[1]李云.基于云计算的物联网安全问题研究[J]. 网络安全技术与应用,2016(1):105-107
[2]Ado A .Enabling privacy and security in cloud of Things: Architecture, applications, security & privacy challenges[J].Applied Computing and Informatics, 2019,11:1-6
[3] Khanna A.An architectural design for cloud of things[J].Facta Universitatis Series: Electron. Energ, 2015, 29 (3):357–365
[4] Liu C, Yang C, Zhang X.External integrity verifification for outsourced big data in cloud and IoT: a big picture, Future Gen. Comput[J]. Syst, 2015,49 :58–67
[5] Minh L,Dang.A Survey on Internet of Things and Cloud Computing for Healthcare[J].Electronics, 2019.8:1-49
[6] Lesperance N, Kulkarni S,Cheng K. Hardware trojan detection using exhaustive testing of k-bit subspaces[C]//Proc of the 20th Asia and South Pacifific Design Automation Conference (ASP-DAC). Piscataway,NJ:IEEE, 2015:755–760
[7] Raza S, Wallgren L, Voigt T. Real-time intrusion detection in the Internet of things[J].Ad hoc Netw, 2013, 11 (8):2661–2674
[8] Karlof C, Wagner D.Secure routing in wireless sensor networks: Attacks and countermeasures[J]. Ad hoc Netw, 2003, 1 (2):293-315
[9] Son S, McKinley K S, Shmatikov S. Diglossia: Detecting code injection attacks with precision and effiffifficiency[C]//Proc of the 2013 ACM SIGSAC Conf on Computer & Communications Security. New York:ACM, 2013: 1181–1192
[10] Adat V, Gupta B.Security in Internet of things: Issues, challenges, taxonomy, and architecture, Telecommun[J]. Syst, 2018,67 (3):423-441
[11] Lin J, Yu W, Zhang N, Yang X,et al. A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications[J].IEEE Internet Things J, 2017, 4 (5):1125-1142
[12] Otte P, De Vos M, Pouwelse J.Trustchain: A sybil-resistant scalable blockchain[J].Future Gener Comput Syst, 2017 :1–11
|