참고문헌
- J. M. Blythe & S. D. Johnson. (2018, March). The consumer security index for IoT: A protocol for developing an index to improve consumer decision making and to incentivize greater security provision in IoT devices. Living in the Internet of Things: Cybersecurity of the IoT - 2018. (pp. 1-7). London : IET.
- R. Gurunath, M. Agarwal, A. Nandi & D. Samanta. (2018, August). An Overview: Security Issue in IoT Network. 2018 2nd International Conference on I-SMAC(IoT in Social, Mobile, Analytics and Cloud). (pp. 104-107). Palladam : IEEE.
- D. D. Lopez et al. (2018). Shielding IoT against Cyber-Attacks: An Event-Based Approach Using SIEM. Wireless Communications and Mobile Computing, 2018, 1-18. DOI:10.1155/2018/3029638
- A. A. Hezam & D. Konstantas (2019). A Comprehensive Study of Security and Privacy Guidelines, Threats, and Countermeasures: An IoT Perspective. Journal of Sensor and Actuator Networks, 8(22), 1-38. DOI : 10.3390/jsan8020022
- Springer. (2019). Big Data and Internet of Things Security and Forensics: Challenges and Opportunities. [Handbook of Big Data and IoT Security]. Cham : A. Azmoodeh, A. Dehghantanha & K. R. Choo.
- K. Tsai, Y. Huang, F. Leu, I. You, Y. Huang & C. Tsai. (2018). AES-128 based Secure Low Power Communication for LoRaWAN IoT Environments. IEEE Access, 6, 45325-45334. DOI : 10.1109/ACCESS.2018.2852563
- A. Sadeghi, C. Wachsmann & M. Waidner. (2015, June). Security and privacy challenges in industrial internet of things. 52nd ACM/EDAC/IEEE Design Automation Conference, (pp. 1-6). San Francisco : ACM.
- D. H. Kim, J. Y. Cho, J. I. Lim & B. G. Lee. (2016). Developing iot security requirements for service providers. Information, 19(2), 595-603.
- H. U. Kim. (2017). A Design of Mutual authentication protocol between heterogeneous services in the internet of things Environment. Doctoral dissertation. Soongsil University, Seoul.
- K. H. Lee & J. S. Lee. (2018). Mutual Authentication Method for hash Chain Based Sensors in IoT Environment. Journal of the korea Academia-Industrial cooperation Society, 9(11), 303-309.
- S. Y. Min & J. S. Lee. (2018). Device Mutual Authentication and Key Management Techniques in a Smart Home Environment. Journal of the korea Academia-Industrial cooperation Society, 9(10), 661-667.
- S. J. Yu, K. S. Park, Y. H. Park & Y. H. Park. (2018). Lightweight User Authentication and Key Agreement Scheme in Wireless Sensor Network Environments. The Journal of Korea Information and Communications Society, 43(12), 2215-2229. DOI : 10.7840/kics.2018.43.12.2215
- M. S. Farash, M. Turkanovic, S. Kumari & M. Holbl. (2016). An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment. Ad Hoc Networks, 36(1), 152-176. DOI : 10.1016/j.adhoc.2015.05.014
- K. C. Baruah, S. Banerjee, M. P. Dutta & C. T. Bhunia. (2015). An Improved Biometric-based Multi-server Authentication Scheme Using Smart Card. International Journal of Security and Its Applications, 9(1), 397-408. DOI : 10.14257/ijsia.2015.9.1.38
- K. H. Lee & J. S. Lee. (2018). Mutual Authentication Method for Hash Chain Based Sensors in IoT Environment. Journal of the Korea Academia-Industrial cooperation Society, 19(11), 303-309. DOI : 10.5762/KAIS.2018.19.11.303
- M. El-hajj, A. Fadlallah, M. Chamoun & A. Serhrouchni. (2019). A Survey of Internet of Things (IoT) Authentication Schemes. Sensors, 19(5), 1-43. DOI : 10.3390/s19051141
- M. Husamuddin & M. Qayyum. (2017, March). Internet of Things: A study on security and privacy threats. 2017 2nd International Conference on Anti-Cyber Crimes (ICACC). (pp. 93-97). Abha : IEEE.