[1] 陈灿峰. 低功耗蓝牙技术原理与应用 [M]. 北京: 北京航空航天大学出版社, 2013. [2] Bluetooth Special Interest Group.Bluetooth SIG Specification of the Bluetooth system: core package version 4.0 [EB/OL]. (2009-07-28) [2015-04-20]. http://www.bluetooth.org. 2009. [3] 魏德龄. 蓝牙4.2欲让物联网成真, 低功耗成核心优势 [EB/OL]. (2015-01-23) [2015-04-21]. http://www.cctime.com/index.asp. 2015. [4] Heiner Perrey, Osman Ugus, Dirk Westhoff.Security enhancement for bluetooth low energy with Merkle's puzzle[C]// Proceedings of Mobile Computing and Communications Review. New York: ACM, 2011: 45-46. [5] Iman Almomani, Mohammed Al-Saruri, Mousa Tawfiq AL-Akhras. Secure public key exchange against man-in-the-middle attack during secure simple pairing (SSP) in Bluetooth4.0[J]. World Applied Sciences Journal (S1818-4952), 2011, 13(4): 769-780. [6] Keijo Haataja, Pekka Toivanen.Two practical man-in-the-middle attacks on Bluetooth secure simple pairing and countermeasures[J]. IEEE Transactions on Wireless Communications (S1536-1276), 2010, 9(1): 384-392. [7] Andrew Y Lindell.Attacks on the pairing protocol of Bluetooth v2.1[M]. Las Vegas, Nevada, USA: Black Hat, 2008. [8] Jani Suomalainen, Jukka Valkonen, N Asokan. Security associations in personal networks: A comparative analysis[C]// 4th European Workshop, ESAS 2007, Cambridge, UK, Finland: NOKIA Research Center, 2007: 1-18. [9] Bin Yu, Haiyan Li.Research and Design of one Key Agreement Scheme in Bluetooth[C]// Computer Science and Software Engineering, 2008 International Conference on. Wuhan: IEEE, 2008: 665-668. [10] Diallo, Al-Khateeb, Wajdi Fawzi, et al. A Secure Authentication Scheme for Bluetooth Connection[C]// Computer and Communication Engineering (ICCCE). Kuala Lumpur: IEEE, 2014: 60-63. [11] 施荣华, 翁丽萍, 王国才. 基于单向哈希链的网络密钥协商协议[J]. 湖南大学学报(自然科学版), 2011, 38(3): 77-81. [12] 张小彬, 韩继红, 王亚弟, 等. 基于分簇的Ad Hoc网络密钥协商协议[J]. 计算机工程, 2010, 36(1): 170-173. |