International Core Journal of Engineering 2020-26 | Page 184

[10] [11] [12] [13] blocks[J].IEEE Transactions on Computer- Aidled Design of Integrated Circuits and Systems, 2015, 34(8):1295-1307. Chongyao Xu. The Design and Implemention of IoT Secruity Chio Based on National Encryption Algorithm and PUF Technology[D]. Guangdong University of Technology,2018. Rahman M T, Ralhman F, Forte D, et al. An aging-resistant RO-PUF for reliable key generation[J]. IEEE Transactions on Emerging Topics in Computing, 2016, 4(3): 335-348. Sundaresan S, Doss R, PiramuthuS, et al. A secure search protocol for low cost passive RFID tags[J].Computer Networks, 2017, 122: 70-82. ZHOU Xianwei,XUE Nan. IPSec parsing[M].Beijing:Nationl Defense Industry Press.2006:15. [14] GM/T 0022-2014 People's Republic of China cipher industry standard:IPSec VPN specification[S].Beijing, Standards Press of China,2014. [15] Peng Song.The Research and Application of Security Technology for MQTT-Based IoT Communication[D].BeiJing University of Posts and Telecommunications,2019. [16] Xiao Huan.Security Analysis and Attack Detection on Link Layer of ZigBee Wireless Sensor Network[D].BeiJing University of Posts and Telecommunications,2013. [17] Sensen Li. Design and Implementation of Bluetooth Secure Transmission System Based on PUF[D].PLA Strategic Support Force Information Engineering University, 2018. 162