메뉴 건너뛰기




Volumn 76, Issue , 2017, Pages 285-292

Efficient certificateless access control for industrial Internet of Things

Author keywords

Certificateless cryptography; Industrial wireless sensor network; Internet of Things; Security; Signcryption

Indexed keywords

CRYPTOGRAPHY; ENERGY UTILIZATION; INTERNET OF THINGS; SENSOR NODES; WIRELESS SENSOR NETWORKS;

EID: 85009775076     PISSN: 0167739X     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.future.2016.12.036     Document Type: Article
Times cited : (53)

References (40)
  • 1
    • 84935865949 scopus 로고    scopus 로고
    • A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks
    • He, D., Kumar, N., Chilamkurti, N., A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Inform. Sci. 321 (2015), 263–277.
    • (2015) Inform. Sci. , vol.321 , pp. 263-277
    • He, D.1    Kumar, N.2    Chilamkurti, N.3
  • 2
    • 84938212949 scopus 로고    scopus 로고
    • Probabilistic receiver-location privacy protection in wireless sensor networks
    • Rios, R., Cuellar, J., Lopez, J., Probabilistic receiver-location privacy protection in wireless sensor networks. Inform. Sci. 321 (2015), 205–223.
    • (2015) Inform. Sci. , vol.321 , pp. 205-223
    • Rios, R.1    Cuellar, J.2    Lopez, J.3
  • 3
    • 70349619163 scopus 로고    scopus 로고
    • Industrial wireless sensor networks: challenges, design principles, and technical approaches
    • Gungor, V.C., Hancke, G.P., Industrial wireless sensor networks: challenges, design principles, and technical approaches. IEEE Trans. Ind. Electron. 56:10 (2009), 4258–4265.
    • (2009) IEEE Trans. Ind. Electron. , vol.56 , Issue.10 , pp. 4258-4265
    • Gungor, V.C.1    Hancke, G.P.2
  • 4
    • 84891066296 scopus 로고    scopus 로고
    • R3E: reliable reactive routing enhancement for wireless sensor networks
    • Niu, J., Cheng, L., Gu, Y., Shu, L., Das, S.K., R3E: reliable reactive routing enhancement for wireless sensor networks. IEEE Trans. Ind. Inf. 10:1 (2014), 784–794.
    • (2014) IEEE Trans. Ind. Inf. , vol.10 , Issue.1 , pp. 784-794
    • Niu, J.1    Cheng, L.2    Gu, Y.3    Shu, L.4    Das, S.K.5
  • 5
    • 67649560482 scopus 로고    scopus 로고
    • Integrating wireless sensor networks and the Internet: A security analysis
    • Roman, R., Lopez, J., Integrating wireless sensor networks and the Internet: A security analysis. Internet Res. 19:2 (2009), 246–259.
    • (2009) Internet Res. , vol.19 , Issue.2 , pp. 246-259
    • Roman, R.1    Lopez, J.2
  • 6
    • 74549125519 scopus 로고    scopus 로고
    • An energy-efficient access control scheme forwireless sensor networks based on elliptic curve cryptography
    • Le, X.H., Lee, S., Butun, I., Khalid, M., Sankar, R., Kim, M., Han, M., Lee, Y.K., Lee, H., An energy-efficient access control scheme forwireless sensor networks based on elliptic curve cryptography. J. Commun. Netw. 11:6 (2009), 599–606.
    • (2009) J. Commun. Netw. , vol.11 , Issue.6 , pp. 599-606
    • Le, X.H.1    Lee, S.2    Butun, I.3    Khalid, M.4    Sankar, R.5    Kim, M.6    Han, M.7    Lee, Y.K.8    Lee, H.9
  • 7
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Rivest, R.L., Shamir, A., Adleman, L., A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21:2 (1978), 120–126.
    • (1978) Commun. ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 8
    • 80855130876 scopus 로고    scopus 로고
    • Distributed access control with privacy support in wireless sensor networks
    • He, D., Bu, J., Zhu, S., Chan, S., Chen, C., Distributed access control with privacy support in wireless sensor networks. IEEE Trans. Wireless Commun. 10:10 (2011), 3472–3481.
    • (2011) IEEE Trans. Wireless Commun. , vol.10 , Issue.10 , pp. 3472-3481
    • He, D.1    Bu, J.2    Zhu, S.3    Chan, S.4    Chen, C.5
  • 10
    • 84890338882 scopus 로고    scopus 로고
    • Linkable ring signature with unconditional anonymity
    • Liu, J.K., Au, M.H., Susilo, W., Zhou, J., Linkable ring signature with unconditional anonymity. IEEE Trans. Knowl. Data Eng. 26:1 (2014), 157–165.
    • (2014) IEEE Trans. Knowl. Data Eng. , vol.26 , Issue.1 , pp. 157-165
    • Liu, J.K.1    Au, M.H.2    Susilo, W.3    Zhou, J.4
  • 11
    • 79952071204 scopus 로고    scopus 로고
    • FDAC: toward fine-grained distributed data access control in wireless sensor networks
    • Yu, S., Ren, K., Lou, W., FDAC: toward fine-grained distributed data access control in wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 22:4 (2011), 673–686.
    • (2011) IEEE Trans. Parallel Distrib. Syst. , vol.22 , Issue.4 , pp. 673-686
    • Yu, S.1    Ren, K.2    Lou, W.3
  • 13
    • 79959506807 scopus 로고    scopus 로고
    • Fine-grained data access control for distributed sensor networks
    • Hur, J., Fine-grained data access control for distributed sensor networks. Wirel. Netw. 17:5 (2011), 1235–1249.
    • (2011) Wirel. Netw. , vol.17 , Issue.5 , pp. 1235-1249
    • Hur, J.1
  • 14
    • 84863522640 scopus 로고    scopus 로고
    • Distributed privacy-preserving access control in sensor networks
    • Zhang, R., Zhang, Y., Ren, K., Distributed privacy-preserving access control in sensor networks. IEEE Trans. Parallel Distrib. Syst. 23:8 (2012), 1427–1438.
    • (2012) IEEE Trans. Parallel Distrib. Syst. , vol.23 , Issue.8 , pp. 1427-1438
    • Zhang, R.1    Zhang, Y.2    Ren, K.3
  • 15
    • 84878920667 scopus 로고    scopus 로고
    • Enabling end-to-end secure communication between wireless sensor networks and the Internet
    • Yu, H., He, J., Zhang, T., Xiao, P., Zhang, Y., Enabling end-to-end secure communication between wireless sensor networks and the Internet. World Wide Web 16:4 (2013), 515–540.
    • (2013) World Wide Web , vol.16 , Issue.4 , pp. 515-540
    • Yu, H.1    He, J.2    Zhang, T.3    Xiao, P.4    Zhang, Y.5
  • 16
    • 63449122349 scopus 로고    scopus 로고
    • Digital signcryption or how to achieve cost (signature & encryption) ≪ cost (signature) + cost(encryption)
    • Springer-Verlag
    • Zheng, Y., Digital signcryption or how to achieve cost (signature & encryption) ≪ cost (signature) + cost(encryption). Proc. Advances in Cryptology-CRYPTO'97 LNCS, vol. 1294, 1997, Springer-Verlag, 165–179.
    • (1997) Proc. Advances in Cryptology-CRYPTO'97, LNCS , vol.1294 , pp. 165-179
    • Zheng, Y.1
  • 17
    • 84880570801 scopus 로고    scopus 로고
    • Efficient signcryption for heterogeneous systems
    • Li, F., Zhang, H., Takagi, T., Efficient signcryption for heterogeneous systems. IEEE Syst. J. 7:3 (2013), 420–429.
    • (2013) IEEE Syst. J. , vol.7 , Issue.3 , pp. 420-429
    • Li, F.1    Zhang, H.2    Takagi, T.3
  • 18
    • 84896506672 scopus 로고    scopus 로고
    • Distributed access control with adaptive privacy preserving property for wireless sensor networks
    • Ma, C., Xue, K., Hong, P., Distributed access control with adaptive privacy preserving property for wireless sensor networks. Secur. Commun. Netw. 7:4 (2014), 759–773.
    • (2014) Secur. Commun. Netw. , vol.7 , Issue.4 , pp. 759-773
    • Ma, C.1    Xue, K.2    Hong, P.3
  • 19
    • 0037623983 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • Boneh, D., Franklin, M., Identity-based encryption from the weil pairing. SIAM J. Comput. 32:3 (2003), 586–615.
    • (2003) SIAM J. Comput. , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 20
    • 36248988077 scopus 로고    scopus 로고
    • On broadcast authentication in wireless sensor networks
    • Ren, K., Lou, W., Zeng, K., Moran, P.J., On broadcast authentication in wireless sensor networks. IEEE Trans. Wireless Commun. 6:11 (2007), 4136–4144.
    • (2007) IEEE Trans. Wireless Commun. , vol.6 , Issue.11 , pp. 4136-4144
    • Ren, K.1    Lou, W.2    Zeng, K.3    Moran, P.J.4
  • 21
    • 84861445209 scopus 로고    scopus 로고
    • SDRP: a secure and distributed reprogramming protocol for wireless sensor networks
    • He, D., Chen, C., Chan, S., Bu, J., SDRP: a secure and distributed reprogramming protocol for wireless sensor networks. IEEE Trans. Ind. Electron. 59:11 (2012), 4155–4163.
    • (2012) IEEE Trans. Ind. Electron. , vol.59 , Issue.11 , pp. 4155-4163
    • He, D.1    Chen, C.2    Chan, S.3    Bu, J.4
  • 22
    • 84871070974 scopus 로고    scopus 로고
    • Practical identity-based signature for wireless sensor networks
    • Li, F., Zhong, D., Takagi, T., Practical identity-based signature for wireless sensor networks. IEEE Wirel. Commun. Lett. 1:6 (2012), 637–640.
    • (2012) IEEE Wirel. Commun. Lett. , vol.1 , Issue.6 , pp. 637-640
    • Li, F.1    Zhong, D.2    Takagi, T.3
  • 23
    • 84894526330 scopus 로고    scopus 로고
    • Secure and efficient data transmission for cluster-based wireless sensor networks
    • Lu, H., Li, J., Guizani, M., Secure and efficient data transmission for cluster-based wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 25:3 (2014), 750–761.
    • (2014) IEEE Trans. Parallel Distrib. Syst. , vol.25 , Issue.3 , pp. 750-761
    • Lu, H.1    Li, J.2    Guizani, M.3
  • 24
    • 84883394343 scopus 로고    scopus 로고
    • Practical secure communication for integrating wireless sensor networks into the Internet of things
    • Li, F., Xiong, P., Practical secure communication for integrating wireless sensor networks into the Internet of things. IEEE Sens. J. 13:10 (2013), 3677–3684.
    • (2013) IEEE Sens. J. , vol.13 , Issue.10 , pp. 3677-3684
    • Li, F.1    Xiong, P.2
  • 25
    • 84880413059 scopus 로고    scopus 로고
    • Enforcing security mechanisms in the IP-based Internet of things: An algorithmic overview
    • Cirani, S., Ferrari, G., Veltri, L., Enforcing security mechanisms in the IP-based Internet of things: An algorithmic overview. Algorithms 6:2 (2013), 197–226.
    • (2013) Algorithms , vol.6 , Issue.2 , pp. 197-226
    • Cirani, S.1    Ferrari, G.2    Veltri, L.3
  • 26
    • 84916934620 scopus 로고    scopus 로고
    • IoT-OAS: An OAuth-based authorization service architecture for secure services in IoT scenarios
    • Cirani, S., Picone, M., Gonizzi, P., Veltri, L., Ferrari, G., IoT-OAS: An OAuth-based authorization service architecture for secure services in IoT scenarios. IEEE Sens. J. 15:2 (2014), 1224–1234.
    • (2014) IEEE Sens. J. , vol.15 , Issue.2 , pp. 1224-1234
    • Cirani, S.1    Picone, M.2    Gonizzi, P.3    Veltri, L.4    Ferrari, G.5
  • 30
    • 12344258539 scopus 로고
    • Efficient signature generation by smart cards
    • Schnorr, C.P., Efficient signature generation by smart cards. J. Cryptol. 4:3 (1991), 161–174.
    • (1991) J. Cryptol. , vol.4 , Issue.3 , pp. 161-174
    • Schnorr, C.P.1
  • 31
    • 35048854673 scopus 로고    scopus 로고
    • Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity
    • Springer-Verlag
    • Chow, S.S.M., Yiu, S.M., Hui, L.C.K., Chow, K.P., Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity. Proc. Information Security and Cryptology-ICISC 2003 LNCS, vol. 2971, 2004, Springer-Verlag, 352–369.
    • (2004) Proc. Information Security and Cryptology-ICISC 2003, LNCS , vol.2971 , pp. 352-369
    • Chow, S.S.M.1    Yiu, S.M.2    Hui, L.C.K.3    Chow, K.P.4
  • 35
    • 0003753233 scopus 로고    scopus 로고
    • The Design of Rijndael: AES-the Advanced Encryption Standard
    • Springer
    • Daemen, J., Rijmen, V., The Design of Rijndael: AES-the Advanced Encryption Standard. 2002, Springer.
    • (2002)
    • Daemen, J.1    Rijmen, V.2
  • 36
    • 0142002511 scopus 로고    scopus 로고
    • The elliptic curve digital signature algorithm (ECDSA)
    • Johnson, D., Menezes, A., Vanstone, S., The elliptic curve digital signature algorithm (ECDSA). Int. J. Inf. Secur. 1:1 (2001), 36–63.
    • (2001) Int. J. Inf. Secur. , vol.1 , Issue.1 , pp. 36-63
    • Johnson, D.1    Menezes, A.2    Vanstone, S.3
  • 38
    • 84870065829 scopus 로고    scopus 로고
    • EIBAS: An efficient identity-based broadcast authentication scheme in wireless sensor networks
    • Shim, K.A., Lee, Y.R., Park, C.M., EIBAS: An efficient identity-based broadcast authentication scheme in wireless sensor networks. Ad Hoc Networks 11:1 (2013), 182–189.
    • (2013) Ad Hoc Networks , vol.11 , Issue.1 , pp. 182-189
    • Shim, K.A.1    Lee, Y.R.2    Park, C.M.3
  • 39
    • 39049094066 scopus 로고    scopus 로고
    • IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks
    • Cao, X., Kou, W., Dang, L., Zhao, B., IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks. Comput. Commun. 31:4 (2008), 659–667.
    • (2008) Comput. Commun. , vol.31 , Issue.4 , pp. 659-667
    • Cao, X.1    Kou, W.2    Dang, L.3    Zhao, B.4
  • 40
    • 84901244949 scopus 로고    scopus 로고
    • 2DRP: Secure implementations of distributed reprogramming protocol for wireless sensor networks
    • 2DRP: Secure implementations of distributed reprogramming protocol for wireless sensor networks. Ad Hoc Networks 19 (2014), 1–8.
    • (2014) Ad Hoc Networks , vol.19 , pp. 1-8
    • Shim, K.A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.