[1] |
Yu Xiao-bo,Zhu Hong-ru,Liu Da-peng,et al.Analysis of LoRa WAN security mechanism [J].Telecommunications Science,2019,35 (8):152-157.(in Chinese)
|
[2] |
Lü Wen-tao.Research on ALOHA anti-collision algorithm and data security in LoRa network[D].Chongqing:Chongqing University of Technology,2018.(in Chinese)
|
[3] |
Xu W T, Jha S, Hu W.LoRa-Key: Secure key generation system for LoRa-based network[J].IEEE Internet of Things Journal, 2019,6(4):6404-6416.
|
[4] |
Zhang J,Marshall A,Hanzo L. Channel-envelope differenc- ing eliminates secret key correlation:LoRa-based key generation in low power wide area networks[J].
|
|
IEEE Transactions on Vehicular Technology,2018,67(12):12462-12466.
|
[5] |
Kim J,Song J S. A secure device-to-device link establishment scheme for LoRa WAN[J].IEEE Sensors Journal,2018,18(5):2153-2160.
|
[6] |
Ozyilmaz K R,Yurdakul A .Designing a blockchain-based IoT with ethereum,swarm,and LoRa:The software solution to create high availability with minimal security risks[J].
|
|
IEEE Consumer Electronics Magazine,2019,8(2):28-34.
|
[7] |
Chu C H,Ouyang Y C,Jang C B.Secure data transmission with cloud computing in heterogeneous wireless networks[J].Security Communication Networks,2012,5(12):1325-1336.
|
[8] |
Paar C,Pelzl J. Understanding cryptography: A textbook for students and practitioners[M].Ma Xiao-ting translation. Beijing:Qinghua University Press,2014.(in Chinese)
|
[9] |
Li Hai-hua.Application of data encryption technology in computer network communication security [J].Computer CD Software and Application,2013(8):146.(in Chinese)
|
[10] |
Liu Xu.Research and implementation of communication security of electric energy information acquisition system based on Modbus/TCP[D].Harbin:Harbin Institute of Technology,2018.(in Chinese)
|
[11] |
Xiao Zhen-jiu,Hu Chi,Jiang Zheng-tao,et al.Optimization of AES and RSA algorithms and their hybrid encryption system[J].Application Research of Computers,2014,31(4):1189-1194.(in Chinese)
|
[12] |
Liu Zhi-hui,Liu Jian-hui.Research on data encryption transmission scheme based on AES and RSA[J].Computer Security,2007(11):39-41.(in Chinese)
|
[13] |
Wang Rui.Design of a multi-mode hybrid encryption system based on AES and RSA algorithms[D].Shanghai:Fudan University,2011.(in Chinese)
|
[14] |
Song Li-min,Song Xiao-rui. Design and implementation of a data security transmission scheme based on hybrid encryption[J].
|
|
Netinfo Security,2017(12):6-10.(in Chinese)
|
[15] |
Zuo Xiao-jing, Wang Rong.A hybrid database data encryption strategy based on data sensitivity[J].Henan Science,2015,33(4):574-577.(in Chinese)
|
[16] |
Yu Cheng-bo, Qian Ze-wen,Yan Ya-heng. The data encryption about BLE entrance guard management system based on AES and RSA [J].Microcomputer & its Applications,2017(2):17-19.(in Chinese)
|
[17] |
Chen Ji-xin,Wang Zhong,Zhao Jin-yu.Improved AES encryption algorithm design in CAN bus communication[J].Microcontrollers & Embedded Systems,2018,18(7):25-29.(in Chinese)
|
[18] |
Wang He-kun,Chen Song-tao.Application and implementation of optimized AES algorithm in optical transport network[J].Optical Communication Technology,2019,43(5):47-50.(in Chinese)
|
[19] |
Li Sheng-liang.Research and implementation of data encryption technology for optical disc library based on AES algorithm[D].Wuhan:Huazhong University of Science and Technology,2015.(in Chinese)
|
[20] |
Zhang Yao,Ye Ling.WSN encryption algorithm based on AES[J].Computer Engineering and Design,2015,36(3):619-623.(in Chinese)
|
[21] |
Sun He,Li Shao-bo.Analysis and improvement of RSA data encryption algorithm[J].Computer Knowledge and Technology,2016,12(33):45-48.(in Chinese)
|
|
附中文参考文献:
|
[1] |
于小博,朱红儒,刘大鹏,等.LoRa广域网安全机制剖析[J].电信科学,2019,35(08):152-157.
|
[2] |
吕文涛.LoRa网络中ALOHA防碰撞算法及数据安全的研究[D].重庆:重庆理工大学,2018.
|
[8] |
Paar C,Pelzl J.深入浅出密码学:常用加密技术原理与应用[M].马小婷,译.北京:清华大学出版社,2014.
|
[9] |
李海华.数据加密技术在计算机网络通信安全中的应用探析[J].计算机光盘软件与应用,2013(8):146.
|
[10] |
刘旭.基于Modbus/TCP的电能信息采集系统通信安全研究与实现[D].哈尔滨:哈尔滨工业大学,2018.
|
[11] |
肖振久,胡驰,姜正涛,等.AES与RSA算法优化及其混合加密体制[J].计算机应用研究,2014,31(4):1189-1194.
|
[12] |
刘志会,刘建辉.基于AES和RSA的数据加密传送方案研究[J].计算机安全,2007(11):39-41.
|
[13] |
王瑞.基于AES、RSA算法的多模混合加密系统设计[D].上海:复旦大学,2011.
|
[14] |
宋利民,宋晓锐.一种基于混合加密的数据安全传输方案的设计与实现[J].信息网络安全,2017(12):6-10.
|
[15] |
左晓静,王荣.一种基于数据敏感度的混合型数据库加密策略[J].河南科学,2015,33(4):574-577.
|
[16] |
余成波,钱泽文,闫亚恒.基于AES与RSA的BLE门禁管理系统的数据加密[J].微型机与应用,2017(2):17-19.
|
[17] |
陈基昕,王忠,赵锦宇.CAN总线通信中的改进AES加密算法设计[J].单片机与嵌入式系统应用,2018,18(7):25-29.
|
[18] |
王赜坤,陈松涛.优化的AES算法在光传送网中的应用与实现[J].光通信技术,2019,43(5):47-50.
|
[19] |
李升亮.基于AES算法的光盘库数据加密技术研究与实现[D].武汉:华中科技大学,2015.
|
[20] |
张尧,叶玲.基于AES的WSN加密算法[J].计算机工程与设计,2015,36(3):619-623.
|
[21] |
孙赫,李少波.RSA数据加密算法分析与改进[J].电脑知识与技术,2016,12(33):45-48.
|