[1] ATSUYA Y, AYED S B, TERAOKA F. Network access authentication infrastructure using EAP-TTLS on diameter EAP application[C]//Proceedings of the 7th Asian Internet Engineering Conference on-AINTEC '11. Bangkok, Thailand:ACM Press, 2011:56-63. [2] CHIANG M, ZHANG T. Fog and IoT:an overview of research opportunities[J]. IEEE Internet of Things Journal, 2016, 3(6):854-864. [3] YAO Y Y, CHANG X L, MIŠIĆ J, et al. BLA:blockchain-assisted lightweight anonymous authentication for distributed vehicular fog services[J]. IEEE Internet of Things Journal, 2019, 6(2):3775-3784. [4] GRØNBÆK I. Architecture for the Internet of Things (IoT):API and interconnect[C]//2008 Second International Conference on Sensor Technologies and Applications (sensorcomm 2008). Cap Esterel, France:IEEE, 2008:802-807. [5] LI Cunbin, LI Xiaopeng, TIAN Shiming, et al. Challenges and prospects of risk transmission in deep fusion of electric power and information for energy Internet[J]. Automation of Electric Power Systems, 2017, 41(11):17-25. [6] DE CALDAS FILHO F L, MARTINS L M C E, ARAÚJO I P, et al. Design and evaluation of a semantic gateway prototype for IoT networks[C]//Companion Proceedings of the10th International Conference on Utility and Cloud Computing. New York, USA:ACM, 2017:195-201. [7] SULTAN A, MUSHTAQ M A, ABUBAKAR M. IOT security issues via blockchain:a review paper[C]//Proceedings of the 2019 International Conference on Blockchain Technology. New York, USA:ACM, 2019:60-65. [8] WANG Zhongchun, FAN Guolin, et al. Technology implementation of IoT security gateway based on lightweight security protocol[J]. Communications Technology, 2020, 53(2):469-473. [9] FENG T, CHEN W Y, ZHANG D, et al. One-stop efficient PKI authentication service model based on blockchain[M]. Singapore:Springer Singapore, 2020:31-47. [10] FAROOQ S M, SUHAIL HUSSAIN S M, USTUN T S. Elliptic curve digital signature algorithm (ECDSA) certificate based authentication scheme for advanced metering infrastructure[C]//2019 Innovations in Power and Advanced Computing Technologies (i-PACT). Vellore, India:IEEE, 2019:1-6. [11] BEHESHTI-ATASHGAH M, AREF M R, BAYAT M, et al. ID-based strong designated verifier signature scheme and its applications in Internet of Things[C]//2019 27th Iranian Conference on Electrical Engineering (ICEE). Yazd, Iran:IEEE, 2019:1486-1491. [12] HAN S, XIE M D, YANG B L, et al. A certificateless verifiable strong designated verifier signature scheme[J]. IEEE Access, 2019, 7:126391-126408. [13] HE Yongyuan, PANG Jin. Application prospect of block chain technology in electric power industry[J]. Electric Power Information and Communication Technology, 2018, 16(3):39-42. [14] FAN Jingang, WEI An, GUO Yanlai, et al. Architecture of energy micro grid based on block chain[J]. Electric Power Information and Communication Technology, 2018, 16(12):9-13. [15] ZENG Zeng, ZHANG Li, MEI Wenming, et al. A blockchain-based smart power grid system[J]. Electric Power Information and Communication Technology, 2019, 17(1):31-35. [16] LEE S, HEO M, PARK K, et al. Enhancing the security of IoT gateway based on the classification of user security-sensitive data[C]//Proceedings of the Conference on Research in Adaptive and Convergent Systems. Chongqing China. New York, USA:ACM, 2019:241-243. [17] CHRISTIN D, REINHARDT A, MOGRE P S, et al. Wireless sensor networks and the Internet of Things:Selected challenges[EB/OL]. 2009. [18] IBRAHIM M H. SecureCoin:a robust secure and efficient protocol for anonymous bitcoin ecosystem[J]. nternational Journal of Network Security, 2017, 19(2):295-312. [19] TOMESCU A, DEVADAS S. Catena:efficient non-equivocation via bitcoin[C]//2017 IEEE Symposium on Security and Privacy (SP). San Jose, USA:IEEE, 2017:393-409. [20] LEI A, CRUICKSHANK H, CAO Y, et al. Blockchain-based dynamic key management for heterogeneous intelligent transportation systems[J]. IEEE Internet of Things Journal, 2017, 4(6):1832-1843. [21] HE Y H, LI H, CHENG X Z, et al. A blockchain based truthful incentive mechanism for distributed P2P applications[J]. IEEE Access, 2018, 6:27324-27335. [22] ZYSKIND G, NATHAN O, PENTLAND A '. Decentralizing privacy:using blockchain to protect personal data[C]//2015 IEEE Security and Privacy Workshops. San Jose, USA:IEEE, 2015:180-184. [23] CHRISTIDIS K,DEVETSIKIOTIS M. Blockchains and smart contracts for the internet of things[J]. IEEE Access, 2016, 4:2292-2303. [24] MENDKI P. Blockchain enabled IoT edge computing[C]//Proceedings of the 2019 International Conference on Blockchain Technology. New York, USA:ACM, 2019:66-69. [25] ALEXOPOULOS N, VASILOMANOLAKIS E, IVÁNKÓ N R, et al. Towards blockchain-based collaborative intrusion detection systems[M]. Cham:Springer International Publishing, 2018:107-118.
|