• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Ma Jun, Guo Yuanbo, Ma Jianfeng, Xiong Jinbo, Zhang Tao. A Hierarchical Access Control Scheme for Perceptual Layer of IoT[J]. Journal of Computer Research and Development, 2013, 50(6): 1267-1275.
Citation: Ma Jun, Guo Yuanbo, Ma Jianfeng, Xiong Jinbo, Zhang Tao. A Hierarchical Access Control Scheme for Perceptual Layer of IoT[J]. Journal of Computer Research and Development, 2013, 50(6): 1267-1275.

A Hierarchical Access Control Scheme for Perceptual Layer of IoT

More Information
  • Published Date: June 14, 2013
  • The perceptual layer is at the most front-end of information collection, which plays a fundamental role in the Internet of Things (IoT). In the perceptual layer, mass perceptual nodes are required to sense a vast range of different data types for authorized users in accordance with privacy, security, and customization. This leads to the problem that traditional access control schemes (IBAC, RBAC etc.) fail to meet the requirements of users who want secure and efficient access resources on-demand. In this paper, a hierarchical access control scheme for perceptual layer of the IoT is presented. In the scheme, every hierarchical node, representing a class in the access hierarchy, is composed of perceptual nodes which provide information with the same levels of security. More hierarchical nodes can be modeled as a set of partially ordered classes. Besides, the scheme considers the limited computational and storage capacity of mass perceptual nodes. Compared with previous proposals, the scheme has the following advantages: Every user and perceptual node possesses a single key material to get some keys by a deterministic key derivation algorithm, and obtains the resources at the presented class and all descendant classes in the hierarchy. This increases the security of hierarchical node and reduces much storage costs. Due to supporting full-dynamic changes to the access hierarchy and replacement of key material, the presented scheme not only provides security of hierarchical data access, but also efficiently reduces much communication cost greatly. Furthermore, the scheme is provably secure without random oracle model and meets other security features. Further analysis show that our scheme adapts to access control requirement of perceptive layer of the IoT.
  • Related Articles

    [1]Zhang Wei, Han Linyu, Zhang Dianlei, Ren Pengjie, Ma Jun, Chen Zhumin. GeoPMF: A Distance-Aware Tour Recommendation Model[J]. Journal of Computer Research and Development, 2017, 54(2): 405-414. DOI: 10.7544/issn1000-1239.2017.20150822
    [2]Xin Wei, Sun Huiping, Chen Zhong. Analysis and Design of Distance-Bounding Protocols for RFID[J]. Journal of Computer Research and Development, 2013, 50(11): 2358-2366.
    [3]Yang Liu, Yu Jian, Jing Liping. An Adaptive Large Margin Nearest Neighbor Classification Algorithm[J]. Journal of Computer Research and Development, 2013, 50(11): 2269-2277.
    [4]Zhao Xiaoming, Ye Xijian. A New Approach to Ridgelet Transform[J]. Journal of Computer Research and Development, 2008, 45(5): 915-922.
    [5]He Honghui, Wang Lizhen, and Zhou Lihua. pgi-distance: An Efficient Method Supporting Parallel KNN-join Process[J]. Journal of Computer Research and Development, 2007, 44(10): 1774-1781.
    [6]Liu Bing, Wang Wei, and Shi Baile. The Tight Estimation Distance Using Wavelet[J]. Journal of Computer Research and Development, 2006, 43(10): 1732-1737.
    [7]Ming Xing, Liu Yuanning, Zhu Xiaodong, Xu Tao. Iris Recognition Based on Wavelet Transform with Shift Invariance Preprocessing[J]. Journal of Computer Research and Development, 2006, 43(7): 1186-1193.
    [8]Song Chuanming, Wang Xianghai. A Shape Adaptive Integer Wavelet Coding Algorithm Based on New Quantization Scheme[J]. Journal of Computer Research and Development, 2006, 43(4): 695-701.
    [9]Ji Qijin and Dong Yongqiang. Self-Similar Traffic Synthesizing Using Gaussian Mixture Model in Wavelet Domain[J]. Journal of Computer Research and Development, 2006, 43(3): 389-394.
    [10]Shang Zhaowei, Zhang Mingxin, Zhao Ping, Shen Junyi. Different Complex Wavelet Transforms for Texture Retrieval and Similarity Measure[J]. Journal of Computer Research and Development, 2005, 42(10): 1746-1751.

Catalog

    Article views (1478) PDF downloads (886) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return