首页 | 官方网站   微博 | 高级检索  
     

基于信息覆盖的无线传感器网络访问控制机制
引用本文:杜志强,沈玉龙,马建峰,周利华.基于信息覆盖的无线传感器网络访问控制机制[J].通信学报,2010,31(2):113-119.
作者姓名:杜志强  沈玉龙  马建峰  周利华
作者单位:西安电子科技大学,计算机学院,陕西,西安,710071;西安电子科技大学,计算机网络与信息安全教育部重点实验室,陕西,西安,710071
基金项目:国家自然科学基金资助项目,陕西省自然科学基金资助项目,航空科学基金资助项目 
摘    要:通过周期性地信息扩散,设计THC(two-hop cover)算法,使传感器节点能够在用户移动过程中及时得到用户的认证信息.基于THC算法,引入Merkle散列树和单向链等安全机制,采用分布式的访问控制模式,提出了适用于随机移动用户的传感器网络访问控制机制.分析和实验表明,本机制既适用移动用户,也适用静止用户,计算、通信、存储开销低,能够抵制节点捕获、重放、DoS等攻击.

关 键 词:无线传感器网络  网络安全  访问控制  单向链

Two-hop cover-based access control scheme for wireless sensor networks
DU Zhi-qiang,SHEN Yu-long,MA Jian-feng,ZHOU Li-hua.Two-hop cover-based access control scheme for wireless sensor networks[J].Journal on Communications,2010,31(2):113-119.
Authors:DU Zhi-qiang  SHEN Yu-long  MA Jian-feng  ZHOU Li-hua
Abstract:In order to support randomly moving users, a THC (two-hop cover) algorithm and a two-hop cover-based ac-cess control scheme were proposed. The proposed algorithm made two-hop nodes be able to retrieve access control in-formation of user's in time through diffusing the information periodically. The scheme based on THC algorithm, the se-curity mechanisms of Merkle hash tree and one way chain, as well as distributed access control mode, its main contribu-tion was it supports randomly moving users for the first time. The analyses and experiments have shown that the pro-posed scheme can be applied to both mobile and stationary user and have several advantages over the current access con-trol methods of low cost in computation, communication and storage, and resistance to node capture, query replay and DoS attacks.
Keywords:wireless sensor networks  network security  access control  one way chain
本文献已被 CNKI 万方数据 等数据库收录!
点击此处可从《通信学报》浏览原始摘要信息
点击此处可从《通信学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号