参考文献
[1]Leo M,Battisti F,Carli M,et al.A Federated Architecture Approach for Internet of Things Security[C]//Proceedings of EuroMed Telco Conference.Washington D.C.,USA:IEEE Press,2014:1-5.
[2]马满福,倪伟.物联网中跨域移动节点的信任迁移[J].计算机工程,2013,39(4):100-104.
[3]Miorandi D,Sicari S,Pellegrini F,et al.Internet of Things:Vision,Applications & Research Challenges[J].Ad Hoc Networks,2012,10(7):1497-1516.
[4]Roman R,Zhou Jianying,Lopez J.On the Features and Challenges of Security and Privacy in Distributed Internet of Things[J].Computer Networks,2013,57(10):2266-2279.
[5]武传坤.物联网安全关键技术与挑战[J].密码学报,2015,2(1):40-53.
[6]杜大海,范红,王冠.物联网安全网关认证与密钥协商协议设计[J].微电子学与计算机,2014,31(7):98-100.
[7]Langley A,Hamburg M,Turner S.Elliptic Curves for Security[EB/OL].(2015-08-11).http://datatracker.ietf.org/doc/draft-irtf-cfrg-curves/draft-irtf-cfrg-curves-05.html.
[8]Markmann T,Schmidt T C,Wahlisch M.Federated End-to-End Authentication for the Constrained Internet of Things Using IBC and ECC[C]//Proceedings of ACM Conference on Special Interest Group on Data Communication.New York,USA:ACM
Press,2015:603-604.
[9]Liu Jing,Xiao Yang,Philip C C L.Authentication and Access Control in the Internet of Things[C]//Proceedings of the 32nd International Conference on Distributed Com-puting Systems.Washington D.C.,USA:IEEE Press,2012:588-592.
[10]Rescorla E,Modadugu N.Datagram Transport Layer Security Version 1.2[EB/OL].(2015-08-15).http://tools.ietf.org/html/rfc6347.
[11]Kothmayr T,Schmitt C,Hu Wen,et al.DTLS Based Security and Two-way Authentication for the Internet of Things[J].Ad Hoc Networks,2013,11(8):2710-2723.
[12]Porambage P,Schmitty C,Kumar P,et al.PAuthKey:A Pervasive Authentication Protocol and Key Establishment Scheme for Wireless Sensor Networks in Distributed IoT Applications[J].International Journal of Distributed Sensor
Networks,2014(2):1-14.
[13]Liu An,Ning Peng.TinyECC:A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks[C]//Proceedings of the 7th International Conference on Information Processing in Sensor Networks.Washington D.C.,USA:IEEE
Press,2008:245-256.
[14]Yu Hong,He Jingsha,Zhang Ting,et al.Enabling End-to-End Secure Communication Between Wireless Sensor Networks and the Internet[J].World Wide Web,2013,16(4):515-540.
[15]王志蓬,林慕清,季东杰,等.无线局域网中基于身份签名的接入认证方案[J].计算机工程,2014,40(12):108-113.
编辑顾逸斐
|