期刊文献+

无线传感器网络访问控制的研究进展 被引量:4

Survey of access control in wireless sensor networks
下载PDF
导出
摘要 针对无线传感器网络安全研究中访问控制所面临的安全挑战,归纳和总结了目前国内外在该领域的相关研究和现状,然后对现有的安全访问控制方案进行了系统的分析和比较。对无线传感器网络安全访问控制的研究方向、进展和趋势进行了探讨。 This paper firstly investigated the security issues of access control challenges in wireless sensor networks. Then it summarized, analyzed, and compared the current situations and related research at horn6 and abroad. At last,it studied the fur- ther directions of wireless sensor networks access control techniques.
出处 《计算机应用研究》 CSCD 北大核心 2013年第10期2896-2902,共7页 Application Research of Computers
基金 新疆维吾尔自治区自然科学基金资助项目(2013211A012)
关键词 无线传感器网络 访问控制 节点部署 认证 安全 wireless sensor networks access control node placement authentication security
  • 相关文献

参考文献44

  • 1李凤华,苏铓,史国振,马建峰.访问控制模型研究进展及发展趋势[J].电子学报,2012,40(4):805-813. 被引量:126
  • 2PERHIG A,STANKOVIC J,WAGNER D. Security in wireless sensornetworks"]. Communications of the ACM,2004,47(6) :53-57.
  • 3TAGUE P,POOVENDRAN R. Modeling node capture attacks inwireless sensor networks [ C]//Proc of the 46th Annual Allerton Con-ference on Communication, Control, and Computing. 2008 : 1221-1224.
  • 4NEWSOME J, SHI E, SONG D,et al. The sybil attack in sensornetworks : analysis & defenses [ C]//Proc of the 3rd InternationalSymposium on Information Processing in Sensor Networks. New York :ACM Press,2004:259-268..
  • 5PARNO B,PERRIG A, GLIGOR V. Distributed detection of nodereplication attacks in sensor networks [ C] //Proc of IEEE Symposiumon Security and Privacy. Washington DC: IEEE Computer Society,2005:49-63.
  • 6ZHU Wen-tao. Node replication attacks in wireless sensor networks:bypassing the neighbor-based detection scheme [ C] //Proc of the In-ternational Conference on Network Computing and Information Securi-ty. 2011:156-160.
  • 7MEGHDADI M, OZDEMIR S,GULER I. A survey of wormhole-based attacks and their countermeasures in wireless sensor networks[J].丨ETE Technical Review,2011,28(2) :89-102.
  • 8DU Xiao-jiang, CHEN H H. Security in wireless sensor networks[J]. IEEE Wireless Communications,2008,15(4) :60-66.
  • 9裴庆祺,沈玉龙,马建峰.无线传感器网络安全技术综述[J].通信学报,2007,28(8):113-122. 被引量:93
  • 10WONG K H M, ZHENG Yuan, CAO Jian-nong, et al. A dynamicuser authentication scheme for wireless sensor networks [ C] //Proc ofIEEE International Conference on Sensor Networks, Ubiquitous, andTrustworthy Computing. 2006:244-251.

二级参考文献155

共引文献257

同被引文献31

  • 1Struts-menu源码分析[EB/OL].http://www.raibledesigns.com/struts-menu.2006-9-10.
  • 2Ferraiolo D F, Barkley J F, Kuhn D R.A role based access control model and reference implementation within a corporate intranet[J].ACM Transactions on Information and System Security,1999,2( 1):47-68.
  • 3Sandhu R, Coyne E J, Feinstein H L, et al.Role-based access control models[J].IEEE Computer, 1996, 29(2): 38-47.
  • 4Epstein P, Sandhu R.Towards a UML based approach to role engineering[C]//Proceedings of the 4th ACM Work- shop on Role-Based Access Control,Fairfax, 1999.
  • 5Youman C, Coyne E, Sandhu R.Proceedings of the 3rd ACM Workshop on Role-Based Access Control[C].[S.l.]: ACM, 1998:555-557.
  • 6Ferraiolo D F, Sandhu R, Gavrila S, et al.Proposed NIST standard for role-based access control[J].ACM Transac- tions on Information and System Security,2001,43 (3) : 224-274.
  • 7陈雄华.Acegi框架介绍[EB/OL].程序员大本营.(2007)http://blog.csdn.net/bio_go/archive/2008/07/28/2723350.aspx/.
  • 8Fowler M.重构:改善既有代码的设计[M].熊节,译.北京:人民邮电出版社,2010:77-80.
  • 9FERRAIOLO D F, BARKLEY J F, RICHARD KUHN D. A role based access control model and reference im- plementation within a corporate intranet [ J ]. ACM Transactions on Information and System Security, 1999, 2( 1 ) :34-64.
  • 10SANDHU R, EDWARD J C, FEINSTEIN H L, et al. Role- based access control models [ J ]. IEEE Comput- er, 1996,29(2) :38- 47.

引证文献4

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部