International Core Journal of Engineering 2020-26 | Page 184
[10]
[11]
[12]
[13]
blocks[J].IEEE Transactions on Computer- Aidled Design of
Integrated Circuits and Systems, 2015, 34(8):1295-1307.
Chongyao Xu. The Design and Implemention of IoT Secruity Chio
Based on National Encryption Algorithm and PUF Technology[D].
Guangdong University of Technology,2018.
Rahman M T, Ralhman F, Forte D, et al. An aging-resistant RO-PUF
for reliable key generation[J]. IEEE Transactions on Emerging Topics
in Computing, 2016, 4(3): 335-348.
Sundaresan S, Doss R, PiramuthuS, et al. A secure search protocol for
low cost passive RFID tags[J].Computer Networks, 2017, 122: 70-82.
ZHOU Xianwei,XUE Nan. IPSec parsing[M].Beijing:Nationl
Defense Industry Press.2006:15.
[14] GM/T 0022-2014 People's Republic of China cipher industry
standard:IPSec VPN specification[S].Beijing, Standards Press of
China,2014.
[15] Peng Song.The Research and Application of Security Technology for
MQTT-Based IoT Communication[D].BeiJing University of Posts
and Telecommunications,2019.
[16] Xiao Huan.Security Analysis and Attack Detection on Link Layer of
ZigBee Wireless Sensor Network[D].BeiJing University of Posts and
Telecommunications,2013.
[17] Sensen Li. Design and Implementation
of Bluetooth Secure
Transmission System Based on PUF[D].PLA Strategic Support Force
Information Engineering University, 2018.
162