[1] ITU Internet Reports 2005:The Internet of Things[EB/OL].(2005-07-11).http://bbs.cnttr.com/viewthread.Phptid=241077.
[2] 王 晶,全春来,周 翔.物联网公共安全平台软件体系架构研究[J].计算机工程与设计,2011,32(10):3374-3377.
[3] 白 蛟,全春来.基于物联网的公共安全云计算平台[J].计算机工程与设计,2011,32(11):3696-3701.
[4] Liu Jihong,Yang Li.Application of Internet of Things in the Community Security Management[C]//Proceedings of the 3rd International Conference on Computational Intelligence,Communication Systems and Networks.Bali,Indonesia:IEEE Press,2011:314-318.
[5] 任 伟,雷 敏,杨 榆.ID保护的物联网T2ToI中能量高效的健壮密钥管理方案[J].小型微型计算机系统,2011,32(9):1903-1907.
[6] 李大伟,杨 庚.基于重复博弈的物联网密钥共享方案[J].通信学报,2010,31(9A):97-103.
[7] 席国宝,陈惠芳,赵问道.基于中国剩余定理的秘密共享组播密钥管理方案[J].电子与信息学报,2006,28(12):2378- 2381.
[8] Rivest R L,Adleman L,Detrouzos M L.On Data Banks and Privacy Homomorphism[M].New York,USA:Academic Press,1978.
[9] Banihashemian S,GhaemiBafghi A.A New Key Management Scheme in Heterogeneous Wireless Sensor Networks[C]// Proceedings of the 12th International Conference on Advanced Communication Technology.[S.l.]:IEEE Press,2010:141- 146.
[10] 章 睿,刘吉强,赵 佳.一种基于ID的传感器网络密钥管理方案[J].电子与信息学报,2009,31(4):929-932.
[11] 曾 萍,张 历,胡荣磊,等.WSN中基于ECC的轻量级认证密钥协商协议[J].计算机工程与应用,2014,50(2):65-69,80.
[12] Chan Haowen,Perrig A,Song D.Random Key Pre-distribution Schemes for Sensor Networks[C]//Proceedings of 2003 IEEE Symposium on Security and Privacy.Washington D.C.〖KG-*3〗,USA:IEEE Computer Society,2003:197-213.
|