Journal of Engineering and Applied Sciences
Year:
2017
Volume:
12
Issue:
7 SI
Page No.
8062 - 8065
References
Be, S. and J. Kim, 2015. Development of Internet of Things (IoT) and change in security paradigm. KISTEP. IntI., 14: 44-57.
Jang, B. and C. Kim, 2014. Research on internet of things security technology. Secur. Eng. Res. J., 11: 429-438.
KINEWS., 2014. Existing IoT products 80%, maintain security vulnerability. KINEWS Company, Mushin, Lagos, Nigeria.
Kim, D., S. Yun and Y. Lee, 2013. Security for IoT service. J. Inst. Telecommun. Eng. Korea Inf. Commun., 30: 53-59.
Kim, D., S. Yun and Y. Lee, 2013. Security for IoT service. J. Inst. Telecommun. Eng. Korea Inf. Commun., 30: 53-59.
Kim, H., 2014. Security and privacy problem in internet of things environment. TTA. J., 153: 35-39.
Kim, S. and D. Jo, 2015. IoT (Internet of Tings) security technology trends. Korea Contents Soc. J., 13: 31-35.
Kim, S.H., 2016. Internet of Things (IoT) technology. J. Electron. Donating Soc., 43: 64-71.
Kwon, H., B. Chun and J. Kim, 2015. Current status of next generation IoT network security. Inf. Process. Soc. J., 22: 35-46.
Lee, H., C. Bak and S. Kim, 2014. Work effected with the same characteristics of IoT device. Inf. Sci. J. Software Appl., 41: 545-556.
Lee, S., 2015. Protection trend of information from Internet of Things (IoT). J. Korea Inst. Inf. Commun., 16: 28-35.