期刊文献+

无线传感网络的安全访问控制算法研究 被引量:1

Secure Access Control Algorithm for Wireless Sensor Network
下载PDF
导出
摘要 提出一种基于速率变化调整的无线传感网络安全访问控制算法,首先分析无线传感网络访问数据平均输入速率和输出速率、访问数据效率控制、访问数据公平性控制等参数的要求;采用丢包率平滑器,对无线传感网络丢包数据进行平滑处理;最后通过对无线传感网络访问数据包速率变化的调整,实现安全访问控制.实验结果分析证明,利用该算法能够最大限度地利用无线传感网络中的服务资源,实现了无线传感网络的安全访问控制,具有广泛的应用价值. This paper proposes a method to match the feature points of user information based on probability generation.In the fusion probability assignment generation theory to set up a user information probability generation model,the latent variables of unknown type defines the user information for the model,calculate the joint probability distribution,distribution of resources of each type of access to a posteriori estimates,given different types of resources associated with the measurement of the threshold,construct the matching feature expression,calculate the most the characteristics of short distance between adjacent types of user information,the user information matching feature points of University library.The simulation results show that the proposed method can improve the accuracy of the feature points matching,which can lay a solid foundation for improving the service quality of University library.
出处 《微电子学与计算机》 CSCD 北大核心 2017年第11期124-127,共4页 Microelectronics & Computer
关键词 无线传感网络 安全访问 丢包率平滑器 速率变化 控制算法 wireless sensor network security access the packet rate smoother rate of change: control algorithm
  • 相关文献

参考文献10

二级参考文献125

  • 1蔡谊,郑志蓉,沈昌祥.基于多级安全策略的二维标识模型[J].计算机学报,2004,27(5):619-624. 被引量:28
  • 2刘应军,顾松山,周雨华,张深寿,戴泽军.新一代天气雷达体扫模式的比较分析[J].气象,2006,32(1):44-50. 被引量:10
  • 3沈昌祥,张焕国,冯登国,曹珍富,黄继武.信息安全综述[J].中国科学(E辑),2007,37(2):129-150. 被引量:357
  • 4李忱,张越,陈赢.气象雷达组网和网络气象雷达的发展[C]//第26届中国气象学会年会第三届气象综合探测技术研讨会分会场论文集.2009:588-592.
  • 5陆嘉恒.Hadoop实战[M].2版.北京:机械工业出版社,2012.
  • 6Cohen G H, Coon G A. Theoretical consideration of retarded control. Trans. ASME, 1953 ;75:827-833.
  • 7Miller J A, Lopez A M, Smith C L, et al. A comparison of controller tuning techniques. Control Engineering, 1967; 12:72-75.
  • 8Vaquero L, Rodero Marino L, Cacerce J, et al. A break in the clouds., towards a cloud definition J]. SIGCOMM Computer Com- munication Review, 2009, 39 (1) . 50 - 55.
  • 9Wan Z G, Liu J, Deng R H. HASBE: A Hierarchical Attribute- Based Solution for Flexibleand Scalable Access Control in Cloud Computing [J]. IEEE Transactions on Information Forensics and Security, 2012, 7 (2): 743-754.
  • 10Yu S, Wang C, Ren K, et al. Achieving secure, scalable, and fine-grained data access control in cloud computing [A]. INFO- COM, 2010 Proceeding IEEE. San Diego, CA: IEEE [C]. Con- ference Publications, 2010:534 - 542.

共引文献78

同被引文献11

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部