Advertisement

Research on the access control protocol Priccess design of network privacy protection

Article
  • 24 Downloads

Abstract

To provide a more reliable security for the network privacy, the access control protocol Priccess design of network privacy protection was studied. First of all, this paper presented the problems in wireless network security, and points out the key technologies, including privacy protection, user authentication, trust management, network security communication architecture and other technologies. Then, it made a brief analysis of the composition of the Priccess protocol, a wireless communication network in the roaming authentication scheme and wireless sensor network privacy data protection scheme. Furthermore, the roaming authentication scheme and wireless sensor networks data privacy protection in a wireless communication network was established. Finally, the results of the evaluation of the message load of Priccess protocol proved it was efficient for most of the user access devices, which could provide more efficient protection for the privacy of the network communication.

Keywords

Priccess design Privacy protection Wireless network security DAS Sensor network 

Notes

Acknowledgements

This study is supported by “Ningxia Autonomous Region Advantageous Discipline (Grant No. ND20151031)”.

References

  1. 1.
    Shin, M., Ma, J., Mishra, A., et al.: Wireless network security and interworking. Proc. IEEE 94(2), 455–466 (2006)CrossRefGoogle Scholar
  2. 2.
    Li, N., Zhang, N., Das, S.K., et al.: Privacy preservation in wireless sensor networks: a state-of-the-art survey. Ad Hoc Netw. 7(8), 1501–1514 (2009)CrossRefGoogle Scholar
  3. 3.
    Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Commun. ACM 47(6), 53–57 (2004)CrossRefGoogle Scholar
  4. 4.
    Walters, J.P., Liang, Z., Shi, W., et al.: Wireless sensor network security: a survey. Secur. Distrib. Grid Mob. Pervasive Comput. 1(8), 367 (2007)Google Scholar
  5. 5.
    Wood, A.D., Stankovic, J.: Denial of service in sensor networks. Computer 35(10), 54–62 (2002)CrossRefGoogle Scholar
  6. 6.
    Shi, E., Perrig, A.: Designing secure sensor networks. IEEE Wirel. Commun. 11(6), 38–43 (2004)CrossRefGoogle Scholar
  7. 7.
    Buttyán, L., Gessner, D., Hessler, A., et al.: Application of wireless sensor networks in critical infrastructure protection: challenges and design options [security and privacy in emerging wireless networks]. IEEE Wirel. Commun. 17(5), 44–49 (2010)CrossRefGoogle Scholar
  8. 8.
    Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 10(05), 571–588 (2002)MathSciNetCrossRefMATHGoogle Scholar
  9. 9.
    Want, R., Hopper, A., Falcao, V., et al.: The active badge location system. ACM Trans. Inf. Syst. (TOIS) 10(1), 91–102 (1992)CrossRefGoogle Scholar
  10. 10.
    Kargl, F., Papadimitratos, P., Buttyan, L., et al.: Secure vehicular communication systems: implementation, performance, and research challenges. IEEE Commun. Mag. 46(11), 110–118 (2008)CrossRefGoogle Scholar
  11. 11.
    Wood, A., Virone, G., Doan, T., et al.: ALARM-NET: wireless sensor networks for assisted-living and residential monitoring. Univ. Virginia Comput. Sci. Dep. Tech. Rep. 2(9), 90–93 (2006)Google Scholar
  12. 12.
    Ostfeld, A., Uber, J.G., Salomons, E., et al.: The battle of the water sensor networks (BWSN): a design challenge for engineers and algorithms. J. Water Resour. Plan. Manage. 134(6), 556–568 (2008)CrossRefGoogle Scholar
  13. 13.
    Al Ameen, M., Liu, J., Kwak, K.: Security and privacy issues in wireless sensor networks for healthcare applications. J. Med. Syst. 36(1), 93–101 (2012)CrossRefGoogle Scholar
  14. 14.
    Kundur, D., Luh, W., Okorafor, U.N., et al.: Security and privacy for distributed multimedia sensor networks. Proc. IEEE 96(1), 112–130 (2008)CrossRefGoogle Scholar
  15. 15.
    Li, H., Lin, K., Li, K.: Energy-efficient and high-accuracy secure data aggregation in wireless sensor networks. Comput. Commun. 34(4), 591–597 (2011)MathSciNetCrossRefGoogle Scholar
  16. 16.
    Akyildiz, I.F., Pompili, D., Melodia, T.: Underwater acoustic sensor networks: research challenges. Ad hoc Netw. 3(3), 257–279 (2005)CrossRefGoogle Scholar
  17. 17.
    Zhao, J., Zhang, P., Cao, G., et al.: Cooperative caching in wireless p2p networks: design, implementation, and evaluation. IEEE Trans. Parallel Distrib. Syst. 21(2), 229–241 (2010)CrossRefGoogle Scholar
  18. 18.
    Baker, S.D., Hoglund, D.H.: Medical-grade, mission-critical wireless networks [designing an enterprise mobility solution in the healthcare environment]. IEEE Eng. Med. Biol. Mag. 27(2), 86–95 (2008)CrossRefGoogle Scholar
  19. 19.
    Khan, M.K., Alghathbar, K.: Cryptanalysis and security improvements of ‘two-factor user authentication in wireless sensor networks’. Sensors 10(3), 2450–2459 (2010)CrossRefGoogle Scholar
  20. 20.
    Felt, A., Evans, D.: Privacy protection for social networking apis. Web 2.0 Secur. Priv. (W2SP’08) 5(7), 56–60 (2008)Google Scholar
  21. 21.
    Akyildiz, I.F., Wang, X., Wang, W.: Wireless mesh networks: a survey. Comput. Netw. 47(4), 445–487 (2005)CrossRefMATHGoogle Scholar
  22. 22.
    He, D., Bu, J., Zhu, S., et al.: Distributed access control with privacy support in wireless sensor networks. IEEE Trans. Wirel. Commun. 10(10), 3472–3481 (2011)CrossRefGoogle Scholar
  23. 23.
    Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1–11 (2011)CrossRefGoogle Scholar
  24. 24.
    Xiao, Y., Chen, H., Yang, S., et al.: Wireless network security. EURASIP J. Wirel. Commun. Netw. 20(1), 1–3 (2009)Google Scholar
  25. 25.
    Li, M., Lou, W., Ren, K.: Data security and privacy in wireless body area networks. IEEE Wirel. Commun. 17(1), 51–58 (2010)CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.School of Mathematics and Computer ScienceNingxia Normal UniversityGuyuanChina

Personalised recommendations