2Al-Turjman F M,Al-Fagih A E,Alsalih W M,et al.A delay-tolerant framework for integrated RSNs in Io T[J].Computer Communications,2013,36:998-1010.
3Ruzzelli A G,Jurdak R,O’Hare G M P.On the RFID wake-up impulse for multi-hop sensor network[C]//Proc of 1st ACM Work-shop on Convergence of RFID and Wireless Sensor Networks and Their Applications(Sense ID),2007.
4Mason A,Shaw A.Asset tracking:beyond RFID[C]//7th Annual PG Symposium on the Convergence of Telecommunications,Networking and Broadcasting,2006:267-272.
5Wang Xiaoliang,Sun Xingming,Yang Hengfu.An anonymity and authentication mechanism for internet of things[J].Convergence Information Technology,2011,6(3):98-105.
6Kate A,Zaverucha G,Hengartner U.Anonymous and security in delay tolerant networks[C]//Proceedings of Security and Privacy in Communications Networks and the Workshops,2007:504-513.
7Batina L,Lee Y,Seys S,et al.Extending ecc-based rfid authentication protocols to privacy-preserving multi-party grouping proofs[J].Personal and Ubiquitous Computing,2012,16(3):323-335.
8Dimitriou T.A lightweight rfid protocol to protect against traceability and cloning attacks[C]//First International Conference on Security and Privacy for Emerging Areas in Communications Networks,Secure Comm 2005,2005:59-66.
9Tsudik G.A family of dunces:trivial rfid identification and authentication protocols[C]//Proceedings of the 7th International Conference on Privacy Enhancing Technologies,PET’07,2007:45-61.