ÀÚ·á°Ë»ö-Ç¥ÁØ

Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ

ÀÚ·á °Ë»ö°á°ú

°Ë»öÆäÀÌÁö·Î
Ç¥ÁØÁ¾·ù Á¤º¸Åë½Å´ÜüǥÁØ(TTAS)
Ç¥ÁعøÈ£ TTAK.KO-12.0151 ±¸ Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2010-12-23 ÃÑ ÆäÀÌÁö 38
ÇÑ±Û Ç¥Áظí USN ȯ°æ¿¡¼­ÀÇ Å° °ü¸® ±â¼ú Àû¿ë Áöħ
¿µ¹® Ç¥Áظí Guidelines for Using Key Management Schemes over USN
ÇÑ±Û ³»¿ë¿ä¾à ÁÖ¿ä ³»¿ëÀ¸·Î´Â USN ȯ°æ¿¡¼­ÀÇ Å° °ü¸® ¸ðµ¨ °í·Á»çÇ×À» °ËÅäÇÏ°í À̸¦ ±â¹ÝÀ¸·Î °ø°Ý À¯Çü ºÐ·ù¸¦ ÅëÇØ À¯Çüº°·Î °¡Àå È¿À²ÀûÀ¸·Î Àû¿ë °¡´ÉÇÑ Å° °ü¸® ±â¼úÀ» ºÐ¼®ÇÑ´Ù. ÀÌ·¯ÇÑ ºÐ¼®À» ¹ÙÅÁÀ¸·Î ¼¾¼­ ³×Æ®¿öÅ©ÀÇ ¼³Ä¡ À¯ÇüÀ» ±¸ºÐÇÏ°í °¢ À¯ÇüÀÇ ¼¾¼­ ³×Æ®¿öÅ©¿¡¼­ Å° °ü¸® ±â¹ýÀ» ¼±Á¤ÇÏ´Â °úÁ¤À» Á¤ÀÇÇÑ´Ù.
¿µ¹® ³»¿ë¿ä¾à This standard first identifies several factors to be considered in key management schemes under the USN environments and proposes the most efficient key management schemes for each attack model considering the identified factors. This standard also describes some example application sensor networks to show the key management selection procedure.
°ü·Ã IPR È®¾à¼­ Á¢¼öµÈ IPR È®¾à¼­ ¾øÀ½
°ü·ÃÆÄÀÏ    TTAK.KO-12.0151.pdf TTAK.KO-12.0151.pdf
Ç¥ÁØÀÌ·Â
Ç¥Áظí Ç¥ÁعøÈ£ Á¦°³Á¤ÀÏ ±¸ºÐ À¯È¿
¿©ºÎ
IPR
È®¾à¼­
ÆÄÀÏ
USN ȯ°æ¿¡¼­ÀÇ Å° °ü¸® ±â¼ú Àû¿ë Áöħ TTAK.KO-12.0151 2010-12-23 Á¦Á¤ À¯È¿ ¾øÀ½ TTAK.KO-12.0151.pdf
Ç¥ÁØÀ¯Áöº¸¼öÀÌ·Â
°ËÅäÀÏÀÚ °ËÅä°á°ú °ËÅä³»¿ë
2019-05-31 À¯Áö ÇöÀç È°¿ëµÇ°í Àִ ǥÁØÀ̹ǷΠÀ¯Áö°¡ ÇÊ¿äÇÔ