3NL I. M,LIU Y,ZHU Y. China's national research project on wire- less senso networks[J]. IEEE Wireless Communications, 2007,14 (6) :78-83.
4AKYILDIZ I F,SU W, SANKARASUBRAMANSIAM Y, et al. A survey on sensor networks[J]. IEEE Communications Magazine, 2002,40(8) : 104-112.
5WEBER R H. Internet of things--new security and privacy challen- ges[J]. Computer Law Security Review, 2010,26 (1) : 23-30.
6LEUSSE P, PERIORELLIS P, DIMITRAKOS T, et al. Self man- aged security cell, a security model for the internet of things and serviees[C]. In: 2009 First International Conference on Future ln- ternet. IEEE, 2009 : 47-52.
7TRAUB K,ALLGAIR G,BARTHEL H,et al. The EPCglobal ar- chitecture framework [ S ]. http://www, gslhk, org/files/docu- ment/epc_standards/architecture_l_3-framework-20090319, pdf.
1Van Kranenburg R.The Intemet of Things.Amsterdam:Waag Society,2008.
2Yan L,Zhang Y,Yang L T.The Intemet of Things:From RFID to the Next.Generation Pervasive Networked Systems.Auerbach Publications,2008.
3Chakrabarti D,Maitra S,Roy B.A Key Predistribution Scheme for Wireless Sensor Networks:Merging Blocks in Combinatorial Design.Journal of Information Security,2006,5(2):105-114.
4International Telecommunication Union.ITU Internet Reports 2005:The Internet of Things,2005.
5Floerkemeier C.Langheinrich M,Heisch E,Mattern F.The Internet of Things:Lecture Notes in Computer Science.Springer,2008,49-52.
6Benjamin F, Oliver G. Security Challenges of EPCglobal network [J]. Communications of the ACM-Barbara Liskov: ACM' s AM.Turing Award Winner. 2009, 52 ( 07 ): 121-125.
7J.G.Alfaro, M.Barbeau and E.Kranakis. Analysis of Threats to the Security of EPC Networks [J]. 2008 Communication Networks and Services Research Conference. 2008.
10Bellovin S M,Merritt M.Encrypted key exchange: Password-based protocols secure against dictionary attacks. Proceedings of the IEEE Symposium on Research in Security and Privacy . 1992