N. Plasencia, "QUARK: a lightweight hash", http:// 131002.net/quark, 2012.
- M. Hell, T. Johansson, A. Maximov, and W. MeIer, "A stream cipher proposal: Grain-128", In IEEE International Symposium on Information Theory (ISIT 2006), 2006.
- J. Guo, T. Peyrin, and A. Poschmann, "The photon family of lightweight hash functions", in Crypto 2011, Lncs, vol. 6841, pp. 222-239, 2011.
- A. Bogdanov, M. Knezevic, G. Leander, D. Toz, K. Varici, I. Verbauwhede, and Spongent: "The design space of lightweight cryptographic hashing", http:// sites.google.com/site/spongenthash, 2012.
- N. Koblitz, "Elliptic curve cryptosystems", Mathematics of Computation, vol. 48, no. 77, pp. 203- 209, 1987. https://doi.org/10.1090/S0025-5718-1987-0866109-5
- Wi-Fi Alliance, http://www.wi-fi.org
- ZigBee Alliance, http://www.zigbee.org
- DASH7 Alliance, http://www.dash7.org
- Bluetooth, http://www.bluetooth.org
- O. Savry, F. Vacherand, "Security and privacy protection of contactless devices", In The Internet of Things, pp. 409-419, 2010.
- P. de Leusse, P. Periorellis, T. Dimitrakos, and S. K. Nair, "Self managed security cell, a security model for the internet of things and services", In Advances in Future Internet, 2009 First International Conference on, pp. 47-52, 2009.
- J. Zhang, M. Liang, "A new architecture for convertged internet of things", In Internet Technology and Applications, International Conference on, pp. 1-4, 2010.
- B. Zhang, X. X. Ma, and Zhi-Guang Qin, "Security architecture on the trusting internet of things", Journal of Elecrtonic Science and Technology, 2011.
- L. Hongpei, "What is trusted network architecture", Network & Computer Security, no. 2, pp. 36-38, 2005.
- Z. Yanwe, W. U. Zhenqiang, and Y. E. Jiangca, "Study of new trusted network framework", Computer Application, vol. 29, no. 9, pp. 2535-2565, Sep. 2009.
- OASIS, Web Services Security: SOAP Message Security 1.0(WS-Security 2004), http://docs.oasisopen. org/wss/2004/01/oasis-200401-wss-soap-mess age-security-1.0.pdf, Mar. 2004.
- J. Reagle, "IETF RFC2807 XML Signature Requiremets", Jul. 2000.
- W3C, XML-Signature Syntax and Processing, http:// www.w3.org/TR/xmldsig-core, Feb. 2002.
- W3C, XML Encryption Syntax and Processing, http://www.w3.org/TR/xmlenccore, Dec. 2002.
- W3C, Decryption Transform for XML Signature, http://www.w3.org/TR/xmlencdecrypt, Dec. 2002.
- W3C, XML Key Management Specification (XKMS) Ver 2.0-Candidate Recommendation, http:// www.w3.org/TR/xkms2, Apr. 2004.
- W3C, SOAP Security Extensions: Digital Signature, http://www.w3.org/TR/2001/NOTE-SOAPdsig- 20010206, Feb. 2001.
- OASIS, Web Services Security: SAML Token Profile - working drafts, http://www.oasis-open.org/committees/ download. php/7837/WSS-SAML-15.pdf, Jul. 2004.
- OASIS, Security Assertion Markup Language (SAML), http://www.oasis-open.org/committees /security, Jul. 2004.
- OASIS, eXtensible Access Control Markup Language( XACML) Version 1.0 - Standards, Feb. 2003.
- Z. Shelby, K. Hartke, and C. Bormann, "Constrained application protocol(coap)", 2013.
- E. Rescorla, N. Modadugu, "Datagram transport layer security", 2006.
- K. Cameron, The Laws of Identity, http://www. identityblog.com/?page_id=354, May 2005.
- D. Recordon, B. Fitzpatrick, OpenID Authentication 1.1, http://www.openid.net/specs/openidauthentication- 1_1.txt, May 2006.
- D. Recordon, D. Reed, "OpenID 2.0: a platform for user-centric identity management", In Proceedings of the Second ACM Workshop on Digital Identity Management, pp. 11-16. ACM, 2006.
- T. Wason, "Liberty ID-FF architecture overview", Liberty Alliance Project, 2004. http://www.projectliberty. org/specs
- 조영섭, 진승헌, 문필주, 정교일, "ID 연계 기반 의 인터넷 ID Management System: e-IDMS", 전자공학회논문지, 43, 2006년.
- 김호원, 제 4회 스마트그리드 보안 워크샵, 2013 년 7월.