[1] Bonneau J,Herley C,Van Oorschot PC,et al. Passwords and the evolution of imperfect authentication [J]. Communications of the ACM,2015,58(7): 78-87
[2] Forrester. Security: The vital element of the Internet of things[R].Forrester, 2015
[3] ISO/IEC 20180:2012, Telecommunications and Information Exchange Between Systems-Security Framework for Ubiquitous Sensor Networks[S]. ISO/IEC,2012
[4] IEC 62443-1-1:2009, Industrial Communication Networks-Network and System Security-Part 1-1 Terminology, Concepts and Models[S]. International Electro Technical Commission(IEC),2009
[5] ITU-T, Y.2060,Overview of the Internet of Things[S]. International Telecommunication Union (ITU),2016
[6] NIST Special Publication 800-63B, Digital Identity Guidelines: Authentication and Lifecycle Management[S]. National Institute of Standards and Technology(NIST),2017
[7] 全国信息安全标准化技术委员会(tc260). GB/T 33474—2016,物联网 参考体系结构[S].北京:中国标准出版社,2016
[8] 全国信息安全标准化技术委员会(tc260) GB/T 33745—2017,物联网 术语[S].北京:中国标准出版社,2017
[9]工业和信息化部电信研究院.物联网白皮书(2017年)[R].2017
[10] Sarma S, Brock D, Ashton K. The networked world, MIT-AUTOID-WH-001 [R].1999