메뉴 건너뛰기




Volumn 7, Issue 4, 2014, Pages 759-773

Distributed access control with adaptive privacy preserving property for wireless sensor networks

Author keywords

Distributed access control; Privacy; Proxy signature; Signcryption; Wireless sensor networks

Indexed keywords

ADAPTIVE CONTROL SYSTEMS; AUTHENTICATION; BEHAVIORAL RESEARCH; CRYPTOGRAPHY; DATA PRIVACY; ENERGY UTILIZATION;

EID: 84896506672     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.777     Document Type: Article
Times cited : (34)

References (35)
  • 3
    • 33746373934 scopus 로고    scopus 로고
    • A novel privacy preserving authentication and access control scheme for pervasive computing environment
    • Ren K, Lou W, Kim K, Deng R. A novel privacy preserving authentication and access control scheme for pervasive computing environment. IEEE Transactions on Vehicular Technology 2006; 55(4): 1373-1384.
    • (2006) IEEE Transactions on Vehicular Technology , vol.55 , Issue.4 , pp. 1373-1384
    • Ren, K.1    Lou, W.2    Kim, K.3    Deng, R.4
  • 4
    • 48049100992 scopus 로고    scopus 로고
    • Query privacy in wireless sensor networks, Proceedings of IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), San Diego, California, USA
    • Carbunar B, Yu Y, Shi L, Pearce M, Vasudevan V. Query privacy in wireless sensor networks, Proceedings of IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), San Diego, California, USA, 2007; 203-212.
    • (2007) , pp. 203-212
    • Carbunar, B.1    Yu, Y.2    Shi, L.3    Pearce, M.4    Vasudevan, V.5
  • 5
    • 48649088209 scopus 로고    scopus 로고
    • A group signature based secure and privacy-preserving vehicular communication framework, Proceeding of the Mobile Networking for Vehicular Environment (MOVE) workshop in conjunction with IEEE INFOCOM, Anchorage, Alaska, USA
    • Guo JH, Baugh JP, Wang SQ. A group signature based secure and privacy-preserving vehicular communication framework, Proceeding of the Mobile Networking for Vehicular Environment (MOVE) workshop in conjunction with IEEE INFOCOM, Anchorage, Alaska, USA, 2007; 103-108.
    • (2007) , pp. 103-108
    • Guo, J.H.1    Baugh, J.P.2    Wang, S.Q.3
  • 6
    • 70349658629 scopus 로고    scopus 로고
    • 2AC: Distributed privacy preserving access control in sensor networks, Proceedings of IEEE International Conference on Computer Communications (INFOCOM), Rio de Janeiro, Brazil
    • 2AC: Distributed privacy preserving access control in sensor networks, Proceedings of IEEE International Conference on Computer Communications (INFOCOM), Rio de Janeiro, Brazil, 2009; 1251-1259.
    • (2009) , pp. 1251-1259
    • Zhang, R.1    Zhang, Y.2    Ren, K.3
  • 8
    • 63449122349 scopus 로고    scopus 로고
    • Digital signcryption or how to achieve cost (signature & encryption)≪cost (signature)+ cost (encryption), Advances in CRYPTO'97, Santa Barbara, California, USA
    • Zheng YL. Digital signcryption or how to achieve cost (signature & encryption)≪cost (signature)+ cost (encryption), Advances in CRYPTO'97, Santa Barbara, California, USA, 1997; 165-179.
    • (1997) , pp. 165-179
    • Zheng, Y.L.1
  • 9
    • 79960881762 scopus 로고    scopus 로고
    • Distributed privacy-preserving access control in a single-owner multi-user sensor network, IEEE International Conference on Computer Communications (INFOCOM) Mini-Conference, Shanghai, China
    • He DJ, Bu JJ, Zhu SC, Yin MJ, Gao Y, Wang HD, Chan S, Chen C. Distributed privacy-preserving access control in a single-owner multi-user sensor network, IEEE International Conference on Computer Communications (INFOCOM) Mini-Conference, Shanghai, China, 2011; 331-335.
    • (2011) , pp. 331-335
    • He, D.J.1    Bu, J.J.2    Zhu, S.C.3    Yin, M.J.4    Gao, Y.5    Wang, H.D.6    Chan, S.7    Chen, C.8
  • 10
  • 11
    • 33845458336 scopus 로고    scopus 로고
    • A dynamic user authentication scheme for wireless sensor networks, Proceedings of Sensor Networks, Ubiquitous, and Trustworthy Computing, Newport Beach, California, USA
    • Wong KHM, Zheng Y, Cao JN, Wang SW. A dynamic user authentication scheme for wireless sensor networks, Proceedings of Sensor Networks, Ubiquitous, and Trustworthy Computing, Newport Beach, California, USA, 2006; 244-251.
    • (2006) , pp. 244-251
    • Wong, K.H.M.1    Zheng, Y.2    Cao, J.N.3    Wang, S.W.4
  • 12
    • 39349093196 scopus 로고    scopus 로고
    • An improved dynamic user authentication scheme for wireless sensor networks, Proceedings of IEEE Global Telecommunications Conference (Globecom), Washington, DC, USA
    • Tseng HR, Jan RH, Yang W. An improved dynamic user authentication scheme for wireless sensor networks, Proceedings of IEEE Global Telecommunications Conference (Globecom), Washington, DC, USA, 2007; 986-990.
    • (2007) , pp. 986-990
    • Tseng, H.R.1    Jan, R.H.2    Yang, W.3
  • 13
    • 62949130774 scopus 로고    scopus 로고
    • Two-factor user authentication in wireless sensor networks
    • Das ML. Two-factor user authentication in wireless sensor networks. IEEE Transaction on Wireless Communication 2009; 8: 1086-1090.
    • (2009) IEEE Transaction on Wireless Communication , vol.8 , pp. 1086-1090
    • Das, M.L.1
  • 14
    • 77955495427 scopus 로고    scopus 로고
    • Cryptanalysis and security improvements of 'Two-factor user authentication in wireless sensor networks'
    • Khan MK, Alghathbar K. Cryptanalysis and security improvements of 'Two-factor user authentication in wireless sensor networks'. Sensors 2010; 10(3): 2450-2459.
    • (2010) Sensors , vol.10 , Issue.3 , pp. 2450-2459
    • Khan, M.K.1    Alghathbar, K.2
  • 15
    • 78650459565 scopus 로고    scopus 로고
    • An enhanced two-factor access control scheme in wireless sensor networks
    • He D, Gao Y, Chan S, Chen C, Bu J. An enhanced two-factor access control scheme in wireless sensor networks. Ad Hoc & Sensor Wireless Networks 2010; 10(4): 361-371.
    • (2010) Ad Hoc & Sensor Wireless Networks , vol.10 , Issue.4 , pp. 361-371
    • He, D.1    Gao, Y.2    Chan, S.3    Chen, C.4    Bu, J.5
  • 16
    • 63149087345 scopus 로고    scopus 로고
    • Efficient distributed security for wireless medical sensor networks, International Conference on Intelligent Sensors, Sensor Networks and Information Processing, Sydney, Australia
    • Morchon OG, Baldus H. Efficient distributed security for wireless medical sensor networks, International Conference on Intelligent Sensors, Sensor Networks and Information Processing, Sydney, Australia, 2008; 249-254.
    • (2008) , pp. 249-254
    • Morchon, O.G.1    Baldus, H.2
  • 17
    • 14844304757 scopus 로고    scopus 로고
    • Tinypk: securing sensor networks with public key technology, Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Nsetworks, Washington, DC, USA
    • Watro R, Kong D, Cuti SF, Gardiner C, Lynn C, Kruus P. Tinypk: securing sensor networks with public key technology, Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Nsetworks, Washington, DC, USA, 2004; 59-64.
    • (2004) , pp. 59-64
    • Watro, R.1    Kong, D.2    Cuti, S.F.3    Gardiner, C.4    Lynn, C.5    Kruus, P.6
  • 18
    • 20344381294 scopus 로고    scopus 로고
    • A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography, IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, Santa Clara, CA, USA
    • Malan D J, Welsh M, Smith Michael. A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography, IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, Santa Clara, CA, USA, 2004; 71-80.
    • (2004) , pp. 71-80
    • Malan, D.J.1    Welsh, M.2    Smith, M.3
  • 19
    • 34548302064 scopus 로고    scopus 로고
    • pDCS: security and privacy support for data-centric sensor networks, Proceedings of IEEE International Conference on Computer Communications (INFOCOM), Rio de Janeiro, Brazil
    • Shao M, Zhu S, Zhang W, Cao G. pDCS: security and privacy support for data-centric sensor networks, Proceedings of IEEE International Conference on Computer Communications (INFOCOM), Rio de Janeiro, Brazil, 2009; 1298-1306.
    • (2009) , pp. 1298-1306
    • Shao, M.1    Zhu, S.2    Zhang, W.3    Cao, G.4
  • 20
    • 77649094379 scopus 로고    scopus 로고
    • Data security and privacy in wireless body area networks
    • Li M, Lou W, Ren K. Data security and privacy in wireless body area networks. IEEE Wireless Communication 2010; 17(1): 51-58.
    • (2010) IEEE Wireless Communication , vol.17 , Issue.1 , pp. 51-58
    • Li, M.1    Lou, W.2    Ren, K.3
  • 21
  • 22
    • 84896506971 scopus 로고    scopus 로고
    • Realizing robust user authentication in sensor networks, Workshop on Real-World Wireless Sensor Networks, Sweden
    • Benenson Z, Gedicke N, Raivio O. Realizing robust user authentication in sensor networks, Workshop on Real-World Wireless Sensor Networks, Sweden, 2005; 135-142.
    • (2005) , pp. 135-142
    • Benenson, Z.1    Gedicke, N.2    Raivio, O.3
  • 23
    • 70349682512 scopus 로고    scopus 로고
    • FDAC: toward fine-grained distributed data access control in wireless sensor networks, Proceedings of IEEE International Conference on Computer Communications (INFOCOM), Rio de Janeiro, Brazil
    • Yu S, Ren K, Lou W. FDAC: toward fine-grained distributed data access control in wireless sensor networks, Proceedings of IEEE International Conference on Computer Communications (INFOCOM), Rio de Janeiro, Brazil, 2009; 963-971.
    • (2009) , pp. 963-971
    • Yu, S.1    Ren, K.2    Lou, W.3
  • 24
    • 84968503742 scopus 로고
    • Elliptic curve cryptosystems
    • Koblitz N. Elliptic curve cryptosystems. Mathematics of Computation 1987; 48(177): 203-209.
    • (1987) Mathematics of Computation , vol.48 , Issue.177 , pp. 203-209
    • Koblitz, N.1
  • 25
    • 51349100827 scopus 로고    scopus 로고
    • A security architecture achieving anonymity and traceability in wireless mesh networks, IEEE INFOCOM: The 27th Conference on Computer Communications, Phoenix, AZ, USA
    • Sun JY, Zhang C, Fang YG. A security architecture achieving anonymity and traceability in wireless mesh networks, IEEE INFOCOM: The 27th Conference on Computer Communications, Phoenix, AZ, USA, 2008; 1687-1695.
    • (2008) , pp. 1687-1695
    • Sun, J.Y.1    Zhang, C.2    Fang, Y.G.3
  • 26
    • 0010567510 scopus 로고    scopus 로고
    • Proxy signatures, revisited, International Conference on Information and Communication Security, Lecture Notes in Computer Science, Beijing, China
    • Kim S, Park S, Won D. Proxy signatures, revisited, International Conference on Information and Communication Security, Lecture Notes in Computer Science, Beijing, China, 1997; 223-232.
    • (1997) , pp. 223-232
    • Kim, S.1    Park, S.2    Won, D.3
  • 27
    • 33947512019 scopus 로고    scopus 로고
    • Formal proofs for the security of signcryption
    • Baek J, Steinfeld R, Zheng Y. Formal proofs for the security of signcryption. Journal of Cryptology 2007; 20: 203-235.
    • (2007) Journal of Cryptology , vol.20 , pp. 203-235
    • Baek, J.1    Steinfeld, R.2    Zheng, Y.3
  • 28
    • 35048854673 scopus 로고    scopus 로고
    • Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity, International Conference on Information and Communication Security, ICISC 2003, LNCS, Vol. 2971, Seoul, Korea
    • Chow SSM, Yiu SM, Hui LCK, Chow KP. Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity, International Conference on Information and Communication Security, ICISC 2003, LNCS, Vol. 2971, Seoul, Korea, 2004; 352-369.
    • (2004) , pp. 352-369
    • Chow, S.S.M.1    Yiu, S.M.2    Hui, L.C.K.3    Chow, K.P.4
  • 29
    • 33646820668 scopus 로고    scopus 로고
    • Efficient and provably-secure identity-based signatures and signcryption from bilinear maps
    • Barreto P, Libert B, McCullagh N, Quisquater J. Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. Advances in Cryptology 2005; 3788: 515-532.
    • (2005) Advances in Cryptology , vol.3788 , pp. 515-532
    • Barreto, P.1    Libert, B.2    McCullagh, N.3    Quisquater, J.4
  • 30
    • 84958960201 scopus 로고    scopus 로고
    • A practical implementation of elliptic curve cryptosystems over gf(p) on a 16-bit microcomputer, Public Key Cryptography, Pacifico Yokohama, Japan
    • Hasegawa T, Nakajima J, Matsui M. A practical implementation of elliptic curve cryptosystems over gf(p) on a 16-bit microcomputer, Public Key Cryptography, Pacifico Yokohama, Japan, 1998; 182-194.
    • (1998) , pp. 182-194
    • Hasegawa, T.1    Nakajima, J.2    Matsui, M.3
  • 31
    • 25144467465 scopus 로고    scopus 로고
    • An efficient signcryption scheme with forward secrecy based on elliptic curve
    • Hwang RJ, Lai CH, Su FF. An efficient signcryption scheme with forward secrecy based on elliptic curve. Applied Mathematics and Computation 2004; 167(2005): 870-881.
    • (2004) Applied Mathematics and Computation , vol.167 , Issue.2005 , pp. 870-881
    • Hwang, R.J.1    Lai, C.H.2    Su, F.F.3
  • 32
    • 35048859269 scopus 로고    scopus 로고
    • Efficient signcryption with key privacy from gap Diffie-Hellman groups, PKC
    • Libert B, Quisquater JJ. Efficient signcryption with key privacy from gap Diffie-Hellman groups, PKC, 2004; 187-200.
    • (2004) , pp. 187-200
    • Libert, B.1    Quisquater, J.J.2
  • 33
    • 33750062561 scopus 로고    scopus 로고
    • ECGSC: elliptic curve based generalized signcryption, Ubiquitous Intelligence and Computing, Wuhan, China
    • Han YL, Yang XY, Wei P. ECGSC: elliptic curve based generalized signcryption, Ubiquitous Intelligence and Computing, Wuhan, China, 2006; 956-965.
    • (2006) , pp. 956-965
    • Han, Y.L.1    Yang, X.Y.2    Wei, P.3
  • 34
    • 78650492723 scopus 로고    scopus 로고
    • Secure and efficient generalized signcryption scheme based on a short ECDSA, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Darmstadt, Germany
    • Zhang CR, Chi L, Zhang YQ. Secure and efficient generalized signcryption scheme based on a short ECDSA, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Darmstadt, Germany, 2010; 466-469.
    • (2010) , pp. 466-469
    • Zhang, C.R.1    Chi, L.2    Zhang, Y.Q.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.