메뉴 건너뛰기




Volumn 5, Issue , 2017, Pages 4018-4027

LACS: A Lightweight Label-Based Access Control Scheme in IoT-Based 5G Caching Context

Author keywords

5G; access control; authentication; caching; fog node; Internet of things

Indexed keywords

5G MOBILE COMMUNICATION SYSTEMS; AUTHENTICATION; FOG; FOG COMPUTING; WIRELESS NETWORKS;

EID: 85019001570     PISSN: None     EISSN: 21693536     Source Type: Journal    
DOI: 10.1109/ACCESS.2017.2678510     Document Type: Article
Times cited : (52)

References (48)
  • 3
    • 84870983755 scopus 로고    scopus 로고
    • Generations of mobile wireless technology: A survey
    • M. R. Bhalla and A. V. Bhalla, "Generations of mobile wireless technology: A survey," Int. J. Comput. Appl., vol. 5, no. 4, pp. 26-32, 2010.
    • (2010) Int. J. Comput. Appl. , vol.5 , Issue.4 , pp. 26-32
    • Bhalla, M.R.1    Bhalla, A.V.2
  • 4
    • 84943739624 scopus 로고    scopus 로고
    • The tactile Internet IoT, 5G and cloud on steroids
    • Mar
    • M. Dohler, "The tactile Internet IoT, 5G and cloud on steroids," in Proc. IET Conf., Mar. 2015, pp. 1-16.
    • (2015) Proc. IET Conf , pp. 1-16
    • Dohler, M.1
  • 5
    • 85010619421 scopus 로고    scopus 로고
    • Performance modeling and optimization of -exible QoS-guaranteed multifunctional MAC for rural pro-table ubiquitous 5G IoT/M2M systems
    • Nov.
    • A. Loshkarev and A. Markhasin, "Performance modeling and optimization of -exible QoS-guaranteed multifunctional MAC for rural pro-table ubiquitous 5G IoT/M2M systems," presented at the Int. Conf. Inf. Sci. Commun. Technol., Nov. 2016, pp. 1-5.
    • (2016) The Int. Conf. Inf. Sci. Commun. Technol. , pp. 1-5
    • Loshkarev, A.1    Markhasin, A.2
  • 6
    • 84912039280 scopus 로고    scopus 로고
    • A cloud-storage RFID location tracking system
    • Jul
    • Y.-L. Lai and J. Cheng, "A cloud-storage RFID location tracking system," IEEE Trans. Magn., vol. 50, no. 7, Jul. 2014, Art. no. 3501004.
    • (2014) IEEE Trans. Magn. , vol.50 , Issue.7
    • Lai, Y.-L.1    Cheng, J.2
  • 7
    • 84953726416 scopus 로고    scopus 로고
    • Information centric networking in IoT scenarios: The case of a smart home
    • Jun
    • M. Amadeo, C. Campolo, A. Iera, and A. Molinaro, "Information centric networking in IoT scenarios: The case of a smart home," presented at the IEEE Int. Conf. Commun., Jun. 2015, pp. 648-653.
    • (2015) IEEE Int. Conf. Commun , pp. 648-653
    • Amadeo, M.1    Campolo, C.2    Iera, A.3    Molinaro, A.4
  • 8
    • 85192116965 scopus 로고    scopus 로고
    • Usable access control enabled by sensing enterprise architectures
    • M. Uriarte et al., "Usable access control enabled by sensing enterprise architectures," in Proc. 6th Workshop Enterprise Interoperability, 2015, pp. 1-10.
    • (2015) Proc. 6th Workshop Enterprise Interoperability , pp. 1-10
    • Uriarte, M.1
  • 9
    • 84919372488 scopus 로고    scopus 로고
    • Security, privacy and trust in internet of things: The road ahead
    • Jan
    • S. Sicari, A. Rizzardi, L. A. Grieco, and A. Coen-Porisini, "Security, privacy and trust in Internet of Things: The road ahead," Comput. Netw., vol. 76, pp. 146-164, Jan. 2015.
    • (2015) Comput. Netw. , vol.76 , pp. 146-164
    • Sicari, S.1    Rizzardi, A.2    Grieco, L.A.3    Coen-Porisini, A.4
  • 10
    • 84923927975 scopus 로고    scopus 로고
    • Attribute-based access control
    • Feb
    • V. C. Hu, D. R. Kuhn, and D. F. Ferraiolo, "Attribute-based access control," Computer, vol. 48, no. 2, pp. 85-88, Feb. 2015.
    • (2015) Computer , vol.48 , Issue.2 , pp. 85-88
    • Hu, V.C.1    Kuhn, D.R.2    Ferraiolo, D.F.3
  • 11
    • 84893561510 scopus 로고    scopus 로고
    • Guide to attribute based access control (ABAC) de- nition and considerations (draft)
    • V. C. Hu et al., "Guide to attribute based access control (ABAC) de- nition and considerations (draft)," NIST Special Pub., vol. 800, no. 162, pp. 15-26, 2013.
    • (2013) NIST Special Pub. , vol.800 , Issue.162 , pp. 15-26
    • Hu, V.C.1
  • 12
    • 84908332324 scopus 로고    scopus 로고
    • LSD-ABAC: Lightweight static and dynamic attributes based access control scheme for secure data access in mobile environment
    • Sep
    • F. Li, Y. Rahulamathavan, and M. Rajarajan, "LSD-ABAC: Lightweight static and dynamic attributes based access control scheme for secure data access in mobile environment," in Proc. IEEE 39th Annu. IEEE Conf. Local Comput. Netw., Sep. 2014, pp. 354-361.
    • (2014) Proc. IEEE 39th Annu. IEEE Conf. Local Comput. Netw , pp. 354-361
    • Li, F.1    Rahulamathavan, Y.2    Rajarajan, M.3
  • 13
    • 84904513885 scopus 로고    scopus 로고
    • A lightweight access control mechanism for mobile cloud computing
    • Apr./May
    • X. Yao, X. Han, and X. Du, "A lightweight access control mechanism for mobile cloud computing," in Proc. IEEE Conf. Comput. Commun. Workshops, Apr./May 2014, pp. 380-385.
    • (2014) Proc. IEEE Conf. Comput. Commun. Workshops , pp. 380-385
    • Yao, X.1    Han, X.2    Du, X.3
  • 14
    • 84921416301 scopus 로고    scopus 로고
    • LIVE: Lightweight integrity veri-cation and content access control for named data networking
    • Feb
    • Q. Li, X. Zhang, Q. Zheng, R. Sandhu, and X. Fu, "LIVE: Lightweight integrity veri-cation and content access control for named data networking," IEEE Trans. Inf. Forensics Security, vol. 10, no. 2, pp. 308-320, Feb. 2015.
    • (2015) IEEE Trans. Inf. Forensics Security , vol.10 , Issue.2 , pp. 308-320
    • Li, Q.1    Zhang, X.2    Zheng, Q.3    Sandhu, R.4    Fu, X.5
  • 15
    • 84881510395 scopus 로고    scopus 로고
    • A survey on attribute-based encryption schemes of access control in cloud environments
    • Jul
    • C.-C. Lee, P.-S. Chung, and M.-S. Hwang, "A survey on attribute-based encryption schemes of access control in cloud environments," Int. J. Netw. Secur., vol. 15, no. 4, pp. 231-240, Jul. 2013.
    • (2013) Int. J. Netw. Secur , vol.15 , Issue.4 , pp. 231-240
    • Lee, C.-C.1    Chung, P.-S.2    Hwang, M.-S.3
  • 19
    • 70350635850 scopus 로고    scopus 로고
    • A ciphertextpolicy attribute-based encryption scheme with constant ciphertext length
    • K. Emura, A. Miyaji, A. Nomura, K. Omote, and M. Soshi, "A ciphertextpolicy attribute-based encryption scheme with constant ciphertext length," in Proc. Inf. Security Pract. Exper., 2009, pp. 13-23.
    • (2009) Proc. Inf. Security Pract. Exper , pp. 13-23
    • Emura, K.1    Miyaji, A.2    Nomura, A.3    Omote, K.4    Soshi, M.5
  • 20
    • 49049111604 scopus 로고    scopus 로고
    • Bounded ciphertext policy attribute based encryption
    • V. Goyal, A. Jain, O. Pandey, and A. Sahai, "Bounded ciphertext policy attribute based encryption," in Proc. ICALP, 2008, pp. 579-591.
    • (2008) Proc. ICALP , pp. 579-591
    • Goyal, V.1    Jain, A.2    Pandey, O.3    Sahai, A.4
  • 21
    • 76649143738 scopus 로고    scopus 로고
    • Mediated ciphertext-policy attribute based encryption and its application
    • Busan, South Korea
    • L. Ibraimi et al., "Mediated ciphertext-policy attribute based encryption and its application," IN Porc. Inf. Secur. Appl., Int. Workshop (Wisa), Busan, South Korea, 2009, pp. 309-323.
    • (2009) Porc. Inf. Secur. Appl., Int. Workshop (Wisa) , pp. 309-323
    • Ibraimi, L.1
  • 22
    • 70350630621 scopus 로고    scopus 로고
    • Ef-cient and provable secure ciphertext-policy attribute-based encryption schemes
    • L. Ibraimi, Q. Tang, P. Hartel, and W. Jonker, "Ef-cient and provable secure ciphertext-policy attribute-based encryption schemes," in Proc. Inf. Secur. Pract. Exper., 2009, pp. 1-12.
    • (2009) Proc. Inf. Secur. Pract. Exper , pp. 1-12
    • Ibraimi, L.1    Tang, Q.2    Hartel, P.3    Jonker, W.4
  • 24
    • 84983157129 scopus 로고    scopus 로고
    • A secure hardware module and system concept for local and remote industrial embedded system identiffcation
    • Sep
    • C. Lesjak, T. Ruprechter, J. Haid, H. Bock, and E. Brenner, "A secure hardware module and system concept for local and remote industrial embedded system identiffcation," in Proc. Emerg. Technol. Factory Autom., Sep. 2014, pp. 1-7.
    • (2014) Proc. Emerg. Technol. Factory Autom , pp. 1-7
    • Lesjak, C.1    Ruprechter, T.2    Haid, J.3    Bock, H.4    Brenner, E.5
  • 25
    • 79952097011 scopus 로고    scopus 로고
    • A trusted platform module for near field communication
    • Aug
    • M. Hutter and R. Toegl, "A trusted platform module for near field communication," in Proc. Int. Conf. Syst. Netw. Commun., Aug. 2010, pp. 136-141.
    • (2010) Proc. Int. Conf. Syst. Netw. Commun , pp. 136-141
    • Hutter, M.1    Toegl, R.2
  • 26
    • 84903144750 scopus 로고    scopus 로고
    • On middleware for emerging health services
    • J. Singh and J. M. Bacon, "On middleware for emerging health services," J. Internet Services Appl., vol. 5, no. 6, pp. 1-34, 2014.
    • (2014) J. Internet Services Appl , vol.5 , Issue.6 , pp. 1-34
    • Singh, J.1    Bacon, J.M.2
  • 28
    • 85152504598 scopus 로고    scopus 로고
    • Metrics-driven security objective decomposition for an e-health application with adaptive security management
    • R. M. Savola and H. Abie, "Metrics-driven security objective decomposition for an e-health application with adaptive security management," in Proc. Int. Workshop Adapt. Secur., 2013, pp. 1-6.
    • (2013) Proc. Int. Workshop Adapt. Secur , pp. 1-6
    • Savola, R.M.1    Abie, H.2
  • 30
    • 84947488175 scopus 로고    scopus 로고
    • Frame-based medium access control for 5G wireless networks
    • I. K. Son, S. Mao, Y. Li, M. Chen, M. X. Gong, and T. S. Rappaport, "Frame-based medium access control for 5G wireless networks," Mobile Netw. Appl., vol. 20, no. 6, pp. 763-772, 2015.
    • (2015) Mobile Netw. Appl , vol.20 , Issue.6 , pp. 763-772
    • Son, I.K.1    Mao, S.2    Li, Y.3    Chen, M.4    Gong, M.X.5    Rappaport, T.S.6
  • 31
    • 84930944604 scopus 로고    scopus 로고
    • Integrated energy and spectrum harvesting for 5G wireless communications
    • May/Jun
    • Y. Liu, Y. Zhang, R. Yu, and S. Xie, "Integrated energy and spectrum harvesting for 5G wireless communications," IEEE Netw., vol. 29, no. 3, pp. 75-81, May/Jun. 2015.
    • (2015) IEEE Netw , vol.29 , Issue.3 , pp. 75-81
    • Liu, Y.1    Zhang, Y.2    Yu, R.3    Xie, S.4
  • 32
    • 84963520971 scopus 로고    scopus 로고
    • SCMA for downlink multiple access of 5G wireless networks
    • Dec
    • H. Nikopour et al., "SCMA for downlink multiple access of 5G wireless networks," in Proc. IEEE GLOBECOM, Dec. 2014, pp. 3940-3945.
    • (2014) Proc. IEEE GLOBECOM , pp. 3940-3945
    • Nikopour, H.1
  • 33
    • 84958102458 scopus 로고    scopus 로고
    • A survey on 5G: The next generation of mobile communication
    • Mar
    • N. Panwar, S. Sharma, and A. K. Singh, "A survey on 5G: The next generation of mobile communication," Phys. Commun., vol. 18, pp. 64-84, Mar. 2016.
    • (2016) Phys. Commun , vol.18 , pp. 64-84
    • Panwar, N.1    Sharma, S.2    Singh, A.K.3
  • 34
    • 84861589601 scopus 로고    scopus 로고
    • FemtoCaching: Wireless video content delivery through distributed caching helpers
    • Mar
    • N. Golrezaei, K. Shanmugam, A. G. Dimakis, A. F. Molisch, and G. Caire, "FemtoCaching: Wireless video content delivery through distributed caching helpers," in Proc. IEEE INFOCOM, Mar. 2012, pp. 1107-1115.
    • (2012) Proc. IEEE INFOCOM , pp. 1107-1115
    • Golrezaei, N.1    Shanmugam, K.2    Dimakis, A.G.3    Molisch, A.F.4    Caire, G.5
  • 36
    • 0025383763 scopus 로고
    • A guided tour of Chernoff bounds
    • T. Hagerup and C. Rüb, "A guided tour of Chernoff bounds," Inf. Process. Lett., vol. 33, no. 6, pp. 305-308, 1990.
    • (1990) Inf. Process. Lett , vol.33 , Issue.6 , pp. 305-308
    • Hagerup, T.1    Rüb, C.2
  • 37
    • 84939498664 scopus 로고    scopus 로고
    • Partner selection and incentive mechanism for physical layer security
    • Aug
    • N. Zhang, N. Cheng, N. Lu, X. Zhang, J. W. Mark, and X. Shen, "Partner selection and incentive mechanism for physical layer security," IEEE Trans. Wireless Commun., vol. 14, no. 8, pp. 4265-4276, Aug. 2015.
    • (2015) IEEE Trans. Wireless Commun , vol.14 , Issue.8 , pp. 4265-4276
    • Zhang, N.1    Cheng, N.2    Lu, N.3    Zhang, X.4    Mark, J.W.5    Shen, X.6
  • 38
    • 84908454906 scopus 로고    scopus 로고
    • Sybil attacks and their defenses in the Internet of Things
    • Oct
    • K. Zhang, X. Liang, R. Lu, and X. Shen, "Sybil attacks and their defenses in the Internet of Things," IEEE Internet Things J., vol. 1, no. 5, pp. 372-383, Oct. 2014.
    • (2014) IEEE Internet Things J , vol.1 , Issue.5 , pp. 372-383
    • Zhang, K.1    Liang, X.2    Lu, R.3    Shen, X.4
  • 39
    • 84885114251 scopus 로고    scopus 로고
    • SmokeGrenade: An efficient key generation protocol with artificial interference
    • Nov
    • D. Chen, Z. Qin, X. Mao, P. Yang, Z. Qin, and R.Wang, "SmokeGrenade: An efficient key generation protocol with artificial interference," IEEE Trans. Inf. Forensics Security, vol. 8, no. 11, pp. 1731-1745, Nov. 2013.
    • (2013) IEEE Trans. Inf. Forensics Security , vol.8 , Issue.11 , pp. 1731-1745
    • Chen, D.1    Qin, Z.2    Mao, X.3    Yang, P.4    Qin, Z.5    Wang, R.6
  • 40
    • 85015170558 scopus 로고    scopus 로고
    • S2M: A lightweight acoustic fingerprints-based wireless device authentication protocol
    • Feb
    • D. Chen et al., "S2M: A lightweight acoustic fingerprints-based wireless device authentication protocol," IEEE Internet Things J., vol. 4, no. 1, pp. 88-100, Feb. 2017, doi: 10.1109/JIOT.2016.2619679.
    • (2017) IEEE Internet Things J , vol.4 , Issue.1 , pp. 88-100
    • Chen, D.1
  • 41
    • 85019012502 scopus 로고    scopus 로고
    • An efficient and fine-grained big data access control scheme with privacypreserving policy
    • to be published
    • K. Yang, Q. Han, H. Li, K. Zheng, Z. Su, and X. Shen, "An efficient and fine-grained big data access control scheme with privacypreserving policy," IEEE Internet Things J., to be published, doi: 10.1109/JIOT.2016.2571718.
    • IEEE Internet Things J.
    • Yang, K.1    Han, Q.2    Li, H.3    Zheng, K.4    Su, Z.5    Shen, X.6
  • 43
    • 84951305302 scopus 로고    scopus 로고
    • Sep
    • Chris Palmer. (Sep. 2014). Gradually sunsetting SHA-1. [Online]. Available: https://security.googleblog.com/2014/09/gradually-sunsettingsha- 1.html
    • (2014) Gradually Sunsetting SHA-1
    • Palmer, C.1
  • 47
    • 84914817681 scopus 로고    scopus 로고
    • Ubiquitous shift with information centric network caching using fog computing
    • Cham, Switzerland, Springer
    • I. Abdullahi, S. Arif, and S. Hassan, "Ubiquitous shift with information centric network caching using fog computing," in Computational Intelligence in Information Systems. Cham, Switzerland: Springer, 2015, pp. 327-335.
    • (2015) Computational Intelligence in Information Systems , pp. 327-335
    • Abdullahi, I.1    Arif, S.2    Hassan, S.3
  • 48
    • 84951050684 scopus 로고    scopus 로고
    • A survey of fog computing: Concepts, applications and issues
    • S. Yi, C. Li, and Q. Li, "A survey of fog computing: Concepts, applications and issues," in Proc. Workshop Mobile Big Data, 2015, pp. 37-42.
    • (2015) Proc. Workshop Mobile Big Data , pp. 37-42
    • Yi, S.1    Li, C.2    Li, Q.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.