Journal of Engineering and Applied Sciences

Year: 2017
Volume: 12
Issue: 7 SI
Page No. 8062 - 8065

IoT and Wireless Terminal Security Technique

Authors : Wonseok Kim, Eunsik Bak and Euiin Choi

References

Be, S. and J. Kim, 2015. Development of Internet of Things (IoT) and change in security paradigm. KISTEP. IntI., 14: 44-57.

Jang, B. and C. Kim, 2014. Research on internet of things security technology. Secur. Eng. Res. J., 11: 429-438.

KINEWS., 2014. Existing IoT products 80%, maintain security vulnerability. KINEWS Company, Mushin, Lagos, Nigeria.

Kim, D., S. Yun and Y. Lee, 2013. Security for IoT service. J. Inst. Telecommun. Eng. Korea Inf. Commun., 30: 53-59.

Kim, D., S. Yun and Y. Lee, 2013. Security for IoT service. J. Inst. Telecommun. Eng. Korea Inf. Commun., 30: 53-59.

Kim, H., 2014. Security and privacy problem in internet of things environment. TTA. J., 153: 35-39.

Kim, S. and D. Jo, 2015. IoT (Internet of Tings) security technology trends. Korea Contents Soc. J., 13: 31-35.

Kim, S.H., 2016. Internet of Things (IoT) technology. J. Electron. Donating Soc., 43: 64-71.

Kwon, H., B. Chun and J. Kim, 2015. Current status of next generation IoT network security. Inf. Process. Soc. J., 22: 35-46.

Lee, H., C. Bak and S. Kim, 2014. Work effected with the same characteristics of IoT device. Inf. Sci. J. Software Appl., 41: 545-556.

Lee, S., 2015. Protection trend of information from Internet of Things (IoT). J. Korea Inst. Inf. Commun., 16: 28-35.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved