[7] TAI Weiliang,CHANG Yafen,LI Weihan. An IoT notion-based authentication and key agreement scheme ensuring user anonymity for heterogeneous ad hoc wireless sensor networks[J]. Journal of Information Security and Applications, 2017, 34(2):133-141.
[9] RAHAYU T M,LEE S G,LEE H J. A secure routing protocol for wireless sensor networks considering secure data aggregation[J]. Sensors, 2015,15(7):127-138.
[14] XING Jie,BI Hongjun,LIU Yun. Research on security threat assessment method based on the attack tree model of the Internet of Things[J]. Journal of Convergence Information Technology, 2013,8(3):653-658.
[15] CHENG Shuhong,WANG Yi,ZHANG Wenke. Research on the cooperative game model of Internet of Things based on mobile node-to-mobile node communication[J]. Journal of Computational and Theoretical Nanoscience, 2016,13(12): 9607-9611.