Advertisement

The Study on Wireless Sensor Networks Security Access Scheme

  • Xiaofeng Miao
  • Panguo Fan
  • Dejun Mu
Conference paper
Part of the Advances in Intelligent and Soft Computing book series (AINSC, volume 117)

Abstract

In this paper, we design a UCON based security access scheme for WSNs. The proposed scheme can not only provide secure authentication with low expenses between client nodes and server nodes, but also perform access control with attribute mutability and decision continuity. Our initial work with the proposed model has been very promising and provides a great tool to resolve the security access problem for WSNs.

Keywords

Wireless Sensor Networks Security Access Scheme Access Archtecture 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Panja, B., Madria, S.K., Bhargava, B.: A role-based access in a hierarchical sensor network architecture to provide multilevel security. Computer Communications 31(4), 793–806 (2008)CrossRefGoogle Scholar
  2. 2.
    Maccari, L., Mainardi, L., Marchitti, M.A., Prasad, N.R., Fantacci, R.: Lightweight, distributed access control for wireless sensor networks supporting mobility. In: The Proc. IEEE International Conference on Communications (ICC 2008), vol. 7, pp. 1141–1145 (May 2008)Google Scholar
  3. 3.
    Zhou, Y., Zhang, Y., Fang, Y.: Access control in wireless sensor networks. Ad Hoc Networks 5(1), 3–13 (2007)CrossRefGoogle Scholar
  4. 4.
    Shen, Y., Ma, J., Pei, Q.: An Access Control Scheme in Wireless Sensor Networks. In: Proc. 4th IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007), Dalian, China, September 2007, pp. 362–367 (2007)Google Scholar
  5. 5.
    Pu, F., Sun, D., Cao, Q., Cai, H., Yang, F.: Pervasive Computing Context Access Control Based on UCONABC Model. In: Proc. 2nd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), Pasadena, California, USA, December 2006, pp. 689–692 (2006)Google Scholar
  6. 6.
    Zhang, X., Presicce, F.P., Sandhu, R.: Formal Model and Policy Specification of Usage Control. ACM Transactions on Information and System Security 8(4), 351–387 (2005)CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media Dordrecht 2012

Authors and Affiliations

  1. 1.School of AutomationNorthwestern Polytechnical UniversityXi’anChina
  2. 2.Xi’an Innovation CollegeYan’an UniversityXi’anChina

Personalised recommendations