Multi-user access control scheme based on resources hierarchies for perceptual layer of IoT

被引:0
|
作者
Ma, Jun [1 ,2 ]
Guo, Yuan-Bo [2 ]
Ma, Jian-Feng [1 ,3 ]
Liu, Xi-Meng [1 ]
Li, Qi [1 ]
机构
[1] School of Computer Science and Technology, Xidian University, Xi'an, Shaanxi 710071, China
[2] PLA Information Engineering University, Zhengzhou, Henan 450004, China
[3] Shaanxi Key Laboratory of Network and System Security, Xidian University, Xi'an, Shaanxi 710071, China
来源
关键词
D O I
10.3969/j.issn.0372-2112.2014.01.005
中图分类号
学科分类号
摘要
32
引用
收藏
页码:28 / 35
相关论文
共 50 条
  • [1] A Multi-User Collaborative Access Control Scheme Based on New Hash Chain
    Wang, Zetian
    Li, Yunfa
    Liu, Guanxu
    Zhang, Di
    ELECTRONICS, 2023, 12 (08)
  • [2] Multi-User Multi-IoT-Device Symbiotic Radio: A Novel Massive Access Scheme for Cellular IoT
    Wang, Jun
    Liang, Ying-Chang
    Sun, Sumei
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2024, 23 (09) : 11876 - 11889
  • [3] Privacy-preserving Multi-user Encrypted Access Control Scheme for Cloud-assisted IoT applications
    Kaaniche, Nesrine
    Laurent, Maryline
    PROCEEDINGS 2018 IEEE 11TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2018, : 590 - 597
  • [4] Research on Multi-user Access Control Scheme for Private Cloud in Space Control Center
    Liang, Min
    Zhang, Hui
    Gao, Fei
    Wang, Hao
    Wei, Jun
    Huang, Ming
    2019 IEEE 11TH INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN 2019), 2019, : 558 - 564
  • [5] PUF-based user access control scheme for IoT environment
    Kumar, Devender
    Pachigolla, Sai Kishore
    Manhas, Shubham Singh
    Rawat, Karan
    JOURNAL OF INFORMATION & OPTIMIZATION SCIENCES, 2023, 44 (07): : 1347 - 1364
  • [6] Multi-user chaos MIMO-OFDM scheme for physical layer multi-access security
    Inaba, Yuma
    Okamoto, Eiji
    IEICE NONLINEAR THEORY AND ITS APPLICATIONS, 2014, 5 (02): : 172 - 183
  • [7] A Multi-User Access Scheme for Throughput Enhancement in UDN with NOMA
    Liu, Yiming
    Li, Xi
    Ji, Hong
    Zhang, Heli
    2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2017, : 1364 - 1369
  • [8] Multi-User Searchable hncryption Scheme with General Access Structure
    Zirtol, Kobra Amiri
    Noroozi, Mahnaz
    Eslami, Ziba
    2015 2ND INTERNATIONAL CONFERENCE ON KNOWLEDGE-BASED ENGINEERING AND INNOVATION (KBEI), 2015, : 398 - 403
  • [9] Access control for adaptive reservations on multi-user systems
    Cucinotta, Tommaso
    PROCEEDINGS OF THE 14TH IEEE REAL-TIME AND EMBEDDED TECHNOLOGY AND APPLICATIONS SYMPOSIUM, 2008, : 387 - 396
  • [10] Joint optimized multi-user access and UAV deployments based on heterogeneous revenue in IoT network
    Zeng, Yaoping
    Lu, Dongyang
    Du, Jianbo
    COMPUTER NETWORKS, 2023, 234