期刊文献+

无线传感器网络中一种基于行为可信的访问控制机制 被引量:4

Access Control Mechanism Based on Behaviour Trust in Wireless Sensor Networks
下载PDF
导出
摘要 访问控制是无线传感器网络的一种重要应用,已有研究工作大多是通过相邻传感器之间的密钥交换来实现。从传感器行为的空间相关性和时间相关性入手,提出了一种基于相似度的以局部检测为主的分布式传感器行为可信的访问控制机制。该机制通过检验传感器本地采样值构成的时空相似度与传感器行为随机过程统计特征的符合程度来实现行为信任的访问控制。模拟仿真试验表明,该机制可以减少传感器之间的数据交换,当网络中10%的传感器存在不安全行为时,该模型可以检测到95%的不可信传感器。 Access control is an important application of wireless sensor networks. Previous works are implemented by exchanging key among neighboring sensors. Considering that in many cases, an sensors behaviour is both spatially and temporally correlated, this paper proposed a distributed and localized behaviour trust mechanism based on similarity, this mechanism implements behaviour trust access control by using statistical hypothesis test for matching the reading sequence of sensors and statistical characters of the behaviour. The simulation results show that the mechanism can reduce the network traffic,can detect as much as 93% of the not trusty sensors when 10%of sensors are not security.
出处 《计算机科学》 CSCD 北大核心 2012年第B06期72-76,共5页 Computer Science
基金 安徽省教育厅自然科学基金重点项目(KJ2007A046)资助
关键词 无线传感器网络 访问控制 行为信任 安全 Wireless sensor network Access control Behaviour trust Secure
  • 相关文献

参考文献20

  • 1崔莉,鞠海玲,苗勇,李天璞,刘巍,赵泽.无线传感器网络研究进展[J].计算机研究与发展,2005,42(1):163-174. 被引量:730
  • 2李建中,高宏.无线传感器网络的研究进展[J].计算机研究与发展,2008,45(1):1-15. 被引量:440
  • 3任丰原,黄海宁,林闯.无线传感器网络[J].软件学报,2003,14(7):1282-1291. 被引量:1709
  • 4Benenson Z, Gedicke O R N. Realizing Robust User Authentication in Sensor Networks[C]//Stockholm. Sweden: 2005.
  • 5Kirk H M,Zheng Wong-yang, Cao Jian-nong. A Dynamic User Authenticationg Scheme for Wireless Sensor Networks Pdf[C]// 2006.
  • 6Zhang Wen-sheng, Song Hui, Zhu Sen-cun. Least Privilege and Privilege Deprivation. Towards Toleraling Mobile Sink Compromises in Wireless Sensor Networls[C]//ACM MobHoc. 2005: 182-188.
  • 7B R. An Optimal Class of Symmetric Key Gneration Systems[C]// Paris. France, 1985.
  • 8Wang Hao-dong. Distributed User Access Control in Sensor Networks[C]//San Francisco. CA,2006.
  • 9Perrig A, Szewczyk R, et al. SPINS: Security protocols for sensor network[J]. Wireless Networks, 2002,8(5): 521-534.
  • 10Liu D, Nini P. Multi-level μTESLA: a broadcast authentication system for distributed sensor networks[J]. ACM Transactions on Embedded Computing Systems (TECS), 2004,3(4) : 800-836.

二级参考文献393

共引文献3067

同被引文献66

  • 1裴庆祺,沈玉龙,马建峰.无线传感器网络安全技术综述[J].通信学报,2007,28(8):113-122. 被引量:93
  • 2PERHIG A,STANKOVIC J,WAGNER D. Security in wireless sensornetworks"]. Communications of the ACM,2004,47(6) :53-57.
  • 3TAGUE P,POOVENDRAN R. Modeling node capture attacks inwireless sensor networks [ C]//Proc of the 46th Annual Allerton Con-ference on Communication, Control, and Computing. 2008 : 1221-1224.
  • 4NEWSOME J, SHI E, SONG D,et al. The sybil attack in sensornetworks : analysis & defenses [ C]//Proc of the 3rd InternationalSymposium on Information Processing in Sensor Networks. New York :ACM Press,2004:259-268..
  • 5PARNO B,PERRIG A, GLIGOR V. Distributed detection of nodereplication attacks in sensor networks [ C] //Proc of IEEE Symposiumon Security and Privacy. Washington DC: IEEE Computer Society,2005:49-63.
  • 6ZHU Wen-tao. Node replication attacks in wireless sensor networks:bypassing the neighbor-based detection scheme [ C] //Proc of the In-ternational Conference on Network Computing and Information Securi-ty. 2011:156-160.
  • 7MEGHDADI M, OZDEMIR S,GULER I. A survey of wormhole-based attacks and their countermeasures in wireless sensor networks[J].丨ETE Technical Review,2011,28(2) :89-102.
  • 8DU Xiao-jiang, CHEN H H. Security in wireless sensor networks[J]. IEEE Wireless Communications,2008,15(4) :60-66.
  • 9WONG K H M, ZHENG Yuan, CAO Jian-nong, et al. A dynamicuser authentication scheme for wireless sensor networks [ C] //Proc ofIEEE International Conference on Sensor Networks, Ubiquitous, andTrustworthy Computing. 2006:244-251.
  • 10TSENG H R, JAN Rong-hong, YANG W. An improved dynamic userauthentication scheme for wireless sensor networks [ C] //Proc of theGlobal Telecommunications Conference. 2007 :986-990.

引证文献4

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部