[1] International Telecommunication Union. ITU Internet Reports 2005: the Internet of Things [R/OL]. [2010-12-10]. http://www.itu.int/osg/spu/publications/internetofthings/InternetofThings_summary.pdf.
[2] 武传坤. 物联网安全架构初探[J]. 中国科学院院刊, 2010, 25(4): 411-419.
Wu Chuankun. A Preliminary Investigation on the Security Architecture of the Internet of things [J]. Bulletin of Chinese Academy of Sciences, 2010, 25(4): 411-419.
[3] 顾晶晶, 陈松灿, 庄毅. 基于无线传感器网络拓扑结构的物联网定位模型[J]. 计算机学报, 2010, 33(9): 1548-1556.
Gu Jingjing, Chen Songcan, Zhuang Yi. Wireless Sensor Network-Based Topology Structures for the Internet of Things Localization[J]. Chinese Journal of Computers, 2010, 33(9): 1548-1556.
[4] Wang Yong, Attebury G, Ramamurthy B. A Survey of Security Issues in Wireless Sensor Networks[J]. IEEE In Communications Surveys & Tutorials, 2006, 8(2): 2-23.
[5] 裴庆琪, 沈玉龙, 马建峰. 无线传感器网络安全技术综述[J]. 通信学报, 2007, 28(8): 113-122.
Pei Qingqi, Shen Yulong, Ma Jianfeng. Survey of Wireless Sensor Network Security Techniques[J]. Journal of Communication, 2007, 28(8): 113-122.
[6] 刘云, 裴庆琪. 一种传感器网络访问控制机制[J]. 西安电子科技大学学报, 2010, 37(3): 507-512.
Liu Yun, Pei Qingqi. Access Control Scheme in a Wireless Sensor Network [J]. Journal of Xidian University, 2010, 37(3): 507-512.
[7] Banerjee S, Mukhopadhyay D. Symmetric Key Based Authenticated Querying in Wireless Sensor Networks [C]//Proc of the First International Conference on Integrated Internet Ad Hoc and Sensor Networks. New York: ACM Press, 2006.
[8] Maccari L, Mainardi L, Marchitt M A, et al. Lightweight, Distributed Access Control for Wireless Sensor Networks Supporting Mobility [C]//International Conference on Communications 2008 (ICC'08). Beijing: IEEE, 2008: 1441-1445.
[9] Benenson Z, Gartner F C, Kesdogan D. An Algorithmic Framework for Robust Access Control in Wireless Sensor Networks [C]//Second European Workshop o n Wireless Sensor Networks (EWSN). Germary: Computer Science, 2005: 158-165.
[10] Benenson Z, Gedicke N, Raivio O. Realizing Robust User Authentication in Sensor Networks [C]//Workshop on Real-World Wireless Sensor Networks. Stockholm: Swedish Insitute of Computer Science, 2005: 135-142.
[11] Watro R, Kong D, Cuti S fen, et al. TinyPK: Securing Sensor Networks with Public Key Technology[C]//Proc of the 2nd ACM workshop on Security of Ad Hoc and Sensor Networks. Washington: ACM Press, 2004: 59-64.
[12] Sandhu R, Samarati P. Access Control: Principles and Practice [J]. IEEE Communications Magazine, 1994, 32(9): 40-48.
[13] Sandhu R, Coyne E J, Feinstein H L, et al. Role-Based Access Control Models [J]. IEEE Computers, 1996, 29(2): 38-47.
[14] Zhang X, Li Y, Nalla D. An Attribute-Based Access Matrix Model [C]//Proc of the 2005 ACM Symposium on Applied Computing. New Mexico: ACM Press, 2005: 359-363.
[15] Wang L Y, Wijesekera D, Jajodia S. A Logic-Based Framework for Attribute Based Access Control [C]//Proc of the 2004 ACM Workshop on Formal Methods in Security Engineering. Washington: ACM Press, 2004: 45-55.
[16] Sahai A, Waters B. Fuzzy Identity Based Encryption [C]//Proc of Eurocrypt 2005. Berlin: Springer-Verlag, 2005: 457-473.
[17] Boneh D, Franklin M. Identity-Based Encryption from the Weil Pairing [C]//Proc of the 21st Annual International Cryptology Conference on Advances in Cryptology. Berlin: Springer-Verlag, 2001: 213-229. |