期刊文献+

物联网中基于受控对象的分布式访问控制 被引量:2

Distributed Access Control Scheme Based on Controlled Object in the Internet of Things
下载PDF
导出
摘要 提出了一种基于受控对象的分布式访问控制方法,将访问主体的访问权限直接与节点的资源对象相关联,由节点管理用户的权限,简化权限的管理。将对称密码体制与非对称密码体制应用于分布式访问控制中,根据设备对象的能力分别采用不同的加密策略,在保证控制强度的同时减小节点计算能耗。性能分析表明,该方案能够在节点低开销的基础上对用户进行有效的接入控制和权限限制,简化用户的权限管理,并有效减少用户DOS攻击和重放攻击对网络的威胁。 In this paper, we propose a distributed access control scheme based on controlled object, in which we make all of the nodes manage the user's right to simplify the right management, and adopt different encryption policy according to the ability of the device object to realize high level of control and low consumption of calculation. The analysis shows that proposed scheme can effectively control the user's access based on node's low cost, and mitigate DOS attack and reply attack of users.
出处 《电子科技大学学报》 EI CAS CSCD 北大核心 2012年第6期893-898,共6页 Journal of University of Electronic Science and Technology of China
基金 国家科技重大专项(2010ZX03006-001) 重庆市自然科技基金(cstc2011jjA40040) 重庆市科技攻关计划(cstc2011AB2096)
关键词 受控对象 分布式访问控制 权限 安全 物联网 controlled object distributed access control privilege security the Intemet of Things
  • 相关文献

参考文献11

  • 1WANG H, SHENG B, LI Q. Elliptic curve cryptography- based access control in sensor networks[J]. Security and Networks, 2006(1): 127-137.
  • 2LE Xuan-hung, LEE Sung-young, BUTUN I, et al. An energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography[J]. Communications and Networks, 2009, 6(11): 599-606.
  • 3YU Shu-cheng, REN Kui, LOU Wen-jing. FDAC: Toward fine-grained distributed data access control in wireless sensor networks[J]. Institute of Electrical and Electronics Engineers, 2011, 22(4): 673-686.
  • 4杨洋,丁仁杰,闵勇.基于受控对象的访问控制模型[J].电力系统自动化,2003,27(7):36-40. 被引量:10
  • 5WANG H, LI Q. Distributed user access control in sensor networks[C]//IEEE International Conference on Distributed Computing in Sensor Systems. San Francisco, CA. USA: IEEE, 2006: 305-320.
  • 6GURA N, PATEL A, WANDER A, et al. Comparing elliptic curve cryptography and RSA on 8-bit CPUs[J]. LNCS, 2004, 3156: 119-132.
  • 7VAIDYA B, SILVA J S, RODRIGUES J J P C. Robust dynamic user authentication scheme for wireless sensor networks[M]. New York, NY, USA: ACM Press, 2009.
  • 8CHAKRAVORTY R. A programmable service architecture for mobile medical care[C]//4th IEEE International Conference on Pervasive Computing and Communications. [S.I.]: IEEE, 2006.
  • 9LE Xuan-hung, KHALID M, SANKAR R. An efficient mutual authentication and access control scheme for wireless sensor networks in healthcare[J]. Journal of Networks, 2011, 6(3): 355-364.
  • 10吴世忠 祝世雄 张文政 等.应用密码学[M].北京:机械工业出版社,2000..

二级参考文献2

  • 1[4]Morris Sloman, Emil Lupu, Imperial College. Security and Management Policy Specification. IEEE Network, 2002, 16(2)
  • 2[5]Adam N R, Atluri Vijayalakshmi, Bertino Elisa. A Content-based Authorization Model for Digital Libraries. IEEE Translation Knowledge and Data Engineering, 2002, 14(2)

共引文献23

同被引文献24

  • 1沈海波,洪帆.基于属性的授权和访问控制研究[J].计算机应用,2007,27(1):114-117. 被引量:16
  • 2Zhu Yan,Ahn G J,Hu Hongxin,et al.Role-based cryptosystem:a new cryptographic RBAC system based on role-key hierarchy[J].IEEE Trans on Information Forensics and Security,2013,8(12):2138-2153.
  • 3Hebig R N,Meinel C,Menzel M,et al.A Web service architecture for decentralised identity and attribute-based access control[C] //Proc of IEEE International Conference on Web Services.2009:551-558.
  • 4Hummer W,Gaubatz P,Strembeck M,et al.An integrated approach for identity and access management in a SOA context[C] //Proc of the 16th ACM Symposium on Access Control Models and Technologies.2011:21-30.
  • 5Yuan E,Tong Jin.Attributed based access control (ABAC) for Web services[C] //Proc of IEEE International Conference on Web Services.2005.
  • 6Liu Songyun,Huang Hejiao.Role-based access control for distributed cooperation environment[C] //Proc of International Conference on Computational Intelligence and Security.2009:455-459.
  • 7钟将,冯永,汪成亮,等.基于属性的访问控制模型及其跨域访问方法[P].中国:201010533806.9,2011-03-30.
  • 8Azzedin F,Maheswaran M.Evolving and managing trust in grid computing systems[C] //Proc of IEEE Canadian Conference on Electrical and Computer Engineering.2002:1424-1429.
  • 9李晓峰,冯登国,陈朝武,房子河.基于属性的访问控制模型[J].通信学报,2008,29(4):90-98. 被引量:80
  • 10朱剑,赵海,徐久强,张希元,陆育慧.WSN中基于跨层策略的低能耗/高可靠通信问题研究[J].系统仿真学报,2009,21(16):4975-4979. 被引量:1

引证文献2

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部