References
- 미래창조과학부, "사물인터넷(IoT) 정보보호 로드맵," 2014년 10월.
- 김호원, 김동규, "IoT 기술과 보안," 한국정보보호학회지, 22권, 1호, pp. 7-13, 2012년 2월.
- ITU-T Y.2060: Overview of the Internet of things, June 2012.
- A. Serbanati, et al., "IoT-A Project Deliverable D4.2 - Concepts and Solutions for Privacy and Security in the Resolution Infrastructure," Feb. 2012.
- A. Perrig, D. Song, R. Canetti, J.D. Tyger, B. Briscoe, "Timed Efficient Stream Loss-Tolerant Authentication (TESLA): Multicast Source Authentication Transform Introduction," RFC 4082, June 2005.
- TTA, "128비트 경량 블록 암호 LEA," 정보통신단체표준, 2013년 12월.
- D.-C. Kim, et al., "LSH: A New Fast Secure Hash Function Family," in Proc. ICISC 2014, LNCS 8949, pp. 286-313, 2015.
- J.H. Cheon, H.T. Lee, J.H. Seo, "A New Additive Homomorphic Encryption based on the co-ACD Problem," in Proc. ACM SIGSAC Conf. Computer and Commun. Security, 2014, pp. 287-298.
- A. Riahi, et al., "A systemic and cognitive approach for IoT security," in Proc. Int. Conf. Computing, Networking, and Commun., 2014.
- J. Lee, B. Bagheri, H.-A. Kao, "A Cyber-Physical Systems architecture for Industry 4.0-based manufacturing systems," Manufacturing Letters, vol. 3., pp. 18-23, 2015. https://doi.org/10.1016/j.mfglet.2014.12.001
- Tofino Security, https://www.tofinosecurity.com/blog/majormanufacturer-admits-plc-security-breach
- Stuxnet, https://en.wikipedia.org/wiki/Stuxnet
- C. Neuman, "Challenges in security for cyber-physical systems," in Proc. DHS: S&T workshop on future directions in cyber-physical systems security, 2009.
- E.K. Wang, et al., "Security issues and challenges for cyber physical system," in Proc. the 2010 IEEE/ACM Int'l Conf. Green Computing and Commun. & Int. Conf. Cyber, Physical and Social Computing, 2010. p. 733-738.