[1] Bluetooth Special Interest Group. Bluetooth SIG Specification of the Bluetooth system: core package version 4.0 [EB/OL]. (2010-6-30) [2015-4-20]. http://www.bluetooth.org.2010. [2] 元器件交易网. 芯片厂商火拼蓝牙4.0 机遇与挑战并存[EB/OL]. (2013-11-19) [2015-4-20]. http://news. cecb2b.com/info/20131119/1528149.shtml. 2013. [3] 阮文杰. 蓝牙安全问题分析及安全算法实现 [D]. 太原: 太原理工大学, 2009. [4] John Padgette, Karen Scarfone, Lily Chen. NIST Special Publication 800-121 Revision 1. Guide to Bluetooth Security [EB/OL]. (2012-6-30) [2015-4-20]. http://csrc.nist. gov/publications/nistpubs/800-121-rev1/sp800-121_rev1.pdf [5] Raphael C-W Phan, Patrick Mingard. Analyzing the Secure Simple Pairing in Bluetooth v4.0[J]. Wireless Personal Communications(S0929-6212), 2010, 64(4):1-19. [6] Mike Ryan.Bluetooth: With Low Energy comes Low Security[C]//WOOT’13 Proceedings of the 7th USENIX conference on Offensive Technologies. Washington: USENIX Association Berkeley. 2013: 4-4. [7] Daniel C Nash, Thomas L Martin.Towards an Intrusion Detection System for Battery Exhaustion Attacks on Mobile Computing Devices[C]//Pervasive Computing and Communications Workshops, PerCom 2005 Workshops. Third IEEE International Conference on. USA: IEEE, 2005: 141-145. [8] JPushpa Suri, Sona Rani.Security Manager-Key to Restrict the Attacks in Bluetooth[J]. Journal of Computer Science (S1000-9000), 2007, 3(7): 546-548. [9] Dave Singelee, Bart Preneel.Improved Pairing Protocol for Bluetooth[C]// Proceeding ADHOC-NOW'06 Proceedings of the 5th International Conference on Ad-Hoc, Mobile, and Wireless Networks. Ottawa, Canada : Springer Berlin Heidelberg . 2006: 252-265. [10] Sriram Nandha Premnath, Sneha Kumar Kasera.Battery-Draining-Denial-of-Service Attack on Bluetooth Devices[J]. International Journal of Distributed Sensor Networks (S1550-1329), 2006, 2(3): 267-287. [11] 徐光亮. 蓝牙安全链路管理器设计与实现 [D]. 郑州:信息工程大学, 2012. [12] 刘衍珩, 付枫, 朱建启, 等. 基于活跃熵的DoS攻击检测模型[J]. 吉林大学学报(工学版), 2011, 41(4): 1059-1064. [13] 张亚玲, 韩照国, 任姣霞. 基于相对熵理论的多测度网络异常检测方法[J]. 计算机应用, 2010, 30(7): 1771-1774. [14] 穆祥昆, 王劲松, 薛羽丰, 黄玮. 基于活跃熵的网络异常流量检测方法[J]. 通信学报, 2013, 34(Z2): 51-57. [15] 陈建辉. 认证协议抵御DoS攻击研究及协议改进安全方案的实现 [D]. 南京: 南京航空航天大学, 2007. [16] 陈灿峰. 低功耗蓝牙技术原理与应用 [M]. 北京: 北京航空航天大学出版社, 2013. |