Home           Contact us           FAQs           
     Journal Home     |     Aim & Scope    |    Author(s) Information      |     Editorial Board     |     MSP Download Statistics
2013 (Vol. 5, Issue: 11)
Article Information:

Distributed Access Control Based on Proxy Signature in M2M Sensor Networks

Lingyu Lee, Yunsheng Zhang, Ying Jiang and Yingli Liu
Corresponding Author:  Yunsheng Zhang 

Key words:  Access control, M2M sensor networks, proxy signature, security, trapdoor hash function, ,
Vol. 5 , (11): 3069-3073
Submitted Accepted Published
August 11, 2012 September 17, 2012 April 05, 2013

In this study, we have a research of the distributed access control based on proxy signature in M2M sensor networks M2M sensor networks. As M2M sensor networks are usually deployed in hostile environment, the global communication security of M2M sensor networks is and will continue to be a major concern. Although there are many related works on access control in WSNs (Wireless Sensor Networks), Ad-hoc networks, MANETs (Mobile Ad-hoc Networks) and etc., they cannot be applied to M2M sensor networks directly. Motivated by this consideration, we develop a secure and distributed access control scheme based on proxy signature for M2M sensor networks, which provides strong authentication and achieves efficiency. Moreover, security of the proposed technique does not rely on availability of a secure channel.
Abstract PDF HTML
  Cite this Reference:
Lingyu Lee, Yunsheng Zhang, Ying Jiang and Yingli Liu, 2013. Distributed Access Control Based on Proxy Signature in M2M Sensor Networks.  Research Journal of Applied Sciences, Engineering and Technology, 5(11): 3069-3073.
    Advertise with us
ISSN (Online):  2040-7467
ISSN (Print):   2040-7459
Submit Manuscript
   Current Information
   Sales & Services
Home  |  Contact us  |  About us  |  Privacy Policy
Copyright © 2015. MAXWELL Scientific Publication Corp., All rights reserved