1. FM Amine, LA Maglaras, J Helge, et al (2017). Authentication Protocols for Internet of Things: A Comprehensive Survey[J]. Security and Communication Networks, 1--41.
2. W Zhou, Y Jia, AN Peng, YQ Zhang, P Liu (2019). The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved[J]. IEEE Internet of Things Journal, 6(2): 1606--1616.
3. A Manos, A Tim, B Michael (2017). Understanding the Mirai Botnet[C]. 26th USENIX Security Symposium, 1093--1110.
4. R Joshitta, L Arockiam. Authentication in IoT Environment: A Survey. International Journal of Advanced Research in Computer Science and Software Engineering, 2016, 6(10): 140--145.
5. D Alrababah, E Alshammari, A Alsuht. A Survey: Authentication Protocols for Wireless Sensor Network in the Internet of Things; Keys and Attacks[C]. The International Conference on new Trends in Computing Sciences (ICTCS'2017), 2017: 270--276.