최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기情報保護學會論文誌 = Journal of the Korea Institute of Information Security and Cryptology, v.31 no.2, 2021년, pp.133 - 144
김태완 (국민대학교) , 이세윤 (국민대학교) , 정서우 (국민대학교) , 위한샘 (국민대학교) , 이옥연 (국민대학교)
Ardupilot and PX4 are representative open source projects for drones, and drone-controlled open sources are widely used for drone development at home and abroad due to reduced development costs, stability of source code, and rapid development feedback. However there are also fatal drawbacks behind s...
"A Study on the Domestic and Foreign Tr ends of Drone Industry Based on 4th Ind ustrial Revolution,", https://www.gb.go.kr/Main/open_contents/section/economy/page.do?mnu_uid2874&BD_CODEbbs_gongji&cmd2&B_NUM70035301&B_STEP70035300&V_NUM, Feb. 2021.
Joseph A. Marty, "Vulnerability Analysis of the MAVLink Protocol for Command and Control of Unmanned Aircraft," Mar. 2014.
You-sung Kang, Ju-han Kim, Kun-woo Kim and Seung-Gwang Lee. "Security Requirements for Drone-based Services," TTAK.KO-12.0317, June. 2016.
Yong-hyun Yoon, Kyung-ryun Oh, Sung-hoon Shin, Sang-seop Lee and Dong-geun Lee, "Industry Guide for Global Technical Regulations on Drone(Unmanned Aircraft)," KATS(Korean Agency for Technology and Standards), KSA(Korea Standard Association), 2018-2, Jan. 2018.
Anis Koubaa, Azza Allouch, Maram Alajlan, Yasir Javed, Abdelfettah Belghith, and Mohamed Khalgui, "Micro Air Vehicle Link (MAVLink) in a Nutshell: A survery," IEEE Access, vol. 7, pp. 87658-87680, June. 2019.
GitHub, "mavlink" www.github.com/mavlink, Feb. 2021.
Quyuh Dang, "Recommendation for Applications Using Approved Hash Algorithms,", 800-107 Rev 1, Aug. 2012.
Seong-Min Cho, Seung-Hyun Seo, "Status of cryptographic technologies applied to drone security," Journal of the Korea Institute of Information Security & Cryptology, 30(2), pp. 11-19, Apr. 2020.
Myoung-su Kim, Il-sun You and Kang-bin Yim, "Analysis of Fragility and Response Technology of Unmanned Mobile Drone," Journal of the Korea Institute of Information Security & Cryptology, 30(2), pp. 49-57, Apr. 2020.
N. Buthcer and A. Stewart "Securing the MAVLink Communication for Unmanned Aircraft Systems," CSSE14-02, University of Appalachian State and University of Auburn, 2014
TTA, "TTAK.K0-12.0235/R2", Dec. 2020.
SEONG-MIN CHO, EUNGI HONG, and SEUNG-HYUN SEO, "Random Number Generator Using Sensors for Drone," IEEE Access, vol. 8, pp. 30343-30354, Feb. 2020.
Jungmin Park, Seongjoon Cho, Taejin Lim, and Mark Tehranipoor, "QEC: A Quantum Entropy Chip and Its Applications," IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 28, pp. 1471-1484, June. 2020.
Rakel Haakegaard, Joanna Lang, "The Elliptic Curve Diffie-Hellman (ECDH)," Dec. 2015.
Marin Feldhofer, Sandra Dominikus, and Johannes Wolkersstorfer, "Strong Authentication for RFID Systems Using the AES Algorithm," CHES 2004, vol. 3156, Aug. 2004.
KISA, "Password Algorithm and Key Length Usage Guide," December, 2018
SECG, "SEC 1: Elliptic Curve Cryptography", Apr. 2009.
Tarun Kumar Goyal, Vineet Sahula, "Light Weight Security Algorithm for Low Power IoT Devices," 2016 ICACCI (International Conference on Advances in Computing, Communications and Informatics), Sep. 2016.
PX4, "Pixhawk", https://px4.io/, Feb. 2021.
Microchip, "SMART SAM G55G SAM G55J Data sheet", May. 2016.
EYL, "ENTROPY CHIP: GAME CHANGER FOR IoT SECURITY," Dec. 2016
Si-hoon Moon, Min-woo Kim and Tae-kyung Kwon, "Trends in lightweight cryptographic technology for IoT communication environment," The Journal of The Korean Intitute of Communication Sciences, 33(3), pp. 80-86, Feb. 2016.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
Free Access. 출판사/학술단체 등이 허락한 무료 공개 사이트를 통해 자유로운 이용이 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.