Two-hop cover-based access control scheme for wireless sensor networks

In order to support randomly moving users,a THC(two-hop cover) algorithm and a two-hop cover-based ac-cess control scheme were proposed.The proposed algorithm made two-hop nodes be able to retrieve access control in-formation of user’s in time through diffusing the information periodically.The schem...

Full description

Saved in:
Bibliographic Details
Main Authors: DU Zhi-qiang1, SHEN Yu-long1, MA Jian-feng1, ZHOU Li-hua1
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2010-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/74649416/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841537686297378816
author DU Zhi-qiang1
SHEN Yu-long1
MA Jian-feng1
ZHOU Li-hua1
author_facet DU Zhi-qiang1
SHEN Yu-long1
MA Jian-feng1
ZHOU Li-hua1
author_sort DU Zhi-qiang1
collection DOAJ
description In order to support randomly moving users,a THC(two-hop cover) algorithm and a two-hop cover-based ac-cess control scheme were proposed.The proposed algorithm made two-hop nodes be able to retrieve access control in-formation of user’s in time through diffusing the information periodically.The scheme based on THC algorithm,the se-curity mechanisms of Merkle hash tree and one way chain,as well as distributed access control mode,its main contribu-tion was it supports randomly moving users for the first time.The analyses and experiments have shown that the pro-posed scheme can be applied to both mobile and stationary user and have several advantages over the current access con-trol methods of low cost in computation,communication and storage,and resistance to node capture,query replay and DoS attacks.
format Article
id doaj-art-8c8259a09b1e43dcbbc42468aba9a61d
institution Kabale University
issn 1000-436X
language zho
publishDate 2010-01-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-8c8259a09b1e43dcbbc42468aba9a61d2025-01-14T08:26:39ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2010-01-013111311974649416Two-hop cover-based access control scheme for wireless sensor networksDU Zhi-qiang1SHEN Yu-long1MA Jian-feng1ZHOU Li-hua1In order to support randomly moving users,a THC(two-hop cover) algorithm and a two-hop cover-based ac-cess control scheme were proposed.The proposed algorithm made two-hop nodes be able to retrieve access control in-formation of user’s in time through diffusing the information periodically.The scheme based on THC algorithm,the se-curity mechanisms of Merkle hash tree and one way chain,as well as distributed access control mode,its main contribu-tion was it supports randomly moving users for the first time.The analyses and experiments have shown that the pro-posed scheme can be applied to both mobile and stationary user and have several advantages over the current access con-trol methods of low cost in computation,communication and storage,and resistance to node capture,query replay and DoS attacks.http://www.joconline.com.cn/zh/article/74649416/wireless sensor networksnetwork securityaccess controlone way chain
spellingShingle DU Zhi-qiang1
SHEN Yu-long1
MA Jian-feng1
ZHOU Li-hua1
Two-hop cover-based access control scheme for wireless sensor networks
Tongxin xuebao
wireless sensor networks
network security
access control
one way chain
title Two-hop cover-based access control scheme for wireless sensor networks
title_full Two-hop cover-based access control scheme for wireless sensor networks
title_fullStr Two-hop cover-based access control scheme for wireless sensor networks
title_full_unstemmed Two-hop cover-based access control scheme for wireless sensor networks
title_short Two-hop cover-based access control scheme for wireless sensor networks
title_sort two hop cover based access control scheme for wireless sensor networks
topic wireless sensor networks
network security
access control
one way chain
url http://www.joconline.com.cn/zh/article/74649416/
work_keys_str_mv AT duzhiqiang1 twohopcoverbasedaccesscontrolschemeforwirelesssensornetworks
AT shenyulong1 twohopcoverbasedaccesscontrolschemeforwirelesssensornetworks
AT majianfeng1 twohopcoverbasedaccesscontrolschemeforwirelesssensornetworks
AT zhoulihua1 twohopcoverbasedaccesscontrolschemeforwirelesssensornetworks