Computer and Modernization ›› 2020, Vol. 0 ›› Issue (04): 52-.doi: 10.3969/j.issn.1006-2475.2020.04.010
Previous Articles Next Articles
Received:
2019-07-18
Online:
2020-04-22
Published:
2020-04-24
CLC Number:
WU Jin-yu1, ZHANG Li-juan2, SUN Hong-di2, LAI Yu-yang2. Trusted Secure Access Scheme of Ubiquitous Power IoT[J]. Computer and Modernization, 2020, 0(04): 52-.
Add to citation manager EndNote|Ris|BibTeX
URL: http://www.c-a-m.org.cn/EN/10.3969/j.issn.1006-2475.2020.04.010
[1] NOUAILHAT A. European parliament resolution on nanosciences and nanotechnologies: An action plan for Europe 2005-2009[M]// An Introduction to Nanoscience and Nanotechnology. ISTE, 2010. [2] 国家标准化委员会. GB/T 36468-2018,物联网系统评价指标体系编制通则[S]. [3] 国家标准化委员会. GB/T 36478.1-2018,物联网信息交换和共享第1部分:总体架构[S]. [4] 国家标准化委员会. GB/T 36478.2-2018,物联网信息交换和共享第2部分:通用技术要求[S]. [5] 王澎. 基于可信计算的终端安全防护系统[J]. 信息安全与通信保密, 2010,1(1):119-121. [6] HAHN A, ASHOK A, SRIDHAR S, et al. Cyber-physical security test beds: Architecture, application, and evaluation for smart grid[J]. IEEE Transactions on Smart Grid, 2015,4(2):1-6. [7] HALL J, BARBEAU M, KRANAKIS E. Detection of transient in radio frequency fingerprinting using signal phase[C]// The IASTED International Conference on Wireless & Optical Communications. 2003:13-18. [8] HALL J, BARBEAU M, KRANAKIS E. Enhancing intrusion detection in wireless networks using radio frequency fingerprinting (Extended Abstract)[C]// Communications, Internet and Information Technology (CIIT). 2004:103-108. [9] PORAMBAGE P, SCHMITT C, KUMAR P, et al. Two-phase authentication protocol for wireless sensor networks in distributed IoT applications[C]// Wireless Communications and Networking Conference. 2014:2728-2733. [10]MOOSAVI S R, GIA T N, RAHMANI A, et al. SEA: A secure and efficient authentication and authorization architecture for IoT-based healthcare using smart gateways[J]. Procedia Computer Science, 2015,52(1):452-459. [11]AMIN R, KUMAR N, BISWAS G P, et al. A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment[J]. Future Generation Computer Systems, 2018,78(3):1005-1019. [12]王春东,白仪,莫秀良,等. 基于物联网的身份双向认证机制研究[J]. 南开大学学报(自然科学版), 2016,49(2):22-28. [13]冯福伟,李瑛,徐冠宁,等. 基于集群架构的物联网身份认证系统[J]. 计算机应用, 2013,33(S1):126-129. [14]戚湧,徐阳,李千目. 一种物联网密钥管理和认证方案[J]. 计算机与现代化, 2014(12):91-96. [15]SCIANCALEPORE S, CAPOSSELE A, PIRO G, et al. Key management protocol with implicit certificates for IoT systems[C]// Proceedings of 2015 Workshop on IoT Challenges in Mobile and Industrial Systems. 2015:37-42. [16]WAZID M, DAS A K, ODELU V, et al. Design of secure user authenticated key management protocol for generic IoT networks[J]. IEEE Internet of Things Journal, 2018,5(1):269-282. [17]KUNG Y H, HSIAO H C. GroupIt: Lightweight group key management for dynamic IoT environments[J]. IEEE Internet of Things Journal, 2019,5(6):5155-5165. [18]SCIANCALEPORE S, PIRO G, BOGGIA G, et al. Public key authentication and key agreement in IoT devices with minimal airtime consumption[J]. IEEE Embedded Systems Letters, 2017,9(1):1-4. [19]ROMAN R, ALCARAZ C, LOPEZ J, et al. Key management systems for sensor networks in the context of the Internet of Things[J]. Computers & Electrical Engineering, 2011,37(2):147-159. [20]ESPOSITO C, FICCO M, CASTIGLIONE A, et al. Distributed group key management for event notification confidentiality among sensors[J]. IEEE Transactions on Dependable & Secure Computing, 2018(99):1. [21]LAVANYA S, USHA D M. A survey on key management in Internet of Things[C]// Proceedings of the International Conference on Intelligent Computing Systems (ICICS). 2017:572-580. [22]YE C, MATHUR S, REZNIK A, et al. Information-theoretically secret key generation for fading wireless channels[J]. IEEE Transactions on Information Forensics & Security, 2009,5(2):240-254. [23]SCIANCALEPORE S, PILC M, SCHRDER S, et al. Attribute-based access control scheme in federated IoT platforms[C]// 2017 International Workshop on Interoperability and Open-Source Solutions. 2016:123-138. [24]YEH L Y, CHIANG P Y, TSAI Y L, et al. Cloud-based fine-grained health information access control framework for lightweight IoT devices with dynamic auditing and attribute revocation[J]. IEEE Transactions on Cloud Computing, 2018,6(2):532-544. [25]HUSSEIN D, BERTIN E, FREY V. A community-driven access control approach in distributed IoT environments[J]. IEEE Communications Magazine, 2017,55(3):146-153. [26]LU B X, WANG L, LIU J L, et al. LaSa: Location aware wireless security access control for IoT systems[J]. Mobile Networks & Applications, 2018(11):1-13. [27]CRUZPIRIS L, RIVERA D, MARSAMAESTRE I, et al. Access control mechanism for IoT environments based on modelling communication procedures as resources[J]. Sensors, 2018,18(3):917-937. [28]梅颖. 基于区块链的物联网访问控制简化模型构建[J]. 中国传媒大学学报(自然科学版), 2017,24(5):7-12. [29]周超,任志宇. 结合属性与角色的访问控制模型综述[J]. 小型微型计算机系统, 2018,39(4):782-786. [30]SHANG C W, LIU Q T, ZHAO C L, et al. A research on UCON enhanced dynamic access control model for the business process of composite Web services[J]. Journal of Wuhan University, 2011,57(5):408-412. [31]杨赞,王建新,杨林,等. 多域环境下基于使用控制的融合访问控制机制[J]. 吉林大学学报(工学版), 2014,44(1):158-163. [32]蔡婷,陈昌志. 云环境下基于UCON的访问控制模型研究[J]. 计算机科学, 2014,41(S1):262-264. [33]CUI Y Q. Dynamic context_aware usage control-based grid access control model[J]. Computer Science, 2008,35(2):37-41. [34]张海鹏. 基于UCON的物联网环境访问控制模型及其应用[D]. 上海:华东理工大学, 2012. [35]丁霞,徐开勇,李立新,等. 基于UCONABC模型的电子文档安全系统[J]. 计算机工程, 2008,34(2):127-129. [36]AZIZ B. Modelling fine-grained access control policies in grids[J]. Journal of Grid Computing, 2015,14(3):1-17. [37]KRISHNAMACHARI N, IYENGAR S. Distributed Bayesian algorithms for fault tolerant event region detection in wireless sensor networks[J]. IEEE Transactions on Computers, 2004,53(3):241-250. [38]LUO X W, DONG M, HUANG Y L. On distributed fault tolerant detection in wireless sensor networks[J]. IEEE Transactions on Computers, 2006,55(1):58-70. [39]曹冬磊,曹建农,金蓓弘. 一种无线传感器网络中事件区域监测的容错算法[J]. 计算机学报, 2007,30(10):1770-1776. [40]李宏,谢政,陈建二. 一种无线传感网分布式加权容错算法[J]. 系统仿真学报, 2008,20(14):3750-3755. [41]PENG L P, GAO H, LI J Z, et al. Reliable and fast detection of gradual events in wireless sensor networks[C]// International Conference on Wireless Algorithms. 2008:261-273. [42]YM S J, CHOI Y H. An adaptive fault-tolerant event detection scheme for wireless sensor networks[J]. Sensors, 2010,10(3):2332-2447. [43]JAN M A, NANDA P, HE X, et al. A robust authentication scheme for observing resources in the Internet of Things environment[C]// 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications. 2014:205-211. |
[1] | WANG Xiaohang1, LI Yongjie1, YU Lei1, FAN Xiao2. A Method of Using Compound Event Probability Operation to Solve Problem of Negative Information Blocking Maximization [J]. Computer and Modernization, 2024, 0(12): 24-33. |
[2] | ZHOU Chuanhua1, 2, REN Taijiao1, LUO Lan1, ZHOU Hao1. Boundary Mixed Resampling Based on Joint Entropy for Imbalanced Data [J]. Computer and Modernization, 2024, 0(09): 95-100. |
[3] | HONG Guangjie, CAI Maoguo, ZHAN Kaijie, OU Jifa. MPA Algorithm Based on Adaptive Rotation Learning and Crisis Awareness Strategy [J]. Computer and Modernization, 2024, 0(07): 112-119. |
[4] | ZHAN Kaijie, CAI Maoguo, HONG Guangjie, OU Jifa. Archimedes Optimization Algorithm Based on LHS and Sine-cosine Search [J]. Computer and Modernization, 2024, 0(06): 38-42. |
[5] | ZHU Lingheng1, 2, GU Danpeng1, 2, TANG Songqiang1, 2, CHEN Xiaoyong1, 2. Algorithm for Layered Bipartite Graph Maximum Matching Problem [J]. Computer and Modernization, 2024, 0(06): 59-63. |
[6] | LI Yufei, YAN Li, ZENG Yanping, LIU Yunheng. Joint optimization of Picking Operation Based on Nested Ant Colony Algorithm [J]. Computer and Modernization, 2024, 0(06): 64-69. |
[7] | XIA Huang-zhi1, 2, CHEN Li-min3, MAO Xue-di1, 2, QI Fu1, 2. Adaptive Bald Eagle Search Algorithm Embedded with Somersault Foraging and Application [J]. Computer and Modernization, 2024, 0(02): 7-14. |
[8] | OU Ji-fa, CAI Mao-guo, HONG Guang-jie, ZHAN Kai-jie. Improved DOA Based on PWLCM and Bald Eagle’s Swooping Mechanism [J]. Computer and Modernization, 2024, 0(01): 109-116. |
[9] | XIA Huang-zhi, CHEN Li-min, MAO Xue-di, . Adaptive Bald Eagle Search Algorithm with Dynamic Learning and Gaussian Mutation [J]. Computer and Modernization, 2024, 0(01): 117-126. |
[10] | YAN Yang, ZHAN Zi-jun, CAO Shao-hua. Collaborative Device-based Large-scale Offloading: A Bi-level Optimization Algorithm Fusing Divide-and-conquer and Greedy [J]. Computer and Modernization, 2023, 0(11): 13-21. |
[11] | LU Lei, HE Zhi-ming, HUANG Zhi-cheng. An Improved Sparrow Search Algorithm Based on Multi-strategy [J]. Computer and Modernization, 2023, 0(10): 23-31. |
[12] | MA Guo-xiang, YANG Ling-fei, YAN Chuan-bo, ZHANG Zhi-hao, SUN Bing, WANG Xiao-rong. Ultrasonic Image Diagnosis of Hepatic Echinococcosis Based on Deep DenseNet Network [J]. Computer and Modernization, 2023, 0(09): 100-104. |
[13] | HAN Xue. Multi Path Planning Based on Constrained Clustering and Particle Swarm Optimization [J]. Computer and Modernization, 2023, 0(08): 7-11. |
[14] | LAI Jian-bin, FENG Gang. An Experience Replay Strategy Based on Mixed Samples [J]. Computer and Modernization, 2023, 0(06): 33-38. |
[15] | ZHAO Ying, ZHAI Yuan-wei, CHEN Jun-jun, TENG Jian. Time Series Forecasting Model Based on LSTM-Prophet Nonlinear Combination [J]. Computer and Modernization, 2020, 0(09): 6-11. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||