Two-hop cover-based access control scheme for wireless sensor networks
In order to support randomly moving users,a THC(two-hop cover) algorithm and a two-hop cover-based ac-cess control scheme were proposed.The proposed algorithm made two-hop nodes be able to retrieve access control in-formation of user’s in time through diffusing the information periodically.The schem...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2010-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74649416/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841537686297378816 |
---|---|
author | DU Zhi-qiang1 SHEN Yu-long1 MA Jian-feng1 ZHOU Li-hua1 |
author_facet | DU Zhi-qiang1 SHEN Yu-long1 MA Jian-feng1 ZHOU Li-hua1 |
author_sort | DU Zhi-qiang1 |
collection | DOAJ |
description | In order to support randomly moving users,a THC(two-hop cover) algorithm and a two-hop cover-based ac-cess control scheme were proposed.The proposed algorithm made two-hop nodes be able to retrieve access control in-formation of user’s in time through diffusing the information periodically.The scheme based on THC algorithm,the se-curity mechanisms of Merkle hash tree and one way chain,as well as distributed access control mode,its main contribu-tion was it supports randomly moving users for the first time.The analyses and experiments have shown that the pro-posed scheme can be applied to both mobile and stationary user and have several advantages over the current access con-trol methods of low cost in computation,communication and storage,and resistance to node capture,query replay and DoS attacks. |
format | Article |
id | doaj-art-8c8259a09b1e43dcbbc42468aba9a61d |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2010-01-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-8c8259a09b1e43dcbbc42468aba9a61d2025-01-14T08:26:39ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2010-01-013111311974649416Two-hop cover-based access control scheme for wireless sensor networksDU Zhi-qiang1SHEN Yu-long1MA Jian-feng1ZHOU Li-hua1In order to support randomly moving users,a THC(two-hop cover) algorithm and a two-hop cover-based ac-cess control scheme were proposed.The proposed algorithm made two-hop nodes be able to retrieve access control in-formation of user’s in time through diffusing the information periodically.The scheme based on THC algorithm,the se-curity mechanisms of Merkle hash tree and one way chain,as well as distributed access control mode,its main contribu-tion was it supports randomly moving users for the first time.The analyses and experiments have shown that the pro-posed scheme can be applied to both mobile and stationary user and have several advantages over the current access con-trol methods of low cost in computation,communication and storage,and resistance to node capture,query replay and DoS attacks.http://www.joconline.com.cn/zh/article/74649416/wireless sensor networksnetwork securityaccess controlone way chain |
spellingShingle | DU Zhi-qiang1 SHEN Yu-long1 MA Jian-feng1 ZHOU Li-hua1 Two-hop cover-based access control scheme for wireless sensor networks Tongxin xuebao wireless sensor networks network security access control one way chain |
title | Two-hop cover-based access control scheme for wireless sensor networks |
title_full | Two-hop cover-based access control scheme for wireless sensor networks |
title_fullStr | Two-hop cover-based access control scheme for wireless sensor networks |
title_full_unstemmed | Two-hop cover-based access control scheme for wireless sensor networks |
title_short | Two-hop cover-based access control scheme for wireless sensor networks |
title_sort | two hop cover based access control scheme for wireless sensor networks |
topic | wireless sensor networks network security access control one way chain |
url | http://www.joconline.com.cn/zh/article/74649416/ |
work_keys_str_mv | AT duzhiqiang1 twohopcoverbasedaccesscontrolschemeforwirelesssensornetworks AT shenyulong1 twohopcoverbasedaccesscontrolschemeforwirelesssensornetworks AT majianfeng1 twohopcoverbasedaccesscontrolschemeforwirelesssensornetworks AT zhoulihua1 twohopcoverbasedaccesscontrolschemeforwirelesssensornetworks |