Elliptical Curve Cryptography Based Access Control Solution for IoT Based WSN

With IoT, many apps and services in fields such as police job, health care, safety, etc. are increasing. The services provided are often accessed by the customer from anywhere, anytime and anywhere via sensitive device apps. This makes IoT essential for safety and privacy. Wireless network detector (WSN), a kind of correspondence framework, is regularly conveyed in the unattended condition any place the supposed client gains admittance to the system. The nodes of the detector gather understanding from the environment. If the information is important and private, it requires safety steps to protect them from unlawful access. According to the IoT framework’s novel taxonomy, entirely distinct analytical problems are presented, essential alternatives and analytical operations are uncloaked, and instructions are expected for attention-grabbing assessment. Additionally, current access management solutions based on elliptical curve cryptography are surveyed and mentioned to make sure the protection of IoT parts and applications.

[1]  Yuguang Fang,et al.  Access control in wireless sensor networks , 2007, Ad Hoc Networks.

[2]  Tejeshwari Thakur,et al.  An Access Control Protocol for Wireless Sensor Network Using Double Trapdoor Chameleon Hash Function , 2016, J. Sensors.

[3]  Dheerendra Mishra,et al.  Secure and efficient user authentication scheme for multi-gateway wireless sensor networks , 2017, Ad Hoc Networks.

[4]  Zhuzhong Qian,et al.  AccessAuth: Capacity-aware security access authentication in federated-IoT-enabled V2G networks , 2017, J. Parallel Distributed Comput..

[5]  Sudip Misra,et al.  Energy-Efficient and Distributed Network Management Cost Minimization in Opportunistic Wireless Body Area Networks , 2018, IEEE Transactions on Mobile Computing.

[6]  Mauro Conti,et al.  Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks , 2018, IEEE Internet of Things Journal.

[7]  Andrei Gurtov,et al.  Access Control Protocol With Node Privacy in Wireless Sensor Networks , 2016, IEEE Sensors Journal.

[8]  Bo An,et al.  ACM TIST Special Issue on Urban Intelligence , 2018, ACM Trans. Intell. Syst. Technol..

[9]  Sheetal Kalra,et al.  A lightweight biometrics based remote user authentication scheme for IoT services , 2017, J. Inf. Secur. Appl..

[10]  Shekhar Verma,et al.  Privacy in wireless sensor networks using ring signature , 2014, J. King Saud Univ. Comput. Inf. Sci..

[11]  S. Smys,et al.  An energy efficient and secure data forwarding scheme for wireless body sensor network , 2019 .

[12]  Yacine Challal,et al.  A roadmap for security challenges in the Internet of Things , 2017, Digit. Commun. Networks.

[13]  Erdogan Dogdu,et al.  Context-Aware Computing, Learning, and Big Data in Internet of Things: A Survey , 2018, IEEE Internet of Things Journal.

[14]  Woei-Jiunn Tsaur,et al.  Secure IoT-Based, Incentive-Aware Emergency Personnel Dispatching Scheme with Weighted Fine-Grained Access Control , 2017, ACM Trans. Intell. Syst. Technol..

[15]  Hicham Lakhlef,et al.  Internet of things security: A top-down survey , 2018, Comput. Networks.

[16]  Pardeep Kumar,et al.  Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey , 2011, Sensors.

[17]  Kyung Sup Kwak,et al.  Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications , 2010, Journal of Medical Systems.

[18]  Jie Wu,et al.  Quantitative Measurement and Design of Source-Location Privacy Schemes for Wireless Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.

[19]  Yi Luo,et al.  Secure and Efficient Access Control Scheme for Wireless Sensor Networks in the Cross-Domain Context of the IoT , 2018, Secur. Commun. Networks.

[20]  Dong Hoon Lee,et al.  PACPs: practical access control protocols for wireless sensor networks , 2012, IEEE Transactions on Consumer Electronics.