1Van Kranenburg R.The Intemet of Things.Amsterdam:Waag Society,2008.
2Yan L,Zhang Y,Yang L T.The Intemet of Things:From RFID to the Next.Generation Pervasive Networked Systems.Auerbach Publications,2008.
3Chakrabarti D,Maitra S,Roy B.A Key Predistribution Scheme for Wireless Sensor Networks:Merging Blocks in Combinatorial Design.Journal of Information Security,2006,5(2):105-114.
4International Telecommunication Union.ITU Internet Reports 2005:The Internet of Things,2005.
5Floerkemeier C.Langheinrich M,Heisch E,Mattern F.The Internet of Things:Lecture Notes in Computer Science.Springer,2008,49-52.
6Medaglia C M, Serbanati A. An overview of privacy and security issues in the Internet of things [C]// Proceedings of the 20th Tyrrhenian Workshop on Digital Communications. Sardinia, Italy: Springer, 2010:389-395.
7Leusse P, Periorellis P, Dimitrakos T. Self managed security cell, a security model for the Internet of Things and services [C]// Proceedings of the 1st International Conference on Advances in Future Internet. Athens/Glyfada, Greece: IEEE, 2009: 47-52.
8Hamad F, Smalov L, James A. Energy-aware security in M commerce and the Internet of Things[J].IETE Technical review, 2009, 26(5) : 357 - 362.
9Juels A. RFID security and privacy: A research survey [J]. IEEE Journal on Selected Areas in Communication, 2006, 24(2) :381 - 394.
10Weber R H. Internet of Things New security and privacy challenges [J]. Computer Law & Security Reviezo, 2010, 26(1): 23-30.