참고문헌
- V. Hassija. V. Chamola. V. Saxena. D. Jain. P. Goyal & B. Sikdar. (2019). A Survey on IoT Security Application Areas Security Threats and Solution Architectures, IEEE Access, .7, 82721-82743. https://doi.org/10.1109/access.2019.2924045
- M. Endler. A. Silva & R. A.M.S. Cruz. (2017). An Approach for Secure Edge Computing in the Internet of Things, 1st Cyber Security in Networking Conference(CSNet), 1-8.
- S. H. Kim. D. H. Kim. H. S. Oh. H. S. Jeon & H. J. Park. (2016). The Data Collection Solution Based on MQTT for Stable IoT platforms, Journal of the Korea Institute of Information and Communication Enginering, 20(4), 728-738. https://doi.org/10.6109/jkiice.2016.20.4.728
- A. Al-Dulaimy. Y. Sharma. M. G. Khan & J. Taheri. (2020). Introduction to edge computing, Institution of Engineering and Technology. 1-24. DOI: 10.1049/PBPC033E_ch1
- M. Nakkar. R. AITawy & A. Youseef. (2021). Lightweight Authentication and Key Agreement Protocol for Edge Computing Applica, IEEE 7th World Forum on Internet of Things(WF-IoT), 415-420. DOI: 10.1109/WF-IoT51360.2021.9595939
- A. Erroutbi. A. E. Hanjri & A. Sekkaki. (2019). Secure and Lightweight HMAC Mutual Authentication Protocol for Communication between IoT Devices and Fog Nodes, 5th IEEE International Smart Cites Conference ISC2. 251-257.
- L. Loffi. C. M. Westphall. L. D. Grudtner & C. B. Westphall. (2019). Mutual Authentication for IoT in the Context of Fog Computing. 11th International Conference on Communication System & Networks(COMSNETS). 367-374.
- M. N. Aman. K. C. Chua & B. Sikdar. (2017). Mutual Authentication in IoT System Using Physical Unclonable Functions. IEEE Internet of Things Journal, 4(5), 1327-1340. https://doi.org/10.1109/JIOT.2017.2703088
- A. Shahidinejad. M. G. Arani. A. Souri. M. Shojafar & S. Kumari. (2020). Light-Edge: A Lightweight Authentication Protocol for IoT Devices in an Edge-Cloud Environment, IEEE Consumer Electronics Magazine, 1-6. https://doi.org/10.1109/MCE.2017.2770231
- M. H. Ibrahim. (2016). Octopus: An Edge-Fog Mutual Authentication Scheme, International Journal of Network Security, International Journal of Network Security, 18(6). 1089-1101.
- C. Y. Weng. C. T. Li. C. L. Chen & C. C. Lee. (2021). Lightweight Anonymous Authentication and Secure Communication Scheme for fog Computing Service, IEEE Access, .9. 145522-145537. https://doi.org/10.1109/ACCESS.2021.3123234
- J. Y. Choi. (2019). A study on the application of blickchain to the edge computing-based Internet of Things. Journal of Digital Convergence. 17(12), 219-228. https://doi.org/10.14400/JDC.2019.17.12.219
- K. Kaur. S. Garg. G. Kaddoum. M. Guizani & D. N. K. Jayakody. (2019). A Lightweight and Privacy-Preserving Authentication Protocol for Mobile Edge Computing. IEEE Global Communications Conference(GLOBECOM), 1-6. DOI : 10.1109/GLOBECOM38437.2019.9013856
- M. A. Rakeei & F. Moazami. (2020), An efficient and provably secure authenticated key agreement scheme for mbile edge computing, IACR Criptol., 1-12
- Y. Li, Q.Cheng & X. Liu. (2021). A Secure Anonymous Identity-Based Scheme in New Authentication Architecture for Mobile Edge Computing, IEEE Systems Journal, 15(1), 935-946 https://doi.org/10.1109/JSYST.2020.2979006
- Y. Xiao. Y. Jia. C. Liu. X. Cheng. & J. Yu. (2019), Edge Computing Security: State of the Art and Challenges, Preceedings of the IEEE, 107(8), 1608-1631 https://doi.org/10.1109/JPROC.2019.2918437
- J. H. Hong. K. C. Lee & S. Y. Lee. (2020). Trends in Edge Computing Technology, ETRI Electronics and Telecommunications Tends, 35(6). 78-87.