박사

사물인터넷 환경에서의 안전한 디바이스 인증 방법 = Secure Device Authentication Method in the Internet of Things

김은 2015년
논문상세정보
' 사물인터넷 환경에서의 안전한 디바이스 인증 방법 = Secure Device Authentication Method in the Internet of Things' 의 주제별 논문영향력
논문영향력 선정 방법
논문영향력 요약
주제
  • 그룹 인증
  • 디바이스 인증
  • 사물인터넷
동일주제 총논문수 논문피인용 총횟수 주제별 논문영향력의 평균
999 0

0.0%

' 사물인터넷 환경에서의 안전한 디바이스 인증 방법 = Secure Device Authentication Method in the Internet of Things' 의 참고문헌

  • 사물인터넷상에서의 보안과 프라이버시 보호 이슈
    김지현 김호원 서희정 이동건 최종석 정보처리학회지, 제21권, 제2호, pp.48-60 [2014]
  • 사물인터넷 개념, 구현기술 그리고 비즈니스
    김학용 홍릉과학출판사 [2014]
  • 박사
    “USIM 카드 기반의 효율적인 UMTS 인증 프로토콜”
    전하용 년 경남대학교 대학원 박사학위 논문 [2009]
  • “Device-to-Device(D2D)기술 동향,”
    강형우 [2013]
  • http://www.itdaily.kr/news/articleView.html?idxno=55646
  • http://www.ddaily.co.kr/news/article.html?no=122029
  • http://www.boannews.com/media/view.asp?idx=42947&kind=2
  • Yun-Kyung Lee, Jong-wook Han, and Kyo-il Chung, “Home Device Authentication Method in Ubiquitous Environments,” Consumer Electronics, pp.1-5, 2007.
  • Yi Jiang, Wei Cheng, and Xiaojiang Du, “Group-based key array authentication protocol in radio frequency identification systems,” IET information Security, Vol.8, Iss.6, pp.290-296, 2014.
  • W.S Juang, “Efficient user authentication and key agreement in wireless sensor network,” Lecture Notes Comput. Sci., vol.4298, pp.15-29, Aug.2006.
  • V.Mora-Afonso, P.Caballero-Gil, and J.Molina_Gil, “Strong authentication on smart wireless devices,” Future Generation Communication Technology(FGCT), pp.137-142, 2013.
  • V.Kolesnikov, “MAC aggregation with message multiplicity,” in Security and Cryptography for Networks. Springer, pp.445-460, 2012.
  • V.Kolesnikov, W.Lee, and J.Hong, “MAC aggregation resilient to DoS attacks,” in Proc.IEEE International Conference on Smart Grid Communications(SmartGridComm), pp.226-231, 2011.
  • Tobias Heer, Oscar Garcia-Morchon, Rene Hummen, Sye Loong Keoh, Sandeep S.Kummar, and Klasu Wehrele, “Security Challenges in the IP-based Internet of Things,” Wireless Personal Communication, Vol.61, No.3, pp.527-542, 2011.
  • Toan-Thinh TRUONG, Minh-Triet TRAN, and Anh-Due DUONG, “Robust mobile device integration of a fingerprint biometric remote authentication scheme,” Advanced Information Networking and Applications(AINA), pp.678-685, 2012.
  • Thamer A.Alghamdi, Aboubaker Lasebae, and Mahdi Aiash, “Security Analysis of the Constrained Application Protocol in the Internet of Things,” Future Generation Communication Technology(FGCT) , pp.163-168, 2013.
  • Telecommunication Technology Association, “Object Identifier based Internet of Things Device Identification Scheme," TTAK.KO-06.0365, 2014.
  • Telecommunication Technology Association, “Definition and Reference Model of the Internet of Things,”TTAK.KO-06.0346, 2013.
  • Sye Loong Keoh, Sandeep S.Kumar, and Hannes Tschofenig, “Secuing the Internet of Things : A Standardization Perspective,” Internet of Things Journal, IEEE, Vol.1, No.3, pp265-275, 2014.
  • Soon-Nyean Chong, Huo-Chong Ling, and Pei-Lee Teh, “Secure Encrypted Steganography Graphical Password scheme for Near Field Communication Smartphone access control system,” Expert Systems with Applications, vol.41, Iss.7-1, pp.3561-3568, 2013.
  • Reza Ghanbarimanan and Alireza Nemaney Pour, “A New Definition of Group Ahentication Increasing Performance of Server Calculation,” Information Science and Applications(ICISA), pp.1-6, 2012.
  • Rene Hummen, Jan H.Ziegeldorf, Hossein SHafagh, Shahid Raza, and Klaus Wehrle, “Towards Viable Certificate-based Authentication for the Internet of Thing,” ACM, pp.37-42, 2013.
  • Pradeep Hanumanthappa and Sanjay Singh, “Privacy Preserving and Ownership Authentication in Ubiquitous Computing Devices using Secure Three Way Authentication,” IEEE Innovations in Information Technology(IIT), pp.107-112, 2012.
  • Parisa Memarmoshrefi, Omar Alfandi, Ansgar Kellner, and Dieter Hogrefe, “Autonomous Group-based Authentication Mechanism in Mobile Ad Hoc Networks,” Trust, Security and Privacy in Computing and Communicaiton(TrustCom), pp.1097-1102, 2012.
  • Oladayo Bello and Sherali Zeadally, “Intelligent Device-to-Device Communication in the Internet of Things,” IEEE SYSTEM JOURNAL, Vol.PP, Iss.99, pp.1-11, 2014.
  • Marlies Rybnicek, Christoph Lang_Muhr, and Daniel Haslinger, “A Roadmap to Continuous Biometric Authentication on Mobile Devices,” Wireless Communications and Mobile Computing Conference(IWCMC), pp.122-127, 2014.
  • Marc Barisch, “Design and Evaluation of an Architecture for Ubiquitous User Authentication based on Identity Management Systems,” Trust, Security and Privacy in Computing and Communications(TrustCom), pp.863-872, 2011.
  • M.K.Khan, J.Zhang, and X.Wang, “Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices,” Chaos, Solitons & Fractals, vol.35, no.3, pp.519-524, 2008.
  • Lingjun Li, Xinxin Zhao, and Guoliang Xue, “Near Field Authentication for Smart Devices,” IEEE INFOCOM, pp.375-379, 2013.
  • Li Xiaoyong and ZhangHui, “Identity-based Authenticated Key Exchange Protocols,” 201O International Conference on Educational and Information Technology (ICEIT 2010), pp.V3-85-V3-87, 2010.
  • Lein Harn, “Brief Contributions,” IEEE TRANSACTIONS ON COMPUTERS, Vol.62, No. 9, pp.1893-1898, 2013.
  • K. Oh, T. Kim and H. Kim, “Implementation of public key-based key distribution in wireless sensor network,” in Proc. KOSBE, pp.95-98, Seoul, Korea, Feb.2008.
  • Jen-Ho Yang and Chin-Chen Chang, “An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem,” Computers & Security, Vol.28, Iss.3-4, pp.138-143, 2008.
  • J.Katz and A.Lindell, “Aggregate message authentication codes,” in Topics in Cryptology-CT-RSA 2008. Springer, pp.155-169, 2008.
  • IPv6 보안 기술서, 한국인터넷진흥원
    KISA 안내 해설, 제-25호, 2010 [2010]
  • Huansheng Ning, Hong Liu, and Laurence T. Yang, “Cyberentity Security in the Internet of Things,” IEEE Computer Society, Vol.46, No 4, pp46-53, 2013.
  • Huansheng Ning and Ziou Wang, “Future Internet of Things Architecture:Like Mankind Neural System or Social Organization Framework,” IEEE COMMUNICATION LETTERS, Vol.15, No.4, pp.461-463, 2011.
  • Chun-Ta Li and Min-Shiang Hwang, “An efficient biometrics-based remote user authentication scheme using smart cards,” Journal of Network and Computer Applications, Vol.33, Iss.1, pp.1-5, 2010.
  • Chengzhe Lai, Hui Li, Rongxing Lu, Rong Jiang, and Xuemen(Sherman) Shen, “LGTH:A Lightweight Group Authentication Protocol for Machine-Type Communication in LTE Networks,” Global Communication Conference(GLOBECOM), pp.832-837, 2013.
  • C.-L.Chen, C.-C.Lee, and C.-Y.Hsu, “Mobile device integration of a fingerprint biometric remote authentication scheme,” International Journal of Communication Systems, 2011. [oneline].Available:http://dx.doi.org/10.1002/dac.1277