[1]
AutoID Labs. AutoID Labs home Page[DB/OL]. http://www.autoidlabs.org/page.html, 20140511.
[2]International Telecommunication Union. Internet Reports 2005: The Internet of Things[R]. Geneva: ITU, 2005.
[3]ITUT, Recommendation Y.20602012. Overview of the Internet of things[S].
[4]物联网在线. 国际电信联盟正式通过“物联网概述”(Y.IoToverview)标准草案[EB/OL]. http://www.iotonline.com/zhengce/2012/0327/17982.html, 20140311.
[5]杨庚,许建,陈伟,等. 物联网安全特征与关键技术[J]. 南京邮电大学学报(自然科学版), 2010,30(4):2029.
[6]肖毅. 物联网安全管理技术研究[J]. 通信技术, 2011,44(1):6970.
[7]刘宴兵,胡文平. 基于物联网的网络信息安全体系[J]. 中兴通讯技术, 2011,17(1):2833.
[8]Babar S, Mahalle P, Stango A, et al. Proposed security model and threat taxonomy for the internet of things (IoT)[M]// Recent Trends in Network Security and Applications. Springer Berlin Heidelberg, 2010:420429.
[9]王小妮,魏桂英. 物联网RFID系统数据传输中密码算法的研究[J]. 北京信息科技大学学报, 2009,12(4):7578.
[10]Kothmayr T, Schmitt C, Hu W, et al. A DTLS based endtoend security architecture for the Internet of Things with twoway authentication[C]// Proc. the 37th IEEE International Conference on Pervasive Computing and Communication. 2012:95696.
[11]Raza S, Chung T, Duquennoy S, et al. Securing Internet of Things with Lightweight IPSec[R]. Sweden: Swedish Institute of Computer Science, 2010.
[12]Bonetto R, Bui N, Lakkundi V, et al. Secure communication for smart IoT objects: Protocol stacks, use cases and practical examples[C]// Proc. 2012 IEEE International Symposium on World of Wireless, Mobile and Multimedia Networks (WoWMoM). 2012:17.
[13]Diffie W, Hellman M. New directions in cryptography[J]. IEEE Trans. Inform. Theory, 1976,22(6):644654.
[14]吴世忠,祝世雄,张文政,等. 应用密码学协议、算法与C源程序[M]. 北京: 机械工业出版社, 2006:7084.
[15]IETFRFC2104, HMAC: Keyedhashing for Message Authentication(1997)[S].
[16]任卫东,陈立全,朱文远,等. 一种基于Kademlia的网络语音安全多路通信方法[J]. 信息网络安全, 2012(11):2731.
[17]郭婵. 无线网状网多径路由协议及其安全机制的研究[D]. 合肥:中国科学技术大学, 2010.
|