Abstract
|
Article Information:
Distributed Access Control Based on Proxy Signature in M2M Sensor Networks
Lingyu Lee, Yunsheng Zhang, Ying Jiang and Yingli Liu
Corresponding Author: Yunsheng Zhang
Submitted: August 11, 2012
Accepted: September 17, 2012
Published: April 05, 2013 |
Abstract:
|
In this study, we have a research of the distributed access control based on proxy signature in M2M sensor networks M2M sensor networks. As M2M sensor networks are usually deployed in hostile environment, the global communication security of M2M sensor networks is and will continue to be a major concern. Although there are many related works on access control in WSNs (Wireless Sensor Networks), Ad-hoc networks, MANETs (Mobile Ad-hoc Networks) and etc., they cannot be applied to M2M sensor networks directly. Motivated by this consideration, we develop a secure and distributed access control scheme based on proxy signature for M2M sensor networks, which provides strong authentication and achieves efficiency. Moreover, security of the proposed technique does not rely on availability of a secure channel.
Key words: Access control, M2M sensor networks, proxy signature, security, trapdoor hash function, ,
|
Abstract
|
PDF
|
HTML |
|
Cite this Reference:
Lingyu Lee, Yunsheng Zhang, Ying Jiang and Yingli Liu, . Distributed Access Control Based on Proxy Signature in M2M Sensor Networks. Research Journal of Applied Sciences, Engineering and Technology, (11): 3069-3073.
|
|
|
|
|
ISSN (Online): 2040-7467
ISSN (Print): 2040-7459 |
|
Information |
|
|
|
Sales & Services |
|
|
|