参考文献
[1]Atzori L, Iera A, Morabito G.The Internet of Things:A survey.Computer Networks,2010,54(15):2787~2805.
[2]Broll G, Paolucci M, Wagner M, et al..Perci-Pervasive Service Interaction with theInternet of Things.IEEE Internet Computing,2009,13(6):74~81.
[3]Forrester Advises.Forget 3G—Only“Invisible Mobile”Will Reignite Mobile Telecom,http://www.forrester.com/ER/Press/Release/0,1769,729,FF.html.
[4]Sarma S.A History of the EPC, RFID:Applications, Security, and Privacy, S.Garfinkeland B.Rosedberg, eds, Addison-Wesley,2005:37~55.
[5]Thiesse F, Floerkemeier C, Harrison M, et al..Technology, Standards, and Real-WorldDeployments of the EPC Network, IEEE Internet Computing,2009,13(2):36~43.
[6]Auto-Id Labs:http://www.autoidlabs.org/.
[7]Kevin Ashton.That“Internet of Things”Thing.In:RFID Journal,22 July 2009.
[8]International Telecommunication Union.ITU Internet Reports 2005:Internet ofThings.http://www.itu.int/dms_pub/itu-s/opb/pol/S-POL-IR.IT-2005-SUM-PDF-E.pdf.
[9]Kortuem G, Kawsar F, Fitton D, et al..Smart objects as building blocks for the Internetof things.IEEE Internet Computing,2010,14(1):44~51.
[10]Internet of Things in 2020:http://www.iot-visitthefuture.eu/fileadmin/documents/researchforeurope/270808_IoT_in_2020_Workshop_Report_V1-1.pdf.
[11]Vermesan O, Friess P, et al..Internet of Things Strategic Research Roadmap.http://www.internet-of-things-research.eu/pdf/IoT_Cluster_Strategic_Research_Agenda_2011.pdf.
[12]Stockman H.Communication by Means of Reflected Power.Proceedings of the IRE,October 1948:1196~1204.
[13]Welbourne E, Battle L, Cole G, et al..Building the Internet of Things Using RFID—The RFID Ecosystem Experience.IEEE Internet Computing,2009,13(3):48~55.
[14]Michael K, Roussos G, Huang G, et al..Planetary-Scale RFID Services in an Age ofUberveillance.Proceedings of the IEEE, September 2010,98(9):1663~1671.
[15]http://www.ibm.com/ibm/ideasfromibm/us/smartplanet/20081106/sjp_speech.shtml.
[16]http://www.gov.cn/ldhd/2009-11/23/content_1471208.htm.
[17]http://www.gov.cn/zwgk/2012-02/14/content_2065999.htm.
[18]http://www.iotexpo.org/.
[19]http://tech.sina.com.cn/z/kdwlwlt2012/.
[20]http://www.gov.cn/2010lh/content_1555767.htm.
[21]tinyOS:http://www.tinyos.net/.
[22]Contiki:http://www.contiki.com/.
[23]Hui J, Culler D, Chakrabarti S.6LoWPAN:Incorporating IEEE 802.15.4 Into theIP Architecture-Internet Protocol for Smart Objects(IPSO)Alliance, White Paper#3,January 2000.
[24]IEEE 802.15.4:http://www.ieee802.org/15/pub/TG4.html.
[25]6LoWPAN:http://www.ietf.org/html.charters/6lowpan-charter.html.
[26]Kushalnagar N, Montenegro G, Schumacher C.IPv6 over Low-Power Wireless PersonalArea Networks(6LoWPANs):Overview, Assumptions, Problem Statement, and Goals, IETF RFC 4919,2007.
[27]Montenegro G, Kushalnagar N, Hui J.et al..Transmission of IPv6 Packets over IEEE802.15.4 Networks, IETF RFC 4944,2007.
[28]Hui J, Culler D.Extending IP to Low-Power, Wireless Personal Area Networks.IEEEInternet Computing,2008,12(4):37~45.
[29]ROLL:https://datatracker.ietf.org/wg/roll/charter/.
[30]Vasseur J, Kim E, Pister K, et al..Routing Metrics used for Path Calculation in LowPower and Lossy Networks draft-ietf-roll-routing-metrics-19.http://tools.ietf.org/html/draft-ietf-roll-routing-metrics-19,2011.
[31]Winter T, Thubert T, Brandt A, et al..RPL:IPv6 Routing Protocol for Low power andLossy Networks.IETF RFC 6550.http://tools.ietf.org/html/rfc6550,2012.
[32]CoRE:https://datatracker.ietf.org/wg/core/charter/.
[33]Shelby Z, Hartke K, Bormann C.Constrained Application Protocol(CoAP).draft-ietf-core-coap-08.https://datatracker.ietf.org/doc/draft-ietf-core-coap/,2011.
[34]Lwip:http://www.ietf.org/mail-archive/web/lwip/current/msg00073.html.
[35]Chen W.Implementation Techniques of the Lightweight TCP/IP Stack, draft-chen-lwip-implementation-01.http://tools.ietf.org/html/draft-chen-lwip-implementation-01,2010.11.
[36]IEEE 802.15.1:http://www.ieee802.org/15/pub/TG1.html.
[37]IEEE 802.15.2:http://www.ieee802.org/15/pub/TG2.html.
[38]IEEE 802.15.3:http://www.ieee802.org/15/pub/TG3.html.
[39]Daemen J, Borg S, Rijmen V.The Design of Rijndael:AES-The Advanced EncryptionStandard.Springer-Verlag,2002.
[40]ZigBee:http://www.zigbee.org/.
[41]Hui J, Culler D.IP is Dead, Long Live IP for Wireless Sensor Networks.SenSys'08,November 2008.
[42]Hui J, Culler D.Culler.IPv6 in Low-Power Wireless Networks.In Proceedings of theIEEE, November 2010,98(11):1865~1878.
[43]Bult K, Burstein A, Chang D, et al..W.J.Kaiser, et al.Low Power Systems forWireless Microsensors.In Proceedings of IEEE ISLPED,1996.
[44]Perkins C, Belding-Royer E, Das S.Ad hoc On-Demand Distance Vector(AODV)Routing.IETF RFC 3561.2010-06-18.
[45]Brandt A, Buron J, Porcu G.Home Automation Routing Requirements in Low-Powerand Lossy Networks.IETF RFC5826.http://tools.ietf.org/html/rfc5826,April 2010.
[46]Pister K, Thubert P, Dwars S, et al..Industrial Routing Requirements in Low-Power andLossy Networks.IETF RFC 5673.http://tools.ietf.org/html/rfc5673,October 2009.
[47]Dohler M, Watteyne T, Winter T, et al..Routing Requirements for Urban Low-Powerand Lossy Networks.IETF RFC5548.http://tools.ietf.org/html/rfc5548,May 2009.
[48]Martocci J, Pieter De Mil, Vermeylen W, et al..Building Automation RoutingRequirements in Low Power and Lossy Networks.IETF RFC 5867.http://tools.ietf.org/html/rfc5867,June 2010.
[49]Levis P, Tavakoli A, Dawson-Haggerty S.Overview of Existing Routing Protocols forLow Power and Lossy Networks.draft-ietf-roll-protocols-survey-07.http://tools.ietf.org/html/draft-ietf-roll-protocols-survey-07,2009.
[50]Vasseur J, Kim E, Pister K, et al..Routing Metrics used for Path Calculation in LowPower and Lossy Networks.draft-ietf-roll-routing-metrics-19.http://tools.ietf.org/html/draft-ietf-roll-routing-metrics-19,2011.
[51]Douglas S, De Couto, et al..A High-Throughput Path Metric for Multi-Hop WirelessRouting, MobiCom'03,September,2003.
[52]uC/IP:http://ucip.sourceforge.net/.
[53]TinyTCP:http://www.unusualresearch.com/tinytcp/tinytcp.htm.
[54]LwIP:http://savannah.nongnu.org/projects/lwip/.
[55]uIP:http://www.sics.se/~adam/uip/index.php/Main_Page.
[56]Liu C, Kaiser J.A Survey of Mobile Ad Hoc network Routing Protocols.University ofUlm Tech.Report Series,2003.