1 A. Kamble, "Security Attacks and Secure Routing Protocols in RPL-based Internet of Things: Survey" 33-39, 2017
2 A. Brandt, "RPL : IPv6 routing protocol for low-power and lossy networks"
3 K. Park, "Pseudonym Address based Hidden Tunnel Networking for Network Address Mutation"
4 J. H. Jafarian, "Multi-dimensional Host Identity Anonymization for Defeating Skilled Attacks" 47-58, 2016
5 M. Dunlop, "MT6D : a moving target IPv6 defense" 1321-1326, 2011
6 M. F. Razali, "IoT Honeypot: A Review from Researcher’s Perspective" 93-98, 2018
7 S. Deering, "Internet Protocol, Version 6(IPv6)Specication"
8 C. F. Morrell, "Improving the Security, Privacy, and Anonymity of a Client-Server Network through the Application of a Moving Target Defense" Virginia Tech 2016
9 J. Rivera, "Gartner Says 4.9 Billion Connected ‘Things’ Will Be in Use in 2015"
10 D. Kewley, "Dynamic Approaches to Thwart Adversary Intelligence Gathering" 176-185, 2001
1 A. Kamble, "Security Attacks and Secure Routing Protocols in RPL-based Internet of Things: Survey" 33-39, 2017
2 A. Brandt, "RPL : IPv6 routing protocol for low-power and lossy networks"
3 K. Park, "Pseudonym Address based Hidden Tunnel Networking for Network Address Mutation"
4 J. H. Jafarian, "Multi-dimensional Host Identity Anonymization for Defeating Skilled Attacks" 47-58, 2016
5 M. Dunlop, "MT6D : a moving target IPv6 defense" 1321-1326, 2011
6 M. F. Razali, "IoT Honeypot: A Review from Researcher’s Perspective" 93-98, 2018
7 S. Deering, "Internet Protocol, Version 6(IPv6)Specication"
8 C. F. Morrell, "Improving the Security, Privacy, and Anonymity of a Client-Server Network through the Application of a Moving Target Defense" Virginia Tech 2016
9 J. Rivera, "Gartner Says 4.9 Billion Connected ‘Things’ Will Be in Use in 2015"
10 D. Kewley, "Dynamic Approaches to Thwart Adversary Intelligence Gathering" 176-185, 2001
11 박태근, "Design of a Protected Server Network with Decoys for Network-based Moving Target Defense" 한국컴퓨터정보학회 23 (23): 57-64, 2018
12 R. E. Navas, "Demo: Do Not Trust Your Neighbors!A Small IoT Platform Illustrating a Man-in-the-Middle Attack" 120-125, 2018
13 S. Antonatos, "Defending against Histlist Worms using Network Address Space Randomization" 51 (51): 3471-3490, 2007
14 J. Sun, "DESIR: Decoy-enhanced seamless IP randomization" 2016
15 D. J. Bernstein, "Curve25519: new die-hellman speed records" Springer 207-228, 2006
16 강구홍, "Analysis of Threat Model and Requirements in Network-based Moving Target Defense" 한국컴퓨터정보학회 22 (22): 83-92, 2017
17 J. H. Jafarian, "An Effective Address Mutation Approach for Distructing Reconnaissance Attacks" 10 (10): 2562-2577, 2015
18 M. Atighetchi, "Adaptive Use of Network-Centric Mechanisms in Cyber-Defense" 183-192, 2003
19 S. Oh, "A hybrid mode to enhance the downward route performance in routing protocol for low power and lossy networks" 14 (14): 2018
20 T. Park, "A Scalable and Seamless Connection Migration Scheme for Moving Target Defense in Legacy Networks" E101-D (E101-D): 2018