Ye, NingZhu, YanWang, Ru-chuanMalekian, RezaLin, Qiao-min2014-05-122014-05-122014-07Ye, N, Zhu, Y, Wang, R-C, Malekian, R & Lin, Q-M, 2014, 'An efficient authentication and access control scheme for perception layer of Internet of Things', Applied Mathematics and Information Sciences, vol. 8, no. 4, pp. 1617-1624.10.12785/amis/080416http://hdl.handle.net/2263/39762In this paper, we proposed an efficient authentication and access control method based on general view of the security issues for perception layer of Internet of Things (IoT). The advantage of the proposed method is establishing session key based on Elliptic Curve Cryptography (ECC). This enhances mutual authentication between the user and sensor nodes, and intermediate processes. On the other hand, this method solves the resource-constrained problem in perception layer of the Internet of Things.en© 2014 NSP Natural Sciences Publishing Cor.Mutual authenticationInternet of Things (IoT)Elliptic curve cryptography (ECC)Attribute-based access control (ABAC)An efficient authentication and access control scheme for perception layer of Internet of ThingsPostprint Article