[1]
|
NING H, LIU H. Cyber-physical-social based security architecture for future internet of things[J]. Advances in Internet of Things, 2012, 2(1): 34-39. [2] ZHAO K, GE L. A survey on the internet of things security[C]//2013 9th International Conference on Computational Intelligence and Security (CIS). [S.l.]: IEEE, 2013: 663-667. [3] SARMA A, GIRAO J. Identities in the future internet of things[J]. Wireless Peers Communication,2009,49(3): 353-363. [4] JIANG Ji-ya, LIU Tong, SHI Yan-qing, et al. The research on mutual authentication protocol for RFID system based on combined symmetric key[C]//International Conference on Information, Business and Education Technology. Beijing: [s.n.], 2013: 136-137. [5] 闫韬. 物联网隐私保护及密钥管理机制中若干关键技术研究[D]. 北京: 北京邮电大学, 2012. YAN Tao. Research on the key problems of privacy protection and key management in the internet of things[D]. Beijing: Beijing University of Posts&telecommunications, 2012. [6] LIU Y, ZHOU G. Key technologies and applications of internet of things[C]//2012 Fifth International Conference on Intelligent Computation Technology and Automation (ICICTA). [S.l.]: IEEE, 2012: 197-200. [7] PERRIG A, SZEWCZYK R, TYGAR J D, et al. SPINS: Security protocols for sensor networks[J]. Wireless Networks, 2002, 8(5): 521-534. [8] GORLATOVA M, SHARMA T, SHRESTHA D, et al. Prototyping energy harvesting active networked tags (EnHANTs) with MICA2 Motes[C]//2010 7th Annual IEEE Communications Society Conference on Sensor Mesh and Ad Hoc Communications and Networks (SECON). [S.l.]: IEEE, 2010: 1-3. [9] VEGENDLA A, SEO H, LEE D, et al. Implementation of an RFID key management system for DASH7[J]. Journal of Information and Communication Convergence Engineering, 2014, 12(1): 19-25. [10] 南相浩. CPK算法与标识认证[J]. 信息安全与通信保密, 2006(9): 51-54. NAN Xiang-hao. CPK algorithm and identity authenrication[J]. Information Security and Communications Privacy, 2006(9): 51-54. [11] 王嘉林. 基于PKI和CPK的大规模网络认证方案的对比分析[J]. 保密科学技术, 2012(6): 44-46. WANG Jia-lin. Comparative analysis of large scale network authentication scheme based on CPK and PKI[J]. Security Science and Technology, 2012(6): 44-46. [12] 曾会, 蒋兴浩, 孙锬锋. 一种基于PKI的物联网安全模型研究[J]. 计算机应用与软件, 2012, 29(6): 271-274. ZENG Hui, JIANG Xing-hao, SUN Tan-feng. Research on a PKI-based IoT securiry model[J]. Computer Applications and Software , 2012, 29(6): 271-274. [13] 冯福伟, 李瑛, 徐冠宁, 等. 基于集群架构的物联网身份认证系统[J]. 计算机应用, 2013, 33(A01): 126-129. FENG Fu-wei, LI Ying,XU Guan-ning, et al. IoT authentication system based on cluster architecture[J]. Journal of Computer Applications, 2013, 33(A01): 126-129. [14] YANG L, YU P, BAILING W, et al. IOT secure transmission based on integration of IBE and PKI/CA[J]. International Journal of Control & Automation, 2013, 6(2): 50-61. [15] 张文奇. 基于RFID的物联网安全接入机制研究[D]. 北京: 北京交通大学, 2013. ZHANG Wen-qi. Research on network security access mechanism based on RFID[D]. Beijing: Beijing Jiaotong University, 2013. |