5LEUSSE P, PERIORELLIS P, DIM ITRAKOST, et al. Self managed security cell, a security model for the Internet of Things and Services [C]. Proceedings of the 2009 First International Conference on Advances in Future Internet. Piscataway: IEEE, 2009: 47-52.
6MULLIGAN G. The Internet of Things: here now and coming soon[J]. IEEE Intemet Computing,2010,14(1):36-37.
7HAMAD F, SMALOV L, JAMES A. Energy-aw are security in commerce and the Internet of things [J]. IEEE, Technical Review, 2009, 26(5):357-362.
8WATRO R, KONG D. Tiny PK: securing sensor networks with public key technology [C]. Proceedings of the 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks, New York: ACM press, 2004:59-64.
9BENENSON Z, GEDICKE N, RA IVIO O. Realizing robust user authentication in sensor networks [C]. Proceedings of the Work shop on Real-World Wireless Sensor Networks (REALWSN 2005). [S.l.]: Stockhohn, 2005:135-142.
10MALAND J, WELSH M, SMITHM D. A public-key in frastructure for key distribution in Tiny OS based on elliptic curve cryptography [C]. 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks. Piscataway, IEEE, 2004: 71-80.
1Evan W, Leilani B, Garret C,et al. Building the internet of things using RFID: The RFID ecosystem experience [J].IEEE Internet Computing, 2009, 13(3) :48-50.