[1] PENG Anni,ZHOU Wei,JIA Yan,et al.Survey of the Internet of things operating system security[J].Journal on Communications,2018,39(3):22-34.(in Chinese)彭安妮,周威,贾岩,等.物联网操作系统安全研究综述[J].通信学报,2018,39(3):22-34. [2] MUDGERIKAR A,SHARMA P,BERTINO E.E-spion:a system-level intrusion detection system for IoT devices[C]//Proceedings of the 2019 ACM Conference on Computer and Communications Security.New York,USA:ACM Press,2019:493-500. [3] ARSHAD J,AZAD M A,ABDELLATIFM M,et al.COLIDE:a collaborative intrusion detection framework for IoT[J].IET Networks,2018,8(1):3-14. [4] AKBARZADEH A,BAYAT M,ZAHEDNEJAD B,et al.A lightweight hierarchical authentication scheme for Internet of things[J].Journal of Ambient Intelligence and Humanized Computing,2019,10(7):2607-2619. [5] SHARMA G,KALRA S.A lightweight multi-factor secure smart card based remote user authentication scheme for cloud-IoT applications[J].Journal of Information Security and Applications,2018,42:95-106. [6] MENG Qian,MA Jianfeng,CHEN Kefei,et al.Data comparable encryption scheme based on cloud computing in Internet of things[J].Journal on Communications,2018,39(4):167-175.(in Chinese)孟倩,马建峰,陈克非,等.基于云计算平台的物联网加密数据比较方案[J].通信学报,2018,39(4):167-175. [7] RAJESH S,PAUL V,MENON V G,et al.A secure and efficient lightweight symmetric encryption scheme for transfer of text files between embedded IoT devices[J].Symmetry,2019,11(2):293. [8] DUNLOP M,GROAT S,URBANSKI W,et al.Mt6d:a moving target IPv6 defense[C]//Proceedings of Military Communications Conference.Washington D.C.,USA:IEEE Press,2011:1321-1326. [9] DUNLOP M,GROAT S,URBANSKI W,et al.The blind man's bluff approach to security using IPv6[J].IEEE Security and Privacy,2012,10(4):35-43. [10] PREISS T,SHERBURNE M,MARCHANY R,et al.Implementing dynamic address changes in contikios[C]//Proceedings of IEEE International Conference on Information Society.Washington D.C.,USA:IEEE Press,2014:222-227. [11] SHERBURNE M,MARCHANY R,TRONT J.Implementing moving target IPv6 defense to secure 6LowPan in the IoT and smart grid[C]//Proceedings of the 9th Annual Cyber and Information Security Research Conference.New York,USA:ACM Press,2014:37-40. [12] ZZITE K,CANTRELL M,MARCHANY R,et al.Designing a micro-moving target IPv6 defense for the IoT[C]//Proceedings of the 2nd IEEE/ACM International Conference on Internet-of-Things Design and Implementation.Washington D.C.,USA:IEEE Press,2017:179-184. [13] SHAH J L,PARVEZ J.Optimizing security and address configuration in IPv6 SLAAC[J].Procedia Computer Science,2015,54:177-185. [14] CARPERTER B,JIANG S.Significance of IPv6 interface identifiers[J].Internet Engineering Task Force,2014,65:1-10 [15] DUNLOP M,GROAT S,MARCHANY R,et al.The good,the bad,the IPv6[C]//Proceedings of the 9th Annual Communication Networks and Services Research Conference.Washington D.C.,USA:IEEE Press,2011:77-84. [16] GRANJAL J,MONTEIRO E,SILVA J S.Security for the Internet of things:a survey of existing protocols and open research issues[J].IEEE Communications Surveys and Tutorials,2015,17(3):1294-1312. [17] NABEEL N,HABAEBI M,MUSTAPHA N C,et al.IoT light weight crypto functions[J].International Journal of Interactive Mobile Technologies,2019,13(4):117. [18] ZEITZ K,CANTRELL M,MARCHANY R,et al.Changing the game:a micro moving target IPv6 defense for the IoT[J].IEEE Wireless Communications Letters,2018,7(4):578-581. [19] BALASCH J,EGE B,EISENBARTH T,et al.Compact implementation and performance evaluation of hash functions in attiny devices[C]//Proceedings of International Conference on Smart Card Research and Advanced Applications.Berlin,Germany:Springer,2012:158-172. [20] YÜ Ke,WANG Huifeng.Research and Improvement of RPL Routing Protoco[J].Computer Engineering,2018,44(3):103-108.(in Chinese)俞柯,王慧锋.RPL路由协议的研究与改进[J].计算机工程,2018,44(3):103-108. [21] PAI V,SHENOY U K K.6LowPan-performance analysis on low power networks[C]//Proceedings of International Conference on Computer Networks and Communication Technologies.Berlin,Germany:Springer,2019:145-156. |