[1] |
邬贺铨 . 物联网技术与应用的新进展[J]. 物联网学报, 2017,1(1): 1-6.
|
|
WU H Q . Technology and application progress on Internet of things[J]. Chinese Journal on Internet of Things, 2017,1(1): 1-6.
|
[2] |
孙玉 . 我国物联网产业发展趋势[J]. 物联网学报, 2017,1(3): 1-5.
|
|
SUN Y . Development trend of IoT industry in China[J]. Chinese Journal on Internet of Things, 2017,1(3): 1-5.
|
[3] |
ZHOU J , CAO Z F , DONG X L ,et al. Security and privacy for cloud-based IoT:challenges[J]. IEEE Communications Magazine, 2017,55(1): 26-33.
|
[4] |
LI D X , PENG W , DENG W P ,et al. A blockchain-based authentication and security mechanism for IoT[C]// 2018 27th International Conference on Computer Communication and Networks (ICCCN). IEEE, 2018: 1-6.
|
[5] |
HAMMI M T , HAMMI B , BELLOT P ,et al. Bubbles of trust:a decentralized blockchain-based authentication system for IoT[J]. Computers & Security, 2018,78: 126-142.
|
[6] |
ZHANG D , . Big data security and privacy protection[C]// 8th International Conference on Management and Computer Science (ICMCS 2018). Atlantis Press, 2018.
|
[7] |
ZYSKIND G , NATHAN O . Decentralizing privacy:using blockchain to protect personal data[C]// 2015 IEEE Security and Privacy Workshops. IEEE, 2015: 180-184.
|
[8] |
LIU F F , GE Q , YAROM Y ,et al. Catalyst:defeating last-level cache side channel attacks in cloud computing[C]// 2016 IEEE International Symposium on High Performance Computer Architecture (HPCA). IEEE, 2016: 406-418.
|
[9] |
JOSEP A D , KATZ R A D , KONWINSKI A D ,et al. A view of cloud computing[J]. Communications of the ACM, 2010,53(4): 50-58.
|
[10] |
ZHANG B , MOR N , KOLB J ,et al. The cloud is not enough:saving IoT from the cloud[C]// 7th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 15). 2015.
|
[11] |
SALMAN O , ABDALLAH S , ELHAJJ I H ,et al. Identity-based authentication scheme for the Internet of things[C]// 2016 IEEE Symposium on Computers and Communication (ISCC). IEEE, 2016: 1109-1111.
|
[12] |
MIETTINEN M , MARCHAL S , HAFEEZ I ,et al. IoT sentinel:automated device-type identification for security enforcement in IoT[C]// 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS). IEEE, 2017: 2177-2184.
|
[13] |
KALIYA N , HUSSAIN M . Framework for privacy preservation in IoT through classification and access control mechanisms[C]// 2017 2nd International Conference for Convergence in Technology (I2CT). IEEE, 2017: 430-434.
|
[14] |
CROSBY M , NACHIAPPAN , PATTANAYAK P ,et al. Blockchain technology:beyond bitcoin[J]. Applied Innovation Review, 2016,2: 6-19.
|
[15] |
MAO Y Y , YOU C S , ZHANG J ,et al. A survey on mobile edge computing:the communication perspective[J]. IEEE Communications Surveys & Tutorials, 2017,19(4): 2322-2358.
|
[16] |
SHARMA P K , SINGH S , JEONG Y S ,et al. DistBlockNet:a distributed blockchains-based secure SDN architecture for IoT networks[J]. IEEE Communications Magazine, 2017,55(9): 78-85.
|
[17] |
XU R H , CHEN Y , BLASCH E ,et al. BlendCAC:a blockchainenabled decentralized capability-based access control for IoTs[C]// 2018 IEEE International Conference on Blockchain. IEEE, 2018: 1027-1034.
|
[18] |
NOVO O . Blockchain meets IoT:an architecture for scalable access management in IoT[J]. IEEE Internet of Things Journal, 2018,5(2): 1184-1195.
|
[19] |
FARHADI M , MIORANDI D , PIERRE G . Blockchain enabled fog structure to provide data security in IoT applications[J]. arXiv:1901.04830, 2019
|
[20] |
AYOADE G , KARANDE V , KHAN L ,et al. Decentralized IoT data management using blockchain and trusted execution environment[C]// 2018 IEEE International Conference on Information Reuse and Integration (IRI). IEEE, 2018: 15-22.
|
[21] |
MAYMOUNKOV P , MAZIERES D . Kademlia:a peer-to-peer information system based on the XOR metric[C]// International Workshop on Peer-to-Peer Systems. Springer, 2002: 53-65.
|
[22] |
COHEN B , . Incentives build robustness in BitTorrent[C]// Workshop on Economics of Peer-to-Peer Systems. 20036: 68-72.
|
[23] |
NECHVATAL J , BARKER E , BASSHAM L ,et al. Report on the development of the advanced encryption standard (AES)[J]. Journal of Research of the National Institute of Standards and Technology, 2001,106(3):511.
|
[24] |
ANDROULAKI E , BARGER A , BORTNIKOV V ,et al. Hyperledger fabric:a distributed operating system for permissioned blockchains[C]// Proceedings of the 13th EuroSys Conference. 2018: 1-15.
|
[25] |
SAMONAS S , COSS D . The CIA strikes back:redefining confidentiality,integrity and availability in security[J]. Journal of Information System Security, 2014,10(3):21.
|
[26] |
王宗慧, 张胜利, 金石 ,等. 区块链数据隐私保护研究[J]. 物联网学报, 2018,2(3): 71-81.
|
|
WANG Z H , ZHANG S L , JIN S ,et al. Survey on privacy preserving techniques for blockchain[J]. Chinese Journal on Internet of Things, 2018,2(3): 71-81.
|