[1] 柴远波,郑晶晶.无线Mesh网络应用技术[M].北京:电子工业出版社,2015. [2] AKYILDIZA I F,WANG Xudong,WANG Weilin.Wireless Mesh networks:a survey[J].Computer Networks,2005,47(4):445-487. [3] SIDDIQUI M S,CHOONG S V.Security issues in wireless Mesh networks[C]//Proceedings of International Conference on Multimedia and Ubiquitous Engineering.Washington D.C.,USA:IEEE Computer Society,2007:717-722. [4] MARTIGNON F,PARIS S,CAPONE A.DSA-Mesh:a distributed security architecture for wireless mesh networks[J].Security and Communication Networks,2011,4(3):242-256. [5] 朱建明,高胜,段美姣.区块链技术与应用[M].北京:机械工业出版社,2018. [6] DONET J A D,PÉREZ-SOLA C.The bitcoin P2P network[C]//Proceedings of International Conference on Financial Cryptography and Data Security.Berlin,Germany:Springer,2014:87-102. [7] STALLINGS W.Cryptography and network security:principles and practice[J].International Annals of Criminology,2003,46(4):121-136. [8] MATTILA J.The blockchain phenomenon——the disruptive potential of distributed consensus architectures[EB/OL].[2018-10-12].https://ideas.repec.org/p/rif/wpaper/38.html. [9] PETERS G W,PANAYI E.Understanding modern banking ledgers through blockchain technologies:future of transaction processing and smart contracts on the internet of money[M].Berlin,Germany:Springer,2016:239-278. [10] EVANS D.Economic aspects of bitcoin and other decentralized public-ledger currency platforms[J].SSRN Electronic Journal,2014,685:203-231. [11] WOOD G.Ethereum:a secure decentralized generalised transaction ledger[EB/OL].[2018-10-12].http://gavwood.com/paper.pdf. [12] SOMPOLINSKY Y,ZOHAR A.Secure high-rate transaction processing in bitcoin[C]//Proceedings of International Conference on Financial Cryptography and Data Security.Berlin,Germany:Springer,2015:507-527. [13] CHATTERJEE K,DE A,GUPTA D.Mutual authentication protocol using hyperelliptic curve cryptosystem in constrained devices[J].International Journal of Network Security,2013,15(1):9-15. [14] SHI Wenbo,GONG Peng.A new user authentication protocol for wireless sensor networks using elliptic curves cryptography[J].International Journal of Distributed Sensor Networks,2013,9(4):1-10. [15] 许力,王栋城,苏彬庭,等.基于身份盲签名的无线Mesh网络匿名切换认证方案[J].工程科学与技术,2018,50(2):148-153. [16] LAI Y M,CHENG P J,LEE C C,et al.A new ticket-based authentication mechanism for fast handover in mesh network[J].PloS One,2016,11(5):1-7. [17] GAO Tianhan,MIAO Qidi,GUO Nan.Anonymous authentication scheme based on identity-based proxy group signature for wireless Mesh network[J].EURASIP Journal on Wireless Communications and Networking,2016(1):193. [18] ALTOP D K,BINGÖL M A,LEVI A,et al.DKEM:secure and efficient distributed key establishment protocol for wireless Mesh networks[J].Ad Hoc Networks,2017,54:53-68. [19] NAKAMOTO S.Bitcoin:a peer-to-peer electronic cash system[EB/OL].[2018-10-12].http://bitcoin.org/bitcoin.pdf. [20] FROMKNECHT C,VELICANU D,YAKOUBOV S.Certcoin:a namecoin based decentralized authentication system[EB/OL].[2018-10-12].http://courses.csail.mit.edu/6.857/2014/files/19-fromknecht-velicann-yakoubovcertcoin.pdf. [21] FROMKNECHT C,VELICANU D,YAKOUBOV S.A decentralized public key infrastructure with identity retention[EB/OL].[2018-10-12].https://eprint.iacr.org/2014/803.pdf. [22] AL-BASSAM M.SCPKI:a smart contract-based PKI and identity system[C]//Proceedings of ACM Workshop on Blockchain,Cryptocurrencies and Contracts.New York,USA:ACM Press,2017:35-40. [23] 唐春明,高隆.区块链系统下的多方密钥协商协议[J].信息网络安全,2017(12):17-21. [24] 胡逸飞,熊焰,黄文超.基于区块链审计的公钥分发方案[J].计算机工程,2019,45(5):29-34. [25] ZHANG Yongguang,LEE Wenke,HUANG Yian.Intrusion detection techniques for mobile wireless networks[J].Wireless Networks,2003,9(5):545-556. [26] Go-ethereum[EB/OL].[2018-10-12].https://github.com/ethereum/Go-ethereum. [27] Remix-ide[EB/OL].[2018-10-12].https://github.com/ethereum/remix-ide. |