[1]FINKENZELLER K.射频识别技术原理与应用[M].王俊峰,译.北京:电子工业出版社,2015.
[2]JUELS A.RFID security and privacy:a research survey[J].IEEE Journal on Selected Areas in Communications,2006,24(2):381-394.
[3]胡炜.物联网中基于RFID的系统安全技术研究与应用[D].镇江:江苏科技大学,2012.
[4]龚洁中,陈恭亮,李林森,等.基于流密码的RFID安全认证协议[J].计算机工程,2012,38(18):126-129.
[5]何文才,阎晓姮,于源猛,等.基于NTRU密码体制的RFID安全协议[J].计算机工程,2014,40(7):114-117.
[6]DEFEND B,FU K,JUELS A.Cryptanalysis of two lightweight RFID authentication schemes[C]//Proceedings of IEEE International Conference on Pervasive Computing and Communications Workshops.Washington D.C.,USA:IEEE Press,2007:211-216.
[7]刘在爽,王坚,孙瑞,等.无线通信物理层安全技术综述[J].通信技术,2014,47(2):128-135.
[8]NEGI R,GOEL S.Secret communication using artificial noise[C]//Proceedings of Vehicular Technology Conference.Washington D.C.,USA:IEEE Press,2005:1906-1910.
[9]雷维嘉,左莉杰,江雪,等.中继网络中不准确信道状态信息下抗多窃听者的物理层安全方案[J].电子与信息学报,2015,37(9):2191-2197.
[10]赵耀环,谢梦非,尚勇.物理层安全中的最优中继选择及协同干扰策略[J].电子学报,2015,43(4):791-794.
[11]CHAI Q,GONG G,ENGELS D W,et al.How to develop clairaudience-active eavesdropping in passive RFID systems[C]//Proceedings of IEEE International Symposium on World of Wireless Mobile and Multimedia Networks.Washington D.C.,USA:IEEE
Press,2012:1-6.
[12]YOU J,WANG G,ZHONG Z.Physical layer security-enhancing transmission protocol against eavesdropping for ambient backscatter communication system[C]//Proceedings of IEEE Conference on Wireless,Mobile and Multi-media.Washington
D.C.,USA:IEEE Press,2015:5.
[13]YANG Q,WANG H,ZHANG Y,et al.Physical layer security in MIMO backscatter wireless systems[J].IEEE Transactions on Wireless Communications,2016,15(11):7547-7560.
[14]DOBKIN D M.The RF in RFID:passive UHF RFID in practice[J].Newnes,2007,14(5):1133-1138.
[15]SUN L,REN P,DU Q,et al.Security-aware relaying scheme for cooperative networks with untrusted relay nodes[J].IEEE Communications Letters,2015,19(3):463-466.
[16]WANG X,SU Z,WANG G.Relay selection for secure backscatter wireless communications[J].Electronics Letters,2015,51(12):951-952.
|