[1] ROMANA R, ZHOUA J, LOPEZB J. On the features and challenges of security & privacy in distributed Internet of Things[J]. Computer Networks, 2013, 57 (10), 2266-2279.
[2] 吴功宜,吴应,物联网工程导论[M],机械工业出版社,2012.
[3] 钱志鸿, 王义君, 物联网技术与应用研究[J],电子学报,2012,40(5),1023-1029.
[4] 徐小涛,杨志红,物联网信息安全[M],人民邮电出版社,2012.
[5] Dunkels A, IP for Smart Objects v1.1 – IPSO Alliance [M/OL], http: // ipso – alliance.org/ downloads/ Why+IP.
[6] Atzori L, Iera A, Morabito G, The Internet of Things: A survey[J], Computer Networks, 2010, 54(15):2787-2805.
[7] 吴振强, 周彦伟, 马建峰, 物联网安全传输模型[J], 计算机学报, 2011, 34(8):1351-1364.
[8] Masoumeh Safkhani, Nasour Bagheri, Ali Mahani, On the security of RFID anti-counting security protocol (ACSP)[J], Journal of computational and applied mathematics, 2014, 259(2), 2 ,12-521.
[9] Tapalina Bhattasali, Rituparna Chaki, Nabendu Chaki, Study of Security Issues in Pervasive Environment of Next Generation Internet of Things [J], Computer Information Systems and Industrial Management, Lecture Notes in Computer Science, 2013,8104(5), 206-217.
[10] Han G, Shu L, Chan S, Hu J, Security and privacy in internet of things: methods, architectures, and solutions[J], Security and Communication Networks, 2014, 7, 2181–2182.
[11]CHEN X,ZHANG F,KIM K.A new ID·based group signature scheme from bilinear pairings[EB/OL].(2003).http://eprint.ia—cr.org/2003/1 16.pdf.
[12] GORANTLA M C,SAXENA A.An eficient certificate-less signature scheme[C]//Proc of Cmputational Intelligence and Security.Berlin:Springer,2006:110-116
|