期刊文献+

Ad Hoc网络中基于分簇的访问控制方案

CHENG Fan,WANG Xiaoming.Access control based on clustering in Ad Hoc networks
下载PDF
导出
摘要 基于分簇结构提出一种适用于AdHoc网络的访问控制方案。通过将资源和节点分等级来实现不同权限的访问控制;采用简单有效的信誉模型和激励机制来改变节点的权限,实现了动态的访问控制;通过簇头代理访问资源,增强了网络的安全性,并且使网络中优质资源得到充分利用。仿真结果表明,该方案有较高的效率和较少的通信量。 This paper proposes an access control scheme for cluster-based Ad Hoc networks. This scheme classifies the resources and nodes into levels to provide differentiated privileges access control. A dynamic access control mechanism is implemented based on the simple effective trust model and incentive mechanism which can change the node' s privilege. The cluster-head proxy is developed to access the resource that enhances security and fully uti- lizes the quality resources. Simulations result show that this scheme is of high efficiency and little communication.
作者 程帆 王晓明
出处 《计算机工程与应用》 CSCD 2012年第28期97-100,111,共5页 Computer Engineering and Applications
基金 国家自然科学基金(No.61070164 No.60773083) 广东省自然科学基金(No.8151063201000022) 广东省科技计划项目(No.2010B010600025)
关键词 AD HOC网络 分簇 访问控制 信誉模型 激励机制 Ad Hoc networks clustering access control trust model incentive mechanism
  • 相关文献

参考文献11

  • 1Ren Kui,Lou Wenjing, Kim Kwangjo,et al.A novel privacy preserving authentication and access control scheme for pervasive computing environments[J].IEEE Transactions on Vehicular Echnology, 2006,55 : 1373-1384.
  • 2Palomar E, Tapiador Juan M E.Secure content access and replication in pure P2P networks[J].Computer Communications, 2008,31 : 266-279.
  • 3Li Chun-ta, Hwang Ming-Shiang, Chu Ren-Ping.A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks[J].Computer Communications, 2008,31 : 2803-2814.
  • 4Yeh Lo-Yao, Chen Yen-Cheng, Huang Jiun-Long.PAACP. A portable privacy-preserving authentication and access control protocol in vehicular ad hoc networks[J].Computer Communications, 2010,5 : 1-10.
  • 5Liu Yuhua, Li Yuling.The incentive secure mechanism based on quality of service in P2P network[J].Computers and Mathematics with Applications, 2010,60: 224-233.
  • 6金瑜,古志民,顾进广,赵红武.一种对等网中基于相互信任的两层信任模型[J].软件学报,2009,20(7):1909-1920. 被引量:12
  • 7Drira K, Seba H, Kheddouci H.ECKG: an efficient clustering scheme for group key management in MANETs[J]. Computer Communications, 2010,33 (7) : 1094-1107.
  • 8Saxena N, Tsudik G, Yi J H.Threshold cryptography in P2P and MANETS:The case of access control[J].Computer Networks, 2007,51 : 3632-3649.
  • 9Martinez-Garcia C, Navarro-Arribasj G, Borrell J.Fuzzy role-based access control[J].Information Processing Letters,2011,111:483-487.
  • 10Lin Yu-Li, Hsu Chien-Lung.Sceure key management scheme for dynamic hierarchical access control basecd on ECC[J].The Journal of Systems and Software, 2011,84: 679-685.

二级参考文献2

共引文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部