The Trust-Based Access Control Model in the Wireless Sensor Network<bold> </bold>

被引:0
|
作者
Luo Jing-tang [1 ]
Yao Shi-ying [1 ]
Gou Ji-jun [1 ]
Xu Qi-yang [2 ]
机构
[1] State Grid Sichuan Econ Res Inst, Planning & Review Ctr, Chengdu, Sichuan, Peoples R China
[2] Xidian Univ, Sch Cyber Engn, Xian, Shaanxi, Peoples R China
关键词
WSNs; Access control; Trust; Ring signature<bold>; </bold>;
D O I
10.1109/NaNA2018.2018.00027
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of the wireless sensor networks (WSNs), a lot of sensitive and privacy data need to be protected. How to keep the illegal users from accessing these data, controlling the access behaviors of users and providing a limited service is one of the most important problems that the wireless sensor networks must solve. In this paper, an access control model which is based on ring signature and trust management is proposed in the wireless sensor network. In order to protect against external attack, we use the ring signature to guarantee the privacy access control of wireless sensor networks. In addition, we propose a method of computing trust value based on similarity, which can be used to control the access of each node in the sensor network by means of the combination of direct trust and indirect trust. At last, the model is analyzed qualitatively. Result shows that the model has been improved in terms of generality and security compared to the previous models.<bold> </bold>
引用
下载
收藏
页码:112 / 116
页数:5
相关论文
共 50 条
  • [1] An Overview of Security Services and Trust-Based Authentication Schemes in VANET<bold> </bold>
    Gayathri, M.
    Gomathy, C.
    MICRO-ELECTRONICS AND TELECOMMUNICATION ENGINEERING, ICMETE 2021, 2022, 373 : 193 - 205
  • [2] <bold>Dynamic Power Management based on Wavelet Neural Network in Wireless Sensor Networks</bold>
    Shen, Yan
    Guo, Bing
    2007 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING WORKSHOPS, PROCEEDINGS, 2007, : 431 - +
  • [3] A study on Energy Harvesting based Magnetic Sensor for Wireless Control of JIG Robot<bold> </bold>
    Kwon, Youngkuk
    Lee, Jangmyung
    2018 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY ROBOTICS (ICT-ROBOT), 2018,
  • [4] Energy Efficient Smart Wireless Sensor Network for Border Monitoring<bold> </bold>
    Mahdy, Islam W.
    Elkhatib, Mohamed M.
    Refky, Mohamed A.
    2018 14TH INTERNATIONAL COMPUTER ENGINEERING CONFERENCE (ICENCO), 2018, : 219 - 224
  • [5] RSSI Strength Measurement in Wireless Sensor Network with andWithout Obstacles<bold> </bold>
    Anand, Santosh
    Muralidharan, Roshan
    Manoj, K.
    Shreyas, C.
    Kariappa, Hruthik
    MICRO-ELECTRONICS AND TELECOMMUNICATION ENGINEERING, ICMETE 2021, 2022, 373 : 593 - 608
  • [6] Application of Fuzzy Neural Network in the Trust-Based Access Control Model
    Su, Rina
    Zhang, Yongping
    Fan, Jianbo
    Wang, Yu
    2010 8TH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION (WCICA), 2010, : 1273 - 1276
  • [7] A trust-based dynamic access control model
    Ma, Shunan
    He, Jingsha
    Gao, Feng
    Sun, Xuguang
    Journal of Information and Computational Science, 2010, 7 (10): : 2165 - 2173
  • [8] <bold>A Security Framework for Wireless Sensor Networks</bold>
    Zia, Tanveer
    Zomaya, Albert
    PROCEEDINGS OF THE 2006 IEEE SENSORS APPLICATIONS SYMPOSIUM, 2006, : 49 - 53
  • [9] <bold>Passive Sensor Based Dynamic Object Association Method in Wireless Sensor Networks</bold>
    Cho, Shung Han
    Lee, Jinseok
    Deng, Xi
    Hong, Sangjin
    Cho, We-Duke
    2007 50TH MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1-3, 2007, : 979 - +
  • [10] An Efficient Trust-Based Routing Model for Clustered-Based Hetrogeneous Wireless Sensor Network
    Thaniyath, Gousia
    INTERNATIONAL JOURNAL OF BUSINESS DATA COMMUNICATIONS AND NETWORKING, 2020, 16 (02) : 84 - 101