[1]SEIP G. The future of the EIB system[J]. EIB Proceedings, 2000, 35(3):9-13.[2]TREYTL A, SAUTER T, SCHWAIGER C. Security measures for industrial fieldbus systems-state of the art and solutions for IP-based approaches[C]// Proceedings of the 5th IEEE International Workshop on Factory Communication Systems. Piscataway: IEEE, 2004: 201-209.[3]SALVATORE C, GIOVANNI C. Implementing encryption and authentication in KNX using Diffie-Hellman and AES algorithms[C]// Proceedings of the 35th IEEE Annual Conference on Industrial Electronics. New York: IEEE, 2009: 2459-2464.[4]KNX Association. The overview over the KNXnet/IP specifications[S], 2009. [5]GRANZER W,LECHNER D,PRAUS F,et al. Securing IP backbones in building automation networks[C]// Proceedings of the 7th IEEE International Conference on Industrial Informatics. New York: IEEE, 2009: 410-415.[6]GRANZER W, REINISCH C, KASTNER W. Key set management in networked building automation systems using multiple key servers[C]// Proceedings of the 7th IEEE International Workshop on Factory Communication Systems. New York: IEEE, 2008: 205-214.[7]KENT S, SEO K. RFC 4301, Security Architecture for the Internet Protocol [S], 2005.[8]HARKINS D, CARREL D. RFC 2409, The Internet Key Exchange (IKE) [S], 1998.[9]DIERKS T, RESCORLA E. RFC 5246, The Transport Layer Security (TLS) protocol version 1.2 [S], 2008.[10]HANKERSON D, VANSTONE S, MENEZES A. Guide to elliptic curve cryptography [M].Berlin: Springer, 2004.[11]CILARDO A, COPPOLINO L, MAZZOCCA N, ROMANO L. Elliptic curve cryptography engineering[J]. Proceedings of the IEEE, 2006,94(2): 395-406.[12]SIEMENS. Technical Data EIB-TP-UART-IC[R], 2001.