Yun-Kyung Lee, Jong-wook Han, and Kyo-il Chung, “Home Device Authentication Method in Ubiquitous Environments,” Consumer Electronics, pp.1-5, 2007.
Yi Jiang, Wei Cheng, and Xiaojiang Du, “Group-based key array authentication protocol in radio frequency identification systems,” IET information Security, Vol.8, Iss.6, pp.290-296, 2014.
W.S Juang, “Efficient user authentication and key agreement in wireless sensor network,” Lecture Notes Comput. Sci., vol.4298, pp.15-29, Aug.2006.
V.Mora-Afonso, P.Caballero-Gil, and J.Molina_Gil, “Strong authentication on smart wireless devices,” Future Generation Communication Technology(FGCT), pp.137-142, 2013.
V.Kolesnikov, “MAC aggregation with message multiplicity,” in Security and Cryptography for Networks. Springer, pp.445-460, 2012.
V.Kolesnikov, W.Lee, and J.Hong, “MAC aggregation resilient to DoS attacks,” in Proc.IEEE International Conference on Smart Grid Communications(SmartGridComm), pp.226-231, 2011.
Tobias Heer, Oscar Garcia-Morchon, Rene Hummen, Sye Loong Keoh, Sandeep S.Kummar, and Klasu Wehrele, “Security Challenges in the IP-based Internet of Things,” Wireless Personal Communication, Vol.61, No.3, pp.527-542, 2011.
Toan-Thinh TRUONG, Minh-Triet TRAN, and Anh-Due DUONG, “Robust mobile device integration of a fingerprint biometric remote authentication scheme,” Advanced Information Networking and Applications(AINA), pp.678-685, 2012.
Thamer A.Alghamdi, Aboubaker Lasebae, and Mahdi Aiash, “Security Analysis of the Constrained Application Protocol in the Internet of Things,” Future Generation Communication Technology(FGCT) , pp.163-168, 2013.
Telecommunication Technology Association, “Object Identifier based Internet of Things Device Identification Scheme," TTAK.KO-06.0365, 2014.
Telecommunication Technology Association, “Definition and Reference Model of the Internet of Things,”TTAK.KO-06.0346, 2013.
Sye Loong Keoh, Sandeep S.Kumar, and Hannes Tschofenig, “Secuing the Internet of Things : A Standardization Perspective,” Internet of Things Journal, IEEE, Vol.1, No.3, pp265-275, 2014.
Soon-Nyean Chong, Huo-Chong Ling, and Pei-Lee Teh, “Secure Encrypted Steganography Graphical Password scheme for Near Field Communication Smartphone access control system,” Expert Systems with Applications, vol.41, Iss.7-1, pp.3561-3568, 2013.
Reza Ghanbarimanan and Alireza Nemaney Pour, “A New Definition of Group Ahentication Increasing Performance of Server Calculation,” Information Science and Applications(ICISA), pp.1-6, 2012.
Rene Hummen, Jan H.Ziegeldorf, Hossein SHafagh, Shahid Raza, and Klaus Wehrle, “Towards Viable Certificate-based Authentication for the Internet of Thing,” ACM, pp.37-42, 2013.
Pradeep Hanumanthappa and Sanjay Singh, “Privacy Preserving and Ownership Authentication in Ubiquitous Computing Devices using Secure Three Way Authentication,” IEEE Innovations in Information Technology(IIT), pp.107-112, 2012.
Parisa Memarmoshrefi, Omar Alfandi, Ansgar Kellner, and Dieter Hogrefe, “Autonomous Group-based Authentication Mechanism in Mobile Ad Hoc Networks,” Trust, Security and Privacy in Computing and Communicaiton(TrustCom), pp.1097-1102, 2012.
Oladayo Bello and Sherali Zeadally, “Intelligent Device-to-Device Communication in the Internet of Things,” IEEE SYSTEM JOURNAL, Vol.PP, Iss.99, pp.1-11, 2014.
Marlies Rybnicek, Christoph Lang_Muhr, and Daniel Haslinger, “A Roadmap to Continuous Biometric Authentication on Mobile Devices,” Wireless Communications and Mobile Computing Conference(IWCMC), pp.122-127, 2014.
Marc Barisch, “Design and Evaluation of an Architecture for Ubiquitous User Authentication based on Identity Management Systems,” Trust, Security and Privacy in Computing and Communications(TrustCom), pp.863-872, 2011.
M.K.Khan, J.Zhang, and X.Wang, “Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices,” Chaos, Solitons & Fractals, vol.35, no.3, pp.519-524, 2008.
Lingjun Li, Xinxin Zhao, and Guoliang Xue, “Near Field Authentication for Smart Devices,” IEEE INFOCOM, pp.375-379, 2013.
Li Xiaoyong and ZhangHui, “Identity-based Authenticated Key Exchange Protocols,” 201O International Conference on Educational and Information Technology (ICEIT 2010), pp.V3-85-V3-87, 2010.
K. Oh, T. Kim and H. Kim, “Implementation of public key-based key distribution in wireless sensor network,” in Proc. KOSBE, pp.95-98, Seoul, Korea, Feb.2008.
Jen-Ho Yang and Chin-Chen Chang, “An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem,” Computers & Security, Vol.28, Iss.3-4, pp.138-143, 2008.
J.Katz and A.Lindell, “Aggregate message authentication codes,” in Topics in Cryptology-CT-RSA 2008. Springer, pp.155-169, 2008.
IPv6 보안 기술서, 한국인터넷진흥원
KISA 안내 해설, 제-25호, 2010[2010]
Huansheng Ning, Hong Liu, and Laurence T. Yang, “Cyberentity Security in the Internet of Things,” IEEE Computer Society, Vol.46, No 4, pp46-53, 2013.
Huansheng Ning and Ziou Wang, “Future Internet of Things Architecture:Like Mankind Neural System or Social Organization Framework,” IEEE COMMUNICATION LETTERS, Vol.15, No.4, pp.461-463, 2011.
Chun-Ta Li and Min-Shiang Hwang, “An efficient biometrics-based remote user authentication scheme using smart cards,” Journal of Network and Computer Applications, Vol.33, Iss.1, pp.1-5, 2010.
Chengzhe Lai, Hui Li, Rongxing Lu, Rong Jiang, and Xuemen(Sherman) Shen, “LGTH:A Lightweight Group Authentication Protocol for Machine-Type Communication in LTE Networks,” Global Communication Conference(GLOBECOM), pp.832-837, 2013.
C.-L.Chen, C.-C.Lee, and C.-Y.Hsu, “Mobile device integration of a fingerprint biometric remote authentication scheme,” International Journal of Communication Systems, 2011. [oneline].Available:http://dx.doi.org/10.1002/dac.1277
'
사물인터넷 환경에서의 안전한 디바이스 인증 방법 = Secure Device Authentication Method in the Internet of Things'
의 유사주제(
) 논문