[1]王保云.物联网技术研究综述[J].电子测量与仪器学报,2009,23(12):1-7
[2]Sciancalepore S , Piro G , Boggia G , et al. Public Key Authentication and Key Agreement in IoT Devices With Minimal Airtime Consumption[J]. IEEE Embedded Systems Letters, 2017, 9(1):1-4
[3]汪礼臻,张龙军. 适合物联网环境的混合双向匿名认证协议[J]. 计算机应用研究,2015,32(1):222-225
[4]Han J,Kim J. A lightweight authentication mechanism between IoT devices[C] //Information and Communication Technology Convergence (ICTC). Jeju, South Korea: IEEE Press, 2017: 18-20
[5]袁勇,王飞跃.区块链技术发展现状与展望[J].自动化学报,2016,42(4):481-494
[6] Christidis K , Devetsikiotis M . Blockchains and Smart Contracts for the Internet of Things[J]. IEEE Access, 2016, 54(4):2292-2303
[7] 罗涛, 易波. 关于椭圆曲线数字签名算法研究[J]. 计算机工程与应用, 2003, 39(29):184-187.
[8]佘维,陈建森,顾志豪,等.基于区块链的物联网节点位置隐私保护模型[J].应用科学学报,2020,38(1):139-151.
[9]范吉立,李晓华,聂铁铮,于戈.区块链系统中智能合约技术综述[J].计算机科学,2019,46(11):1-10
[10] 叶小榕, 邵晴, 肖蓉. 基于区块链、智能合约和物联网的供应链原型系统[J]. 科技导报, 2017, 35(23):62-69