Online citations, reference lists, and bibliographies.

Authentication And Access Control In The Internet Of Things

Jing Liu, Y. Xiao, C. Chen
Published 2012 · Computer Science

Cite This
Download PDF
Analyze on Scholarcy
Share
Due to the inherent vulnerabilities of the Internet, security and privacy issues should be considered and addressed before the Internet of Things is widely deployed. This paper mainly analyzes existing authentication and access control methods, and then, it designs a feasible one for the Internet of Things.
This paper references
10.1504/IJSN.2007.013172
Efficient multicast stream authentication for the fully adversarial network model
Christophe Tartary (2007)
10.1109/CCNC.2009.4784994
Intelligent Pervasive Network Authentication: S/Key Based Device Authentication
Deok Gyu Lee (2009)
10.1504/IJSNET.2011.040900
Scatter - secure code authentication for efficient reprogramming in wireless sensor networks
Ioannis Krontiris (2011)
10.1109/ICDCS.2008.77
Comparing Symmetric-key and Public-key Based Security Schemes in Sensor Networks: A Case Study of User Access Control
Haodong Wang (2008)
A Routing-Driven Elliptic Curve Cryptography based Key Management Scheme for Heterogeneous Sensor Networks
Rajasekhar Mungara (2014)
10.1504/IJSN.2009.027340
An efficient One-Time Password authentication scheme using a smart card
Sookyoung Lee (2009)
A novel localized authentication scheme in IEEE 802.11 based Wireless Mesh Networks
X. Lin (2008)
10.1109/SP.2005.19
Seeing-is-believing: using camera phones for human-verifiable authentication
J. McCune (2005)
10.1504/IJSN.2011.043666
ESPAC: Enabling Security and Patient-centric Access Control for eHealth in cloud computing
Mrinmoy Barua (2011)
10.1109/CCST.1997.626248
Overview of authentication protocols
M. Vandenwauver (1997)
10.1016/j.csi.2008.05.014
A novel access control protocol for secure sensor networks
Hui-Feng Huang (2009)
10.1504/IJSN.2011.045226
Is That You? Authentication in a Network without Identities
Taehwan Choi (2011)
10.1016/j.adhoc.2006.05.014
Access control in wireless sensor networks
Yun Zhou (2007)
10.1109/TWC.2009.060598
Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks
Xiaojiang Du (2009)
10.1504/IJSN.2006.011772
Elliptic curve cryptography-based access control in sensor networks
Haodong Wang (2006)
10.1016/J.CLSR.2009.11.008
Internet of Things - New security and privacy challenges
R. H. Weber (2010)
10.1504/IJSN.2006.011779
A self-encryption authentication protocol for teleconference services
Y. Jiang (2006)
10.1109/GLOCOM.2007.190
An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks
Huei-Ru Tseng (2007)
10.1007/11776178_19
Distributed User Access Control in Sensor Networks
Haodong Wang (2006)
10.1504/IJSN.2011.043668
Improved IP Multimedia Subsystem Authentication mechanism for 3G-WLAN networks
Madhu J. Sharma (2011)
10.1504/IJSN.2010.030719
Authentication and secret search mechanisms for RFID-aware wireless sensor networks
Shih-I Huang (2010)
10.1504/IJSN.2008.016202
Anonymous authentication protocol for GSM networks
M. Asadpour (2008)
10.1109/EWSN.2005.1462007
An algorithmic framework for robust access control in wireless sensor networks
Zinaida Benenson (2005)
10.1109/SUTC.2006.6
A dynamic user authentication scheme for wireless sensor networks
Kirk H. M. Wong (2006)
10.1504/IJSN.2008.017225
A novel localised authentication scheme in IEEE 802.11 based Wireless Mesh Networks
Xiaodong Lin (2008)
10.1109/JCN.2009.6388413
An energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography
Le Xuan Hung (2009)
10.1504/IJSN.2010.030723
Lightweight authentication protocol for mobile RFID networks
Ming-Hour Yang (2010)
10.1504/IJSN.2011.043669
A source authentication scheme using network coding
Ahmed Osama Fathy Atya (2011)
Cryptography and network security - principles and practice (3. ed.)
W. Stallings (1999)
An energy efficient access control for sensor networks based on elliptic curve cryptography
X. H. Le (2009)
10.1504/IJSN.2009.023422
Proximity-based authentication of mobile devices
Adin Scannell (2009)
10.1109/ICC.2008.297
A Virtual Password Scheme to Protect Passwords
M. Lei (2008)
10.1504/IJSN.2011.045231
Authenticating strangers in Online Social Networks
Xinxin Zhao (2011)
10.1109/ICCASM.2010.5622549
Research on security management for Internet of Things
Kun Wang (2010)
Cryptography and Network Security: Principles and Practice
W. Stallings (1998)
10.1109/ARES.2010.85
2-clickAuth Optical Challenge-Response Authentication
Anna Vapen (2010)
10.1109/NPC.2007.99
An Access Control Scheme in Wireless Sensor Networks
Shen Yu-long (2007)
10.1109/ICICTA.2011.578
Research on the Architecture of Trusted Security System Based on the Internet of Things
X. Li (2011)
10.1109/TVT.2011.2158864
Reducing Communication Overhead for Nested NEMO Networks: Roaming Authentication and Access Control Structure
Hyung-Jin Lim (2011)
10.1504/IJSN.2010.030724
A cross-layer authentication design for secure video transportation in wireless sensor network
Ju Wang (2010)
10.1109/ICCASM.2010.5622215
Studying on internet of things based on fingerprint identification
Huang Hong-bo (2010)
10.1109/ICC.2008.295
Secret Little Functions and Codebook for Protecting Users from Password Theft
Y. Xiao (2008)
10.1016/j.comcom.2008.05.005
Virtual password using random linear functions for on-line services, ATM machines, and pervasive computing
M. Lei (2008)
10.1504/IJSN.2006.011773
A lightweight encryption and authentication scheme for wireless sensor networks
J. Zheng (2006)
10.1109/JSYST.2012.2183755
Differentiated Virtual Passwords, Secret Little Functions, and Codebooks for Protecting Users From Password Theft
Y. Xiao (2014)
10.1109/ISADS.2011.21
Role-Based Access-Control Using Reference Ontology in Clouds
Wei-Tek Tsai (2011)
10.1504/IJSN.2009.023427
User-aided data authentication
S. Laur (2009)
10.1504/IJSN.2007.012821
DKMS: distributed hierarchical access control for multimedia networks
Ruidong Li (2007)
10.1007/s11277-009-9697-0
Identities in the Future Internet of Things
A. Sarma (2009)
10.1007/11599463_8
Efficient and Secure Password Authentication Schemes for Low-Power Devices
Kee-Won Kim (2005)
10.1504/IJSN.2007.013181
Strong password-based authentication in TLS using the three-party group Diffie?Hellman protocol
M. Abdalla (2007)
10.1016/J.CLSR.2009.09.002
Internet of things - Need for a new legal environment?
R. H. Weber (2009)



This paper is referenced by
10.1145/3004010.3004020
Lightweight Authentication Scheme with Dynamic Group Members in IoT Environments
Jheng-Jia Huang (2016)
Global identity management in the Internet of Things
Ausama Majeed (2018)
A Survey on Hardware-based Security Mechanisms for Internet of Things
Alireza Shamsoshoara (2019)
10.1109/ICCCIS48478.2019.8974544
Architectural Model of Security Threats & theirCountermeasures in IoT
Tanishq Varshney (2019)
10.1007/978-981-15-3418-8
Trusted Computing and Information Security: 13th Chinese Conference, CTCIS 2019, Shanghai, China, October 24–27, 2019, Revised Selected Papers
Phoebe Beverly Chen (2020)
10.1109/TSP49548.2020.9163573
A Secure and Lightweight Authenticated Key Agreement Protocol for Distributed IoT Applications
Pierre E. Abi-Char (2020)
10.4018/978-1-5225-5736-4.CH006
Security in the Internet of Things
Ahmed Maarof (2018)
10.21474/ijar01/7839
PRIVACY ISSUES IN SMART HOME DEVICES USING INTERNET OF THINGS – A SURVEY.
D Usha (2018)
10.1109/ITT48889.2019.9075073
An Enhanced Context-aware Capability-based Access Control Model for the Internet of Things in Healthcare
Jinesh Ahamed (2019)
Smart Internet-Enabled Device Sharing Using Web of Things
Jin H. Park (2014)
10.1109/ICMECH.2017.7921154
Cyber attacks in mechatronics systems based on Internet of Things
Abdullahi Chowdhury (2017)
10.1016/j.future.2019.12.017
A privacy-preserving approach to prevent feature disclosure in an IoT scenario
Serena Nicolazzo (2020)
10.1007/978-3-319-26961-0_21
Functional Encryption in IoT E-Health Care System
Dhruti Sharma (2015)
10.12785/AMIS/080416
An efficient authentication and access control scheme for perception layer of Internet of Things
Y. Ning (2014)
10.1007/978-3-319-72395-2_54
Security and Attack Vector Analysis of IoT Devices
M. Capellupo (2017)
10.1007/978-981-15-3418-8_6
Identity Authentication Under Internet of Everything Based on Edge Computing
Zixiao Kong (2019)
10.1155/2019/5747136
A Systematic Literature Review of Authentication in Internet of Things for Heterogeneous Devices
Sanaz Kavianpour (2019)
10.1109/JSAC.2020.2980916
Blockchain-Assisted Secure Device Authentication for Cross-Domain Industrial IoT
Meng Shen (2020)
10.1109/IDT.2016.7843009
A survey on security of IoT in the context of eHealth and clouds
Imen Ben Ida (2016)
10.1007/978-3-030-11928-7_68
Security Analysis in the Internet of Things: State of the Art, Challenges, and Future Research Topics
Karim Ennasraoui (2018)
10.1109/GLOCOM.2014.7417597
An IdM and Key-Based Authentication Method for Providing Single Sign-On in IoT
Adriano Witkovski (2014)
Security architecture for Fog-To-Cloud continuum system
Sarang Kahvazadeh (2019)
10.1016/j.simpat.2016.09.007
Using virtual environments for the assessment of cybersecurity issues in IoT scenarios
A. Furfaro (2017)
A Review on Internet of Things ( IoT ) in Healthcare
Mustafa Abdullah Azzawi (2016)
10.3390/s140814786
Security Analysis and Improvements of Authentication and Access Control in the Internet of Things
Bruce Ndibanje (2014)
10.4108/eai.20-3-2018.154370
Fine-Grained Access Control for Smart Healthcare Systems in the Internet of Things
Shantanu Pal (2018)
10.1016/J.INS.2019.01.051
PRTA: A Proxy Re-encryption based Trusted Authorization scheme for nodes on CloudIoT
Mang Su (2020)
10.1109/ICMCS.2016.7905662
Access control in IoT: Survey & state of the art
Aafaf Ouaddah (2016)
10.14257/IJFGCN.2016.9.10.01
Theoretical Research on the Time Delay and Corresponding Issues for the Novel Category of Internet of Things Control System
Yucheng Zhang (2016)
Arquitetura para privacidade na integração de internet das coisas e computação em nuvem
Luis Alberto B. Pacheco (2018)
10.1109/JIOT.2018.2848284
SAMS: A Seamless and Authorized Multimedia Streaming Framework for WMSN-Based IoMT
M. Jan (2019)
10.1109/GLOCOM.2018.8647433
Block-Based Access Control for Blockchain-Based Electronic Medical Records (EMRs) Query in eHealth
Xiaoshuai Zhang (2018)
See more
Semantic Scholar Logo Some data provided by SemanticScholar