[1]
|
H. Ning, “RFID Major Projects and State Internet of Things (Second Edition),” China Machine Press, Beijing, 2010.
|
[2]
|
J. Ma, J. Wen, R. Huang and B. Huang, “Cyber-Individual Meets Brain Informatics,” IEEE Intelligent Systems, Vol. 26, No. 5, 2011, pp. 30-37.
doi:10.1109/MIS.2011.55
|
[3]
|
L. Atzori, A. Iera and G. Morabito, “The Internet of Things: A Survey,” Computer Networks, Vol. 54, No. 15, 2010, pp. 2787-2805. doi:10.1016/j.comnet.2010.05.010
|
[4]
|
D. Bandyopadhyay and J. Sen, “Internet of Things: Applications and Challenges in Technology and Standardization,” Wireless Personal Communications, Vol. 58, No. 1, 2011, pp. 49-69. doi:10.1007/s11277-011-0288-5
|
[5]
|
H. Ning, N. Ning, S. Qu, Y. Zhang and H. Yang, “Layered Structure and Management in Internet of Things,” Proceedings of Future Generation Communication and Networking (FGCN 2007), Jeju, 6-8 December 2007, pp. 386-389.
|
[6]
|
R. Roman, P. Najera and J. Lopez, “Securing the Internet of Things,” Computer, Vol. 44, No. 9, 2011, pp. 51-58.
doi:10.1109/MC.2011.291
|
[7]
|
R. Kaur, “Advances in Intrusion Detection System for WLAN,” Advances in Internet of Things, Vol. 1, No. 3, 2011, pp. 51-54. doi:10.4236/ait.2011.13007
|
[8]
|
G. P. Hancke, K. Markantonakis and K. E. Mayes, “Security Challenges for User-Oriented RFID Applications within the ‘Internet of Things’,” Journal of Internet Technology, Vol. 11, No. 3, 2010, pp. 307-313.
|
[9]
|
R. Roman, C. Alcaraz, J. Lopez and N. Sklavos, “Key Management Systems for Sensor Networks in the Context of the Internet of Things,” Computers & Electrical Engineering, Vol. 37, No. 2, 2011, pp. 147-159.
doi:10.1016/j.compeleceng.2011.01.009
|
[10]
|
L. D. Xu, “Information Architecture for Supply Chain Quality Management,” International Journal of Production Research, Vol. 49, No. 1, 2011, pp. 183-198.
doi:10.1080/00207543.2010.508944
|
[11]
|
L. Zhou and H. C. Chao, “Multimedia Traffic Security Architecture for the Internet of Things,” IEEE Network, Vol. 25, No. 3, 2011, pp. 35-40.
doi:10.1109/MNET.2011.5772059
|
[12]
|
H. Ning and Z. Wang, “Future Internet of Things Architecture: Like Mankind Neural System or Social Organization Framework?” IEEE Communications Letters, Vol. 15, No. 4, 2011, pp. 461-463.
doi:10.1109/LCOMM.2011.022411.110120
|
[13]
|
Draft ITU-T Recommendation X.805 (Formerly X.css), Security Architecture for Systems Providing End-to-End communications, 2003.
|
[14]
|
D. Havlik, S. Schade, Z. A. Sabeur , P. Mazzetti, K. Watson, A. J. Berre and J. L. Mon, “From Sensor to Observation Web with Environmental Enablers in the Future Internet,” Sensors, Vol. 11, No. 4, 2011, pp. 3874-3907.
doi:10.3390/s110403874
|
[15]
|
L. Atzori, A. Iera and G. Morabito, “The Internet of Things: A Survey,” Computer Networks, Vol. 54, No. 15, 2010, pp. 2787-2805. doi:10.1016/j.comnet.2010.05.010
|
[16]
|
N. Koshizuka and K. Sakamura, “Ubiquitous ID: Standards for Ubiquitous Computing and the Internet of Things,” IEEE Pervasive Computing, Vol. 9, No. 4, 2010, pp. 98-101. doi:10.1109/MPRV.2010.87
|
[17]
|
P. K. Harmer, P. D. Williams, G. H. Gunsch, G. B. Lamont, “An Artificial Immune System Architecture for Computer Security Applications,” IEEE Transactions on Evolutionary Computation, Vol. 6, No. 3, 2002, pp. 252-280.
doi:10.1109/TEVC.2002.1011540
|