参考文献
[1]姜智文,周熙,佘阳,等.IEEE 802.15.4 MAC协议研究现状[J].无线电通信技术,2013,39(5):11-14.
[2]Khanafer M,Guennoun M and Mouftah H T.A Survey of Beacon-Enabled IEEE 802.15.4 MAC Protocols in Wireless Sensor Networks[J].IEEE Communications Surveys&Tutorials,2014,16(2):856-876.
[3]Sastry N,Wagner D.Security Considerations for IEEE 802.15.4 Networks[C]//ACM Workshop on Wireless Security.ACM,2004.
[4]Sajjad S M,Yousaf M.Security Analysis of IEEE 802.15.4 MAC in The Context of Internet of Things(Io T)[C]//Information Assurance and Cyber Security(CIACS).IEEE,2014.
[5]Shourbaji I A.An Overview of Wireless Local Area Network(WLAN)[J/OL].Computer Science,2013.https://doi.org/10.48550/ar Xiv.1303.1882.
[6]文生印.WLAN系统中身份认证的研究[D].南京:南京邮电大学,2015.
[7]蔡孟儒.无线局域网络安全接入技术研究与应用[D].杭州:杭州电子科技大学,2015.
[8]Kohlios C P,Hayajneh T.A Comprehensive Attack Flow Model and Security Analysis for Wi-Fi and WPA3[J].Electronics,2018,7(11),284.
[9]Jing Q,Vasilakos A V,Wan J,et al.Security of The Internet of Things:perspectives and challenges[J].Wireless Networks,2014,20(8),2481-2501.
[10]Peng H.WIFI Network Information Security Analysis Research[C]//International Conference on Consumer Electronics,Communications and Networks(CECNet).IEEE,2012.
[11]Seddigh N,Nandy B,Makkar R,et al.Security Advances and Challenges in 4G Wireless Networks[C]//International Conference on Privacy,Security and Trust.IEEE,2010.
[12]Ahmad I,Shahabuddin S,Kumar T,et al.Security for 5G and Beyond[J].Communications Surveys&Tutorials,2019,21(4),3682-3722.
[13]于晓冉,李永思.物联网网络层安全[J].无线互联科技,2013(5):22.