2020
DOI: 10.1109/jiot.2020.2975140
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient, Accountable, and Privacy-Preserving Access Control Scheme for Internet of Things in a Sharing Economy Environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 15 publications
(16 citation statements)
references
References 39 publications
0
14
0
Order By: Relevance
“…From Table 2, we can see that our scheme achieves a higher security goal under a weaker security assumption while having a decentralized feature. In these functions, the gateway being not secure and support mobility are two basic requirements in shared IoT device circumstances, so we are going to compare our scheme with references [17,18] in the next sections.…”
Section: Performance Evaluation and Simulation Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…From Table 2, we can see that our scheme achieves a higher security goal under a weaker security assumption while having a decentralized feature. In these functions, the gateway being not secure and support mobility are two basic requirements in shared IoT device circumstances, so we are going to compare our scheme with references [17,18] in the next sections.…”
Section: Performance Evaluation and Simulation Resultsmentioning
confidence: 99%
“…Te authentication of a vehicle and a roadside unit is fnished frst and then the authentication between the two vehicles. Liu et al, in literature [18], designed a centralized and secure access control scheme for sharing devices. Tey combined several existing signature algorithms to complete the authentications between users and gateways, as well as gateways and devices subtly, so as to realize users' access to shared devices.…”
Section: Centralized Solutionsmentioning
confidence: 99%
See 1 more Smart Citation
“…Access control on such usage becomes an import security concerns as a greedy adversary might deploy malicious devices for profits, on the other hand even the users might not give enough money for the services. For same context, Liu et al proposed a secure and efficient access control scheme for IoT in sharing economy environments [ 108 ]. The scheme is based on identity based authentication with anonymous signatures to preserve users privacy.…”
Section: Access Control Protocols In Iotmentioning
confidence: 99%
“… *Dynamic changes in users’ membership (Join/Leave) *IoT device changes (Join/Leave). Liu et al [ 108 ] 2020 *Bilinear pairing *Shared IoT devices *System initialization *The access control scheme allows sharing/accessing IoT devices along with preserving privacy of the users through identity based authentication. *Encryption *Central server *Entity registration *Through one time signatures computed using secret keys, a check on number of accesses on particular device can be made.…”
Section: Access Control Protocols In Iotmentioning
confidence: 99%