[1] |
沈苏彬, 范曲立, 宗平 ,等. 物联网的体系结构与相关技术研究[J]. 南京邮电大学学报(自然科学版), 2009,29(6): 1-11.
|
|
SHEN S B , FAN Q L , ZONG P ,et al. Study on the architecture and associated technologies for Internet of things[J]. Journal of Nanjing University of Posts and Telecommunications (Natural Science), 2009,29(6): 1-11.
|
[2] |
孙其博, 刘杰, 黎羴 ,等. 物联网:概念,架构与关键技术研究综述[J]. 北京邮电大学学报, 2010,33(3): 1-9.
|
|
SUN Q B , LIU J , LI S ,et al. Internet of things:summarize on concepts,architecture and key technology problem[J]. Journal of Beijing University of Posts and Telecommunications, 2010,33(3): 1-9.
|
[3] |
WU M , LU T J , LING F Y ,et al. Research on the architecture of Internet of things[C]// 2010 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE). IEEE, 2010,5: V5484-V5487.
|
[4] |
SINGH S , SINGH N . Internet of things (IoT):security challenges,business opportunities & reference architecture for e-commerce[C]// 2015 International Conference on Green Computing and Internet of Things (ICGCIoT). IEEE, 2015: 1577-1581.
|
[5] |
王宗慧, 张胜利, 金石 ,等. 区块链数据隐私保护研究[J]. 物联网学报, 2018,2(3): 71-81.
|
|
WANG Z H , ZHANG S L , JIN S ,et al. Survey on privacy preserving techniques for blockchain[J]. Chinese Journal on Internet of Things, 2018,2(3): 71-81.
|
[6] |
GOMES M , DA ROSA RIGHI R , DA COSTA C A . Internet of things scalability:analyzing the bottlenecks and proposing alternatives[C]// 2014 6th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT). IEEE, 2014: 269-276.
|
[7] |
ZHANG Z K , CHO M C Y , WANG C W ,et al. IoT security:ongoing challenges and research opportunities[C]// 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications. IEEE, 2014: 230-234.
|
[8] |
KOLIAS C , KAMBOURAKIS G , STAVROU A ,et al. DDoS in the IoT:Mirai and other botnets[J]. Computer, 2017,50(7): 80-84.
|
[9] |
LALLY G , SGANDURRA D . Towards a framework for testing the security of IoT devices consistently[C]// International Workshop on Emerging Technologies for Authorization and Authentication. Springer, 2018: 88-102.
|
[10] |
FERNáNDEZ-CARAMéS T M , FRAGA-LAMAS P . A review on the use of blockchain for the Internet of things[J]. IEEE Access, 2018,6: 32979-33001.
|
[11] |
BANERJEE M , LEE J , CHOO K K R . A blockchain future for Internet of things security:a position paper[J]. Digital Communications and Networks, 2018,4(3): 149-160.
|
[12] |
查选, 王旭, 倪巍 ,等. 区块链技术的一致性和容量的研究与发展及在物联网中的应用[J]. 物联网学报, 2017,1(1): 21-33.
|
|
ZHA X , WANG X , NI W ,et al. Blockchain for IoT:the tradeoff between consistency and capacity[J]. Chinese Journal on Internet of Things, 2017,1(1): 21-33.
|
[13] |
International Data Corporation (IDC). Worldwide and regional Internet of things (IoT) 2014-2020 forecast:a virtuous circle of proven value and demand:IDC #248451[R]. 2014.
|
[14] |
钱卫宁, 邵奇峰, 朱燕超 ,等. 区块链与可信数据管理:问题与方法[J]. 软件学报, 2018,29(1): 150-159.
|
|
QIAN W N , SHAO Q F , ZHU Y C ,et al. Research problems and methods in blockchain and trusted data management[J]. Journal of Software, 2018,29(1): 150-159.
|
[15] |
NAKAMOTO S . Bitcoin:a peer-to-peer electronic cash system[R]. 2019.
|
[16] |
WOOD G . Ethereum:a secure decentralized generalized transaction ledger[J]. Ethereum Project Yellow Paper, 2014,151: 1-32.
|
[17] |
张胜利, 王滔滔, 杨晴 ,等. 高性能许可公链[J]. 深圳大学学报理工版, 2020,37(3): 227-233.
|
|
ZHANG S L , WANG T T , YANG Q ,et al. Permissioned public blockchain with high performance[J]. Journal of Shenzhen University Science and Engineering, 2020,37(3): 227-233.
|