Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2018, Article ID 6140978, 10 pages
https://doi.org/10.1155/2018/6140978
Research Article

Secure and Efficient Access Control Scheme for Wireless Sensor Networks in the Cross-Domain Context of the IoT

School of Software, Nanchang University, Nanchang 330000, China

Correspondence should be addressed to Ming Luo; moc.361@12yppahml

Received 10 September 2017; Revised 22 November 2017; Accepted 24 December 2017; Published 26 February 2018

Academic Editor: Angelos Antonopoulos

Copyright © 2018 Ming Luo et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. J. Granjal, E. Monteiro, and J. S. Silva, “Security in the integration of low-power Wireless Sensor Networks with the Internet: A survey,” Ad Hoc Networks, vol. 24, pp. 264–287, 2015. View at Publisher · View at Google Scholar · View at Scopus
  2. H. Kumarage, I. Khalil, A. Alabdulatif, Z. Tari, and X. Yi, “Secure data analytics for cloud-integrated internet of things applications,” IEEE Cloud Computing, vol. 3, no. 2, pp. 46–56, 2016. View at Publisher · View at Google Scholar · View at Scopus
  3. A. Botta, W. de Donato, V. Persico, and A. Pescapé, “Integration of cloud computing and internet of things: a survey,” Future Generation Computer Systems, vol. 56, pp. 684–700, 2016. View at Publisher · View at Google Scholar
  4. M. Khan, B. N. Silva, and K. Han, “A web of things-based emerging sensor network architecture for smart control systems,” Sensors, vol. 17, no. 2, article no. 332, 2017. View at Publisher · View at Google Scholar · View at Scopus
  5. K. C. Serdaroglu and S. Baydere, “WiSEGATE: wireless sensor network gateway framework for internet of things,” Wireless Networks, vol. 22, no. 5, pp. 1475–1491, 2016. View at Publisher · View at Google Scholar · View at Scopus
  6. V. C. Thang and N. V. Tao, “A performance evaluation of improved IPv6 routing protocol for wireless sensor networks,” International Journal of Intelligent Systems and Applications, vol. 8, no. 12, pp. 18–25, 2016. View at Publisher · View at Google Scholar · View at Scopus
  7. S. Raza, L. Seitz, D. Sitenkov, and G. Selander, “S3K: Scalable security with symmetric keys - DTLS key establishment for the internet of things,” IEEE Transactions on Automation Science and Engineering, vol. 13, no. 3, pp. 1270–1280, 2016. View at Publisher · View at Google Scholar · View at Scopus
  8. Y. Zhou, Y. Zhang, and Y. Fang, “Access control in wireless sensor networks,” Ad Hoc Networks, vol. 5, no. 1, pp. 3–13, 2007. View at Publisher · View at Google Scholar · View at Scopus
  9. H.-F. Huang, “A novel access control protocol for secure sensor networks,” Computer Standards & Interfaces, vol. 31, no. 2, pp. 272–276, 2009. View at Publisher · View at Google Scholar · View at Scopus
  10. H.-S. Kim and S.-W. Lee, “Enhanced novel access control protocol over wireless sensor networks,” IEEE Transactions on Consumer Electronics, vol. 55, no. 2, pp. 492–498, 2009. View at Publisher · View at Google Scholar · View at Scopus
  11. H. Lee, K. Shin, and D. H. Lee, “PACPs: practical access control protocols for wireless sensor networks,” IEEE Transactions on Consumer Electronics, vol. 58, no. 2, pp. 491–499, 2012. View at Publisher · View at Google Scholar · View at Scopus
  12. C.-Y. Chen, A. D. Yein, T.-C. Hsu, J. Y. Chiang, and W.-S. Hsieh, “Secure access control method for wireless sensor networks,” International Journal of Distributed Sensor Networks, vol. 11, no. 7, Article ID 261906, 2015. View at Publisher · View at Google Scholar · View at Scopus
  13. P. Kumar, A. Gurtov, J. Iinatti, M. Sain, and P. Ha, “Access control protocol with node privacy in wireless sensor networks,” IEEE Sensors Journal, vol. 16, no. 22, pp. 8142–8150, 2016. View at Publisher · View at Google Scholar · View at Scopus
  14. H. Yu, J. He, T. Zhang, P. Xiao, and Y. Zhang, “Enabling end-to-end secure communication between wireless sensor networks and the Internet,” World Wide Web, vol. 16, no. 4, pp. 515–540, 2013. View at Publisher · View at Google Scholar · View at Scopus
  15. C. Ma, K. Xue, and P. Hong, “Distributed access control with adaptive privacy preserving property for wireless sensor networks,” Security and Communication Networks, vol. 7, no. 4, pp. 759–773, 2014. View at Publisher · View at Google Scholar · View at Scopus
  16. N.-W. Lo and J.-L. Tsai, “An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks without pairings,” IEEE Transactions on Intelligent Transportation Systems, vol. 17, no. 5, pp. 1319–1328, 2016. View at Publisher · View at Google Scholar · View at Scopus
  17. S. Bala, G. Sharma, and A. K. Verma, “PF-ID-2PAKA: pairing free identity-based two-party authenticated key agreement protocol for wireless sensor networks,” Wireless Personal Communications, vol. 87, no. 3, pp. 995–1012, 2016. View at Publisher · View at Google Scholar · View at Scopus
  18. G. Sharma, S. Bala, and A. K. Verma, “An improved RSA-based certificateless signature scheme for wireless sensor networks,” International Journal of Network Security, vol. 18, no. 1, pp. 82–89, 2016. View at Google Scholar · View at Scopus
  19. A. A. Omala, N. Robert, and F. Li, “A provably-secure transmission scheme for wireless body area networks,” IEEE Cloud Computing, vol. 40, no. 11, article no. 247, 2016. View at Publisher · View at Google Scholar · View at Scopus
  20. Q. Huang, D. S. Wong, and G. Yang, “Heterogeneous signcryption with key privacy,” The Computer Journal, vol. 54, no. 4, pp. 525–536, 2011. View at Publisher · View at Google Scholar · View at Scopus
  21. F. Li, Y. Han, and C. Jin, “Practical access control for sensor networks in the context of the Internet of Things,” Computer Communications, vol. 89, no. 1, pp. 154–164, 2016. View at Publisher · View at Google Scholar · View at Scopus