When U requests data, he is asked to send his public key to show his identification. However, an attacker may send another user's public key to forge identification and get access to the data. 4. Our Proposed PCAC Scheme 4.1. Overview Our paper proposes an automatic, fast, and effective...
Frequency of Requests Requests every 15 s Requests every 60 s 1 Physical Visitor Device 93,908 32,993 1 Simulated Visitor Device 93,834 32,993 1 Physical Device W/ 50 Simulated Visitors Network Load 4,992,656 1,667,138 5. Security Analysis In this section we consider ways an adversary ...
informatics Article An Internet of Things Based Multi-Level Privacy-Preserving Access Control for Smart Living Usama Salama *, Lina Yao and Hye-young Paik ID School of Computer Science and Engineering, University of New South Wales, Sydney, NSW 2052, Australia; lina.yao@unsw.edu.au (L.Y.);...