메뉴 건너뛰기




Volumn 8, Issue 4, 2014, Pages 1617-1624

An efficient authentication and access control scheme for perception layer of internet of things

Author keywords

Attribute based access control; Elliptic curve cryptography; Internet of things; Mutual authentication

Indexed keywords


EID: 84894059526     PISSN: 19350090     EISSN: 23250399     Source Type: Journal    
DOI: 10.12785/amis/080416     Document Type: Article
Times cited : (193)

References (21)
  • 3
    • 74949143896 scopus 로고    scopus 로고
    • Internet of Things-New security and privacy challenges
    • R. H. Weber. Internet of Things-New security and privacy challenges. Computer Law and Security Review, 26, 23-30 (2010).
    • (2010) Computer Law and Security Review , vol.26 , pp. 23-30
    • Weber, R.H.1
  • 6
    • 79953065589 scopus 로고    scopus 로고
    • An efficient mutual authentication and access control scheme for wireless sensor networks in healthcare
    • X. H. Le,M. Khalid, R. Sankar, et al. An efficient mutual authentication and access control scheme for wireless sensor networks in healthcare. Journal of Networks, 6, 355-364 (2011).
    • (2011) Journal of Networks , vol.6 , pp. 355-364
    • Le, X.H.1    Khalid, M.2    Sankar, R.3
  • 9
    • 0142103313 scopus 로고    scopus 로고
    • Security and privacy in sensor networks
    • H. Chan,A. Perrig. Security and privacy in sensor networks. Computer, 36, 103-105 (2003).
    • (2003) Computer , vol.36 , pp. 103-105
    • Chan, H.1    Perrig, A.2
  • 10
    • 39349093196 scopus 로고    scopus 로고
    • An improved dynamic user authentication scheme for wireless sensor networks
    • Global Telecommunications, Washington, DC
    • H. R. Tseng, R. H. Jan,W. Yang. An improved dynamic user authentication scheme for wireless sensor networks. In Proc. IEEE Conf. Global Telecommunications, Washington, DC, 986-990 (2007).
    • (2007) In Proc. IEEE Conf , pp. 986-990
    • Tseng, H.R.1    Jan, R.H.2    Yang, W.3
  • 12
    • 79957702363 scopus 로고    scopus 로고
    • A secured authentication protocol for wireless sensor networks using Elliptic Curves Cryptography
    • H. L. Yeh, T. H. Chen, P. C. Liu, et al. A secured authentication protocol for wireless sensor networks using Elliptic Curves Cryptography, Sensors, 11, 4767-4779 (2011).
    • (2011) Sensors , vol.11 , pp. 4767-4779
    • Yeh, H.L.1    Chen, T.H.2    Liu, P.C.3
  • 13
    • 55849115257 scopus 로고    scopus 로고
    • A novel access control protocol for secure sensor networks
    • H. F. Huang. A novel access control protocol for secure sensor networks. Computer Standards and Interfaces, 31, 272-276 (2009).
    • (2009) Computer Standards and Interfaces , vol.31 , pp. 272-276
    • Huang, H.F.1
  • 14
    • 77955351360 scopus 로고    scopus 로고
    • An attribute and role based access control model for service-oriented environment
    • Xuzhou, Chinese
    • Y. Wei, C. Shi, W. Shao. An attribute and role based access control model for service-oriented environment. In Proc. IEEE Conf. Control and Decision (CCDC), Xuzhou, Chinese, 4451-4455 (2010).
    • (2010) In Proc. IEEE Conf. Control and Decision (CCDC) , pp. 4451-4455
    • Wei, Y.1    Shi, C.2    Shao, W.3
  • 15
    • 84858193897 scopus 로고    scopus 로고
    • The privacy-aware access control system using attribute-and role-based access control in private cloud
    • Shenzhen
    • E. Mon, T. T. Naing. The privacy-aware access control system using attribute-and role-based access control in private cloud. In Proc. IEEE Int. Conf. Broadband Network and Multimedia Technology, Shenzhen, 447-451 (2011).
    • (2011) In Proc. IEEE Int. Conf. Broadband Network and Multimedia Technology , pp. 447-451
    • Mon, E.1    Naing, T.T.2
  • 17
    • 78650436845 scopus 로고    scopus 로고
    • An extended role based access control model for the Internet of Things
    • G. Zhang, J. Tian. An extended role based access control model for the Internet of Things. In Proc. ICINA, Kunming, V1-319 (2010).
    • (2010) In Proc. ICINA, Kunming
    • Zhang, G.1    Tian, J.2
  • 18
    • 84894025341 scopus 로고    scopus 로고
    • An Authorization Management Approach in the Internet of Things
    • Q. Han, J. Li. An Authorization Management Approach in the Internet of Things, (2012).
    • (2012)
    • Han, Q.1    Li, J.2
  • 19
    • 84873426135 scopus 로고    scopus 로고
    • Identity establishment and capability based access control (IECAC) scheme for Internet of Things
    • P. N. Mahalle, B. Anggorojati, N. R. Prasad, et al. Identity establishment and capability based access control (IECAC) scheme for Internet of Things. In Proc.15th Int. WPMC, Taipei, 187-191 (2012).
    • (2012) In Proc.15th Int. WPMC, Taipei , pp. 187-191
    • Mahalle, P.N.1    Anggorojati, B.2    Prasad, N.R.3
  • 20
    • 77954732460 scopus 로고    scopus 로고
    • On the security of an enhanced novel access control protocol for wireless sensor networks
    • P. Zeng, K. K. R. Choo, D. Z. Sun. On the security of an enhanced novel access control protocol for wireless sensor networks. IEEE Transactions on Consumer Electronics, 56, 566-569 (2010).
    • (2010) IEEE Transactions on Consumer Electronics , vol.56 , pp. 566-569
    • Zeng, P.1    Choo, K.K.R.2    Sun, D.Z.3
  • 21
    • 79953104473 scopus 로고    scopus 로고
    • BABAC: An access control framework for network virtualization using user behaviors and attributes
    • Physical and Social Computing, Washington, DC, USA
    • Y. Che, Q. Yang, C. Wu, et al. BABAC: An access control framework for network virtualization using user behaviors and attributes. In Proc. IEEE/ACM Int. Conf. Green Computing and Communications and Int. Conf. Cyber, Physical and Social Computing, Washington, DC, USA, 747-754 (2010).
    • (2010) In Proc. IEEE/ACM Int. Conf. Green Computing and Communications and Int. Conf. Cyber , pp. 747-754
    • Che, Y.1    Yang, Q.2    Wu, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.