首页 | 本学科首页   官方微博 | 高级检索  
     


TC-BAC: A trust and centrality degree based access control model in wireless sensor networks
Authors:Junqi Duan  Deyun Gao  Chuan Heng Foh  Hongke Zhang
Affiliation:1. School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing 100044, PR China;2. Center for Communication Systems Research, University of Surrey, Guildford , Surrey, GU2 7XH, United Kingdom;1. Univ. Politècnica de Catalunya, Dept. d''Arquitectura de Computadors, c/Jordi Girona, 1-3, Barcelona, Spain;2. Univ. Politècnica de València, Communications Dep., València, Spain;1. Orange Labs, 92130 Issy les Moulineaux, France;2. Swinburne University of Technology, John Street, Hawthorn, 3122 Victoria, Australia;3. Telecom SudParis, 9 rue C. Fourier, 91011 Evry Cedex, France;4. INRIA, 2004 Route des Lucioles, 06902 Sophia-Antipolis, France;1. Applied Communication Science (ACS), Inc., Basking Ridge, NJ, USA;2. U.S. Army CERDEC, Aberdeen, MD, USA
Abstract:Access control is one of the major security concerns for wireless sensor networks. However, applying conventional access control models that rely on the central Certificate Authority and sophisticated cryptographic algorithms to wireless sensor networks poses new challenges as wireless sensor networks are highly distributed and resource-constrained. In this paper, a distributed and fine-grained access control model based on the trust and centrality degree is proposed (TC-BAC). Our design uses the combination of trust and risk to grant access control. To meet the security requirements of an access control system with the absence of Certificate Authority, a distributed trust mechanism is developed to allow access of a trusted node to a network. Then, centrality degree is used to assess the risk factor of a node and award the access, which can reduce the risk ratio of the access control scheme and provide a certain protection level. Finally, our design also takes multi-domain access control into account and solves this problem by utilizing a mapping mechanism and group access policies. We show with simulation that TC-BAC can achieve both the intended level of security and high efficiency suitable for wireless sensor networks.
Keywords:Access control  Trust computation  Centrality degree  Wireless sensor networks
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号