Skip to main content
Erschienen in: Cluster Computing 5/2019

12.02.2018

RETRACTED ARTICLE: Research on the access control protocol Priccess design of network privacy protection

verfasst von: Xu Ma, Kai Kang, Wanshun Lu, Li Xu, Chen Chen

Erschienen in: Cluster Computing | Sonderheft 5/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

To provide a more reliable security for the network privacy, the access control protocol Priccess design of network privacy protection was studied. First of all, this paper presented the problems in wireless network security, and points out the key technologies, including privacy protection, user authentication, trust management, network security communication architecture and other technologies. Then, it made a brief analysis of the composition of the Priccess protocol, a wireless communication network in the roaming authentication scheme and wireless sensor network privacy data protection scheme. Furthermore, the roaming authentication scheme and wireless sensor networks data privacy protection in a wireless communication network was established. Finally, the results of the evaluation of the message load of Priccess protocol proved it was efficient for most of the user access devices, which could provide more efficient protection for the privacy of the network communication.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Shin, M., Ma, J., Mishra, A., et al.: Wireless network security and interworking. Proc. IEEE 94(2), 455–466 (2006)CrossRef Shin, M., Ma, J., Mishra, A., et al.: Wireless network security and interworking. Proc. IEEE 94(2), 455–466 (2006)CrossRef
2.
Zurück zum Zitat Li, N., Zhang, N., Das, S.K., et al.: Privacy preservation in wireless sensor networks: a state-of-the-art survey. Ad Hoc Netw. 7(8), 1501–1514 (2009)CrossRef Li, N., Zhang, N., Das, S.K., et al.: Privacy preservation in wireless sensor networks: a state-of-the-art survey. Ad Hoc Netw. 7(8), 1501–1514 (2009)CrossRef
3.
Zurück zum Zitat Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Commun. ACM 47(6), 53–57 (2004)CrossRef Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Commun. ACM 47(6), 53–57 (2004)CrossRef
4.
Zurück zum Zitat Walters, J.P., Liang, Z., Shi, W., et al.: Wireless sensor network security: a survey. Secur. Distrib. Grid Mob. Pervasive Comput. 1(8), 367 (2007)CrossRef Walters, J.P., Liang, Z., Shi, W., et al.: Wireless sensor network security: a survey. Secur. Distrib. Grid Mob. Pervasive Comput. 1(8), 367 (2007)CrossRef
5.
Zurück zum Zitat Wood, A.D., Stankovic, J.: Denial of service in sensor networks. Computer 35(10), 54–62 (2002)CrossRef Wood, A.D., Stankovic, J.: Denial of service in sensor networks. Computer 35(10), 54–62 (2002)CrossRef
6.
Zurück zum Zitat Shi, E., Perrig, A.: Designing secure sensor networks. IEEE Wirel. Commun. 11(6), 38–43 (2004)CrossRef Shi, E., Perrig, A.: Designing secure sensor networks. IEEE Wirel. Commun. 11(6), 38–43 (2004)CrossRef
7.
Zurück zum Zitat Buttyán, L., Gessner, D., Hessler, A., et al.: Application of wireless sensor networks in critical infrastructure protection: challenges and design options [security and privacy in emerging wireless networks]. IEEE Wirel. Commun. 17(5), 44–49 (2010)CrossRef Buttyán, L., Gessner, D., Hessler, A., et al.: Application of wireless sensor networks in critical infrastructure protection: challenges and design options [security and privacy in emerging wireless networks]. IEEE Wirel. Commun. 17(5), 44–49 (2010)CrossRef
8.
Zurück zum Zitat Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 10(05), 571–588 (2002)MathSciNetCrossRefMATH Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 10(05), 571–588 (2002)MathSciNetCrossRefMATH
9.
Zurück zum Zitat Want, R., Hopper, A., Falcao, V., et al.: The active badge location system. ACM Trans. Inf. Syst. (TOIS) 10(1), 91–102 (1992)CrossRef Want, R., Hopper, A., Falcao, V., et al.: The active badge location system. ACM Trans. Inf. Syst. (TOIS) 10(1), 91–102 (1992)CrossRef
10.
Zurück zum Zitat Kargl, F., Papadimitratos, P., Buttyan, L., et al.: Secure vehicular communication systems: implementation, performance, and research challenges. IEEE Commun. Mag. 46(11), 110–118 (2008)CrossRef Kargl, F., Papadimitratos, P., Buttyan, L., et al.: Secure vehicular communication systems: implementation, performance, and research challenges. IEEE Commun. Mag. 46(11), 110–118 (2008)CrossRef
11.
Zurück zum Zitat Wood, A., Virone, G., Doan, T., et al.: ALARM-NET: wireless sensor networks for assisted-living and residential monitoring. Univ. Virginia Comput. Sci. Dep. Tech. Rep. 2(9), 90–93 (2006) Wood, A., Virone, G., Doan, T., et al.: ALARM-NET: wireless sensor networks for assisted-living and residential monitoring. Univ. Virginia Comput. Sci. Dep. Tech. Rep. 2(9), 90–93 (2006)
12.
Zurück zum Zitat Ostfeld, A., Uber, J.G., Salomons, E., et al.: The battle of the water sensor networks (BWSN): a design challenge for engineers and algorithms. J. Water Resour. Plan. Manage. 134(6), 556–568 (2008)CrossRef Ostfeld, A., Uber, J.G., Salomons, E., et al.: The battle of the water sensor networks (BWSN): a design challenge for engineers and algorithms. J. Water Resour. Plan. Manage. 134(6), 556–568 (2008)CrossRef
13.
Zurück zum Zitat Al Ameen, M., Liu, J., Kwak, K.: Security and privacy issues in wireless sensor networks for healthcare applications. J. Med. Syst. 36(1), 93–101 (2012)CrossRef Al Ameen, M., Liu, J., Kwak, K.: Security and privacy issues in wireless sensor networks for healthcare applications. J. Med. Syst. 36(1), 93–101 (2012)CrossRef
14.
Zurück zum Zitat Kundur, D., Luh, W., Okorafor, U.N., et al.: Security and privacy for distributed multimedia sensor networks. Proc. IEEE 96(1), 112–130 (2008)CrossRef Kundur, D., Luh, W., Okorafor, U.N., et al.: Security and privacy for distributed multimedia sensor networks. Proc. IEEE 96(1), 112–130 (2008)CrossRef
15.
Zurück zum Zitat Li, H., Lin, K., Li, K.: Energy-efficient and high-accuracy secure data aggregation in wireless sensor networks. Comput. Commun. 34(4), 591–597 (2011)MathSciNetCrossRef Li, H., Lin, K., Li, K.: Energy-efficient and high-accuracy secure data aggregation in wireless sensor networks. Comput. Commun. 34(4), 591–597 (2011)MathSciNetCrossRef
16.
Zurück zum Zitat Akyildiz, I.F., Pompili, D., Melodia, T.: Underwater acoustic sensor networks: research challenges. Ad hoc Netw. 3(3), 257–279 (2005)CrossRef Akyildiz, I.F., Pompili, D., Melodia, T.: Underwater acoustic sensor networks: research challenges. Ad hoc Netw. 3(3), 257–279 (2005)CrossRef
17.
Zurück zum Zitat Zhao, J., Zhang, P., Cao, G., et al.: Cooperative caching in wireless p2p networks: design, implementation, and evaluation. IEEE Trans. Parallel Distrib. Syst. 21(2), 229–241 (2010)CrossRef Zhao, J., Zhang, P., Cao, G., et al.: Cooperative caching in wireless p2p networks: design, implementation, and evaluation. IEEE Trans. Parallel Distrib. Syst. 21(2), 229–241 (2010)CrossRef
18.
Zurück zum Zitat Baker, S.D., Hoglund, D.H.: Medical-grade, mission-critical wireless networks [designing an enterprise mobility solution in the healthcare environment]. IEEE Eng. Med. Biol. Mag. 27(2), 86–95 (2008)CrossRef Baker, S.D., Hoglund, D.H.: Medical-grade, mission-critical wireless networks [designing an enterprise mobility solution in the healthcare environment]. IEEE Eng. Med. Biol. Mag. 27(2), 86–95 (2008)CrossRef
19.
Zurück zum Zitat Khan, M.K., Alghathbar, K.: Cryptanalysis and security improvements of ‘two-factor user authentication in wireless sensor networks’. Sensors 10(3), 2450–2459 (2010)CrossRef Khan, M.K., Alghathbar, K.: Cryptanalysis and security improvements of ‘two-factor user authentication in wireless sensor networks’. Sensors 10(3), 2450–2459 (2010)CrossRef
20.
Zurück zum Zitat Felt, A., Evans, D.: Privacy protection for social networking apis. Web 2.0 Secur. Priv. (W2SP’08) 5(7), 56–60 (2008) Felt, A., Evans, D.: Privacy protection for social networking apis. Web 2.0 Secur. Priv. (W2SP’08) 5(7), 56–60 (2008)
21.
Zurück zum Zitat Akyildiz, I.F., Wang, X., Wang, W.: Wireless mesh networks: a survey. Comput. Netw. 47(4), 445–487 (2005)CrossRefMATH Akyildiz, I.F., Wang, X., Wang, W.: Wireless mesh networks: a survey. Comput. Netw. 47(4), 445–487 (2005)CrossRefMATH
22.
Zurück zum Zitat He, D., Bu, J., Zhu, S., et al.: Distributed access control with privacy support in wireless sensor networks. IEEE Trans. Wirel. Commun. 10(10), 3472–3481 (2011)CrossRef He, D., Bu, J., Zhu, S., et al.: Distributed access control with privacy support in wireless sensor networks. IEEE Trans. Wirel. Commun. 10(10), 3472–3481 (2011)CrossRef
23.
Zurück zum Zitat Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1–11 (2011)CrossRef Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1–11 (2011)CrossRef
24.
Zurück zum Zitat Xiao, Y., Chen, H., Yang, S., et al.: Wireless network security. EURASIP J. Wirel. Commun. Netw. 20(1), 1–3 (2009) Xiao, Y., Chen, H., Yang, S., et al.: Wireless network security. EURASIP J. Wirel. Commun. Netw. 20(1), 1–3 (2009)
25.
Zurück zum Zitat Li, M., Lou, W., Ren, K.: Data security and privacy in wireless body area networks. IEEE Wirel. Commun. 17(1), 51–58 (2010)CrossRef Li, M., Lou, W., Ren, K.: Data security and privacy in wireless body area networks. IEEE Wirel. Commun. 17(1), 51–58 (2010)CrossRef
Metadaten
Titel
RETRACTED ARTICLE: Research on the access control protocol Priccess design of network privacy protection
verfasst von
Xu Ma
Kai Kang
Wanshun Lu
Li Xu
Chen Chen
Publikationsdatum
12.02.2018
Verlag
Springer US
Erschienen in
Cluster Computing / Ausgabe Sonderheft 5/2019
Print ISSN: 1386-7857
Elektronische ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-017-1681-y

Weitere Artikel der Sonderheft 5/2019

Cluster Computing 5/2019 Zur Ausgabe