References
- 김장환. (2017). 사물인터넷과 AI가 가져올 산업구조의 변화. 융합보안논문지, 17(5), 93-99.
- M. M. Hossain, M. Fotouhi and R. Hasan. Towards an analysis of security issues, challenges, and open problems in the internet of things. 2015.
- S. Babar, P. Mahalle, A. Stango, N. Prasad, and R. Prasad, "Proposed security model and threat taxonomy for the internet of things (IoT)," in Anonymous Berlin, Heidelberg: Springer Berlin Heidelberg, pp. 420-429, 2010.
- M. Abomhara, G. M. Koien, "Security and privacy in the internet of things: Current status and open issues," 2014 International Conference on Privacy and Security in Mobile Systems (PRISMS), pp. 1-8, 2014.
- J. Granjal, E. Monteiro and J. Sa Silva, "Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues," IEEE Communications Surveys & Tutorials, vol. 17, pp. 1294-1312, 2015. https://doi.org/10.1109/COMST.2015.2388550
- M. Asplund and S. Nadjm-Tehrani, "Attitudes and Perceptions of IoT Security in Critical Societal Services," IEEE Access, vol. 4, pp.2130-2138, 2016. https://doi.org/10.1109/ACCESS.2016.2560919
- 유우영. (2018). IoT 보안에 대한 국내외 연구 동향 분석. 융합보안논문지, 18(1), 61-67.
- 이동건, 이연철, 김경훈, 박종규, 최용제, 김호원, "안전하고 신뢰성 있는 PUF 구현을 위한 가이드라인," 정보보호학회논문지, 제 24권, 제 1호, pp. 241-259, 2014. https://doi.org/10.13089/JKIISC.2014.24.1.241
- U. Rṻhrmair and D. E. Holcomb, "PUFs at a Glance," In Proceedings of the conference on Design, Automation & Test in Europe (DATE '14), 2014.
- 백종학, 신광조, "PUF 기술을 활용한 보안칩 기술 개발과 그 응용 분야," 전자공학회지, 7월, 2016.
- 변진욱, "PUF 기반 RFID 인증 프로토콜의 효율적설계에 관한 연구," 정보보호학회논문지, 제 24권, 제5호, pp. 987-999, 2014. https://doi.org/10.13089/JKIISC.2014.24.5.987
- C. W. O'Donnell, G. E. Suh, and S. Devadas, "PUF Based Random Number Generation," MIT CSAIL CSG Technical Memo 481, 2004.
- J. Zhang, B. Qi, and G. Qu, "HCIC: Hardware- assisted Control-flow Integrity Checking," IEEE Internet of Things Journal, pp. 1-14, 2018.
- Y. Alkabani, F. Koushanfar, N. Kiyavash, and M. Potkonjak. "Trusted integrated circuits: A nondestructive hidden characteristics extraction approach", Lecture Notes in Computer Science, Springer-Berlin, vol. 5284, pp. 102-117, 2008.
- J. Bringerr, H. Chabanne, T. Icart, "On physical obfuscation of cryptographic algorithms," vol. 5922 of Lecture Notes in Computer Science, Springer-Verlag, pp. 88-103, 2009.
- 정진우, 이수진. (2019). 5G 인증 및 키합의 프로토콜(5G-AKA)의 보안취약점과 PUF 기반의 보안성 향상 방안 . 융합보안논문지, 19(1), 3-10.
- 백종학, 신광조, "PUF 기술을 활용한 보안칩 기술 개발과 그 응용 분야," 전자공학회지, 제 43권, 제7호, pp. 59-67, 2016.
- M. Huang, B. Yu, and S. Li, "Puf-assisted group key distribution scheme for software-defined wireless sensor networks," IEEE Communications Letters, Vol 22, no. 2, pp. 404-407, 2018. https://doi.org/10.1109/LCOMM.2017.2778725
- 이종훈, 박정수, 정승욱, 정수환. (2013). PUF 기반의 보안 USB 인증 및 키 관리 기법. 한국통신학회 논문지(J-KICS) '13-12 Vol.38B No.12
- J. Liu, Y. Xiao and C.L. Philip Chen, Authentication and Access Control in the Internet of Things, ICDCSW, 2012, 2013 IEEE 33rd International Conference on Distributed Computing Systems Workshops, 2013 IEEE 33rd International Conference on Distributed Computing Systems Workshops 2012, pp. 588-592.
- S. Sciancalepore, A. Capossele, G. Piro, G. Boggia and G. Bianchi, Key Management Protocol with Implicit Certificates for IoT systems, IoT-Sys '15 Proceedings of the 2015 Workshop on IoT challenges in Mobile and Industrial Systems,2015, pp. 37-42.
- Y. Ben Saied and A. Olivereau, D-HIP: A distributed key exchange scheme for HIP-based Internet of Things, World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2012 IEEE International Symposium on a, June 2012, pp. 1-7.
- An. Braeken, P. Kumar, A. Gurtov, M. Ylianttila, Proxy-based end-toend key establishment protocol for the Internet of Things, 2015 IEEE International Conference on Communication Workshop (ICCW), pp. 2677-2682.
- J. Shen, M. Sangman and I. Chung, A Novel Key Management Protocol in Body Area Networks , ICNS 2011 : The Seventh International Conference on Networking and Services, pp. 246-251.
- Yue Li, Design of a Key Establishment Protocol for Smart Home Energy Management System, 2013 Fifth International Conference on Computational Intelligence, Communication Systems and Networks (CICSyN), June 2013, pp. 88-93.
- L. Veltri, S. Cirani, S. Busanelli and G. Ferrari, A novel batch-based group key management protocol applied to the Internet of Things, Ad Hoc Networks, November 2013, vol. 11, pp. 2724-2737. https://doi.org/10.1016/j.adhoc.2013.05.009
- M. Riyadh Abdmeziem, T. Djamel and I. Romdhani, A Decentralized Batch-Based Group Key Management Protocol for Mobile Internet of Things (DBGK), 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), 2015, pp. 1109-1117.
- Gavin Lowe, "Casper : A compiler for the analysis of security protocols," In Proc. 10th IEEE Computer Security Foundations Workshop, 1997.
- F.J. Thayer Fabrega, J.C. Herzog, and J. D. Guttman. "Strand spaces : Proving security protocols correct," Journal of Computer Security, 1999.
- M. Burrows, M. Abadi, and R. Needham, "A logic of authentication," ACM Trans. Comput. Syst. 8(1), pp.18-36, 1990. https://doi.org/10.1145/77648.77649
- M. Warnier, "Bilateral Key Exchange analysed in BAN logic," Research Note, 2002.