박사

IoT 장치의 보안을 위한 양방향 접속방식 중계통신에 대한 연구

이성호 2015년
논문상세정보
    • 저자 이성호
    • 기타서명 A Study of Forward/Reverse Connection Relay Communication for Security of IoT Devices
    • 형태사항 xviii, 144장: 삽화: 30 cm
    • 일반주기 단국대학교 학위논문은 저작권에 의해 보호받습니다, 지도교수 : 한경호, 참고문헌 : 139-142장
    • 학위논문사항 전자전기공학과 컴퓨터응용 전공, 2015. 2, 학위논문(박사)-, 단국대학교 대학원
    • DDC 621.38212, 22
    • 발행지 용인
    • 언어 kor
    • 출판년 2015
    • 발행사항 단국대학교 대학원
    유사주제 논문( 0)

' IoT 장치의 보안을 위한 양방향 접속방식 중계통신에 대한 연구' 의 참고문헌

  • 한국정보통신기술협회 기사
    http://www.tta.or.kr/news/certify_view.jsp?notice_num=3470 [2014]
  • 안전한 WEB of Things 응용을 위한 개체 인증 기술. 한국통신학 회논문지
    강남희 박지예 서울 [2013]
  • 사설네트워크 보안을 위한 역방향 연결에 대한 연구, 석사학위 논문
    이성호 단 국대학교 [2012]
  • 사물인터넷의 기초. 사물인터넷 현황과 의미 분석,그 리고 기업에게 주어진 과제
  • 사물인터넷(IoT)관련 가치사슬 및 시장 구성요소 현황, 정보통신방 송정책
    김민식 정원준 제26권 8호 통권 576호 [2014]
  • uIP-Micro IP Stack. http://en.wikipedia.org/wiki/UIP_(micro_IP)
  • netduino, http://www.netduino.com, http://www.netduino.com/netduinoplus2/schematic.pdf
  • libcoap, CoAP Library for C , http://libcoap.sourceforge.net/
  • Zachry Basnight, Jonathan Butts, Juan Lopez Jr, Thomas Dube(2013). Firmware modification attacks on programmable logic controllers.International Journal of Critical Infrastructure Protection Volume 6, Issue 2, June 2013, Pages 76?84
  • Z. Shelby, Sensinode, K. Hartke, C. Bormann, B. Frank(2011) (2010). Constrained Application Protocol (CoAP) draft-ietf-core-coap-08, Available at: https://tools.ietf.org/html/draft-ietf-core-coap-08
  • Z. Shelby, B. Frank, and D. Sturek(2010). Constrained Application Protocol (CoAP). Internet-Draft (work in progress), Available at: http://tools.ietf.org/html/draft-ietf-core-coap-03
  • Wikipedia, Shodan. http://en.wikipedia.org/wiki/Shodan_(website)
  • Wikipedia, NAT, http://en.wikipedia.org/wiki/Network_address_translation
  • Wikipedia, JTAG, http://en.wikipedia.org/wiki/Joint_Test_Action_Group
  • Wikipedia, HTTPD, http://en.wikipedia.org/wiki/Httpd
  • Wikipedia, Daemon, http://en.wikipedia.org/wiki/Daemon_(computing)
  • Wikipedia, Coap. http://en.wikipedia.org/wiki/Constrained_Application_Protocol
  • Wei Zhang, Weimin Lei, Shaowei Liu, Guangye Li (2014). A general framework of multipath transport system based on application-level relay. Computer Communications Volume 51, 15 September 2014, Pages 70?80
  • Vishal Tripathi, Arup Roy, Asheesh Raina, Kamlesh Bhatia, Anshul Gupta(2014). Emerging Market Analysis: India's Top 10 Technology Trends and Drivers in 2014, 6 March 2014 Gartner. Gartner Newsroom(2014). http://www.gartner.com/newsroom/id/2734517
  • Toshinori Takabatake(2008). A Scheme of Relay Server Selection Methods for NAT Traversal through Home Gateways. Telecommunication Networks and Applications Conference, 2008. ATNAC 2008. Australasian. page 116~121
  • Thangavel D, Xiaoping Ma, Valera A, Hwee-Xian Tan, Tan C.K.-Y(2014). Performance evaluation of MQTT and CoAP via a common middleware. Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), 2014 IEEE Ninth International Conference. Page 1-6
  • T. Berners-Lee, R. Fielding, and L. Masinter(2005). RFC 3986, Uniform Resource Identifier (URI): Generic syntax, 2005. url: http://tools.ietf.org/html/rfc3986
  • T. Beardsley and J. Qian(2010), The TCP Split Handshake: Practical Effects on Modern Network Equipment, Network Protocols and Algorithms, ISSN 1943-3581, vol. 2, no. 1, (2010), pp. 197-217
  • Sinha P, Boukhtouta A, Belarde V H, Debbabi M(2010). Insights from the analysis of the Mariposa botnet. Risks and Security of Internet and Systems (CRiSIS), 2010 Fifth International Conference. Page 1-9
  • Shodan Computer Search Engine. http://www.shodan.io, http://www.shodanhq.com
  • Roland Bodenheim, Jonathan Butts, Stephen Dunlap, Barry Mullins (2014). Evaluation of the ability of the Shodan search engine to identify Internet-facing industrial control devices. International Journal of Critical Infrastructure Protection Volume 7, Issue 2, June 2014, Pages 114?123
  • RealVNC (2011). VNC Enterprise Edition User Guide Version 4.6, April 2011, RealVNC Limited
  • Patrick Thibodeau (2014) The ABC of the Internet of Things, Computer world US
  • P Srisuresh, K Egevang(2001). Traditional IP network address translator (Traditional NAT) RFC-3022. Network Working Group, January 2001
  • Mohammad Rasmi, Aman Jantan(2013). A New Algorithm to Estimate the Similarity between the Intentions of the Cyber Crimes for Network Forensics. Procedia Technology. Volume 11, 2013, Pages 540?547
  • Manjeri N. Kondalwar, Prof. C.J. Shelke (2014), Remote Administrative Trojan/Tool (RAT), Manjeri N. Kondalwar et al, International Journal of Computer Science and Mobile Computing, Vol.3 Issue.3, March- 2014, pg. 482-487
  • Lerche C, Laum N, Golatowski F, Timmermann D, Niedermeier C (2012). Connecting the Web with the Web of Things: Lessons Learned From Implementing a CoAP-HTTP Proxy. Mobile Adhoc and Sensor Systems (MASS), 2012 IEEE 9th International Conference. Page 1-8
  • Jieyu Wu, Xinyu Shao, Haiping Zhu(2013). Relay node deployment based small world effect in hierarchical industrial wireless sensor networks. 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing. page 1066~1071
  • J R Rabaiotti, C J Hargreaves(2010). Using a software exploit to image RAM on an embedded system. Digital Investigation Volume 6, Issues 3?4, May 2010, Pages 95?103
  • J D Case, M Fedor, M L Schoffstall, J Davin(1990). Simple Network Management Protocol (SNMP) - RFC1157. Network Working Group
  • Geert Van de Putte, Daniel Gagic, Rajeev Kapoor, Richard Kinard, Paul Tatarelli (2005). Secure Production Deployment of Web Sphere business Integration Connect, IBM.
  • Gartner Inc(2013), Gartner Says the Internet of Things Installed Base Will Grow to 26 Billion Units By 2020, New Room, at http://www.gartner.com/newsroom/id/2636073
  • Elsevier (2010). Stuxnet may be the work of state-backed hackers. Network Security Volume 2010, Issue 9, September 2010, Pages 1?2
  • CoapSharp, Coap Library for .Net Microframework..http://www.coapsharp.com/, EXILANT Technologies
  • CoAP.NET, A CoAP framework in c#, https://coap.codeplex.com/
  • Castellani A, Fossati T, Loreto S (2012). HTTP-CoAP cross protocol proxy: an implementation viewpoint. Mobile Adhoc and Sensor Systems (MASS), 2012 IEEE 9th International Conference. Page 1-6
  • Cameron H. Malin, Eoghan Casey, James M Aquilina(2008). Chapter 5 ? The Dark Side of Netcat. Netcat Power Tools 2008, Pages 143?177
  • C. H. Yau, Y. Y. Tan, Anthony S. Fong, P. L. Mok (2008). Embedded Architectural Design Using Protection Logics to Defend Attack of Buffer Overflow and Unauthorized Access of - 170 - Code. Computer and Information Technology Workshops, 2008. CIT Workshops 2008. IEEE 8th International Conference. Page 264-269
  • Boulanger(2010), A. Catapults and grappling hooks: The tools and techniques of information warfare. IBM Systems Journal (Volume:37 , Issue: 1 )
  • Bergmann O, Hillmann K.T, Gerdes S (2012). A CoAP-gateway for smart homes. Computing, Networking and Communications (ICNC), 2012 International Conference. Page 446-450
  • ABI Research (2013), More Than 30 Billion Devices Will Wirelessly Connect to the Internet of Everything in 2020, https://www.abiresearch.com/press/more-than-30-billion-devices-will-wirelessly-conne