과제정보
This paper is a basic research project conducted with the support of the Korean Research Foundation with the funding of the government (Ministry of Education) in 2021. (No. NRF2021R1I1A1A01047914)
참고문헌
- S. Russell and T. Abdelzaher, "The Internet of Battlefield Things: The Next Generation of Command Control, Communications and Intelligence (C3I) Decision-Making," IEEE Military Communications Conference, Los Angeles: CA, USA, pp. 29-31, 2018.
- L. Zhu and S. Majumdar, "An invisible warfare with the internet of battlefield things: A literature review," Human Behavior and Emerging Technologies, vol. 3, no. 2, pp. 255-260, Nov. 2020.
- A. Shamir, "How to Share a Secret," Communications of the ACM, vol. 22, no. 11, pp. 612-613, Nov. 1979. https://doi.org/10.1145/359168.359176
- D. Reed, J. Law, D. Hardman, and M. Lodder, "DKMS (Decentralized Key Management System) Designand Archite cture V3," U.S. Department of Homeland Security Science & Technology Directorate, Apr. 2018.
- T. -Y. Yoon and J. -S. Moon, "Private Key Backup and Recovery Framework in Blockchain-based Service Environment," Journal of Digital Contents Society, vol. 20, no. 12, pp. 2485-2493, Dec. 2019. https://doi.org/10.9728/dcs.2019.20.12.2485
- G. Li, L. You, G. Hu, and H. Liqin, "Recoverable Private Key Scheme for Consortium Blockchain Based on Verifiable Secret Sharing," KSII Transactions on Internet And Information System, vol. 15, no. 8, pp. 2865-2878, Aug. 2021.
- T. Noguchi, M. Nakagawa, M. Yoshida, A. G. Ramonet, "A Secure Secret Key-Sharing System for Resource-Constrained IoT Devices using MQTT," in Proceedings of International Conference on Advanced Communications Technology(ICACT), PyeongChang, Korea, pp. 147-153, 2022.
- A. Koubaa, B. Qureshi, M. -F. Sriti, A. Allouch, Y. Javed, M. Alajlan, O. Cheikhrouhou, M. Khalgui, and E. Tovar, "Dronemap Planner: A service-oriented cloud-based management system for the Internet-of-Drones," Ad Hoc Networks, vol. 86, pp. 46-62, Apr. 2019. https://doi.org/10.1016/j.adhoc.2018.09.013
- Y. M. Kwon, J. Yu, B. M. Cho, Y. Eun, and K. -J. Park, "Empirical Analysis of MAVLink Protocol Vulnerability for Attacking Unmanned Aerial Vehicles," IEEE Access, vol. 6, pp. 43203-43212, Aug. 2018. https://doi.org/10.1109/access.2018.2863237
- M. Shin and S. Kim, "A Study on the Security Framework in IoT Services for Unmanned Aerial Vehicle Networks," Journal of Korea Multimedia Society, vol. 21, no. 8, pp. 897-908, Aug. 2018. https://doi.org/10.9717/KMMS.2018.21.8.897
- T. -W. Kim, S. -Y. Lee, S. W. Jung, H. Wi, and O. Yi, "A Research on the Security of Drone Control Data Using Quantum Entropy-Based Random Number Genera," Journal of The Korea Institute of Information Security & Cryptology, vol. 31, no. 2, pp. 133-144, Apr. 2021. https://doi.org/10.13089/JKIISC.2021.31.2.133