共 62 条
- [1] Atzori L., Iera A., Morabito G., The internet of things: A survey, Computer networks, 54, 15, pp. 2787-2805, (2010)
- [2] Aijaz A., Aghvami A.H., Cognitive machine-to-machine communications for Internet-of-Things: A protocol stack perspective, IEEE Internet of Things Journal, 2, 2, pp. 103-112, (2015)
- [3] Holler J., Boyle D., Tsiatsis V., Mulligan C., Karnouskos S., From Machine-to-machine to the Internet of Things: Introduction to a New Age of Intelligence, (2014)
- [4] O'Neill M., Insecurity by design: Today's IoT device security problem, Engineering, 2, 1, pp. 48-49, (2016)
- [5] Lee J.H., Kim H., Security and privacy challenges in the internet of things [security and privacy matters], IEEE Consumer Electronics Magazine, 6, 3, pp. 134-136, (2017)
- [6] Morgan J., A simple explanation of 'The Internet of Things', (2014)
- [7] Granjal J., Monteiro E., Silva J.S., Enabling networklayer security on IPv6 wireless sensor networks, 2010 IEEE Global Telecommunications Conference (GLOBECOM 2010), pp. 1-6, (2010)
- [8] Batool K., Niazi M.A., Modeling the internet of things: a hybrid modeling approach using complex networks and agent-based models, Complex Adaptive Systems Modeling, 5, 1, (2017)
- [9] Al-Fuqaha A., Guizani M., Mohammadi M., Aledhari M., Ayyash M., Internet of things: A survey on enabling technologies, protocols, and applications, IEEE Communications Surveys & Tutorials, 17, 4, pp. 2347-2376, (2015)
- [10] Lee J.Y., Lin W.C., Huang Y.H., A lightweight authentication protocol for internet of things, 2014 International Symposium on Next-Generation Electronics (ISNE), pp. 1-2, (2014)