최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기한국사물인터넷학회 논문지 = Journal of the Korea Internet of Things Society, v.7 no.1, 2021년, pp.1 - 7
The IoT market continues to expand and grow, but the security threat to IoT devices is also increasing. However, it is difficult to apply the security technology applied to the existing system to IoT devices that have a problem of resource limitation. Therefore, in this paper, we present a service t...
* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.
IDC [Internet] https://www.idc.com/getdoc.jsp?containerIdIDC_P29 475, Worldwide Internet of Things Spending Guide.
N.H.Kang, "Standard technology trends for IoT security", Information and Communication Magazine, Vol.21, No.9, pp.40-45, 2014.
S.R.Oh and Y.G.Kim, "Security Analysis of MQTT and CoAP protocols in the IoT Environment" Proceeding of the Korea Information Processing Society Conference, Vol.23, No.1, pp.297-299, 2016.
ISO/IEC, "Information technology - Message Queuing Telemetry Transport(MQTT) V3.1.1. "ISO/IEC 20922:2016, 2016.
H.Y.Kim and J.N.Kim, "A Study of End-to-End Message Security Protocol Based on Lighweight Ciphers for Smart IoT Devices", Journal of The Korea Institute of Information Security & Cryptology, Vol.28, No.6, 2018.
Zach Shelby, Klaus Hartke, and Carsten Bormann, "The Constrained Application Protocol(CoAP)", IETF RFC 7252, 2014.
J. Daemen and V. Rjjmen, "The design of Rijndel:AES-the advanced encryption standard", Springer, 2013.
D. Hong, J. Lee, D. Kim, D. Kwon, K. Ryu. and D. Lee, "LEA: A 128-Bit Block Cipher for Fast Encryption on Common Processors", ISA. LNCS Vol.8267, pp.3-27, Springer, 2013.
J.M.Jeong, P.H.Kim, KY.Jung, E.J.Yoon and K.Y.Yoo, "Key Management Method for LEA Lightweight Block Cipher", Proceedings of Symposium of the Korean Institute of communications and Information Sciences, pp.959-960, 2017.
R. Rivest, A. Shamir, and L. Adleman, "A method for obtaining Digital Signatures and Public-Key Crypto-systems", Communications of the ACM, Vol.21, No.2, pp.120-126, 1978.
N. Koblitz, "Elliptic curve cryptosystems", Mathematics of Computation, Vol.48, No.177, pp.203-209, 1987.
K.H.Lee, "A Scheme on Anomaly Prevention for Systems in IoT Environment", Journal of The Korea Internet of Things Society, Vol.5, No.2, pp.8195-101, 2019.
KISIS [Internet] https://www.kisis.or.kr/kisis/subIndex/307.do
Namuwiki [Internet] https://namu.wiki/w/LEA
Wikipedia [Internet] https://en.wikipedia.org/wiki/ESP8266
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
오픈액세스 학술지에 출판된 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.