Font Size: a A A

Research On Access Control Mechanism For Privacy Protection In Wireless Networks

Posted on:2019-12-18Degree:MasterType:Thesis
Country:ChinaCandidate:L ZhangFull Text:PDF
GTID:2438330548972666Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
In recent years,the widespread application of wireless networks in medical,military,commercial fields caused public interest.There is no doubt that the wireless communication technology has brought more space for the development of electronic commerce,e-government,and tactical Internet.But we can't neglect that the open communication environment which makes wireless transmission be more vulnerable to malicious attacks than wired communication,including passive monitoring,data interception and privacy leakage.In particular,the limitation of nodes' resources makes it impractical to use security mechanisms with high computational complexity and communication overhead in the network.Therefore,the security research in wireless networks is a great challenge.As an important security service,access control is responsible for providing legitimate users with appropriate access privileges and prevents unauthorized users from accessing illegally.Therefore,it is of great theoretical significance and application value to study the access control mechanism with privacy-preservation in wireless networks.The research contents of this paper mainly include :First of all,an access control scheme,ACPP(Access Control with Privacy Preservation),which supports privacy protection and network service optimization in wireless Ad hoc networks is proposed.The main contributions of ACPP(Access Control with Privacy Preservation)include:(1)ACPP proposes the idea of “multi-factor authentication” for the first time,that is,only when the payment,the signature,and the time are all satisfied,could users access network resources;(2)In order to protect user's privacy,ACPP realizes m-anonymous for user's identities by using efficient ring signature technology.That is the verifier can't successfully guess the identity of the signatures with a probability higher than 1/m;(3)ACPP truly implements fine-grained access control,for that the intersection of users' attribute set and default attribute set decides the users' privilege.The more elements in the intersection,the greater the users' access privileges are.(4)ACPP adds an incentive mechanism into the access control scheme for the first time.The system judges the node's behavior by its trust value,and promotes the node to provide high-quality resources through a reward and penalty mechanism,which improves the service quality and optimizes the network performance.Finally,the validity and security of ACPP are verified by rigorous theoretical analysis and simulation experiments.Secondly,a distributed access control scheme ABS-DAC(Distributed Access Control with Attribute-Based Signature)based on attribute signature in wireless body area network is proposed.The main contributions of the scheme include:(1)ABS-DAC controls users' access through attribute signatures and monotonic predicates.When the attributes of the user satisfy the predicates embedded in the signature,it is allowed to access the data monitored by the sensor;(2)There are multiple authority centers in ABS-DAC,and every two authority centers share a pseudo-random function seed,which effectively solves the security issues of key distribution and collusion attacks;(3)In order to achieve the ??),(-differential privacy,we add Gaussian noise with a mean of 0 and standard deviation of ? in the transfer phase.Therefore,even if an attacker intercepts data in a transmission,it cannot determine whether a node's sensitive data exists in the intercepted data set.Finally,rigorous theoretical analysis and simulation experiments demonstrate the security and effectiveness of the access control based on the attribute signature ABS-DAC.
Keywords/Search Tags:Wireless networks, Access control, Privacy preservation, Ring signature, Attribute signature, Differential privacy
PDF Full Text Request
Related items