[1]IEC. Internet of Things: Wireless Sensor Networks[EBOL]. White Paper, [20160308]. http:www.iec.chwhitepaperinternetofthings[2]ISOIEC JTC 1. Internet of things (IoT) preliminary report 2014[ROL]. Geneva: ISO, 2014 [20160401]. http:www.iso.orginternet_of_things_reportjtcl.pdf[3]Chong C Y, Kumar K P. Sensor networks: Evolution, opportunities, and challenges [J]. Proceedings of the IEEE, 2010, 91(8): 12471256[4]Weber R H. Internet of things–New security and privacy challenges[J]. Computer Law & Security Report, 2010, 26(1): 2330[5]中国电子技术标准化研究院. 物联网标准化白皮书[EBOL]. (20160118) [20160321]. http:www.cesi.ac.cncesiguanwanglanmubiaozhunhuayanjiu2016011912330.html[6]Stankovic J. Research directions for the Internet of things[J]. IEEE Internet of Things Journal, 2014, 1(1): 39[7]Babar S, Mahalle P, Stango A, et al. Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT)[M]. Berlin: Springer, 2010: 420429[8]沈昌祥, 陈兴蜀. 基于可信计算构建纵深防御的信息安全保障体系[J]. 四川大学学报: 工程科学版, 2014, 46(1): 17[9]刘宴兵, 胡文平, 杜江. 基于物联网的网络信息安全体系[J]. 中兴通讯技术, 2011, 17: 1720[10]周永彬, 冯登国. RFID安全协议的设计与分析[J]. 计算机学报, 2006, 29(4): 581589[11]Medaglia C M, Serbanati A. An overview of privacy and security issues in the internet of things[M] The Internet of Things. New York: Springer, 2010: 389395 [12]ITU. The Internet of things[EBOL]. (20090807) [20160325]. http:www.itu.intosgspupublicationsinternetofthings[13]钱萍, 吴蒙. 物联网隐私保护研究与方法综述[J]. 计算机应用研究, 2013, 30(1): 1320[14]Grance T. Musings on the four horsemen of the apocalypse and IoT[ROL]. NIST, 2015 [20160404]. http:paris.utdallas.eduqrs15slidespanelQRS2015Panel04TimGrance.pdf