참고문헌
- 미래창조과학부, " 사물인터넷기본계획," (http://www.msip.go.kr/)
- Erin Anzelmo, et. al., "Discussion Paper on the Internet of Things," commissioned by the Institute for Internet and Society, Berlin Oct. 2011. (http://www.theinternetofthings.eu/)
- R. Hummen, J. Hiller, H. Wirtz, M. Henze, H. Shafaqh, K. Wehrle, "6LoWPAN fragmentation attacks and mitigation mechanisms," In Proc. of ACM WiSec, 2013.
- K. Hartke, "Practical Issues with Datagram Transport Layer Security in Constrained Environments,"IETF draft, Apr. 8, 2014.
- Z. Shelby, et. al., "The Constrained Application Protocol," IETF RFC7252, June 2014.
- IETF Constrained RESTful Environments (core) Working Group. (http://datatracker.ietf.org/wg/core/)
- C. Bormann, et. al., "Terminology for Constrained-Node Networks," IETF RFC7228, May 2014.
- P. Wouters, et. al., "Using Raw Public Keys in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS),"IETF RFC7250, June. 2014.
- H. Tschofenig, "Smart Object Security : Considerations for Transport Layer Security Implementations," In Proc, SMART OBJECT SECURITY Workshop, Paris, FRANCE, Mar., 2012
- Tinydtls Documentation. (http://tinydtls.sourceforge.net/)
- R. Shahid, et. al., "6LoWPAN compressed DTLS for CoAP." Proc. of Distributed Computing in Sensor Systems (DCOSS), IEEE. 2012.
- R. Hummen, "Towards viable certificate-based authentication for the internet of things,"Proc.of HotWiSec13, ACM, 2013.
- IETF DTLS In Constrained Environments Working Group. (http://datatracker.ietf.org/wg/dice/)
- S. Gerdes, "Actors in the ACE Architecture," IETF draft, July. 2014.