Supported by : Pukyong National University
- A. Restas, "Drone Application for Supporting Disaster Management," World Journal of Engineering and Technology, Vol. 3, No. 3, pp. 316-321, 2015. https://doi.org/10.4236/wjet.2015.33C047
- I. Bekmezci, O.K. Sahingoz, and S. Temel, "Flying Ad-Hoc Networks (FANETs): A survey," Ad Hoc Networks, Vol. 11, No. 3, pp. 1254-1270, 2013. https://doi.org/10.1016/j.adhoc.2012.12.004
- A.J. Marty, Vulnerability Analysis of the MAV Link Protocol for Command and Control of Unmanned Aircraft, Master's Thesis of Air Force Institute of Technology, 2013.
- N. Prapulla, S. Veena, and G. Srinivasalu, "Development of Algorithms for MAV Security," Proceeding of IEEE International Conference On Recent Trends In Electronics Information Communication Technology, pp. 799-802, 2016.
- IETF, Diffie-Hellman Key Agreement Method, RFC 2631, 1999.
- M. Ergen and D. Lee, "WTRP-Wireless Token Ring Protocol," IEEE Transactions on Vehicular Technology, Vol. 54, No. 6, pp. 1863-1881, 2004.
- Y. Shiu, S. Y. Chang, H. Wu, S. C. H. Huang, and H. Chen, "Physical Layer Security in Wireless Networks: A Tutorial IEEE Wireless Communications," IEEE Wireless Communication, Vol. 18, No. 2, pp. 66-74, 2011. https://doi.org/10.1109/MWC.2011.5751298
- M. Shin and S. Kim, "A Study on the Security Framework for IoT Services Based on Cloud and Fog Computing," Journal of Korea Multimedia Society, Vol. 20, No. 12, 2017, pp. 101-112. https://doi.org/10.9717/kmms.2017.20.2.101
- D. Lee, D. C. Kim, D. Kwon, and H. Kim, "Efficient Hardware Implementation of the Lightweight Block Encryption Algorithm LEA," Sensors, Vol. 14, No. 1, pp. 975-994, 2014. https://doi.org/10.3390/s140100975
- J.S. Coron, Y. Dodis, C. Malinaud, and P. Puniya, "Merkle-Damgard Revisited: How to Construct a Hash Function," Proceeding of Annual International Conference on Advances in Cryptology, pp. 430-448, 2005.