The Trust-Based Access Control Model in the Wireless Sensor Network<bold> </bold>

被引:0
|
作者
Luo Jing-tang [1 ]
Yao Shi-ying [1 ]
Gou Ji-jun [1 ]
Xu Qi-yang [2 ]
机构
[1] State Grid Sichuan Econ Res Inst, Planning & Review Ctr, Chengdu, Sichuan, Peoples R China
[2] Xidian Univ, Sch Cyber Engn, Xian, Shaanxi, Peoples R China
关键词
WSNs; Access control; Trust; Ring signature<bold>; </bold>;
D O I
10.1109/NaNA2018.2018.00027
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of the wireless sensor networks (WSNs), a lot of sensitive and privacy data need to be protected. How to keep the illegal users from accessing these data, controlling the access behaviors of users and providing a limited service is one of the most important problems that the wireless sensor networks must solve. In this paper, an access control model which is based on ring signature and trust management is proposed in the wireless sensor network. In order to protect against external attack, we use the ring signature to guarantee the privacy access control of wireless sensor networks. In addition, we propose a method of computing trust value based on similarity, which can be used to control the access of each node in the sensor network by means of the combination of direct trust and indirect trust. At last, the model is analyzed qualitatively. Result shows that the model has been improved in terms of generality and security compared to the previous models.<bold> </bold>
引用
下载
收藏
页码:112 / 116
页数:5
相关论文
共 50 条
  • [41] Trust-based secure aggregation in wireless sensor networks
    Hur, Junbeom
    Lee, Yoonho
    Hong, Seongmin
    Yoon, Hyunsoo
    3RD INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND CONTROL TECHNOLOGIES, VOL 3, PROCEEDINGS, 2005, : 1 - 6
  • [42] Trust-based Access Control Model in Multi-domain Environment
    Zhang Qikun
    Wang Ruifang
    Qu Jiaqing
    Gan Yong
    Zheng Jun
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (05): : 149 - 160
  • [43] <bold>ROBUST NEURAL NETWORK CONTROL OF A QUADROTOR HELICOPTER</bold>
    Nicol, C.
    Macnab, C. J. B.
    Ramirez-Serrano, A.
    2008 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-4, 2008, : 1178 - +
  • [44] Driver Braking Control Model for Vehicles<bold> </bold>
    Araki, Takuma
    Ohta, Hidetaka
    Fukuta, Yudai
    Oya, Masahiro
    2018 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY ROBOTICS (ICT-ROBOT), 2018,
  • [45] SVM and RGB-D Sensor Based Gesture Recognition for UAV Control<bold> </bold>
    Aguilar, Wilbert G.
    Cobena, Bryan
    Rodriguez, Guillermo
    Salcedo, Vinicio S.
    Collaguazo, Brayan
    AUGMENTED REALITY, VIRTUAL REALITY, AND COMPUTER GRAPHICS, AVR 2018, PT II, 2018, 10851 : 713 - 719
  • [46] A Desirability Function Approach to Evaluate a Wireless Network Communication Performance<bold> </bold>
    Akbulut, Ahmet
    Kalaycioglu, Aykut
    Arslan, Dilek
    Orumlu, Miase
    Saygin, Oktay
    Kilinc, Ali
    Yilmaz, Asim Egemen
    2018 2ND INTERNATIONAL SYMPOSIUM ON MULTIDISCIPLINARY STUDIES AND INNOVATIVE TECHNOLOGIES (ISMSIT), 2018, : 335 - +
  • [47] <bold>Data Traffic Analysis in Wireless Fusion Network with Multiple Sensors</bold>
    Lee, Jinseok
    Jung, Sangkil
    Kyong, Yuntai
    Deng, Xi
    Hong, Sangjin
    Cho, We-Duke
    2007 50TH MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1-3, 2007, : 975 - +
  • [48] Anomaly Detection in Wireless Sensor Networks Data by Using Histogram Based Outlier Score Method<bold> </bold>
    Kalayci, Ilker
    Ercan, Tuncay
    2018 2ND INTERNATIONAL SYMPOSIUM ON MULTIDISCIPLINARY STUDIES AND INNOVATIVE TECHNOLOGIES (ISMSIT), 2018, : 337 - 342
  • [49] Design and Implementation Wireless Sensor Node with Security Algorithm Based on Microcontroller ESP8266<bold> </bold>
    Msekh, Zahraa A.
    Msekh, Alyaa A.
    MICRO-ELECTRONICS AND TELECOMMUNICATION ENGINEERING, ICMETE 2021, 2022, 373 : 363 - 371
  • [50] A Trust-based Secure Routing Algorithm for Wireless Sensor Networks
    Liu Wei
    Ye Qing
    Yang Nan
    2015 34TH CHINESE CONTROL CONFERENCE (CCC), 2015, : 7726 - 7729