购买
下载掌阅APP,畅读海量书库
立即打开
畅读海量书库
扫码下载掌阅APP

参考文献

[1]工业互联网产业联盟.工业互联网网络连接白皮书[DB/OL]. (2018-09-01) [2020-10-05]. http://www.miit.gov.cn/n973401/n5993937/n5993968/c6488070/part/6488075.pdf.

[2]航天云网.企业级工业互联网平台解决方案[DB/OL]. [2020-10-05]. http://os.casicloud.com/service/enterpriseSolution.html.

[3]ISO.ISO/IEC 9834-1:2012 Information technology-procedures for the operation of object identifier registration authorities:general procedures and top arcs of the international object identifier tree—Part 1[DB/OL]. [2020-10-05]. https://www.iso.org/standard/58055. html.

[4]DEVAKI C. 5G for Industry 4.0[DB/OL]. [2020-10-05]. https://www.3gpp.org/news-events/2122-tsn_v_lan.

[5]TWAYEJ W, KHAN M, AL-RAWESHIDY H S. Network performance evaluation of M2M with self organising cluster head to sink mapping[J]. IEEE Sensors Journal, 2017, 15: 1-2.

[6]AL-KASEEM B R, AL-RAWESHIDY H S. SD-NFV as an energy efficient approach for M2M networks using cloud-based 6LoWPAN testbed[J]. IEEE Internet of Things Journal, 2017, 5: 1-3.

[7]MIŠIĆJ, MIŠIĆV B, KHAN N. Sharing it my way: efficient M2M access in LTE/LTE-A networks[J]. IEEE Transactions on Vehicular Technology, 2017, 66 (1): 696-709.

[8]KHAN N, MIŠIĆJ, MIŠIĆV B. Tradeoffs in PRACH bandwidth partitioning for VM2M overlay network in LTE[C]//Vehicular Technology Conference. IEEE, 2017.

[9]ANDREEV S, LARMO A, GERASIMENKO M, et al. Efficient small data access for machine-type communications in LTE[C]//IEEE International Conference on Communications. IEEE, 2013: 3569-3574.

[10]CONDOLUCI M, DOHLER M, ARANITI G, et al. Enhanced radio access and data transmission procedures facilitating industry-compliant machine-type communications over LTE-based 5G networks[J]. IEEE Wireless Communications, 2016, 23 (1): 56-63.

[11]RIKER A, CERQUEIRA E, CURADO M, et al. A two-tier adaptive data aggregation approach for M2M group-communication[J]. IEEE Sensors Journal, 2016, 16 (3): 823-835.

[12]VIRDIS A, VALLATI C, NARDINI G, et al. D2D communications for large-scale fog platforms: enabling direct M2M interactions[J]. IEEE Vehicular Technology Magazine, 2018, 99: 1-2.

[13]SWAIN S N, THAKUR R, CHEBIYYAM S R M. Coverage and rate analysis for facilitating machine-to-machine communication in LTE-A networks using device-to-device communication[J]. IEEE Transactions on Mobile Computing, 2017, 16 (11): 3014-3027.

[14]WANG Y, WANG X D, XIE B, et al. Intrusion detection in homogeneous and heterogeneous wireless sensor networks[J]. IEEE Transactions on Mobile Computing, 2008, 7 (6): 698-711.

[15]KISHK M A, DHILLON H S. Coexistence of RF-powered IoT and a primary wireless network with secrecy guard zones[J]. IEEE Transactions on Wireless Communications, 2018, 17 (3): 1460-1473.

[16]CIRANI S, PICONE M, GONIZZI P, et al. IoT-OAS: an OAuth-based authorization service architecture for secure services in IoT scenarios[J]. IEEE Sensors Journal, 2014, 15 (2): 1224-1234.

[17]LIU Z, AZARDERAKHSH R, KIM H, et al. Efficient software implementation of ring-LWE encryption on IoT processors[J]. IEEE Transactions on Computers, 2017, 10: 1-2.

[18]MA M, HE D, KUMAR N, et al. Certificateless searchable public key encryption scheme for industrial internet of things[J]. IEEE Transactions on Industrial Informatics, 2018, 14 (99): 759-767.

[19]BELGUITH S, KAANICHE N, LAURENT M, et al. PHOABE: securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT[J]. Computer Networks, 2018, 133: 141-156.

[20]CHAN H, PERRIG A, SONG D. Random key predistribution schemes for sensor networks [C]//Security and Privacy, Proceedings 2003 Symposium on IEEE, 2003: 197-213.

[21] AL-TURJMAN F M, AL-FAGIH A E, ALSALIH W M, et al. A delay-tolerant framework for integrated RSNs in IoT[J]. Computer Communications, 2013, 36 (9): 998-1010.

[22] ZHANG Y, LIANG J, ZHENG B, et al. Key management scheme based on route planning of mobile sink in wireless sensor networks[J]. Sensors, 2016, 16 (2): 170.

[23]CORRIGAN H, BONEH D, MAZIERES D. Riposte: an anonymous messaging system handling millions of users[C]//IEEE Symposium on Security and Privacy, IEEE S & P, 2015: 321-338.

[24]YAO Y, YANG L T, XIONG N N. Anonymity-based privacy-preserving data reporting for participatory sensing[J]. IEEE Internet of Things Journal, 2017, 2 (5): 381-390.

[25]CHEN I R, GUO J, BAO F. Trust management for SOA-based IoT and its application to service composition[J]. IEEE Transactions on Services Computing, 2017, 9 (3): 482-495. RpbUtzsiTJ2IAvWjltRqWJABRkYreXO2iQcVM2wRhWmBjTYaFG8AXd5cIsJzolMx

点击中间区域
呼出菜单
上一章
目录
下一章
×