[1] |
刘云浩 . 物联网导论[M]. 北京: 科学出版社, 2010.
|
|
Liu Yunhao. Introduction to the Internet of things [M]. Beijing: Science Press, 2010.
|
[2] |
王保云 . 物联网技术研究综述[J]. 电子测量与仪器学报, 2009,23(12):1-7.
|
|
Wang Baoyun . Overview of research on Internet of things[J]. Journal of Electronic Measurement and Instrumentation, 2009,23(12):1-7.
|
[3] |
孙其博, 刘杰, 黎羴 , 等 .物联网: 概念、架构与关键技术研究综述[J]. 北京邮电大学学报, 2010,33(3):1-9.
|
|
Sun Qibo, Liu Jie, Li Qi , et al. The Internet of things: a review of concepts, architectures and key technologies[J]. Journal of Beijing University of Posts and Telecommunications, 2010,33(3):1-9.
|
[4] |
杨光, 耿贵宁, 都婧 , 等. 物联网安全威胁与措施[J]. 清华大学学报:自然科学版, 2011,51(10):1335-1340.
|
|
Yang Guang, Geng Guining, Du Jing , et al. Internet of things security threats and measures[J]. Journal of Tsinghua University:Natural Science Edition, 2011,51(10):1335-1340.
|
[5] |
于旭, 梅文 . 物联网信息安全[M]. 西安: 西安电子科技大学出版社, 2014.
|
|
Yu Xu, Mei Wen. Information security of the Internet of things[M]. Xi’an: Xidian University Press, 2014.
|
[6] |
胡柳, 王梅, 邓杰 , 等. 大数据环境下的隐私保护研究[J]. 电子科技, 2017,30(7):159-161.
|
|
Hu Liu, Wang Mei, Deng Jie , et al. Privacy protection in large data environment[J]. Electronic Science and Technology, 2017,30(7):159-161.
|
[7] |
马纪丰, 梁浩 . 物联网感知层信息安全分析与建议[J]. 现代电子技术, 2012,35(19):76-78.
|
|
Ma Jifeng, Liang Hao . Information security analysis and suggestions for the perception layer of the Internet of things[J]. Modern Electronic Technology, 2012,35(19):76-78.
|
[8] |
张静, 葛丽娜, 刘金辉 , 等. 物联网感知层中隐私保护方法研究[J]. 计算机应用与软件, 2016,33(5):293-297.
|
|
Zhang Jing, Ge Lina, Liu Jinhui , et al. Research on privacy protection methods in the perception layer of the Internet of thing[J]. Computer Applications and Software, 2016,33(5):293-297.
|
[9] |
马紫宁, 马一鸣, 王世志 . 射频识别系统安全防范策略[J]. 电子科技, 2015,28(11):170-172.
|
|
Ma Zining, Ma Yiming, Wang Shizhi . Security strategy for RFID System[J]. Electronic Science and Technology, 2015,28(11):170-172.
|
[10] |
辜晟恩 . 物联网感知层的信息安全保障措施[J].电子技术与软件工程, 2017(22):204-208.
|
|
Gu Shengen . Information security measures for the perceptual layer of the Internet of things[J].Electronic Technology and Software Engineering, 2017(22):204-208.
|
[11] |
李凤华, 苏铓, 史国振 , 等. 访问控制模型研究进展及发展趋势[J]. 电子学报, 2012,40(4):805-813.
doi: 10.3969/j.issn.0372-2112.2012.04.030
|
|
Li Fenghua, Su Di, Shi Guozhen , et al. Research progress and development trend of access control model[J]. Journal of Electronics, 2012,40(4):805-813.
doi: 10.3969/j.issn.0372-2112.2012.04.030
|
[12] |
韩道军, 高洁, 翟浩良 , 等. 访问控制模型研究进展[J]. 计算机科学, 2010,37(11):29-33.
|
|
Han Daojun, Gao Jie, Zhai Haoliang , et al. Research progress on access control model[J]. Computer Science, 2010,37(11):29-33.
|
[13] |
蔡婷, 陈昌志, 欧阳凯 , 等. 改进的物联网感知层访问控制策略[J]. 计算机工程与科学, 2015,37(7):1265-1271.
|
|
Cai Ting, Chen Changzhi, Ouyang Kai , et al. Improved Internet of things perception layer access control strategy[J]. Computer Engineering and Science, 2015,37(7):1265-1271.
|
[14] |
马骏 . 物联网感知环境分层访问控制机制研究[D]. 西安:西安电子科技大学, 2014.
|
|
Ma Jun . Research on hierarchical access control mechanism of Internet of things perception environment[D]. Xi’an:Xidian University, 2014.
|
[15] |
罗洪, 杨杰 . 物联网环境下的访问控制技术探析[J]. 西南民族大学学报:自然科学版, 2016,42(6):665-670.
|
|
Luo Hong, Yang Jie . Analysis of access control technology under the Internet of things[J]. Journal of Southwest University for Nationalities:Natural Science Edition, 2016,42(6):665-670.
|
[16] |
张玉婷, 严承华, 魏玉人 . 基于节点认证的物联网感知层安全性问题研究[J].信息网络安全, 2015(11):27-32.
|
|
Zhang Yuting, Yan Chenghua, Wei Yuren . Research on the security of the perceptual layer of Internet of things based on node authentication[J].Information Network Security, 2015(11):27-32.
|