dc.contributor.author |
Ye, Ning
|
|
dc.contributor.author |
Zhu, Yan
|
|
dc.contributor.author |
Wang, Ru-chuan
|
|
dc.contributor.author |
Malekian, Reza
|
|
dc.contributor.author |
Lin, Qiao-min
|
|
dc.date.accessioned |
2014-05-12T10:49:21Z |
|
dc.date.available |
2014-05-12T10:49:21Z |
|
dc.date.issued |
2014-07 |
|
dc.description.abstract |
In this paper, we proposed an efficient authentication and access control method based on general view of the security issues
for perception layer of Internet of Things (IoT). The advantage of the proposed method is establishing session key based on Elliptic
Curve Cryptography (ECC). This enhances mutual authentication between the user and sensor nodes, and intermediate processes. On
the other hand, this method solves the resource-constrained problem in perception layer of the Internet of Things. |
en_US |
dc.description.librarian |
hb2014 |
en_US |
dc.description.sponsorship |
The research is support by National Natural ScienceFoundation of P. R. China ( Grant
No.61170065,61373017,61171053,61103195 and 61203217), Peak of Six Major Talent in Jiangsu Province (Grant No.2010DZXX026), the Natural Science Foundation of Jiangsu Province(Grant No.BK2012436 and BK20130882),Scientific & Technological Support Project of Jiangsu ProvinceGrant No. BE2012183 and BE2012755), Natural Science Key Fund for Colleges and Universities in Jiangsu Province (Grant No.
11KJA520001 and 12KJA520002), Scientific Research & Industry Promotion Project for Higher Education InstitutionsJHB2012-7) . |
en_US |
dc.description.uri |
http://dx.doi.org/10.12785/amis/080416 |
en_US |
dc.identifier.citation |
Ye, N, Zhu, Y, Wang, R-C, Malekian, R & Lin, Q-M, 2014, 'An efficient authentication and access control scheme for perception layer of Internet of Things', Applied Mathematics and Information Sciences, vol. 8, no. 4, pp. 1617-1624. |
en_US |
dc.identifier.other |
10.12785/amis/080416 |
|
dc.identifier.uri |
http://hdl.handle.net/2263/39762 |
|
dc.language.iso |
en |
en_US |
dc.publisher |
Natural Sciences Publishing Cor. |
en_US |
dc.rights |
© 2014 NSP Natural Sciences Publishing Cor. |
en_US |
dc.subject |
Mutual authentication |
en_US |
dc.subject |
Internet of things (IoT) |
en_US |
dc.subject |
Elliptic Curve Cryptography (ECC) |
en_US |
dc.subject |
Attribute-based Access Control (ABAC) |
en_US |
dc.title |
An efficient authentication and access control scheme for perception layer of Internet of Things |
en_US |
dc.type |
Postprint Article |
en_US |