期刊文献+

一种基于角色的WSN访问控制改进方案 被引量:1

An Improved Role-based Access Control Scheme in Wireless Sensor Network
下载PDF
导出
摘要 为提高无线传感器网络中访问控制的安全性和公平性,引入角色思想,提出一种改进的访问控制方案。利用角色授权机制和智能卡认证模式相结合的方法,提高基站密钥的安全性和会话密钥的公平性,同时改善系统权限管理的灵活性和复用性。通过相互认证策略使通信双方检测并拒绝不正确或不完整的交换信息。理论分析结果表明,与Das方案相比,该方案在通信成本方面减少了384 bit,并具有合理的计算成本和相近的存储成本,安全性更高。 In order to improve the security and fairness of access control in Wireless Sensor Network(WSN) and introduce role theory, this paper proposes an improved role-based access control scheme in WSN. Combining the role authorization with the smart card authentication model, this scheme improves the security and the fairness of the session key as well as the flexibility and reusability of system permissions management. Mutual authentication is provided for two parties to detect and reject incorrect or incomplete exchange information. Through theoretical analysis and evaluation, it proves that this scheme reduces 384 bit in communication costs and has a reasonable calculation cost as well as analogical storage cost compared with Das scheme, and it is more secure.
出处 《计算机工程》 CAS CSCD 2014年第5期129-133,共5页 Computer Engineering
基金 国家自然科学基金资助项目(61070164) 广东省自然科学基金资助项目(S2011010002708) 广东省教育部产学研结合基金资助项目(2012B091000038)
关键词 无线传感器网络 基于角色的访问控制 认证 公平性 哈希函数 智能卡 Wireless Sensor Network(WSN) role-based access control authentication fairness Hash function smart card
  • 相关文献

参考文献3

二级参考文献23

  • 1李刚.轻量级Java EE企业应用实战.北京:电子工业出版社,2008.
  • 2思志学.自己动手写Struts.北京:电子工业出版社,2007.
  • 3(加)Budi Kurniawan著,杨涛,王建桥,杨晓云等译.深入浅出Struts 2.北京:人民邮电出版社,2009.
  • 4孙鑫..Java Web开发详解[M].北京:电子工业出版社,2008.
  • 5L Snyder. Formal Models of Capability-based Protection Systems[ J].IEEE Transactions on Computers, 1981,30(3 ) :172-181.
  • 6R Sandhu, E Coyne, H Feinstein. Role-based Access Control Models[ J]. IEEE Computer, 1996,29 (6) :38-47.
  • 7D Ferraiolo, R Sandhu,et al. Proposed NIST Standard for Role-based Access Control [ J ]. ACM Transactions on Information and System Security(TISSEC) ,2001,4(3) :224-274.
  • 8R Thomas, R Sandhu. Task-Based Authorization Controls(TBAC) : A Family of Models for Active and Enterprise-Oriented Authorization Management[ C]. Lake Tahoe, CA: Proceedings of the 11th IFIP WG11.3 Conference on Database Security, 1997.
  • 9Gail-Joon Ahn, Myong Kang,et al. Injecting RBAC to Secure a Webbased Workflow System[ C]. ACM RBAC, 2000.
  • 10Sejong Oh, Seog Park. Task-role-based Access Control Model[ J ]. Information System, 2003, 28 : 533-562.

共引文献104

同被引文献7

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部