An efficient authentication and access control scheme for perception layer of Internet of Things

The research is support by National Natural ScienceFoundation of P. R. China ( Grant No.61170065,61373017,61171053,61103195 and 61203217), Peak of Six Major Talent in Jiangsu Province (Grant No.2010DZXX026), the Natural Science Foundation of Jiangsu Province(Grant No.BK2012436 and BK20130882),Scientific & Technological Support Project of Jiangsu ProvinceGrant No. BE2012183 and BE2012755), Natural Science Key Fund for Colleges and Universities in Jiangsu Province (Grant No. 11KJA520001 and 12KJA520002), Scientific Research & Industry Promotion Project for Higher Education InstitutionsJHB2012-7) .

[1]  Satyajit Banerjee,et al.  Symmetric key based authenticated querying in wireless sensor networks , 2006, InterSense '06.

[2]  Bo Sheng,et al.  Elliptic curve cryptography-based access control in sensor networks , 2006, Int. J. Secur. Networks.

[3]  Wuu Yang,et al.  An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.

[4]  Hui-Feng Huang,et al.  A novel access control protocol for secure sensor networks , 2009, Comput. Stand. Interfaces.

[5]  Weiping Shao,et al.  An attribute and role based access control model for service-oriented environment , 2010, 2010 Chinese Control and Decision Conference.

[6]  Rolf H. Weber,et al.  Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..

[7]  Guoping Zhang,et al.  An extended role based access control model for the Internet of Things , 2010, 2010 International Conference on Information, Networking and Automation (ICINA).

[8]  Chunming Wu,et al.  BABAC: An Access Control Framework for Network Virtualization Using User Behaviors and Attributes , 2010, 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing.

[9]  Da-Zhi Sun,et al.  On the security of an enhanced novel access control protocol for wireless sensor networks , 2010, IEEE Transactions on Consumer Electronics.

[10]  E. A. Etchu Security and Privacy in Sensor Networks , 2010 .

[11]  Sungyoung Lee,et al.  An Efficient Mutual Authentication and Access Control Scheme for Wireless Sensor Networks in Healthcare , 2011, J. Networks.

[12]  Ei Ei Mon,et al.  The privacy-aware access control system using attribute-and role-based access control in private cloud , 2011, 2011 4th IEEE International Conference on Broadband Network and Multimedia Technology.

[13]  Jingcheng Wang,et al.  A novel mutual authentication scheme for Internet of Things , 2011, Proceedings of 2011 International Conference on Modelling, Identification and Control.

[14]  Omar Cheikhrouhou,et al.  An ID-based user authentication scheme for Wireless Sensor Networks using ECC , 2011, ICM 2011 Proceeding.

[15]  Hsin-Wen Wei,et al.  A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography , 2011, Sensors.

[16]  P. Cochat,et al.  Et al , 2008, Archives de pediatrie : organe officiel de la Societe francaise de pediatrie.

[17]  Song Xin fang,et al.  A new access control scheme based on protection of sensitive attributes , 2012, 2012 7th International Conference on Computer Science & Education (ICCSE).

[18]  Jing Liu,et al.  Authentication and Access Control in the Internet of Things , 2012, 2012 32nd International Conference on Distributed Computing Systems Workshops.

[19]  Jing Li,et al.  An Authorization Management Approach in the Internet of Things , 2012 .

[20]  Ramjee Prasad,et al.  Identity establishment and capability based access control (IECAC) scheme for Internet of Things , 2012, The 15th International Symposium on Wireless Personal Multimedia Communications.

[21]  Lida Xu,et al.  The internet of things: a survey , 2014, Information Systems Frontiers.

[22]  Lizhong Jin,et al.  A Novel Secure Architecture for the Internet of Things , 2011, 2016 International Conference on Intelligent Networking and Collaborative Systems (INCoS).