[1] |
ITU Internet Reports 2005: The Internet of Things[Z]. International Telecommunication Union, 2005. |
[2] |
李振汕. 物联网安全问题研究[J]. 信息网络安全, 2010, (12): 1-3. |
[3] |
Chen Xiangqian, Makki K, Yen Kang, et al. Sensor Network Security: A Survey[J].IEEE Communications Surveys & Tutorials.2009, 11(2):52-73 |
[4] |
武传坤. 物联网安全架构初探[J]. 中国科学院院刊, 2010, 25(4): 411-419. |
[5] |
彭 朋, 韩伟力, 赵一鸣, 等. 基于RFID的物联网安全需求研究[J]. 计算机安全, 2011, (1): 75-79. |
[6] |
王后珍, 张焕国. 新型的轻量级数字签名方案[J]. 通信学报, 2010, 31(11): 25-29. |
[7] |
谷 峪, 于 戈, 李晓静, 等. 基于动态概率路径事件模型的RFID数据填补算法[J]. 软件学报, 2010, 21(3): 438-451. |
[8] |
Chen Feng, Yin Xiaolong, German R, et al. Performance Impact of and Protocol Interdependencies of IEEE 802.15.4 Security Mechanisms[C]//Proc. of the 6th International Conference on Mobile Ad Hoc and Sensor Systems. Macau, China: IEEE Press, 2009: 1036-1041. |
|
Shon T, Koo B, Choi H, et al. Security Architecture for IEEE 802.15.4-based Wireless Sensor Network[C]//Proc. of the 4th International Symposium on Wireless Pervasive Computing. Melbourne, Australia: [s. n.], 2009: 1-5. |
[9] |
Barker R. Security Aspects in 6lowPan Networks[C]//Proc. of Design.[J].Automation & Test in Europe Conference & Exhibition. Dresden, Germany: [s. n..2010,:- |
[10] |
Li Chunqing, Zhang Jiancheng. Research of ZigBee’s Data Security and Protection[C]//Proc. of International Forum on Computer Science Technology and Applications. Chongqing, China: [s. n.], 2009: 298-302. |
[11] |
张鸿亮, 刘文予, 符明丽. 基于需求等级的传感器网络安全策略模型[J].微计算机信息.2008, 24(13):134-136 |
[12] |
Kwakernaak H. An Algorithm for Rating Multiple-aspect Alternatives Using Fuzzy Sets[J].Automatica.1979, 15(5):615-616 |
[13] |
张 跃. 模糊随机变量[J].哈尔滨建筑工程学院学报.1989, 22(3):12-20 |
[14] |
Wang Guangyuan, Zhang Yue. The Theory of Fuzzy Stochastic Processes[J].Fuzzy Set and System.1992, 51(2):161-178 |
[15] |
许开立, 陈宝智, 陈 全. 安全等级特征量及其计算方法[J]. 中国安全科学学报, 1999, 9(6): 6-12. |
[16] |
孙林柱, 杨 芳. 非确定信息评价的变权模糊方法[J]. 数学的实践与认识, 2009, 39(6): 12-17. |
|