[1] |
LIU X T, ZHANG T, HU N, et al. The Method of Internet of Things Access and Network Communication Based on MQTT[J]. Computer Communications, 2020,153:169-176.
doi: 10.1016/j.comcom.2020.01.044
|
[2] |
FRUSTACI M, PACE P, ALOI G, et al. Evaluating Critical Security Issues of the IoT World:Present and Future Challenges[J]. IEEE Internet of Things Journal, 2018,5(4):2483-2495.
doi: 10.1109/JIoT.6488907
|
[3] |
XIE Y, WU L B, KUMAR N, et al. Analysis and Improvement of a Privacy-Aware Handover Authentication Scheme for Wireless Network[J]. Wireless Personal Communications, 2017,93(2):523-541.
doi: 10.1007/s11277-016-3352-3
|
[4] |
HE D B, WANG D, XIE Q, et al. Anonymous Handover Authentication Protocol for Mobile Wireless Networks with Conditional Privacy Preservation[J]. Science in China Series F:Information Sciences, 2017,60(5):52104.
|
[5] |
钦豪, 张勇军, 陈佳琦, 等. 泛在电力物联网发展形态与挑战[J], 电力系统自动化, 2020,44(1):13-22.
|
|
QIN Hao, ZHANG Yongjun, CHEN Jiaqi, et al. Development Formsand Challenges of Ubiquitous Power Internet of Things[J]. Automation of Electric Power Systems, 2020,44(1):13-22.
|
[6] |
王海峰, 李朝阳, 吕政, 等. 泛在电力物联网环境下网络安全攻击研究[J]. 浙江电力, 2019,38(12):76-81.
|
|
WANG Haifeng, LI Chaoyang, LV Zheng, et al. Researchon Network Security Attack in Ubiquitous Power Internet of Things[J]. ZheJiang Electric Power, 2019,38(12):76-81.
|
[7] |
SHOR P W. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer[J]. SIAM Review, 1999,41(2):303-332.
doi: 10.1137/S0036144598347011
|
[8] |
XIE Y, WU L, KUMAR N, et al. Analysis and Improvement of a Privacy-Aware Handover Authentication Scheme for Wireless Network[J]. Wireless Personal Communications, 2017,93(2):523-541.
doi: 10.1007/s11277-016-3352-3
|
[9] |
DING XJ, DING F, CHEN X S, et al. Security-Reliability Tradeoff for Multi-Terminal Multi-Mode Coexisting Systems in the Presence of Multiple Eavesdroppers[J]. IET Communications, 2020,14(8):1221-1227.
doi: 10.1049/cmu2.v14.8
|
[10] |
HOFFSTEIN J, PIPHER J, SILVERMAN J H. NTRU:a Ring-Based Public Key Cryptosystem[C]// Proceedings of the 3rd International Symposium on Algorithmic Number Theory.Heidelberg:Springer, 1998: 267-288.
|
[11] |
CHEN R, PENG D Z. A Novel NTRU-Based Handover Authentication Scheme for Wireless Networks[J]. IEEE Communications Letters, 2018,22(3):586-589.
doi: 10.1109/LCOMM.2017.2786228
|
[12] |
HARN L, LIN C L. Authenticated Group Key Transfer Protocol Based on Secret Sharing[J]. IEEE Transactions on Computers, 2010,59(6):842-846.
doi: 10.1109/TC.2010.40
|
[13] |
WANG Q X, CHENG C, ZUO L. Analysis and Improvement of a NTRU-Based Handover Authentication Scheme[J]. IEEE Communications Letters, 2019,23(10):1692-1695.
doi: 10.1109/COML.4234
|
[14] |
GORBENKO I D. Analysis,Assessment and Proposals Regarding the Method for Generation of System Parameters in NTRU-Like Asymmetric Systems[J]. Telecommunications and Radio Engineering, 2017,76(6):511-520.
doi: 10.1615/TelecomRadEng.v76.i6
|
[15] |
喻小宝, 谭忠富, 屈高强. 基于能源互联网的电力商业模式及关键技术研究[J]. 智慧电力, 2019,47(2):9-14.
|
|
YU Xiaobao, TAN Zhongfu, QU Gaoqiang. Researchon Power Business Model and Key Technologies Based on Energy Internet[J]. Smart Power, 2019,47(2):9-14.
|
[16] |
谢忠良, 江凌云. 一种基于NTRU算法的物联网设备接入认证方案[J]. 南京邮电大学学报, 2019,39(3):98-103.
|
|
XIE Zhongliang, JIANG Lingyun. An Internetof Things Access Authentication Scheme Based on NTRU Algorithm[J]. Journal of Nanjing University of Post and Telecommunications, 2019,39(3):98-103.
|
[17] |
CHANG C C, WU H L, SUN C Y. Notes on Secure Authentication Scheme for IoT and Cloud Servers[J]. Pervasive and Mobile Computing, 2017,38:275-278.
doi: 10.1016/j.pmcj.2015.12.003
|
[18] |
LoRa Alliance.LoRa WAN Sepcification:LoRa WANTM Sepecification 3[S/OL]. [2020-10-03]. https://www.lora-alliance.org/lor-awan-for-developers.
|
[19] |
WANG Y P E, LIN X Q, ADHIKARY A, et al. A Primer on 3GPP Narrowband Internet of Things[J]. IEEE Communications Magazine, 2017,55(3):117-123.
|
[20] |
3GPP Technical Specification Group. Revised WID for Furter Enhancal MTC for LTE:3GPP RP-161464[S/OL]. [2020-10-03]. http://www.3gpp.org,accessed Apr.30,2017.
|