References
- Hussain Shaikh, Jong-Ho Kim, "Factor Analysis of IoT Relative Advantages with TAM Model", Journal of Next-generation Convergence Technology Association, Vol. 6, No. 2, pp. 193-201, 2022. https://doi.org/10.33097/JNCTA.2022.06.02.193
- Ji-Yeon Lee, "A Study on Cloud Service Certification Approach from SaaS Security Perspective", Journal of Next-generation Convergence Technology Association, Vol. 6, No .10, pp. 1820-1830, 2022. https://doi.org/10.33097/JNCTA.2022.06.10.1820
- Fatma Alshohoumi, Mohammed Sarrab, Abdulla AlHamadani, and Dawood Al-Abri. "Systematic Review of Existing IoT Architectures Security and Privacy Issues and Concerns", International Journal of Advanced Computer Science and Applications, Vol. 10, No. 7, pp. 232-251, 2019. DOI: 10.14569/IJACSA.2019.0100733.
- Young-Sae Kim and JeongNyeo Kim. "A Performance Analysis of Lightweight Cryptography in IoT Devices", The 28th Joint Conference on Communications and Information, pp. 327-328, 2018
- Caiming Liu, Yan Zhang and Huaqiang Zhang. "A Novel Approach to IoT Security Based on Immunology", Ninth International Conference on Computational Intelligence and Security, pp. 771-775, 2013.
- Kai Zhao and Lina Ge. "A Survey on the Internet of Things Security, Ninth International Conference on Computational Intelligence and Security", pp. 663-667, 2013.
- Hye-minNam and Chang-seop Park. "Modified MQTT-SN Protocol for End-to-End Security in a Constrained Embedded Environment", Journal of The Korea Institute of Information Security & Cryptology, Vol. 30, No., pp. 859-870, 2020. https://doi.org/10.13089/JKIISC.2020.30.5.859.
- Dong-hee Kang and Jae-DeokLim. "Network Security Protocol Performance Analysis in IoT Environment", Journal of The Korea Institute of Information Security & Cryptology, Vol. 32, No. 5, pp. 955-963, 2022. https://doi.org/10.13089/JKIISC.2022.32.5.955.
- Xiong Li, Zhou Xuan and Liu Wen. (2011) Research on the Architecture of Trusted Security System Based on the Internet of Things", 2011 Fourth Internal Conference on Intelligent Computation Technology ad Automation, 1172-1175.
- Mamun Abu-Tair, Soufiene Djahel, Philip Perry, Bryan Scotney, Unsub Zia, Jorge Martinez Carracedo and Ali Sajjad. "Towards Secure and Privacy-Preserving IoT Enabled Smart Home: Architecture and Experimental Study", Sensors. Vol. 20, No. 21., pp. 6131, 2020. doi:10.3390/s20216131.
- A. Juels. P. Syverson. and D. Bailey, "High Power Proxies for Enhancing RFID Privacy and Utility, Center for High Assurance Computer Systems", CHACS, LNCS Vol. 3856, pp. 210-226, 2015. DOI:10.1007/11767831_14
- M. Rieback. B. Crispo. and A. Tanenbaum. RFID Guardian, "A Battery Powered Mobile Device for RFID Privacy Management", Australasian Conference on informaiton Security and Privacy (ACISP) LNCS 3574, 184-194, 2015.
- Moon-si Hoon, Min-woo Kim and Tae-kyung Kwon, "Technology Trend of Ultra-weight En cryption for IoT Communication Surroundings", Korean Institute of Communications and Infor mation Sciences. Information and Communications Magazine. Vol. 33, No. 3, pp. 80-86, 2016.
- Dongkoo Kim and Hyeal Lee. "Implementation of Hardware and Trend of Ultra Encryption Algorithm", IDEC WEBZIN,http://www.idec.or.kr/webzine/?news_id=20191102.2019.
- Seon-Keun Lee. "A Study on Lightweight Block Cryptographic Algorithm Applicable to IoT Environment", Journal of the Korea Academia-Industrial cooperation Society, Vol. 19, No. 3, pp. 1-7. 2018. https://doi.org/10.5762/KAIS.2018.19.3.1.
- Mohammad Abdur Razzaque, Marija Milojevic-Jevric, Andrei Palade and Siobhan Clarke. "Middleware for Internet of Things: A Survey:, IEEE Internet of Things Journal. Vol. 3, No. 1, pp. 70-95, 2016. DOI: 10.1109/JIOT.2015.2498900
- Antonio F. Skarmeta, Jose L. Hernandez Ramos and M. Victoria Moreno. "A Decentralized Approach for Security and Privacy Challenges in the Internet of Things", IEEE World Forum on Internet of Things, pp. 67-72, 2014.
- Seminar Materials, "IoT Security Authentication Criteria Test, Case Study Top7", KISA, 2020.9.18.
- Mouza Bani Shemaili, Chan Yeob Yeun, Khalid Mubarak, Mohamed Jamal Zemerly, "A New Lightweight Hybrid Cryptographic Algorithm for The Internet of Things", The 7th International Conference for Internet Technology and Secured Transaction, 87-92, 2012.