|
參考文獻
[1] 劉雲浩 , 物联网导论, 北京: 科學出版社
[2] Luigi Atzori, Antonio Iera, Giacomo Morabito, Computer Networks,
[3] Waldner, Jean-Baptiste, Nanocomputers and Swarm Intelligence.
[4] Miles, Stephen B. , RFID Technology and Applications. London:
Cambridge University Press, 2011
[5] Philippe GAUTIER,RFID et acquisition de données évènementielles :
retours d&;#39;expérience chez Bénédicta , 2007/12.
[6] 棠棣,《ITU 互联网报告 2005:物联网》之一,2009/12/ 20。
(http://www.arduino.cc/en/Main/ReleaseNotes)
[8] Powen Ko, Arduino 硬體介紹, 2015/5/11。
(http://www.powenko.com/wordpress/?p=4167&;arubalp=667e9c44-ea1
[9] Jackal Chen ,Intel IoT Solution: Edison 簡易測試 &; 執行範例程式,
(http://thinkingiot.blogspot.tw/2015/04/intel-iot-solution-edison_10.ht
[10] CmoreCloud 會員服務條款服務說明
(https://paas.cmoremap.com.tw/agree.html)
[11] Cmoremap,關於我們 (http://www.cmoremap.com.tw/)
[12]藍牙聯盟官方網站(https://www.bluetooth.org/en-us)
[13] Tech_Direct ,藍牙 4.0 低功耗技術 前景看好還是威脅重重,
(http://www.technical-direct.com/2010-11/%E8%97%8D%E7%89%99
57
4-0%E4%BD%8E%E5%8A%9F%E8%80%97%E6%8A%80%E8%A1
%93-%E5%89%8D%E6%99%AF%E7%9C%8B%E5%A5%BD%E9%
82%84%E6%98%AF%E5%A8%81%E8%84%85%E9%87%8D%E9%
[14]臺灣電腦網路危機處理暨協調中心 (TWCERT/CC),
[15]John R. Douceur ,The Sybil Attack
[16]James Newsome Carnegie Mellon University , Elaine Shi Carnegie
Mellon University , Dawn Song Carnegie Mellon University, Adrian
Perrig Carnegie Mellon University,The Sybil Attack in Sensor
Networks: Analysis &; Defenses, 2004
[17] 惠汝生,無線 Ad Hoc 行動隨意網路架構之技術發展評析,中華民國
[18] Josh Broch ,David A. Maltz, David B. Johnson, Yih-Chun Hu, Jorjeta
Jetcheva,A Performance Comparison of Multi-Hop Wireless Ad Hoc
[19] David B. Johnson, David A. Maltz, Josh Broch,DSR: The Dynamic
Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks
[20] 涂瑋君,一個有效率之基於樹狀結構的動態可自我修復藍牙散網
[21] 舒文瓊,M2M:無聯網風生水起
|