Acknowledgement
이 성과는 정부(과학기술정보통신부)의 재원으로 한국연구재단의 지원을 받아 수행된 연구임(No.2021R1F1A1052129)
References
- S.N.Swamy and S.R.Kota, "An Empirical Study on System Level Aspects of Internet of Things (IoT)," IEEE Access, Vol.8, pp.188082-188134, 2020. https://doi.org/10.1109/access.2020.3029847
- J.Hwang, L.Nkenyereye, N.Sung, J.Kim and J.Song, "IoT Service Slicing and Task Offloading for Edge Computing," IEEE Internet of Things Journal, Vol.8, No.14, pp.11526-11547, 2021. https://doi.org/10.1109/JIOT.2021.3052498
- A.M.Zarca, J.B.Bernabe, A.Skarmeta and J.M.Alcaraz Calero, "Virtual IoT HoneyNets to Mitigate Cyberattacks in SDN/NFV-Enabled IoT Networks," IEEE Journal on Selected Areas in Communications, Vol.38, No.6, pp.1262-1277, 2020. https://doi.org/10.1109/jsac.2020.2986621
- H.Lee, "Intrusion Artifact Acquisition Method based on IoT Botnet Malware," Journal of The Korea Internet of Things Society, Vol.7, No.3, pp.1-8, 2021.
- J.K.Park, J.Kim, "Real-Time Monitoring and Control System of Server Room based on IoT," Journal of The Korea Internet of Things Society, Vol.6, No.3, pp.7-13, 2020. https://doi.org/10.20465/KIOTS.2020.6.3.007
- J.Hao, J.Liu, W.Wu, F.Tang and M.Xian, "Secure and Fine-Grained Self-Controlled Outsourced Data Deletion in Cloud-Based IoT," IEEE Internet of Things Journal, Vol.7, No.2, pp.1140-1153, 2020. https://doi.org/10.1109/jiot.2019.2953082
- S.Ramesh and M.Govindarasu, "An Efficient Framework for Privacy-Preserving Computations on Encrypted IoT Data," IEEE Internet of Things Journal, Vol.7, No.9, pp.8700-8708, 2020. https://doi.org/10.1109/jiot.2020.2998109
- S.Kim, "A IoT Security Service based on Authentication and Lightweight Cryptography Algorithm," Vol.7, No.1, pp.1-7, 2021.
- H.Seo, J.K.Park, "The prevent method of data loss due to differences in bit rate between heterogeneous IoT devices," Journal of the Korea Institute of Information and Communication Engineering, Vol.23, No.7, pp.829-836, 2019. https://doi.org/10.6109/JKIICE.2019.23.7.829
- K.Tsai, Y.Huang, F.Leu, I.You, Y.Huang and C.Tsai, "AES-128 Based Secure Low Power Communication for LoRaWAN IoT Environments," IEEE Access, Vol.6, pp.45325-45334, 2018. https://doi.org/10.1109/access.2018.2852563
- L. E. Kane, J. J. Chen, R. Thomas, V. Liu and M. Mckague, "Security and Performance in IoT: A Balancing Act," IEEE Access, Vol.8, pp.121969-121986, 2020. https://doi.org/10.1109/access.2020.3007536
- K.Tsai, F.Leu, I.You, S.Chang, S.Hu and H.Park, "Low-Power AES Data Encryption Architecture for a LoRaWAN," IEEE Access, Vol.7, pp.146348-146357, 2019. https://doi.org/10.1109/access.2019.2941972
- M.Lee, "Performance Evaluation of Smoothing Algorithm for Efficient Use of Network Resources in IoT environments," Journal of The Korea Internet of Things Society, Vol.7, No.2, pp.47-53, 2021. https://doi.org/10.20465/KIOTS.2021.7.2.047
- S.C.Cha, M.S.Chuang, K.H.Yeh, Z.J.Huang and C.Su, "A User-Friendly Privacy Framework for Users to Achieve Consents With Nearby BLE Devices," IEEE Access, Vol.6, pp.20779-20787, 2018. https://doi.org/10.1109/access.2018.2820716
- C.Huang, H.Liu, W.Wang and J.Li, "A Compact and Cost-Effective BLE Beacon With Multiprotocol and Dynamic Content Advertising for IoT Application," IEEE Internet of Things Journal, Vol.7, No.3, pp.2309-2320, 2020. https://doi.org/10.1109/jiot.2019.2958455
- K.E.Jeon, J.She, P.Soonsawad and P.C.Ng, "BLE Beacons for Internet of Things Applications: Survey, Challenges, and Opportunities," IEEE Internet of Things Journal, Vol.5, No.2, pp.811-828, 2018. https://doi.org/10.1109/jiot.2017.2788449
- B.Luo, F.Xiang, Z.Sun and Y.Yao, "BLE Neighbor Discovery Parameter Configuration for IoT Applications," IEEE Access, Vol.7, pp.54097-54105, 2019. https://doi.org/10.1109/access.2019.2912493
- J.Kim and A.Yun, "Secure Fully Homomorphic Authenticated Encryption," IEEE Access, Vol.9, pp.107279-107297, 2021. https://doi.org/10.1109/ACCESS.2021.3100852
- Y.Su, B.Yang, C.Yang and L.Tian, "FPGA-Based Hardware Accelerator for Leveled Ring-LWE Fully Homomorphic Encryption," IEEE Access, Vol.8, pp.168008-168025, 2020. https://doi.org/10.1109/access.2020.3023255
- Y.Ke, M.Q.Zhang, J.Liu, T.T.Su and X.Y. Yang, "Fully Homomorphic Encryption Encapsulated Difference Expansion for Reversible Data Hiding in Encrypted Domain," IEEE Transactions on Circuits and Systems for Video Technology, Vol.30, No.8, pp.2353-2365, 2020. https://doi.org/10.1109/tcsvt.2019.2963393