The Study on Wireless Sensor Networks Security Access Scheme

被引:0
|
作者
Miao, Xiaofeng [1 ]
Fan, Panguo [1 ]
Mu, Dejun [1 ]
机构
[1] Northwestern Polytech Univ, Sch Automat, Xian, Peoples R China
来源
ADVANCED TECHNOLOGY IN TEACHING - PROCEEDINGS OF THE 2009 3RD INTERNATIONAL CONFERENCE ON TEACHING AND COMPUTATIONAL SCIENCE (WTCS 2009), VOL 2: EDUCATION, PSYCHOLOGY AND COMPUTER SCIENCE | 2012年 / 117卷
关键词
Wireless Sensor Networks; Security Access Scheme; Access Archtecture;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we design a UCON based security access scheme for WSNs. The proposed scheme can not only provide secure authentication with low expenses between client nodes and server nodes, but also perform access control with attribute mutability and decision continuity. Our initial work with the proposed model has been very promising and provides a great tool to resolve the security access problem for WSNs.
引用
收藏
页码:233 / 241
页数:9
相关论文
共 50 条
  • [21] A security protocol for Wireless Sensor Networks
    Zhang, Chang N.
    Yu, Qian
    Huang, Xun
    Yang, Cungang
    WIRELESS SENSOR AND ACTOR NETWORKS II, 2008, 264 : 113 - +
  • [22] Quantum security in wireless sensor networks
    Naya Nagy
    Marius Nagy
    Selim G. Akl
    Natural Computing, 2010, 9 : 819 - 830
  • [23] THE SECURITY PROBLEM IN WIRELESS SENSOR NETWORKS
    Zhao, Xiaoye
    2012 IEEE 2nd International Conference on Cloud Computing and Intelligent Systems (CCIS) Vols 1-3, 2012, : 1079 - 1082
  • [24] Security Mechanisms for Wireless Sensor Networks
    Ren, Xiuli
    Yul, Haibin
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (3B): : 155 - 161
  • [25] SECURITY INFRASTRUCTURE FOR WIRELESS SENSOR NETWORKS
    Gheorghe, Laura
    Rughinis, Razvan
    Tapus, Nicolae
    UNIVERSITY POLITEHNICA OF BUCHAREST SCIENTIFIC BULLETIN SERIES C-ELECTRICAL ENGINEERING AND COMPUTER SCIENCE, 2011, 73 (02): : 103 - 116
  • [26] Security methods for wireless sensor networks
    Ren, Xiuli
    IEEE ICMA 2006: Proceeding of the 2006 IEEE International Conference on Mechatronics and Automation, Vols 1-3, Proceedings, 2006, : 1925 - 1930
  • [27] Security Enhanced and Cost-effective User Authentication Scheme for Wireless Sensor Networks
    Liu, Wenfen
    Zhou, Gang
    Wei, Jianghong
    Hu, Xuexian
    Kumari, Saru
    INFORMATION TECHNOLOGY AND CONTROL, 2018, 47 (02): : 275 - 294
  • [28] A two-factor security authentication scheme for wireless sensor networks in IoT environments
    Hu, Bin
    Tang, Wen
    Xie, Qi
    NEUROCOMPUTING, 2022, 500 : 741 - 749
  • [29] A Secret-Sharing-based Security Data Aggregation Scheme in Wireless Sensor Networks
    Liu, Xiaowu
    Ma, Wenshuo
    Yu, Jiguo
    Yu, Kan
    Xiang, Jiaqi
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2021, PT II, 2021, 12938 : 303 - 313
  • [30] Efficient and Security Enhanced Anonymous Authentication with Key Agreement Scheme in Wireless Sensor Networks
    Jung, Jaewook
    Moon, Jongho
    Lee, Donghoon
    Won, Dongho
    SENSORS, 2017, 17 (03)