期刊文献+

物联网感知层一种基于属性的访问控制机制 被引量:6

Attribute-based access control scheme for the perceptive layer of the Internet of Things
下载PDF
导出
摘要 为了实现物联网感知层的细粒度访问控制和用户的匿名数据访问,提出了一种基于用户属性的访问控制机制,并利用双线性映射给出了具体的算法实现.该方案中,用户以其属性证书为依据向传感器节点发起数据访问请求,传感器节点根据门限原则决定是否允许用户访问.该方案可以实现灵活的细粒度访问控制和匿名的数据访问,用户和传感器节点的信息交互次数达到了最少,节点运算量少,只需要进行一次公钥加密.与现有的传感器网络访问控制方案相比,该方案传感器节点开销较小,可扩展性良好,可以适应物联网感知层的访问控制需求. In order to achieve the fine-grained access control and the anonymity of the user access to data in the Internet of Things,an attribute-based access control model is proposed and realized by using the bilinear map.In this scheme,users request data access to the sensor node based on their attributes certificates and the sensor node determines whether to allow access according to the threshold principle.This scheme effectively realizes the flexible fine-graind access control and anonymous access to data.The number of interactions between users and sensor nodes is minimized and the computation of sensor nodes is reduced to one public key encryption.Analysis shows that the scheme has the advantages over the current access control mechanisms of better scalability and lower cost in communication and computation and can adapt to access control requirement of perceptive layer of the Internet of Things.
出处 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2012年第2期66-72,共7页 Journal of Xidian University
基金 国家自然科学基金资助项目(60872041,61072066) 中央高校基本科研业务费专项资金资助项目(JY10000903001,JY10000901034)
关键词 物联网 传感器网络 访问控制 匿名性 the Internet of Things wireless sensor networks access control anonymity
  • 相关文献

参考文献17

  • 1International Telecommunication Union. ITU Internet Reports 2005:the Internet of Things[OL].http://www.itu.int/osg/spu/publications/internetofthings/InternetofThings_summary.pdf,2010.
  • 2武传坤.物联网安全架构初探[J].中国科学院院刊,2010,25(4):411-419. 被引量:76
  • 3顾晶晶,陈松灿,庄毅.基于无线传感器网络拓扑结构的物联网定位模型[J].计算机学报,2010,33(9):1548-1556. 被引量:71
  • 4Wang Yong,Attebury G,Ramamurthy B. A Survey of Security Issues in Wireless Sensor Networks[J].IEEE In Communications Surveys & Tutorials,2006,(02):2-23.
  • 5裴庆祺,沈玉龙,马建峰.无线传感器网络安全技术综述[J].通信学报,2007,28(8):113-122. 被引量:93
  • 6刘云,裴庆祺.一种传感器网络访问控制机制[J].西安电子科技大学学报,2010,37(3):507-512. 被引量:4
  • 7Banerjee S,Mukhopadhyay D. Symmetric Key Based Authenticated Querying in Wireless Sensor Networks[A].New York:acm Press,2006.
  • 8Maccari L,Mainardi L,Marchitt M A. Lightweight,Distributed Access Control for Wireless Sensor Networks Supporting Mobility[A].Beijing:IEEE,2008.1441-1445.
  • 9Benenson Z,Gartner F C,Kesdogan D. An Algorithmic Framework for Robust Access Control in Wireless Sensor Networks[A].Germary:Computer Science,2005.158-165.
  • 10Benenson Z,Gedicke N,Raivio O. Realizing Robust User Authentication in Sensor Networks[A].Stockholm:Swedish Insitute of Computer Science,2005.135-142.

二级参考文献93

共引文献237

同被引文献109

引证文献6

二级引证文献34

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部